Home / Journals / CMC / Online First
Special Issues
Table of Content
  • Open Access

    ARTICLE

    Hourglass-GCN for 3D Human Pose Estimation Using Skeleton Structure and View Correlation

    Ange Chen, Chengdong Wu*, Chuanjiang Leng
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059284
    Abstract Previous multi-view 3D human pose estimation methods neither correlate different human joints in each view nor model learnable correlations between the same joints in different views explicitly, meaning that skeleton structure information is not utilized and multi-view pose information is not completely fused. Moreover, existing graph convolutional operations do not consider the specificity of different joints and different views of pose information when processing skeleton graphs, making the correlation weights between nodes in the graph and their neighborhood nodes shared. Existing Graph Convolutional Networks (GCNs) cannot extract global and deep-level skeleton structure information and view… More >

  • Open Access

    ARTICLE

    LEGF-DST: LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection

    Xin Tong1, Jingya Wang1,*, Ying Yang2, Tian Peng3, Hanming Zhai1, Guangming Ling4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059018
    Abstract With the widespread use of SMS (Short Message Service), the proliferation of malicious SMS has emerged as a pressing societal issue. While deep learning-based text classifiers offer promise, they often exhibit suboptimal performance in fine-grained detection tasks, primarily due to imbalanced datasets and insufficient model representation capabilities. To address this challenge, this paper proposes an LLMs-enhanced graph fusion dual-stream Transformer model for fine-grained Chinese malicious SMS detection. During the data processing stage, Large Language Models (LLMs) are employed for data augmentation, mitigating dataset imbalance. In the data input stage, both word-level and character-level features are More >

  • Open Access

    ARTICLE

    ACSF-ED: Adaptive Cross-Scale Fusion Encoder-Decoder for Spatio-Temporal Action Detection

    Wenju Wang1, Zehua Gu1,*, Bang Tang1, Sen Wang2, Jianfei Hao2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057392
    (This article belongs to the Special Issue: Machine Vision Detection and Intelligent Recognition, 2nd Edition)
    Abstract Current spatio-temporal action detection methods lack sufficient capabilities in extracting and comprehending spatio-temporal information. This paper introduces an end-to-end Adaptive Cross-Scale Fusion Encoder-Decoder (ACSF-ED) network to predict the action and locate the object efficiently. In the Adaptive Cross-Scale Fusion Spatio-Temporal Encoder (ACSF ST-Encoder), the Asymptotic Cross-scale Feature-fusion Module (ACCFM) is designed to address the issue of information degradation caused by the propagation of high-level semantic information, thereby extracting high-quality multi-scale features to provide superior features for subsequent spatio-temporal information modeling. Within the Shared-Head Decoder structure, a shared classification and regression detection head is constructed. A More >

  • Open Access

    ARTICLE

    Detecting Ethereum Ponzi Scheme Based on Hybrid Sampling for Smart Contract

    Yuanjun Qu, Xiameng Si*, Haiyan Kang, Hanlin Zhou
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057368
    Abstract With the widespread use of blockchain technology for smart contracts and decentralized applications on the Ethereum platform, the blockchain has become a cornerstone of trust in the modern financial system. However, its anonymity has provided new ways for Ponzi schemes to commit fraud, posing significant risks to investors. Current research still has some limitations, for example, Ponzi schemes are difficult to detect in the early stages of smart contract deployment, and data imbalance is not considered. In addition, there is room for improving the detection accuracy. To address the above issues, this paper proposes LT-SPSD… More >

  • Open Access

    ARTICLE

    An Arrhythmia Intelligent Recognition Method Based on a Multimodal Information and Spatio-Temporal Hybrid Neural Network Model

    Xinchao Han1,2, Aojun Zhang1,2, Runchuan Li1,2,*, Shengya Shen3, Di Zhang1,2, Bo Jin1,2, Longfei Mao1,2, Linqi Yang1,2, Shuqin Zhang1,2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059403
    (This article belongs to the Special Issue: Emerging Trends and Applications of Deep Learning for Biomedical Signal and Image Processing)
    Abstract Electrocardiogram (ECG) analysis is critical for detecting arrhythmias, but traditional methods struggle with large-scale Electrocardiogram data and rare arrhythmia events in imbalanced datasets. These methods fail to perform multi-perspective learning of temporal signals and Electrocardiogram images, nor can they fully extract the latent information within the data, falling short of the accuracy required by clinicians. Therefore, this paper proposes an innovative hybrid multimodal spatiotemporal neural network to address these challenges. The model employs a multimodal data augmentation framework integrating visual and signal-based features to enhance the classification performance of rare arrhythmias in imbalanced datasets. Additionally, More >

  • Open Access

    ARTICLE

    Vector Extraction from Design Drawings for Intelligent 3D Modeling of Transmission Towers

    Ziqiang Tang1, Chao Han1, Hongwu Li1, Zhou Fan1, Ke Sun1, Yuntian Huang1, Yuhang Chen2, Chenxing Wang2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059094
    Abstract Accurate vector extraction from design drawings is required first to automatically create 3D models from pixel-level engineering design drawings. However, this task faces the challenges of complicated design shapes as well as cumbersome and cluttered annotations on drawings, which interfere with the vector extraction heavily. In this article, the transmission tower containing the most complex structure is taken as the research object, and a semantic segmentation network is constructed to first segment the shape masks from the pixel-level drawings. Preprocessing and postprocessing are also proposed to ensure the stability and accuracy of the shape mask… More >

  • Open Access

    ARTICLE

    Study on Sediment Removal Method of Reservoir Based on Double Branch Convolution

    Hailong Wang1, Junchao Shi1,2, Xinjie Li2,3,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058277
    Abstract In response to the limitations and low computational efficiency of one-dimensional water and sediment models in representing complex hydrological conditions, this paper proposes a dual branch convolution method based on deep learning. This method utilizes the ability of deep learning to extract data features and introduces a dual branch convolutional network to handle the non-stationary and nonlinear characteristics of noise and reservoir sediment transport data. This method combines permutation variant structure to preserve the original time series information, constructs a corresponding time series model, models and analyzes the changes in the outbound water and sediment… More >

  • Open Access

    REVIEW

    Review of Techniques for Integrating Security in Software Development Lifecycle

    Hassan Saeed1, Imran Shafi1, Jamil Ahmad2, Adnan Ahmed Khan3, Tahir Khurshaid4,*, Imran Ashraf5,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057587
    Abstract Software-related security aspects are a growing and legitimate concern, especially with 5G data available just at our palms. To conduct research in this field, periodic comparative analysis is needed with the new techniques coming up rapidly. The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle (SDLC) by analyzing the articles published in the last two decades and to propose a way forward. This review follows Kitchenham’s review protocol. The review has been divided into three main stages including planning, execution, and analysis.… More >

  • Open Access

    ARTICLE

    Federated Learning’s Role in Next-Gen TV Ad Optimization

    Gabriela Dobrița, Simona-Vasilica Oprea*, Adela Bâra
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058656
    Abstract In the rapidly evolving landscape of television advertising, optimizing ad schedules to maximize viewer engagement and revenue has become significant. Traditional methods often operate in silos, limiting the potential insights gained from broader data analysis due to concerns over privacy and data sharing. This article introduces a novel approach that leverages Federated Learning (FL) to enhance TV ad schedule optimization, combining the strengths of local optimization techniques with the power of global Machine Learning (ML) models to uncover actionable insights without compromising data privacy. It combines linear programming for initial ads scheduling optimization with ML—specifically,… More >

  • Open Access

    ARTICLE

    Dynamic Task Offloading Scheme for Edge Computing via Meta-Reinforcement Learning

    Jiajia Liu1,*, Peng Xie2, Wei Li2, Bo Tang2, Jianhua Liu2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058810
    (This article belongs to the Special Issue: Edge-based IoT Systems with Cross-Designs of Communication, Computing, and Control)
    Abstract As an important complement to cloud computing, edge computing can effectively reduce the workload of the backbone network. To reduce latency and energy consumption of edge computing, deep learning is used to learn the task offloading strategies by interacting with the entities. In actual application scenarios, users of edge computing are always changing dynamically. However, the existing task offloading strategies cannot be applied to such dynamic scenarios. To solve this problem, we propose a novel dynamic task offloading framework for distributed edge computing, leveraging the potential of meta-reinforcement learning (MRL). Our approach formulates a multi-objective… More >

  • Open Access

    ARTICLE

    Machine Learning for QoS Optimization and Energy-Efficient in Routing Clustering Wireless Sensors

    Rahma Gantassi, Zaki Masood, Yonghoon Choi*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058143
    (This article belongs to the Special Issue: From Nodes to Knowledge: Harnessing Wireless Sensor Networks)
    Abstract Wireless sensor network (WSN) technologies have advanced significantly in recent years. Within WSNs, machine learning algorithms are crucial in selecting cluster heads (CHs) based on various quality of service (QoS) metrics. This paper proposes a new clustering routing protocol employing the Traveling Salesman Problem (TSP) to locate the optimal path traversed by the Mobile Data Collector (MDC), in terms of energy and QoS efficiency. To be more specific, to minimize energy consumption in the CH election stage, we have developed the M-T protocol using the K-Means and the grid clustering algorithms. In addition, to improve More >

