Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,514)
  • Open Access

    ARTICLE

    Frilled Lizard Optimization: A Novel Bio-Inspired Optimizer for Solving Engineering Applications

    Ibraheem Abu Falahah1, Osama Al-Baik2, Saleh Alomari3, Gulnara Bektemyssova4, Saikat Gochhait5,6, Irina Leonova7, Om Parkash Malik8, Frank Werner9,*, Mohammad Dehghani10

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3631-3678, 2024, DOI:10.32604/cmc.2024.053189

    Abstract This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization (FLO), which emulates the unique hunting behavior of frilled lizards in their natural habitat. FLO draws its inspiration from the sit-and-wait hunting strategy of these lizards. The algorithm’s core principles are meticulously detailed and mathematically structured into two distinct phases: (i) an exploration phase, which mimics the lizard’s sudden attack on its prey, and (ii) an exploitation phase, which simulates the lizard’s retreat to the treetops after feeding. To assess FLO’s efficacy in addressing optimization problems, its performance is rigorously tested on fifty-two… More >

  • Open Access

    ARTICLE

    A Federated Learning Framework with Blockchain-Based Auditable Participant Selection

    Huang Zeng, Mingtian Zhang, Tengfei Liu, Anjia Yang*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5125-5142, 2024, DOI:10.32604/cmc.2024.052846

    Abstract Federated learning is an important distributed model training technique in Internet of Things (IoT), in which participant selection is a key component that plays a role in improving training efficiency and model accuracy. This module enables a central server to select a subset of participants to perform model training based on data and device information. By doing so, selected participants are rewarded and actively perform model training, while participants that are detrimental to training efficiency and model accuracy are excluded. However, in practice, participants may suspect that the central server may have miscalculated and thus… More >

  • Open Access

    ARTICLE

    Research on Multi-Scale Feature Fusion Network Algorithm Based on Brain Tumor Medical Image Classification

    Yuting Zhou1, Xuemei Yang1, Junping Yin2,3,4,*, Shiqi Liu1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5313-5333, 2024, DOI:10.32604/cmc.2024.052060

    Abstract Gliomas have the highest mortality rate of all brain tumors. Correctly classifying the glioma risk period can help doctors make reasonable treatment plans and improve patients’ survival rates. This paper proposes a hierarchical multi-scale attention feature fusion medical image classification network (HMAC-Net), which effectively combines global features and local features. The network framework consists of three parallel layers: The global feature extraction layer, the local feature extraction layer, and the multi-scale feature fusion layer. A linear sparse attention mechanism is designed in the global feature extraction layer to reduce information redundancy. In the local feature… More >

  • Open Access

    ARTICLE

    Optimised CNN Architectures for Handwritten Arabic Character Recognition

    Salah Alghyaline*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4905-4924, 2024, DOI:10.32604/cmc.2024.052016

    Abstract Handwritten character recognition is considered challenging compared with machine-printed characters due to the different human writing styles. Arabic is morphologically rich, and its characters have a high similarity. The Arabic language includes 28 characters. Each character has up to four shapes according to its location in the word (at the beginning, middle, end, and isolated). This paper proposed 12 CNN architectures for recognizing handwritten Arabic characters. The proposed architectures were derived from the popular CNN architectures, such as VGG, ResNet, and Inception, to make them applicable to recognizing character-size images. The experimental results on three More >

  • Open Access

    ARTICLE

    A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet

    Song Deng1,*, Yiming Yuan2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3679-3697, 2024, DOI:10.32604/cmc.2024.052008

    Abstract Malicious attacks against data are unavoidable in the interconnected, open and shared Energy Internet (EI), Intrusion tolerant techniques are critical to the data security of EI. Existing intrusion tolerant techniques suffered from problems such as low adaptability, policy lag, and difficulty in determining the degree of tolerance. To address these issues, we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas: 1) it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights; and 2) it combines a tournament competition More >

  • Open Access

    ARTICLE

    The Lightweight Edge-Side Fault Diagnosis Approach Based on Spiking Neural Network

    Jingting Mei, Yang Yang*, Zhipeng Gao, Lanlan Rui, Yijing Lin

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4883-4904, 2024, DOI:10.32604/cmc.2024.051860

