Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    PROCEEDINGS

    An Investigation of Signal Filtering Methods in Trend Following Strategy Using LSTM

    Yi-Chun Cheng1, Mu-En Wu1, Ju-Fang Yen2, Sheng-Chi Luo1, Jimmy Ming-Tai Wu1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.2, pp. 1-1, 2024, DOI:10.32604/icces.2024.011239

    Abstract Quantitative trading is a strategy that relies on mathematical and statistical models to identify market trading opportunities. Trading strategies can be categorized into trend following and contrarian trading. Way of the Turtle is one of the famous trend following strategies. This study proposes a customized trend following trading mechanism based on Way of the Turtle. The focus of the strategy is to capture major trends over a few significant market moves, so it can be seen that the importance of the entry signals to the trend-following strategy. Therefore, this study applies Long Short-Term Memory (LSTM)… More >

  • Open Access

    ARTICLE

    AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics

    Juhwan Kim, Baehoon Son, Jihyeon Yu, Joobeom Yun*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3371-3393, 2024, DOI:10.32604/cmc.2024.057234 - 18 November 2024

    Abstract Digital forensics aims to uncover evidence of cybercrimes within compromised systems. These cybercrimes are often perpetrated through the deployment of malware, which inevitably leaves discernible traces within the compromised systems. Forensic analysts are tasked with extracting and subsequently analyzing data, termed as artifacts, from these systems to gather evidence. Therefore, forensic analysts must sift through extensive datasets to isolate pertinent evidence. However, manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive. Previous studies addressed such inefficiencies by integrating artificial intelligence (AI) technologies into digital forensics. Despite the efforts in previous studies, artifacts were… More >

  • Open Access

    ARTICLE

    A Novel Filtering-Based Detection Method for Small Targets in Infrared Images

    Sanxia Shi, Yinglei Song*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2911-2934, 2024, DOI:10.32604/cmc.2024.055363 - 18 November 2024

    Abstract Infrared small target detection technology plays a pivotal role in critical military applications, including early warning systems and precision guidance for missiles and other defense mechanisms. Nevertheless, existing traditional methods face several significant challenges, including low background suppression ability, low detection rates, and high false alarm rates when identifying infrared small targets in complex environments. This paper proposes a novel infrared small target detection method based on a transformed Gaussian filter kernel and clustering approach. The method provides improved background suppression and detection accuracy compared to traditional techniques while maintaining simplicity and lower computational costs.… More >

  • Open Access

    CORRECTION

    Correction: Noise-Filtering Enhanced Deep Cognitive Diagnosis Model for Latent Skill Discovering

    Jing Geng1,*, Huali Yang2, Shengze Hu3

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 985-986, 2024, DOI:10.32604/iasc.2024.059591 - 31 October 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Research on Feature Matching Optimization Algorithm for Automotive Panoramic Surround View System

    Guangbing Xiao*, Ruijie Gu, Ning Sun, Yong Zhang

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1329-1348, 2024, DOI:10.32604/csse.2024.050817 - 13 September 2024

    Abstract In response to the challenges posed by insufficient real-time performance and suboptimal matching accuracy of traditional feature matching algorithms within automotive panoramic surround view systems, this paper has proposed a high-performance dimension reduction parallel matching algorithm that integrates Principal Component Analysis (PCA) and Dual-Heap Filtering (DHF). The algorithm employs PCA to map the feature points into the lower-dimensional space and employs the square of Euclidean distance for feature matching, which significantly reduces computational complexity. To ensure the accuracy of feature matching, the algorithm utilizes Dual-Heap Filtering to filter and refine matched point pairs. To further More >

  • Open Access

    ARTICLE

    YOLO-RLC: An Advanced Target-Detection Algorithm for Surface Defects of Printed Circuit Boards Based on YOLOv5

    Yuanyuan Wang1,2,*, Jialong Huang1, Md Sharid Kayes Dipu1, Hu Zhao3, Shangbing Gao1,2, Haiyan Zhang1,2, Pinrong Lv1

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4973-4995, 2024, DOI:10.32604/cmc.2024.055839 - 12 September 2024