  • Open Access

    ARTICLE

    A Support Vector Machine (SVM) Model for Privacy Recommending Data Processing Model (PRDPM) in Internet of Vehicles

    Ali Alqarni*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059238
    Abstract Open networks and heterogeneous services in the Internet of Vehicles (IoV) can lead to security and privacy challenges. One key requirement for such systems is the preservation of user privacy, ensuring a seamless experience in driving, navigation, and communication. These privacy needs are influenced by various factors, such as data collected at different intervals, trip durations, and user interactions. To address this, the paper proposes a Support Vector Machine (SVM) model designed to process large amounts of aggregated data and recommend privacypreserving measures. The model analyzes data based on user demands and interactions with service More >

  • Open Access

    ARTICLE

    TB-Graph: Enhancing Encrypted Malicious Traffic Classification through Relational Graph Attention Networks

    Ming Liu, Qichao Yang, Wenqing Wang, Shengli Liu*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059417
    Abstract The proliferation of internet traffic encryption has become a double-edged sword. While it significantly enhances user privacy, it also inadvertently shields cyber-attacks from detection, presenting a formidable challenge to cybersecurity. Traditional machine learning and deep learning techniques often fall short in identifying encrypted malicious traffic due to their inability to fully extract and utilize the implicit relational and positional information embedded within data packets. This limitation has led to an unresolved challenge in the cybersecurity community: how to effectively extract valuable insights from the complex patterns of traffic packet transmission. Consequently, this paper introduces the… More >

  • Open Access

    ARTICLE

    PIAFGNN: Property Inference Attacks against Federated Graph Neural Networks

    Jiewen Liu1, Bing Chen1,2,*, Baolu Xue1, Mengya Guo1, Yuntao Xu1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057814
    Abstract Federated Graph Neural Networks (FedGNNs) have achieved significant success in representation learning for graph data, enabling collaborative training among multiple parties without sharing their raw graph data and solving the data isolation problem faced by centralized GNNs in data-sensitive scenarios. Despite the plethora of prior work on inference attacks against centralized GNNs, the vulnerability of FedGNNs to inference attacks has not yet been widely explored. It is still unclear whether the privacy leakage risks of centralized GNNs will also be introduced in FedGNNs. To bridge this gap, we present PIAFGNN, the first property inference attack… More >

  • Open Access

    ARTICLE

    Side-Scan Sonar Image Detection of Shipwrecks Based on CSC-YOLO Algorithm

    Shengxi Jiao1, Fenghao Xu1, Haitao Guo2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057192
    (This article belongs to the Special Issue: Research on Deep Learning-based Object Detection and Its Derivative Key Technologies)
    Abstract Underwater shipwreck identification technology, as a crucial technique in the field of marine surveying, plays a significant role in areas such as the search and rescue of maritime disaster shipwrecks. When facing the task of object detection in shipwreck side-scan sonar images, due to the complex seabed environment, it is difficult to extract object features, often leading to missed detections of shipwreck images and slow detection speed. To address these issues, this paper proposes an object detection algorithm, CSC-YOLO (Context Guided Block, Shared Conv_Group Normalization Detection, Cross Stage Partial with 2 Partial Convolution-You Only Look… More >

  • Open Access

    ARTICLE

    VTAN: A Novel Video Transformer Attention-Based Network for Dynamic Sign Language Recognition

    Ziyang Deng1, Weidong Min1,2,3,*, Qing Han1,2,3, Mengxue Liu1, Longfei Li1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057456
    Abstract Dynamic sign language recognition holds significant importance, particularly with the application of deep learning to address its complexity. However, existing methods face several challenges. Firstly, recognizing dynamic sign language requires identifying keyframes that best represent the signs, and missing these keyframes reduces accuracy. Secondly, some methods do not focus enough on hand regions, which are small within the overall frame, leading to information loss. To address these challenges, we propose a novel Video Transformer Attention-based Network (VTAN) for dynamic sign language recognition. Our approach prioritizes informative frames and hand regions effectively. To tackle the first… More >

  • Open Access

    REVIEW

    Enhancing Deepfake Detection: Proactive Forensics Techniques Using Digital Watermarking

    Zhimao Lai1,2, Saad Arif3, Cong Feng4, Guangjun Liao5, Chuntao Wang6,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059370
    (This article belongs to the Special Issue: Challenges and Innovations in Multimedia Encryption and Information Security)
    Abstract With the rapid advancement of visual generative models such as Generative Adversarial Networks (GANs) and stable Diffusion, the creation of highly realistic Deepfake through automated forgery has significantly progressed. This paper examines the advancements in Deepfake detection and defense technologies, emphasizing the shift from passive detection methods to proactive digital watermarking techniques. Passive detection methods, which involve extracting features from images or videos to identify forgeries, encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics. In contrast, proactive digital watermarking techniques embed specific markers into images or videos, facilitating More >

  • Open Access

    ARTICLE

    Improving Machine Translation Formality with Large Language Models

    Murun Yang1,*, Fuxue Li2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058248
    Abstract Preserving formal style in neural machine translation (NMT) is essential, yet often overlooked as an optimization objective of the training processes. This oversight can lead to translations that, though accurate, lack formality. In this paper, we propose how to improve NMT formality with large language models (LLMs), which combines the style transfer and evaluation capabilities of an LLM and the high-quality translation generation ability of NMT models to improve NMT formality. The proposed method (namely INMTF) encompasses two approaches. The first involves a revision approach using an LLM to revise the NMT-generated translation, ensuring a… More >

  • Open Access

    ARTICLE

    Particle Swarm Optimization Algorithm for Feature Selection Inspired by Peak Ecosystem Dynamics

    Shaobo Deng*, Meiru Xie, Bo Wang, Shuaikun Zhang, Sujie Guan, Min Li
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057874
    Abstract In recent years, particle swarm optimization (PSO) has received widespread attention in feature selection due to its simplicity and potential for global search. However, in traditional PSO, particles primarily update based on two extreme values: personal best and global best, which limits the diversity of information. Ideally, particles should learn from multiple advantageous particles to enhance interactivity and optimization efficiency. Accordingly, this paper proposes a PSO that simulates the evolutionary dynamics of species survival in mountain peak ecology (PEPSO) for feature selection. Based on the pyramid topology, the algorithm simulates the features of mountain peak… More >

  • Open Access

    ARTICLE

    A Latency-Aware and Fault-Tolerant Framework for Resource Scheduling and Data Management in Fog-Enabled Smart City Transportation Systems

    Ibrar Afzal1, Noor ul Amin1,*, Zulfiqar Ahmad1,*, Abdulmohsen Algarni2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057755
    (This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)
    Abstract The deployment of the Internet of Things (IoT) with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses, smart cities, and smart transportation systems. Fog computing tackles a range of challenges, including processing, storage, bandwidth, latency, and reliability, by locally distributing secure information through end nodes. Consisting of endpoints, fog nodes, and back-end cloud infrastructure, it provides advanced capabilities beyond traditional cloud computing. In smart environments, particularly within smart city transportation systems, the abundance of devices and nodes poses significant challenges related… More >

  • Open Access

    ARTICLE

    Retinexformer+: Retinex-Based Dual-Channel Transformer for Low-Light Image Enhancement

    Song Liu1,2, Hongying Zhang1,*, Xue Li1, Xi Yang1,3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057662
    (This article belongs to the Special Issue: Data and Image Processing in Intelligent Information Systems)
    Abstract Enhancing low-light images with color distortion and uneven multi-light source distribution presents challenges. Most advanced methods for low-light image enhancement are based on the Retinex model using deep learning. Retinexformer introduces channel self-attention mechanisms in the IG-MSA. However, it fails to effectively capture long-range spatial dependencies, leaving room for improvement. Based on the Retinexformer deep learning framework, we designed the Retinexformer+ network. The “+” signifies our advancements in extracting long-range spatial dependencies. We introduced multi-scale dilated convolutions in illumination estimation to expand the receptive field. These convolutions effectively capture the weakening semantic dependency between pixels… More >

  • Open Access

    ARTICLE

    Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model

    Hoon Ko1, Marek R. Ogiela2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057257
    (This article belongs to the Special Issue: Innovative AI Applications in Pattern Recognition and Visual Data Processing and Hiding)
    Abstract This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology. By combining the strengths of blockchain and generative AI, the research team aimed to address the timely challenge of safeguarding visual medical content. The participating researchers conducted a comprehensive analysis, examining the vulnerabilities of medical AI services, personal information protection issues, and overall security weaknesses. This multifaceted exploration led to an in-depth evaluation of the model’s performance and security. Notably, the correlation between accuracy, detection rate, and error rate was… More >

  • Open Access

    ARTICLE

    Unsupervised Low-Light Image Enhancement Based on Explicit Denoising and Knowledge Distillation

    Wenkai Zhang1,2, Hao Zhang1,2, Xianming Liu1, Xiaoyu Guo1,2, Xinzhe Wang1, Shuiwang Li1,2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059000
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Under low-illumination conditions, the quality of image signals deteriorates significantly, typically characterized by a peak signal-to-noise ratio (PSNR) below 10 dB, which severely limits the usability of the images. Supervised methods, which utilize paired high-low light images as training sets, can enhance the PSNR to around 20 dB, significantly improving image quality. However, such data is challenging to obtain. In recent years, unsupervised low-light image enhancement (LIE) methods based on the Retinex framework have been proposed, but they generally lag behind supervised methods by 5–10 dB in performance. In this paper, we introduce the Denoising-Distilled… More >