    Abstract Network fault diagnosis methods play a vital role in maintaining network service quality and enhancing user experience as an integral component of intelligent network management. Considering the unique characteristics of edge networks, such as limited resources, complex network faults, and the need for high real-time performance, enhancing and optimizing existing network fault diagnosis methods is necessary. Therefore, this paper proposes the lightweight edge-side fault diagnosis approach based on a spiking neural network (LSNN). Firstly, we use the Izhikevich neurons model to replace the Leaky Integrate and Fire (LIF) neurons model in the LSNN model. Izhikevich… More >

  • Open Access

    ARTICLE

    Joint Rain Streaks & Haze Removal Network for Object Detection

    Ragini Thatikonda1, Prakash Kodali1,*, Ramalingaswamy Cheruku2, Eswaramoorthy K.V3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4683-4702, 2024, DOI:10.32604/cmc.2024.051844

    Abstract In the realm of low-level vision tasks, such as image deraining and dehazing, restoring images distorted by adverse weather conditions remains a significant challenge. The emergence of abundant computational resources has driven the dominance of deep Convolutional Neural Networks (CNNs), supplanting traditional methods reliant on prior knowledge. However, the evolution of CNN architectures has tended towards increasing complexity, utilizing intricate structures to enhance performance, often at the expense of computational efficiency. In response, we propose the Selective Kernel Dense Residual M-shaped Network (SKDRMNet), a flexible solution adept at balancing computational efficiency with network accuracy. A… More >

  • Open Access

    ARTICLE

    Multiscale Simulation of Microstructure Evolution during Preparation and Service Processes of Physical Vapor Deposited c-TiAlN Coatings

    Yehao Long, Jing Zhong*, Tongdi Zhang, Li Chen, Lijun Zhang*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3435-3453, 2024, DOI:10.32604/cmc.2024.051629

    Abstract Physical Vapor Deposited (PVD) TiAlN coatings are extensively utilized as protective layers for cutting tools, renowned for their excellent comprehensive performance. To optimize quality control of TiAlN coatings for cutting tools, a multi-scale simulation approach is proposed that encompasses the microstructure evolution of coatings considering the entire preparation and service lifecycle of PVD TiAlN coatings. This scheme employs phase-field simulation to capture the essential microstructure of the PVD-prepared TiAlN coatings. Moreover, cutting simulation is used to determine the service temperature experienced during cutting processes at varying rates. Cahn-Hilliard modeling is finally utilized to consume the More >

  • Open Access

    ARTICLE

    SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm

    Jiahui Liu1,2, Lang Li1,2,*, Di Li1,2, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4641-4657, 2024, DOI:10.32604/cmc.2024.051613

    Abstract Correlation power analysis (CPA) combined with genetic algorithms (GA) now achieves greater attack efficiency and can recover all subkeys simultaneously. However, two issues in GA-based CPA still need to be addressed: key degeneration and slow evolution within populations. These challenges significantly hinder key recovery efforts. This paper proposes a screening correlation power analysis framework combined with a genetic algorithm, named SFGA-CPA, to address these issues. SFGA-CPA introduces three operations designed to exploit CPA characteristics: propagative operation, constrained crossover, and constrained mutation. Firstly, the propagative operation accelerates population evolution by maximizing the number of correct bytes… More >

  • Open Access

    ARTICLE

    Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework

    Simona-Vasilica Oprea*, Adela Bâra

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3827-3853, 2024, DOI:10.32604/cmc.2024.051598

    Abstract The potential of text analytics is revealed by Machine Learning (ML) and Natural Language Processing (NLP) techniques. In this paper, we propose an NLP framework that is applied to multiple datasets to detect malicious Uniform Resource Locators (URLs). Three categories of features, both ML and Deep Learning (DL) algorithms and a ranking schema are included in the proposed framework. We apply frequency and prediction-based embeddings, such as hash vectorizer, Term Frequency-Inverse Dense Frequency (TF-IDF) and predictors, word to vector-word2vec (continuous bag of words, skip-gram) from Google, to extract features from text. Further, we apply more… More >

Displaying 1-10 on page 1 of 5514. Per Page