    Abstract Printed circuit boards (PCBs) provide stable connections between electronic components. However, defective printed circuit boards may cause the entire equipment system to malfunction, resulting in incalculable losses. Therefore, it is crucial to detect defective printed circuit boards during the generation process. Traditional detection methods have low accuracy in detecting subtle defects in complex background environments. In order to improve the detection accuracy of surface defects on industrial printed circuit boards, this paper proposes a residual large kernel network based on YOLOv5 (You Only Look Once version 5) for PCBs surface defect detection, called YOLO-RLC (You… More >

  • Open Access

    ARTICLE

    A Hierarchical Two-Level Feature Fusion Approach for SMS Spam Filtering

    Hussein Alaa Al-Kabbi1,2, Mohammad-Reza Feizi-Derakhshi1,*, Saeed Pashazadeh3

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 665-682, 2024, DOI:10.32604/iasc.2024.050452 - 06 September 2024

    Abstract SMS spam poses a significant challenge to maintaining user privacy and security. Recently, spammers have employed fraudulent writing styles to bypass spam detection systems. This paper introduces a novel two-level detection system that utilizes deep learning techniques for effective spam identification to address the challenge of sophisticated SMS spam. The system comprises five steps, beginning with the preprocessing of SMS data. RoBERTa word embedding is then applied to convert text into a numerical format for deep learning analysis. Feature extraction is performed using a Convolutional Neural Network (CNN) for word-level analysis and a Bidirectional Long… More >

  • Open Access

    ARTICLE

    CRBFT: A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains

    Xiangyu Wu1, Xuehui Du1,*, Qiantao Yang1,2, Aodi Liu1, Na Wang1, Wenjuan Wang1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1491-1519, 2024, DOI:10.32604/cmc.2024.052708 - 18 July 2024

    Abstract Blockchain has been widely used in finance, the Internet of Things (IoT), supply chains, and other scenarios as a revolutionary technology. Consensus protocol plays a vital role in blockchain, which helps all participants to maintain the storage state consistently. However, with the improvement of network environment complexity and system scale, blockchain development is limited by the performance, security, and scalability of the consensus protocol. To address this problem, this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance (PBFT) and proposes a Byzantine fault-tolerant (BFT) consensus… More >

  • Open Access

    ARTICLE

    Joint Modeling of Citation Networks and User Preferences for Academic Tagging Recommender System

    Weiming Huang1,2, Baisong Liu1,*, Zhaoliang Wang1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4449-4469, 2024, DOI:10.32604/cmc.2024.050389 - 20 June 2024

    Abstract In the tag recommendation task on academic platforms, existing methods disregard users’ customized preferences in favor of extracting tags based just on the content of the articles. Besides, it uses co-occurrence techniques and tries to combine nodes’ textual content for modelling. They still do not, however, directly simulate many interactions in network learning. In order to address these issues, we present a novel system that more thoroughly integrates user preferences and citation networks into article labelling recommendations. Specifically, we first employ path similarity to quantify the degree of similarity between user labelling preferences and articles… More >

  • Open Access

    ARTICLE

    Power Quality Disturbance Identification Basing on Adaptive Kalman Filter and Multi-Scale Channel Attention Fusion Convolutional Network

    Feng Zhao, Guangdi Liu*, Xiaoqiang Chen, Ying Wang

    Energy Engineering, Vol.121, No.7, pp. 1865-1882, 2024, DOI:10.32604/ee.2024.048209 - 11 June 2024

    Abstract In light of the prevailing issue that the existing convolutional neural network (CNN) power quality disturbance identification method can only extract single-scale features, which leads to a lack of feature information and weak anti-noise performance, a new approach for identifying power quality disturbances based on an adaptive Kalman filter (KF) and multi-scale channel attention (MS-CAM) fused convolutional neural network is suggested. Single and composite-disruption signals are generated through simulation. The adaptive maximum likelihood Kalman filter is employed for noise reduction in the initial disturbance signal, and subsequent integration of multi-scale features into the conventional CNN… More >

Displaying 1-10 on page 1 of 100. Per Page