  • Open Access

    ARTICLE

    SEFormer: A Lightweight CNN-Transformer Based on Separable Multiscale Depthwise Convolution and Efficient Self-Attention for Rotating Machinery Fault Diagnosis

    Hongxing Wang1, Xilai Ju2, Hua Zhu1,*, Huafeng Li1,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058785
    (This article belongs to the Special Issue: Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems)
    Abstract Traditional data-driven fault diagnosis methods depend on expert experience to manually extract effective fault features of signals, which has certain limitations. Conversely, deep learning techniques have gained prominence as a central focus of research in the field of fault diagnosis by strong fault feature extraction ability and end-to-end fault diagnosis efficiency. Recently, utilizing the respective advantages of convolution neural network (CNN) and Transformer in local and global feature extraction, research on cooperating the two have demonstrated promise in the field of fault diagnosis. However, the cross-channel convolution mechanism in CNN and the self-attention calculations in… More >
    Graphic Abstract

    SEFormer: A Lightweight CNN-Transformer Based on Separable Multiscale Depthwise Convolution and Efficient Self-Attention for Rotating Machinery Fault Diagnosis

  • Open Access

    ARTICLE

    LiDAR-Visual SLAM with Integrated Semantic and Texture Information for Enhanced Ecological Monitoring Vehicle Localization

    Yiqing Lu1, Liutao Zhao2,*, Qiankun Zhao3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058757
    Abstract Ecological monitoring vehicles are equipped with a range of sensors and monitoring devices designed to gather data on ecological and environmental factors. These vehicles are crucial in various fields, including environmental science research, ecological and environmental monitoring projects, disaster response, and emergency management. A key method employed in these vehicles for achieving high-precision positioning is LiDAR (lightlaser detection and ranging)-Visual Simultaneous Localization and Mapping (SLAM). However, maintaining high-precision localization in complex scenarios, such as degraded environments or when dynamic objects are present, remains a significant challenge. To address this issue, we integrate both semantic and… More >

  • Open Access

    ARTICLE

    A Study on Polyp Dataset Expansion Algorithm Based on Improved Pix2Pix

    Ziji Xiao1, Kaibo Yang1, Mingen Zhong1,*, Kang Fan2, Jiawei Tan2, Zhiying Deng1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058345
    Abstract The polyp dataset involves the confidentiality of medical records, so it might be difficult to obtain datasets with accurate annotations. This problem can be effectively solved by expanding the polyp data set with algorithms. The traditional polyp dataset expansion scheme usually requires the use of two models or traditional visual methods. These methods are both tedious and difficult to provide new polyp features for training data. Therefore, our research aims to efficiently generate high-quality polyp samples, so as to effectively expand the polyp dataset. In this study, we first added the attention mechanism to the… More >

  • Open Access

    ARTICLE

    Improving the Position Accuracy and Computational Efficiency of UAV Terrain Aided Navigation Using a Two-Stage Hybrid Fuzzy Particle Filtering Method

    Sofia Yousuf1, Muhammad Bilal Kadri2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.054587
    Abstract Terrain Aided Navigation (TAN) technology has become increasingly important due to its effectiveness in environments where Global Positioning System (GPS) is unavailable. In recent years, TAN systems have been extensively researched for both aerial and underwater navigation applications. However, many TAN systems that rely on recursive Unmanned Aerial Vehicle (UAV) position estimation methods, such as Extended Kalman Filters (EKF), often face challenges with divergence and instability, particularly in highly non-linear systems. To address these issues, this paper proposes and investigates a hybrid two-stage TAN positioning system for UAVs that utilizes Particle Filter. To enhance the… More >

  • Open Access

    ARTICLE

    HRAM-VITON: High-Resolution Virtual Try-On with Attention Mechanism

    Yue Chen1, Xiaoman Liang1,2,*, Mugang Lin1,2, Fachao Zhang1, Huihuang Zhao1,2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059530
    Abstract The objective of image-based virtual try-on is to seamlessly integrate clothing onto a target image, generating a realistic representation of the character in the specified attire. However, existing virtual try-on methods frequently encounter challenges, including misalignment between the body and clothing, noticeable artifacts, and the loss of intricate garment details. To overcome these challenges, we introduce a two-stage high-resolution virtual try-on framework that integrates an attention mechanism, comprising a garment warping stage and an image generation stage. During the garment warping stage, we incorporate a channel attention mechanism to effectively retain the critical features of… More >

  • Open Access

    ARTICLE

    YOLO-LFD: A Lightweight and Fast Model for Forest Fire Detection

    Honglin Wang1, Yangyang Zhang2,*, Cheng Zhu3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058932
    (This article belongs to the Special Issue: Research on Deep Learning-based Object Detection and Its Derivative Key Technologies)
    Abstract Forest fires pose a serious threat to ecological balance, air quality, and the safety of both humans and wildlife. This paper presents an improved model based on You Only Look Once version 5 (YOLOv5), named YOLO Lightweight Fire Detector (YOLO-LFD), to address the limitations of traditional sensor-based fire detection methods in terms of real-time performance and accuracy. The proposed model is designed to enhance inference speed while maintaining high detection accuracy on resource-constrained devices such as drones and embedded systems. Firstly, we introduce Depthwise Separable Convolutions (DSConv) to reduce the complexity of the feature extraction… More >

  • Open Access

    ARTICLE

    Two-Phase Software Fault Localization Based on Relational Graph Convolutional Neural Networks

    Xin Fan1,2, Zhenlei Fu1,2,*, Jian Shu1,2, Zuxiong Shen1,2, Yun Ge1,2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057695
    Abstract Spectrum-based fault localization (SBFL) generates a ranked list of suspicious elements by using the program execution spectrum, but the excessive number of elements ranked in parallel results in low localization accuracy. Most researchers consider intra-class dependencies to improve localization accuracy. However, some studies show that inter-class method call type faults account for more than 20%, which means such methods still have certain limitations. To solve the above problems, this paper proposes a two-phase software fault localization based on relational graph convolutional neural networks (Two-RGCNFL). Firstly, in Phase 1, the method call dependence graph (MCDG) of… More >

  • Open Access

    ARTICLE

    A Perspective-Aware Cyclist Image Generation Method for Perception Development of Autonomous Vehicles

    Beike Yu1, Dafang Wang1,*, Xing Cui2, Bowen Yang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059594
    Abstract Realistic urban scene generation has been extensively studied for the sake of the development of autonomous vehicles. However, the research has primarily focused on the synthesis of vehicles and pedestrians, while the generation of cyclists is rarely presented due to its complexity. This paper proposes a perspective-aware and realistic cyclist generation method via object retrieval. Images, semantic maps, and depth labels of objects are first collected from existing datasets, categorized by class and perspective, and calculated by an algorithm newly designed according to imaging principles. During scene generation, objects with the desired class and perspective… More >

  • Open Access

    ARTICLE

    Decentralized Federated Graph Learning via Surrogate Model

    Bolin Zhang, Ruichun Gu*, Haiying Liu
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.060331
    (This article belongs to the Special Issue: Graph Neural Networks: Methods and Applications in Graph-related Problems)
    Abstract Federated Graph Learning (FGL) enables model training without requiring each client to share local graph data, effectively breaking data silos by aggregating the training parameters from each terminal while safeguarding data privacy. Traditional FGL relies on a centralized server for model aggregation; however, this central server presents challenges such as a single point of failure and high communication overhead. Additionally, efficiently training a robust personalized local model for each client remains a significant objective in federated graph learning. To address these issues, we propose a decentralized Federated Graph Learning framework with efficient communication, termed Decentralized… More >

  • Open Access

    ARTICLE

    Dual-Task Contrastive Meta-Learning for Few-Shot Cross-Domain Emotion Recognition

    Yujiao Tang1, Yadong Wu1,*, Yuanmei He2, Jilin Liu1, Weihan Zhang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059115
    Abstract Emotion recognition plays a crucial role in various fields and is a key task in natural language processing (NLP). The objective is to identify and interpret emotional expressions in text. However, traditional emotion recognition approaches often struggle in few-shot cross-domain scenarios due to their limited capacity to generalize semantic features across different domains. Additionally, these methods face challenges in accurately capturing complex emotional states, particularly those that are subtle or implicit. To overcome these limitations, we introduce a novel approach called Dual-Task Contrastive Meta-Learning (DTCML). This method combines meta-learning and contrastive learning to improve emotion… More >

  • Open Access

    ARTICLE

    MG-SLAM: RGB-D SLAM Based on Semantic Segmentation for Dynamic Environment in the Internet of Vehicles

    Fengju Zhang1, Kai Zhu2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058944
    (This article belongs to the Special Issue: Advanced Communication and Networking Technologies for Internet of Things and Internet of Vehicles)
    Abstract The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology plays a crucial role in vehicle localization and navigation. Traditional Simultaneous Localization and Mapping (SLAM) systems are designed for use in static environments, and they can result in poor performance in terms of accuracy and robustness when used in dynamic environments where objects are in constant movement. To address this issue, a new real-time visual SLAM system called MG-SLAM has been developed. Based on ORB-SLAM2,… More >

