Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,869)
  • Open Access

    ARTICLE

    Anomaly Detection Algorithm of Power System Based on Graph Structure and Anomaly Attention

    Yifan Gao*, Jieming Zhang, Zhanchen Chen, Xianchao Chen

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 493-507, 2024, DOI:10.32604/cmc.2024.048615

    Abstract In this paper, we propose a novel anomaly detection method for data centers based on a combination of graph structure and abnormal attention mechanism. The method leverages the sensor monitoring data from target power substations to construct multidimensional time series. These time series are subsequently transformed into graph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matrices and additional weights associated with the graph structure, an aggregation matrix is derived. The aggregation matrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features. Moreover, both the multidimensional time series segments and… More >

  • Open Access

    ARTICLE

    Multi-Objective Optimization Algorithm for Grouping Decision Variables Based on Extreme Point Pareto Frontier

    Jun Wang1,2, Linxi Zhang1,2, Hao Zhang1, Funan Peng1,*, Mohammed A. El-Meligy3, Mohamed Sharaf3, Qiang Fu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1281-1299, 2024, DOI:10.32604/cmc.2024.048495

    Abstract The existing algorithms for solving multi-objective optimization problems fall into three main categories: Decomposition-based, dominance-based, and indicator-based. Traditional multi-objective optimization problems mainly focus on objectives, treating decision variables as a total variable to solve the problem without considering the critical role of decision variables in objective optimization. As seen, a variety of decision variable grouping algorithms have been proposed. However, these algorithms are relatively broad for the changes of most decision variables in the evolution process and are time-consuming in the process of finding the Pareto frontier. To solve these problems, a multi-objective optimization algorithm for grouping decision variables based… More >

  • Open Access

    ARTICLE

    A Spectral Convolutional Neural Network Model Based on Adaptive Fick’s Law for Hyperspectral Image Classification

    Tsu-Yang Wu1,2, Haonan Li2, Saru Kumari3, Chien-Ming Chen1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 19-46, 2024, DOI:10.32604/cmc.2024.048347

    Abstract Hyperspectral image classification stands as a pivotal task within the field of remote sensing, yet achieving high-precision classification remains a significant challenge. In response to this challenge, a Spectral Convolutional Neural Network model based on Adaptive Fick’s Law Algorithm (AFLA-SCNN) is proposed. The Adaptive Fick’s Law Algorithm (AFLA) constitutes a novel metaheuristic algorithm introduced herein, encompassing three new strategies: Adaptive weight factor, Gaussian mutation, and probability update policy. With adaptive weight factor, the algorithm can adjust the weights according to the change in the number of iterations to improve the performance of the algorithm. Gaussian mutation helps the algorithm avoid… More >

  • Open Access

    ARTICLE

    Enhancing Cancer Classification through a Hybrid Bio-Inspired Evolutionary Algorithm for Biomarker Gene Selection

    Hala AlShamlan*, Halah AlMazrua*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 675-694, 2024, DOI:10.32604/cmc.2024.048146

    Abstract In this study, our aim is to address the problem of gene selection by proposing a hybrid bio-inspired evolutionary algorithm that combines Grey Wolf Optimization (GWO) with Harris Hawks Optimization (HHO) for feature selection. The motivation for utilizing GWO and HHO stems from their bio-inspired nature and their demonstrated success in optimization problems. We aim to leverage the strengths of these algorithms to enhance the effectiveness of feature selection in microarray-based cancer classification. We selected leave-one-out cross-validation (LOOCV) to evaluate the performance of both two widely used classifiers, k-nearest neighbors (KNN) and support vector machine (SVM), on high-dimensional cancer microarray… More >

  • Open Access

    ARTICLE

    Combined CNN-LSTM Deep Learning Algorithms for Recognizing Human Physical Activities in Large and Distributed Manners: A Recommendation System

    Ameni Ellouze1, Nesrine Kadri2, Alaa Alaerjan3,*, Mohamed Ksantini1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 351-372, 2024, DOI:10.32604/cmc.2024.048061

    Abstract Recognizing human activity (HAR) from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases. Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not. Typically, smartphones and their associated sensing devices operate in distributed and unstable environments. Therefore, collecting their data and extracting useful information is a significant challenge. In this context, the aim of this paper is twofold: The first is to analyze human behavior based on the recognition of physical activities. Using the results of physical activity detection… More >

  • Open Access

    ARTICLE

    Braille Character Segmentation Algorithm Based on Gaussian Diffusion

    Zezheng Meng, Zefeng Cai, Jie Feng*, Hanjie Ma, Haixiang Zhang, Shaohua Li

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1481-1496, 2024, DOI:10.32604/cmc.2024.048002

    Abstract Optical braille recognition methods typically employ existing target detection models or segmentation models for the direct detection and recognition of braille characters in original braille images. However, these methods need improvement in accuracy and generalizability, especially in densely dotted braille image environments. This paper presents a two-stage braille recognition framework. The first stage is a braille dot detection algorithm based on Gaussian diffusion, targeting Gaussian heatmaps generated by the convex dots in braille images. This is applied to the detection of convex dots in double-sided braille, achieving high accuracy in determining the central coordinates of the braille convex dots. The… More >

  • Open Access

    ARTICLE

    Image Fusion Using Wavelet Transformation and XGboost Algorithm

    Shahid Naseem1, Tariq Mahmood2,3, Amjad Rehman Khan2, Umer Farooq1, Samra Nawazish4, Faten S. Alamri5,*, Tanzila Saba2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 801-817, 2024, DOI:10.32604/cmc.2024.047623

    Abstract Recently, there have been several uses for digital image processing. Image fusion has become a prominent application in the domain of imaging processing. To create one final image that proves more informative and helpful compared to the original input images, image fusion merges two or more initial images of the same item. Image fusion aims to produce, enhance, and transform significant elements of the source images into combined images for the sake of human visual perception. Image fusion is commonly employed for feature extraction in smart robots, clinical imaging, audiovisual camera integration, manufacturing process monitoring, electronic circuit design, advanced device… More >

  • Open Access

    ARTICLE

    Reinforcement Learning Based Quantization Strategy Optimal Assignment Algorithm for Mixed Precision

    Yuejiao Wang, Zhong Ma*, Chaojie Yang, Yu Yang, Lu Wei

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 819-836, 2024, DOI:10.32604/cmc.2024.047108

    Abstract The quantization algorithm compresses the original network by reducing the numerical bit width of the model, which improves the computation speed. Because different layers have different redundancy and sensitivity to data bit width. Reducing the data bit width will result in a loss of accuracy. Therefore, it is difficult to determine the optimal bit width for different parts of the network with guaranteed accuracy. Mixed precision quantization can effectively reduce the amount of computation while keeping the model accuracy basically unchanged. In this paper, a hardware-aware mixed precision quantization strategy optimal assignment algorithm adapted to low bit width is proposed,… More >

  • Open Access

    ARTICLE

    An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

    Linlin Yuan1,2, Tiantian Zhang1,3, Yuling Chen1,*, Yuxiang Yang1, Huang Li1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1561-1579, 2024, DOI:10.32604/cmc.2023.046907

    Abstract The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’ privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based on this, we propose a… More >

  • Open Access

    ARTICLE

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    Naglaa F. Soliman1, Fatma E. Fadl-Allah2, Walid El-Shafai3,4,*, Mahmoud I. Aly2, Maali Alabdulhafith1, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 201-241, 2024, DOI:10.32604/cmc.2024.046757

    Abstract The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away from unauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and encryption. This paper is mainly… More >

Displaying 1-10 on page 1 of 1869. Per Page