  • Open Access

    ARTICLE

    An Iterated Greedy Algorithm with Memory and Learning Mechanisms for the Distributed Permutation Flow Shop Scheduling Problem

    Binhui Wang, Hongfeng Wang*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058885
    (This article belongs to the Special Issue: Recent Advances in Ensemble Framework of Meta-heuristics and Machine Learning: Methods and Applications)
    Abstract The distributed permutation flow shop scheduling problem (DPFSP) has received increasing attention in recent years. The iterated greedy algorithm (IGA) serves as a powerful optimizer for addressing such a problem because of its straightforward, single-solution evolution framework. However, a potential draw-back of IGA is the lack of utilization of historical information, which could lead to an imbalance between exploration and exploitation, especially in large-scale DPFSPs. As a consequence, this paper develops an IGA with memory and learning mechanisms (MLIGA) to efficiently solve the DPFSP targeted at the mini-mal makespan. In MLIGA, we incorporate a memory… More >

  • Open Access

    ARTICLE

    Enhanced Multi-Scale Object Detection Algorithm for Foggy Traffic Scenarios

    Honglin Wang1, Zitong Shi2,*, Cheng Zhu3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058474
    (This article belongs to the Special Issue: Machine Vision Detection and Intelligent Recognition, 2nd Edition)
    Abstract In foggy traffic scenarios, existing object detection algorithms face challenges such as low detection accuracy, poor robustness, occlusion, missed detections, and false detections. To address this issue, a multi-scale object detection algorithm based on an improved YOLOv8 has been proposed. Firstly, a lightweight attention mechanism, Triplet Attention, is introduced to enhance the algorithm’s ability to extract multi-dimensional and multi-scale features, thereby improving the receptive capability of the feature maps. Secondly, the Diverse Branch Block (DBB) is integrated into the CSP Bottleneck with two Convolutions (C2F) module to strengthen the fusion of semantic information across different… More >

  • Open Access

    ARTICLE

    Innovative Approaches to Task Scheduling in Cloud Computing Environments Using an Advanced Willow Catkin Optimization Algorithm

    Jeng-Shyang Pan1,2, Na Yu1, Shu-Chuan Chu1,*, An-Ning Zhang1, Bin Yan3, Junzo Watada4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058450
    Abstract The widespread adoption of cloud computing has underscored the critical importance of efficient resource allocation and management, particularly in task scheduling, which involves assigning tasks to computing resources for optimized resource utilization. Several meta-heuristic algorithms have shown effectiveness in task scheduling, among which the relatively recent Willow Catkin Optimization (WCO) algorithm has demonstrated potential, albeit with apparent needs for enhanced global search capability and convergence speed. To address these limitations of WCO in cloud computing task scheduling, this paper introduces an improved version termed the Advanced Willow Catkin Optimization (AWCO) algorithm. AWCO enhances the algorithm’s… More >

  • Open Access

    ARTICLE

    Multi-Scale Feature Fusion Network Model for Wireless Capsule Endoscopic Intestinal Lesion Detection

    Shiren Ye, Qi Meng, Shuo Zhang, Hui Wang*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058250
    (This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
    Abstract WCE (Wireless Capsule Endoscopy) is a new technology that combines computer vision and medicine, allowing doctors to visualize the conditions inside the intestines, achieving good diagnostic results. However, due to the complex intestinal environment and limited pixel resolution of WCE videos, lesions are not easily detectable, and it takes an experienced doctor 1–2 h to analyze a complete WCE video. The use of computer-aided diagnostic methods, assisting or even replacing manual WCE diagnosis, has significant application value. In response to the issue of intestinal lesion detection in WCE videos, this paper proposes a multi-scale feature… More >

  • Open Access

    ARTICLE

    LIRB-Based Quantum Circuit Fidelity Assessment and Gate Fault Diagnosis

    Mengdi Yang, Feng Yue, Weilong Wang, Xiangdong Meng, Lixin Wang, Pengyu Han, Haoran He, Benzheng Yuan, Zhiqiang Fan, Chenhui Wang, Qiming Du, Danyang Zheng, Xuefei Feng, Zheng Shan*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058163
    (This article belongs to the Special Issue: Cyber-Physical Systems: recent advances, challenges and opportunities)
    Abstract Quantum circuit fidelity is a crucial metric for assessing the accuracy of quantum computation results and indicating the precision of quantum algorithm execution. The primary methods for assessing quantum circuit fidelity include direct fidelity estimation and mirror circuit fidelity estimation. The former is challenging to implement in practice, while the latter requires substantial classical computational resources and numerous experimental runs. In this paper, we propose a fidelity estimation method based on Layer Interleaved Randomized Benchmarking, which decomposes a complex quantum circuit into multiple sublayers. By independently evaluating the fidelity of each layer, one can comprehensively… More >

  • Open Access

    ARTICLE

    An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things

    Gang Xu1,2,6, Xinyu Fan1, Xiu-Bo Chen2, Xin Liu4, Zongpeng Li5, Yanhui Mao6,7, Kejia Zhang3,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057882
    Abstract Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure,… More >

  • Open Access

    ARTICLE

    Salient Object Detection Based on Multi-Strategy Feature Optimization

    Libo Han1,2, Sha Tao1,2, Wen Xia3, Weixin Sun3, Li Yan3, Wanlin Gao1,2,3,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057833
    Abstract At present, salient object detection (SOD) has achieved considerable progress. However, the methods that perform well still face the issue of inadequate detection accuracy. For example, sometimes there are problems of missed and false detections. Effectively optimizing features to capture key information and better integrating different levels of features to enhance their complementarity are two significant challenges in the domain of SOD. In response to these challenges, this study proposes a novel SOD method based on multi-strategy feature optimization. We propose the multi-size feature extraction module (MSFEM), which uses the attention mechanism, the multi-level feature… More >

  • Open Access

    ARTICLE

    A Fine-Grained Defect Prediction Method Based on Drift-Immune Graph Neural Networks

    Fengyu Yang1,2,*, Fa Zhong2, Xiaohui Wei1, Guangdong Zeng2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057697
    Abstract The primary goal of software defect prediction (SDP) is to pinpoint code modules that are likely to contain defects, thereby enabling software quality assurance teams to strategically allocate their resources and manpower. Within-project defect prediction (WPDP) is a widely used method in SDP. Despite various improvements, current methods still face challenges such as coarse-grained prediction and ineffective handling of data drift due to differences in project distribution. To address these issues, we propose a fine-grained SDP method called DIDP (drift-immune defect prediction), based on drift-immune graph neural networks (DI-GNN). DIDP converts source code into graph… More >

  • Open Access

    ARTICLE

    MSSTGCN: Multi-Head Self-Attention and Spatial-Temporal Graph Convolutional Network for Multi-Scale Traffic Flow Prediction

    Xinlu Zong*, Fan Yu, Zhen Chen, Xue Xia
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057494
    (This article belongs to the Special Issue: Graph Neural Networks: Methods and Applications in Graph-related Problems)
    Abstract Accurate traffic flow prediction has a profound impact on modern traffic management. Traffic flow has complex spatial-temporal correlations and periodicity, which poses difficulties for precise prediction. To address this problem, a Multi-head Self-attention and Spatial-Temporal Graph Convolutional Network (MSSTGCN) for multiscale traffic flow prediction is proposed. Firstly, to capture the hidden traffic periodicity of traffic flow, traffic flow is divided into three kinds of periods, including hourly, daily, and weekly data. Secondly, a graph attention residual layer is constructed to learn the global spatial features across regions. Local spatial-temporal dependence is captured by using a More >

  • Open Access

    ARTICLE

    A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain

    Binyong Li1,2,3, Liangming Deng1,*, Jie Zhang1, Xianhui Deng1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.056730
    Abstract To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants, this research focuses on addressing the complex supply relationships in the automotive market, improving data sharing and interactions across various platforms, and achieving more detailed integration of data and operations. We propose a trust evaluation permission delegation method based on the automotive industry chain. The proposed method combines smart contracts with trust evaluation mechanisms, dynamically calculating the trust value of users based on the historical behavior of the delegated entity, network environment, and other More >

  • Open Access

    ARTICLE

    Multi-Head Encoder Shared Model Integrating Intent and Emotion for Dialogue Summarization

    Xinlai Xing, Junliang Chen*, Xiaochuan Zhang, Shuran Zhou, Runqing Zhang
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.056877
    (This article belongs to the Special Issue: The Next-generation Deep Learning Approaches to Emerging Real-world Applications)
    Abstract In task-oriented dialogue systems, intent, emotion, and actions are crucial elements of user activity. Analyzing the relationships among these elements to control and manage task-oriented dialogue systems is a challenging task. However, previous work has primarily focused on the independent recognition of user intent and emotion, making it difficult to simultaneously track both aspects in the dialogue tracking module and to effectively utilize user emotions in subsequent dialogue strategies. We propose a Multi-Head Encoder Shared Model (MESM) that dynamically integrates features from emotion and intent encoders through a feature fusioner. Addressing the scarcity of datasets More >

  • Open Access

    ARTICLE

    Multi-Head Attention Enhanced Parallel Dilated Convolution and Residual Learning for Network Traffic Anomaly Detection

    Guorong Qi1, Jian Mao1,*, Kai Huang1, Zhengxian You2, Jinliang Lin2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058396
    (This article belongs to the Special Issue: Fortifying the Foundations: Novel Approaches to Cyber-Physical Systems Intrusion Detection and Industrial 4.0 Security)
    Abstract Abnormal network traffic, as a frequent security risk, requires a series of techniques to categorize and detect it. Existing network traffic anomaly detection still faces challenges: the inability to fully extract local and global features, as well as the lack of effective mechanisms to capture complex interactions between features; Additionally, when increasing the receptive field to obtain deeper feature representations, the reliance on increasing network depth leads to a significant increase in computational resource consumption, affecting the efficiency and performance of detection. Based on these issues, firstly, this paper proposes a network traffic anomaly detection… More >

  • Open Access

    ARTICLE

    Telecontext-Enhanced Recursive Interactive Attention Fusion Method for Line-Level Defect Prediction

    Haitao He1, Bingjian Yan1, Ke Xu1,*, Lu Yu1,2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058779
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract Software defect prediction aims to use measurement data of code and historical defects to predict potential problems, optimize testing resources and defect management. However, current methods face challenges: (1) Coarse-grained file level detection cannot accurately locate specific defects. (2) Fine-grained line-level defect prediction methods rely solely on local information of a single line of code, failing to deeply analyze the semantic context of the code line and ignoring the heuristic impact of line-level context on the code line, making it difficult to capture the interaction between global and local information. Therefore, this paper proposes a… More >

  • Open Access

    ARTICLE

    HMFM: A Method for Identifying High-Value Patents by Fusing Multiple Features

    Na Deng, Jiuan Zhang*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058103
    Abstract Rapid and accurate identification of high-quality patents can accelerate the transformation process of scientific and technological achievements, optimize the management of intellectual property rights and enhance the vitality of innovation. Aiming at the shortcomings of the traditional high-value patent assessment method, which is relatively simple and seldom considers the influence of patentees, this paper proposes a high-quality patent method HMFM (High-Value Patent Multi-Feature Fusion Method) that fuses multi-dimensional features. A weighted node importance assessment method in complex network called GLE (Glob-Local-struEntropy) based on improved structural entropy is designed to calculate the influence of the patentee More >

  • Open Access

    ARTICLE

    Lip-Audio Modality Fusion for Deep Forgery Video Detection

    Yong Liu1,4, Zhiyu Wang2,*, Shouling Ji3, Daofu Gong1,5, Lanxin Cheng1, Ruosi Cheng1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057859
    (This article belongs to the Special Issue: Multimedia Security in Deep Learning)
    Abstract In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC… More >

  • Open Access

    ARTICLE

    APWF: A Parallel Website Fingerprinting Attack with Attention Mechanism

    Dawei Xu1,2,3, Min Wang1, Yue Lv1, Moxuan Fu2, Yi Wu4,5,*, Jian Zhao1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058178
    Abstract Website fingerprinting (WF) attacks can reveal information about the websites users browse by de-anonymizing encrypted traffic. Traditional website fingerprinting attack models, focusing solely on a single spatial feature, are inefficient regarding training time. When confronted with the concept drift problem, they suffer from a sharp drop in attack accuracy within a short period due to their reliance on extensive, outdated training data. To address the above problems, this paper proposes a parallel website fingerprinting attack (APWF) that incorporates an attention mechanism, which consists of an attack model and a fine-tuning method. Among them, the APWF… More >

  • Open Access

    ARTICLE

    Efficient Data Aggregation and Message Transmission for Information Processing Model in the CPS-WSN

    Chao-Hsien Hsieh1, Qingqing Yang2,*, Dehong Kong2, Fengya Xu2, Hongmei Wang2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058122
    Abstract The Cyber-Physical Systems (CPS) supported by Wireless Sensor Networks (WSN) helps factories collect data and achieve seamless communication between physical and virtual components. Sensor nodes are energy-constrained devices. Their energy consumption is typically correlated with the amount of data collection. The purpose of data aggregation is to reduce data transmission, lower energy consumption, and reduce network congestion. For large-scale WSN, data aggregation can greatly improve network efficiency. However, as many heterogeneous data is poured into a specific area at the same time, it sometimes causes data loss and then results in incompleteness and irregularity of… More >

  • Open Access

    ARTICLE

    An Improved Chaotic Quantum Multi-Objective Harris Hawks Optimization Algorithm for Emergency Centers Site Selection Decision Problem

    Yuting Zhu1,*, Wenyu Zhang1,2, Hainan Wang1, Junjie Hou1, Haining Wang1, Meng Wang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057441
    Abstract Addressing the complex issue of emergency resource distribution center site selection in uncertain environments, this study was conducted to comprehensively consider factors such as uncertainty parameters and the urgency of demand at disaster-affected sites. Firstly, urgency cost, economic cost, and transportation distance cost were identified as key objectives. The study applied fuzzy theory integration to construct a triangular fuzzy multi-objective site selection decision model. Next, the defuzzification theory transformed the fuzzy decision model into a precise one. Subsequently, an improved Chaotic Quantum Multi-Objective Harris Hawks Optimization (CQ-MOHHO) algorithm was proposed to solve the model. The… More >

  • Open Access

    ARTICLE

    Secure Medical Image Retrieval Based on Multi-Attention Mechanism and Triplet Deep Hashing

    Shaozheng Zhang, Qiuyu Zhang*, Jiahui Tang, Ruihua Xu
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057269
    (This article belongs to the Special Issue: Emerging Trends and Applications of Deep Learning for Biomedical Signal and Image Processing)
    Abstract Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a… More >

  • Open Access

    ARTICLE

    Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks

    Khalil Ullah1,*, Song Jian1, Muhammad Naeem Ul Hassan1, Suliman Khan2, Mohammad Babar3,*, Arshad Ahmad4, Shafiq Ahmad5
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057328
    (This article belongs to the Special Issue: Exploring the Metaverse: Advancements in Future Networks Communication and Computing Technologies for Enhanced Quality of Experience)
    Abstract The emergence of next generation networks (NextG), including 5G and beyond, is reshaping the technological landscape of cellular and mobile networks. These networks are sufficiently scaled to interconnect billions of users and devices. Researchers in academia and industry are focusing on technological advancements to achieve high-speed transmission, cell planning, and latency reduction to facilitate emerging applications such as virtual reality, the metaverse, smart cities, smart health, and autonomous vehicles. NextG continuously improves its network functionality to support these applications. Multiple input multiple output (MIMO) technology offers spectral efficiency, dependability, and overall performance in conjunction with More >

  • Open Access

    ARTICLE

    Enhancing Security in Distributed Drone-Based Litchi Fruit Recognition and Localization Systems

    Liang Mao1,2, Yue Li1,2, Linlin Wang1,*, Jie Li1, Jiajun Tan1, Yang Meng1, Cheng Xiong1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058409
    Abstract This paper introduces an advanced and efficient method for distributed drone-based fruit recognition and localization, tailored to satisfy the precision and security requirements of autonomous agricultural operations. Our method incorporates depth information to ensure precise localization and utilizes a streamlined detection network centered on the RepVGG module. This module replaces the traditional C2f module, enhancing detection performance while maintaining speed. To bolster the detection of small, distant fruits in complex settings, we integrate Selective Kernel Attention (SKAttention) and a specialized small-target detection layer. This adaptation allows the system to manage difficult conditions, such as variable… More >

  • Open Access

    ARTICLE

    Collaborative Trajectory Planning for Stereoscopic Agricultural Multi-UAVs Driven by the Aquila Optimizer

    Xinyu Liu#, Longfei Wang#, Yuxin Ma, Peng Shao*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058294
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract Stereoscopic agriculture, as an advanced method of agricultural production, poses new challenges for multi-task trajectory planning of unmanned aerial vehicles (UAVs). To address the need for UAVs to perform multi-task trajectory planning in stereoscopic agriculture, a multi-task trajectory planning model and algorithm (IEP-AO) that synthesizes flight safety and flight efficiency is proposed. Based on the requirements of stereoscopic agricultural geomorphological features and operational characteristics, the multi-task trajectory planning model is ensured by constructing targeted constraints at five aspects, including the path, slope, altitude, corner, energy and obstacle threat, to improve the effectiveness of the trajectory… More >

  • Open Access

    ARTICLE

    Masked Face Restoration Model Based on Lightweight GAN

    Yitong Zhou, Tianliang Lu*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057554
    Abstract Facial recognition systems have become increasingly significant in public security efforts. They play a crucial role in apprehending criminals and locating missing children and elderly individuals. Nevertheless, in practical applications, around 30% to 50% of images are obstructed to varied extents, for as by the presence of masks, glasses, or hats. Repairing the masked facial images will enhance face recognition accuracy by 10% to 20%. Simultaneously, market research indicates a rising demand for efficient facial recognition technology within the security and surveillance sectors, with projections suggesting that the global facial recognition market would exceed US$3… More >

  • Open Access

    ARTICLE

    Text-Image Feature Fine-Grained Learning for Joint Multimodal Aspect-Based Sentiment Analysis

    Tianzhi Zhang1, Gang Zhou1,*, Shuang Zhang2, Shunhang Li1, Yepeng Sun1, Qiankun Pi1, Shuo Liu3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.055943
    Abstract Joint Multimodal Aspect-based Sentiment Analysis (JMASA) is a significant task in the research of multimodal fine-grained sentiment analysis, which combines two subtasks: Multimodal Aspect Term Extraction (MATE) and Multimodal Aspect-oriented Sentiment Classification (MASC). Currently, most existing models for JMASA only perform text and image feature encoding from a basic level, but often neglect the in-depth analysis of unimodal intrinsic features, which may lead to the low accuracy of aspect term extraction and the poor ability of sentiment prediction due to the insufficient learning of intra-modal features. Given this problem, we propose a Text-Image Feature Fine-grained… More >

  • Open Access

    ARTICLE

    GFRF R-CNN: Object Detection Algorithm for Transmission Lines

    Xunguang Yan1,2, Wenrui Wang1, Fanglin Lu1, Hongyong Fan3, Bo Wu1, Jianfeng Yu1,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057797
    (This article belongs to the Special Issue: Advances in Object Detection: Methods and Applications)
    Abstract To maintain the reliability of power systems, routine inspections using drones equipped with advanced object detection algorithms are essential for preempting power-related issues. The increasing resolution of drone-captured images has posed a challenge for traditional target detection methods, especially in identifying small objects in high-resolution images. This study presents an enhanced object detection algorithm based on the Faster Region-based Convolutional Neural Network (Faster R-CNN) framework, specifically tailored for detecting small-scale electrical components like insulators, shock hammers, and screws in transmission line. The algorithm features an improved backbone network for Faster R-CNN, which significantly boosts the More >

  • Open Access

    ARTICLE

    Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning

    Shijie Tang1,2, Yong Ding1,3,4,*, Huiyong Wang5
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.059143
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract As more and more devices in Cyber-Physical Systems (CPS) are connected to the Internet, physical components such as programmable logic controller (PLC), sensors, and actuators are facing greater risks of network attacks, and fast and accurate attack detection techniques are crucial. The key problem in distinguishing between normal and abnormal sequences is to model sequential changes in a large and diverse field of time series. To address this issue, we propose an anomaly detection method based on distributed deep learning. Our method uses a bilateral filtering algorithm for sequential sequences to remove noise in the More >

  • Open Access

    ARTICLE

    PPS-SLAM: Dynamic Visual SLAM with a Precise Pruning Strategy

    Jiansheng Peng1,2,3,4,*, Wei Qian1, Hongyu Zhang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058028
    Abstract Dynamic visual SLAM (Simultaneous Localization and Mapping) is an important research area, but existing methods struggle to balance real-time performance and accuracy in removing dynamic feature points, especially when semantic information is missing. This paper presents a novel dynamic SLAM system that uses optical flow tracking and epipolar geometry to identify dynamic feature points and applies a regional dynamic probability method to improve removal accuracy. We developed two innovative algorithms for precise pruning of dynamic regions: first, using optical flow and epipolar geometry to identify and prune dynamic areas while preserving static regions on stationary… More >

  • Open Access

    ARTICLE

    DKP-SLAM: A Visual SLAM for Dynamic Indoor Scenes Based on Object Detection and Region Probability

    Menglin Yin1, Yong Qin1,2,3,4,*, Jiansheng Peng1,2,3,4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057460
    Abstract In dynamic scenarios, visual simultaneous localization and mapping (SLAM) algorithms often incorrectly incorporate dynamic points during camera pose computation, leading to reduced accuracy and robustness. This paper presents a dynamic SLAM algorithm that leverages object detection and regional dynamic probability. Firstly, a parallel thread employs the YOLOX object detection model to gather 2D semantic information and compensate for missed detections. Next, an improved K-means++ clustering algorithm clusters bounding box regions, adaptively determining the threshold for extracting dynamic object contours as dynamic points change. This process divides the image into low dynamic, suspicious dynamic, and high More >

  • Open Access

    ARTICLE

    An Improved Practical Byzantine Fault-Tolerant Algorithm Based on XGBoost Grouping for Consortium Chains

    Xiaowei Wang, Haiyang Zhang, Jiasheng Zhang, Yingkai Ge, Kexin Cui, Zifu Peng, Zhengyi Li, Lihua Wang*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058559
    (This article belongs to the Special Issue: Distributed Computing with Applications to IoT and BlockChain)
    Abstract In response to the challenges presented by the unreliable identity of the master node, high communication overhead, and limited network support size within the Practical Byzantine Fault-Tolerant (PBFT) algorithm for consortium chains, we propose an improved PBFT algorithm based on XGBoost grouping called XG-PBFT in this paper. XG-PBFT constructs a dataset by training important parameters that affect node performance, which are used as classification indexes for nodes. The XGBoost algorithm then is employed to train the dataset, and nodes joining the system will be grouped according to the trained grouping model. Among them, the nodes… More >

  • Open Access

    ARTICLE

    Engine Misfire Fault Detection Based on the Channel Attention Convolutional Model

    Feifei Yu1, Yongxian Huang2,*, Guoyan Chen1, Xiaoqing Yang2, Canyi Du2,*, Yongkang Gong2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058051
    Abstract To accurately diagnose misfire faults in automotive engines, we propose a Channel Attention Convolutional Model, specifically the Squeeze-and-Excitation Networks (SENET), for classifying engine vibration signals and precisely pinpointing misfire faults. In the experiment, we established a total of 11 distinct states, encompassing the engine’s normal state, single-cylinder misfire faults, and dual-cylinder misfire faults for different cylinders. Data collection was facilitated by a highly sensitive acceleration signal collector with a high sampling rate of 20,840 Hz. The collected data were methodically divided into training and testing sets based on different experimental groups to ensure generalization and… More >

  • Open Access

    ARTICLE

    Malicious Document Detection Based on GGE Visualization

    Youhe Wang, Yi Sun*, Yujie Li, Chuanqi Zhou
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057710
    Abstract With the development of anti-virus technology, malicious documents have gradually become the main pathway of Advanced Persistent Threat (APT) attacks, therefore, the development of effective malicious document classifiers has become particularly urgent. Currently, detection methods based on document structure and behavioral features encounter challenges in feature engineering, these methods not only have limited accuracy, but also consume large resources, and usually can only detect documents in specific formats, which lacks versatility and adaptability. To address such problems, this paper proposes a novel malicious document detection method-visualizing documents as GGE images (Grayscale, Grayscale matrix, Entropy). The… More >

  • Open Access

    ARTICLE

    A Hybrid Approach for Pavement Crack Detection Using Mask R-CNN and Vision Transformer Model

    Shorouq Alshawabkeh, Li Wu*, Daojun Dong, Yao Cheng, Liping Li
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057213
    (This article belongs to the Special Issue: Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems)
    Abstract Detecting pavement cracks is critical for road safety and infrastructure management. Traditional methods, relying on manual inspection and basic image processing, are time-consuming and prone to errors. Recent deep-learning (DL) methods automate crack detection, but many still struggle with variable crack patterns and environmental conditions. This study aims to address these limitations by introducing the MaskerTransformer, a novel hybrid deep learning model that integrates the precise localization capabilities of Mask Region-based Convolutional Neural Network (Mask R-CNN) with the global contextual awareness of Vision Transformer (ViT). The research focuses on leveraging the strengths of both architectures… More >

  • Open Access

    ARTICLE

    IoT Empowered Early Warning of Transmission Line Galloping Based on Integrated Optical Fiber Sensing and Weather Forecast Time Series Data

    Zhe Li, Yun Liang, Jinyu Wang, Yang Gao*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057225
    Abstract Iced transmission line galloping poses a significant threat to the safety and reliability of power systems, leading directly to line tripping, disconnections, and power outages. Existing early warning methods of iced transmission line galloping suffer from issues such as reliance on a single data source, neglect of irregular time series, and lack of attention-based closed-loop feedback, resulting in high rates of missed and false alarms. To address these challenges, we propose an Internet of Things (IoT) empowered early warning method of transmission line galloping that integrates time series data from optical fiber sensing and weather… More >

  • Open Access

    ARTICLE

    XGBoost-Based Power Grid Fault Prediction with Feature Enhancement: Application to Meteorology

    Kai Liu1, Meizhao Liu1, Ming Tang1, Chen Zhang2,*, Junwu Zhu2,3,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057074
    Abstract The prediction of power grid faults based on meteorological factors is of great significance to reduce economic losses caused by power grid faults. However, the existing methods fail to effectively extract key features and accurately predict fault types due to the complexity of meteorological factors and their nonlinear relationships. In response to these challenges, we propose the Feature-Enhanced XGBoost power grid fault prediction method (FE-XGBoost). Specifically, we first combine the gradient boosting decision tree and recursive feature elimination method to extract essential features from meteorological data. Then, we incorporate a piecewise linear chaotic map to More >

  • Open Access

    ARTICLE

    Detection and Recognition of Spray Code Numbers on Can Surfaces Based on OCR

    Hailong Wang*, Junchao Shi
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057706
    (This article belongs to the Special Issue: Deep Learning and Computer Vision for Industry 4.0 and Emerging Technologies)
    Abstract A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition. In the coding number detection stage, Differentiable Binarization Network is used as the backbone network, combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect. In terms of text recognition, using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate… More >

  • Open Access

    ARTICLE

    A Generative Model-Based Network Framework for Ecological Data Reconstruction

    Shuqiao Liu1, Zhao Zhang2,*, Hongyan Zhou1, Xuebo Chen1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057319
    Abstract This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection systems. Combining Strengths, Weaknesses, Opportunities, Threats (SWOT) analysis data with Variation Autoencoder (VAE) and Generative Adversarial Network (GAN) the network framework model (SAE-GAN), is proposed for environmental data reconstruction. The model combines two popular generative models, GAN and VAE, to generate features conditional on categorical data embedding after SWOT Analysis. The model is capable of generating features that resemble real feature distributions and adding sample factors to more accurately track individual sample data. Reconstructed data is… More >

  • Open Access

    ARTICLE

    Efficient OpenMP Based Z-curve Encoding and Decoding Algorithms

    Zicheng Zhou1, Shaowen Sun2, Teng Liang3, Mengjuan Li4,*, Fengling Xia5,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.056880
    Abstract Z-curve’s encoding and decoding algorithms are primely important in many Z-curve-based applications. The bit interleaving algorithm is the current state-of-the-art algorithm for encoding and decoding Z-curve. Although simple, its efficiency is hindered by the step-by-step coordinate shifting and bitwise operations. To tackle this problem, we first propose the efficient encoding algorithm LTFe and the corresponding decoding algorithm LTFd, which adopt two optimization methods to boost the algorithm’s efficiency: 1) we design efficient lookup tables (LT) that convert encoding and decoding operations into table-lookup operations; 2) we design a bit detection mechanism that skips partial order More >

  • Open Access

    ARTICLE

    Joint Feature Encoding and Task Alignment Mechanism for Emotion-Cause Pair Extraction

    Shi Li, Didi Sun*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057349
    (This article belongs to the Special Issue: Next-Generation Techniques and Applications on Opinion Mining and Affective Computing)
    Abstract With the rapid expansion of social media, analyzing emotions and their causes in texts has gained significant importance. Emotion-cause pair extraction enables the identification of causal relationships between emotions and their triggers within a text, facilitating a deeper understanding of expressed sentiments and their underlying reasons. This comprehension is crucial for making informed strategic decisions in various business and societal contexts. However, recent research approaches employing multi-task learning frameworks for modeling often face challenges such as the inability to simultaneously model extracted features and their interactions, or inconsistencies in label prediction between emotion-cause pair extraction… More >

  • Open Access

    ARTICLE

    MixerKT: A Knowledge Tracing Model Based on Pure MLP Architecture

    Jun Wang1,2, Mingjie Wang1,2, Zijie Li1,2, Ken Chen1,2, Jiatian Mei1,2, Shu Zhang1,2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057224
    Abstract In the field of intelligent education, the integration of artificial intelligence, especially deep learning technologies, has garnered significant attention. Knowledge tracing (KT) plays a pivotal role in this field by predicting students’ future performance through the analysis of historical interaction data, thereby assisting educators in evaluating knowledge mastery and tailoring instructional strategies. Traditional knowledge tracing methods, largely based on Recurrent Neural Networks (RNNs) and Transformer models, primarily focus on capturing long-term interaction patterns in sequential data. However, these models may neglect crucial short-term dynamics and other relevant features. This paper introduces a novel approach to… More >

  • Open Access

    ARTICLE

    A Multi-Objective Particle Swarm Optimization Algorithm Based on Decomposition and Multi-Selection Strategy

    Li Ma1, Cai Dai1,*, Xingsi Xue2, Cheng Peng3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057168
    Abstract The multi-objective particle swarm optimization algorithm (MOPSO) is widely used to solve multi-objective optimization problems. In the article, a multi-objective particle swarm optimization algorithm based on decomposition and multi-selection strategy is proposed to improve the search efficiency. First, two update strategies based on decomposition are used to update the evolving population and external archive, respectively. Second, a multi-selection strategy is designed. The first strategy is for the subspace without a non-dominated solution. Among the neighbor particles, the particle with the smallest penalty-based boundary intersection value is selected as the global optimal solution and the particle… More >

  • Open Access

    ARTICLE

    A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems

    Jiyu Zhang1,*, Kehe Wu1, Ruomeng Yan1, Zheng Tian2, Yizhen Sun2, Yuxi Wu2, Yaogong Guo3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.055243
    Abstract Renewable Energy Systems (RES) provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers (ES). However, securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic. Additionally, managing attributes, including addition, deletion, and modification, is a crucial issue in the access control scheme for RES. To address these security concerns, a trust-based ciphertext-policy attribute-based encryption (CP-ABE) device access control scheme is proposed for RES (TB-CP-ABE). This… More >

  • Open Access

    ARTICLE

    PD-YOLO: Colon Polyp Detection Model Based on Enhanced Small-Target Feature Extraction

    Yicong Yu1,2, Kaixin Lin1, Jiajun Hong1, Rong-Guei Tsai3,*, Yuanzhi Huang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058467
    Abstract In recent years, the number of patients with colon disease has increased significantly. Colon polyps are the precursor lesions of colon cancer. If not diagnosed in time, they can easily develop into colon cancer, posing a serious threat to patients’ lives and health. A colonoscopy is an important means of detecting colon polyps. However, in polyp imaging, due to the large differences and diverse types of polyps in size, shape, color, etc., traditional detection methods face the problem of high false positive rates, which creates problems for doctors during the diagnosis process. In order to… More >

  • Open Access

    ARTICLE

    DecMamba: Mamba Utilizing Series Decomposition for Multivariate Time Series Forecasting

    Jianxin Feng*, Jianhao Zhang, Ge Cao, Zhiguo Liu, Yuanming Ding
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058374
    Abstract Multivariate time series forecasting is widely used in traffic planning, weather forecasting, and energy consumption. Series decomposition algorithms can help models better understand the underlying patterns of the original series to improve the forecasting accuracy of multivariate time series. However, the decomposition kernel of previous decomposition-based models is fixed, and these models have not considered the differences in frequency fluctuations between components. These problems make it difficult to analyze the intricate temporal variations of real-world time series. In this paper, we propose a series decomposition-based Mamba model, DecMamba, to obtain the intricate temporal dependencies and… More >

  • Open Access

    ARTICLE

    Loss Aware Feature Attention Mechanism for Class and Feature Imbalance Issue

    Yuewei Wu1, Ruiling Fu1, Tongtong Xing1, Fulian Yin1,2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057606
    Abstract In the Internet era, recommendation systems play a crucial role in helping users find relevant information from large datasets. Class imbalance is known to severely affect data quality, and therefore reduce the performance of recommendation systems. Due to the imbalance, machine learning algorithms tend to classify inputs into the positive (majority) class every time to achieve high prediction accuracy. Imbalance can be categorized such as by features and classes, but most studies consider only class imbalance. In this paper, we propose a recommendation system that can integrate multiple networks to adapt to a large number… More >

  • Open Access

    ARTICLE

    Attention Eraser and Quantitative Measures for Automated Bone Age Assessment

    Liuqiang Shu, Lei Yu*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.056077
    (This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
    Abstract Bone age assessment (BAA) aims to determine whether a child’s growth and development are normal concerning their chronological age. To predict bone age more accurately based on radiographs, and for the left-hand X-ray images of different races model can have better adaptability, we propose a neural network in parallel with the quantitative features from the left-hand bone measurements for BAA. In this study, a lightweight feature extractor (LFE) is designed to obtain the feature maps from radiographs, and a module called attention eraser module (AEM) is proposed to capture the fine-grained features. Meanwhile, the dimensional… More >

  • Open Access

    ARTICLE

    Occluded Gait Emotion Recognition Based on Multi-Scale Suppression Graph Convolutional Network

    Yuxiang Zou1, Ning He2,*, Jiwu Sun1, Xunrui Huang1, Wenhua Wang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.055732
    Abstract In recent years, gait-based emotion recognition has been widely applied in the field of computer vision. However, existing gait emotion recognition methods typically rely on complete human skeleton data, and their accuracy significantly declines when the data is occluded. To enhance the accuracy of gait emotion recognition under occlusion, this paper proposes a Multi-scale Suppression Graph Convolutional Network (MS-GCN). The MS-GCN consists of three main components: Joint Interpolation Module (JI Moudle), Multi-scale Temporal Convolution Network (MS-TCN), and Suppression Graph Convolutional Network (SGCN). The JI Module completes the spatially occluded skeletal joints using the (K-Nearest Neighbors)… More >

  • Open Access

    ARTICLE

    A Cross Attention Transformer-Mixed Feedback Video Recommendation Algorithm Based on DIEN

    Jianwei Zhang1,2,*, Zhishang Zhao3, Zengyu Cai3, Yuan Feng4, Liang Zhu3, Yahui Sun3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058438
    Abstract The rapid development of short video platforms poses new challenges for traditional recommendation systems. Recommender systems typically depend on two types of user behavior feedback to construct user interest profiles: explicit feedback (interactive behavior), which significantly influences users’ short-term interests, and implicit feedback (viewing time), which substantially affects their long-term interests. However, the previous model fails to distinguish between these two feedback methods, leading it to predict only the overall preferences of users based on extensive historical behavior sequences. Consequently, it cannot differentiate between users’ long-term and short-term interests, resulting in low accuracy in describing… More >

  • Open Access

    ARTICLE

    AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation

    Congcong Wang1, Chen Wang2,3,*, Wenying Zheng4,*, Wei Gu5
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057975
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract As smart grid technology rapidly advances, the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection. Current research emphasizes data security and user privacy concerns within smart grids. However, existing methods struggle with efficiency and security when processing large-scale data. Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge. This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities. The approach optimizes data preprocessing, More >

  • Open Access

    ARTICLE

    DIGNN-A: Real-Time Network Intrusion Detection with Integrated Neural Networks Based on Dynamic Graph

    Jizhao Liu, Minghao Guo*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057660
    Abstract The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats. Intrusion detection systems are crucial to network security, playing a pivotal role in safeguarding networks from potential threats. However, in the context of an evolving landscape of sophisticated and elusive attacks, existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts. To address these issues, this paper proposes a real-time network intrusion detection method based on… More >

  • Open Access

    ARTICLE

    Offload Strategy for Edge Computing in Satellite Networks Based on Software Defined Network

    Zhiguo Liu1,#, Yuqing Gui1,#, Lin Wang2,*, Yingru Jiang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057353
    (This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)
    Abstract Satellite edge computing has garnered significant attention from researchers; however, processing a large volume of tasks within multi-node satellite networks still poses considerable challenges. The sharp increase in user demand for latency-sensitive tasks has inevitably led to offloading bottlenecks and insufficient computational capacity on individual satellite edge servers, making it necessary to implement effective task offloading scheduling to enhance user experience. In this paper, we propose a priority-based task scheduling strategy based on a Software-Defined Network (SDN) framework for satellite-terrestrial integrated networks, which clarifies the execution order of tasks based on their priority. Subsequently, we More >

  • Open Access

    ARTICLE

    Stochastic Augmented-Based Dual-Teaching for Semi-Supervised Medical Image Segmentation

    Hengyang Liu1, Yang Yuan1,*, Pengcheng Ren1, Chengyun Song1, Fen Luo2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.056478
    (This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
    Abstract Existing semi-supervised medical image segmentation algorithms use copy-paste data augmentation to correct the labeled-unlabeled data distribution mismatch. However, current copy-paste methods have three limitations: (1) training the model solely with copy-paste mixed pictures from labeled and unlabeled input loses a lot of labeled information; (2) low-quality pseudo-labels can cause confirmation bias in pseudo-supervised learning on unlabeled data; (3) the segmentation performance in low-contrast and local regions is less than optimal. We design a Stochastic Augmentation-Based Dual-Teaching Auxiliary Training Strategy (SADT), which enhances feature diversity and learns high-quality features to overcome these problems. To be more… More >

  • Open Access

    ARTICLE

    IDSSCNN-XgBoost: Improved Dual-Stream Shallow Convolutional Neural Network Based on Extreme Gradient Boosting Algorithm for Micro Expression Recognition

    Adnan Ahmad, Zhao Li*, Irfan Tariq, Zhengran He
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.055768
    Abstract Micro-expressions (ME) recognition is a complex task that requires advanced techniques to extract informative features from facial expressions. Numerous deep neural networks (DNNs) with convolutional structures have been proposed. However, unlike DNNs, shallow convolutional neural networks often outperform deeper models in mitigating overfitting, particularly with small datasets. Still, many of these methods rely on a single feature for recognition, resulting in an insufficient ability to extract highly effective features. To address this limitation, in this paper, an Improved Dual-stream Shallow Convolutional Neural Network based on an Extreme Gradient Boosting Algorithm (IDSSCNN-XgBoost) is introduced for ME… More >

  • Open Access

    ARTICLE

    Lightweight Underwater Target Detection Using YOLOv8 with Multi-Scale Cross-Channel Attention

    Xueyan Ding1,2, Xiyu Chen1, Jiaxin Wang1, Jianxin Zhang1,2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057655
    Abstract Underwater target detection is extensively applied in domains such as underwater search and rescue, environmental monitoring, and marine resource surveys. It is crucial in enabling autonomous underwater robot operations and promoting ocean exploration. Nevertheless, low imaging quality, harsh underwater environments, and obscured objects considerably increase the difficulty of detecting underwater targets, making it difficult for current detection methods to achieve optimal performance. In order to enhance underwater object perception and improve target detection precision, we propose a lightweight underwater target detection method using You Only Look Once (YOLO) v8 with multi-scale cross-channel attention (MSCCA), named… More >

  • Open Access

    ARTICLE

    Unmasking Social Robots’ Camouflage: A GNN-Random Forest Framework for Enhanced Detection

    Weijian Fan1,*, Chunhua Wang2, Xiao Han3, Chichen Lin4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.056930
    Abstract The proliferation of robot accounts on social media platforms has posed a significant negative impact, necessitating robust measures to counter network anomalies and safeguard content integrity. Social robot detection has emerged as a pivotal yet intricate task, aimed at mitigating the dissemination of misleading information. While graph-based approaches have attained remarkable performance in this realm, they grapple with a fundamental limitation: the homogeneity assumption in graph convolution allows social robots to stealthily evade detection by mingling with genuine human profiles. To unravel this challenge and thwart the camouflage tactics, this work proposed an innovative social… More >

  • Open Access

    ARTICLE

    Anomaly Detection of Controllable Electric Vehicles through Node Equation against Aggregation Attack

    Jing Guo*, Ziying Wang, Yajuan Guo, Haitao Jiang
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057045
    (This article belongs to the Special Issue: Best Practices for Smart Grid SCADA Security Systems Using Artificial Intelligence (AI) Models)
    Abstract The rapid proliferation of electric vehicle (EV) charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system. This study presents an innovative anomaly detection framework for EV charging stations, addressing the unique challenges posed by third-party aggregation platforms. Our approach integrates node equations-based on the parameter identification with a novel deep learning model, xDeepCIN, to detect abnormal data reporting indicative of aggregation attacks. We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation. The xDeepCIN model, incorporating a Compressed Interaction Network, has the ability… More >

  • Open Access

    ARTICLE

    Research on Stock Price Prediction Method Based on the GAN-LSTM-Attention Model

    Peng Li, Yanrui Wei, Lili Yin*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.056651
    Abstract Stock price prediction is a typical complex time series prediction problem characterized by dynamics, nonlinearity, and complexity. This paper introduces a generative adversarial network model that incorporates an attention mechanism (GAN-LSTM-Attention) to improve the accuracy of stock price prediction. Firstly, the generator of this model combines the Long and Short-Term Memory Network (LSTM), the Attention Mechanism and, the Fully-Connected Layer, focusing on generating the predicted stock price. The discriminator combines the Convolutional Neural Network (CNN) and the Fully-Connected Layer to discriminate between real stock prices and generated stock prices. Secondly, to evaluate the practical application… More >

  • Open Access

    ARTICLE

    DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm

    Chunhui Li1,2, Xiaoying Wang1,2,*, Qingjie Zhang1,2, Jiaye Liang1, Aijing Zhang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058081
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract Previous studies have shown that deep learning is very effective in detecting known attacks. However, when facing unknown attacks, models such as Deep Neural Networks (DNN) combined with Long Short-Term Memory (LSTM), Convolutional Neural Networks (CNN) combined with LSTM, and so on are built by simple stacking, which has the problems of feature loss, low efficiency, and low accuracy. Therefore, this paper proposes an autonomous detection model for Distributed Denial of Service attacks, Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention (MSCNN-BiGRU-SHA), which is based on a Multi-strategy Integrated Zebra Optimization Algorithm (MI-ZOA). The… More >

  • Open Access

    ARTICLE

    A Lightweight Multiscale Feature Fusion Network for Solar Cell Defect Detection

    Xiaoyun Chen1, Lanyao Zhang1, Xiaoling Chen1, Yigang Cen2, Linna Zhang1,*, Fugui Zhang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.058063
    Abstract Solar cell defect detection is crucial for quality inspection in photovoltaic power generation modules. In the production process, defect samples occur infrequently and exhibit random shapes and sizes, which makes it challenging to collect defective samples. Additionally, the complex surface background of polysilicon cell wafers complicates the accurate identification and localization of defective regions. This paper proposes a novel Lightweight Multi-scale Feature Fusion network (LMFF) to address these challenges. The network comprises a feature extraction network, a multi-scale feature fusion module (MFF), and a segmentation network. Specifically, a feature extraction network is proposed to obtain… More >

  • Open Access

    ARTICLE

    Optimizing Fine-Tuning in Quantized Language Models: An In-Depth Analysis of Key Variables

    Ao Shen1, Zhiquan Lai1,*, Dongsheng Li1,*, Xiaoyu Hu2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.057491
    Abstract Large-scale Language Models (LLMs) have achieved significant breakthroughs in Natural Language Processing (NLP), driven by the pre-training and fine-tuning paradigm. While this approach allows models to specialize in specific tasks with reduced training costs, the substantial memory requirements during fine-tuning present a barrier to broader deployment. Parameter-Efficient Fine-Tuning (PEFT) techniques, such as Low-Rank Adaptation (LoRA), and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency. Among these, QLoRA, which combines PEFT and quantization, has demonstrated notable success in reducing memory footprints during fine-tuning, prompting the development… More >