Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (37)
  • Open Access

    ARTICLE

    Curve Classification Based on Mean-Variance Feature Weighting and Its Application

    Zewen Zhang1, Sheng Zhou1, Chunzheng Cao1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2465-2480, 2024, DOI:10.32604/cmc.2024.049605 - 15 May 2024

    Abstract The classification of functional data has drawn much attention in recent years. The main challenge is representing infinite-dimensional functional data by finite-dimensional features while utilizing those features to achieve better classification accuracy. In this paper, we propose a mean-variance-based (MV) feature weighting method for classifying functional data or functional curves. In the feature extraction stage, each sample curve is approximated by B-splines to transfer features to the coefficients of the spline basis. After that, a feature weighting approach based on statistical principles is introduced by comprehensively considering the between-class differences and within-class variations of the… More >

  • Open Access

    ARTICLE

    CMAES-WFD: Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy

    Di Wang, Yuefei Zhu, Jinlong Fei*, Maohua Guo

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2253-2276, 2024, DOI:10.32604/cmc.2024.049504 - 15 May 2024

    Abstract Website fingerprinting, also known as WF, is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination, even when using the Tor anonymity network. While advanced attacks based on deep neural network (DNN) can perform feature engineering and attain accuracy rates of over 98%, research has demonstrated that DNN is vulnerable to adversarial samples. As a result, many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success. However, these methods suffer from high bandwidth overhead or require access to the target… More >

  • Open Access

    ARTICLE

    Validity, Reliability, and Measurement Invariance of the Thai Smartphone Application-Based Addiction Scale and Bergen Social Media Addiction Scale

    Kamolthip Ruckwongpatr1,#, Chirawat Paratthakonkun2,#, Usanut Sangtongdee3,4,*, Iqbal Pramukti5, Ira Nurmala6, Kanokwan Angkasith7, Weena Thanachaisakul7, Jatuphum Ketchatturat8, Mark D. Griffiths9, Yi-Kai Kao10,*, Chung-Ying Lin1,5,11,12

    International Journal of Mental Health Promotion, Vol.26, No.4, pp. 293-302, 2024, DOI:10.32604/ijmhp.2024.047023 - 04 May 2024

    Abstract Background: In recent years, there has been increased research interest in both smartphone addiction and social media addiction as well as the development of psychometric instruments to assess these constructs. However, there is a lack of psychometric evaluation for instruments assessing smartphone addiction and social media addiction in Thailand. The present study evaluated the psychometric properties and gender measurement invariance of the Thai version of the Smartphone Application-Based Addiction Scale (SABAS) and Bergen Social Media Addiction Scale (BSMAS). Method: A total of 801 Thai university students participated in an online survey from January 2022 to More >

  • Open Access

    ARTICLE

    Factor Structure and Longitudinal Invariance of the CES-D across Diverse Residential Backgrounds in Chinese Adolescents

    Yanjing Cao1, Chenchen Xu1,2, Qi Li1, Shan Lu1,2,*, Jing Xiao1,*

    International Journal of Mental Health Promotion, Vol.26, No.4, pp. 261-269, 2024, DOI:10.32604/ijmhp.2024.043729 - 04 May 2024

    Abstract Background: Valid and reliable measures of depressive symptoms are crucial for understanding risk factors, outcomes, and interventions across rural and urban settings. Despite this need, the longitudinal invariance of these measures over time remains understudied. This research explores the structural components of the Center for Epidemiological Studies Depression Scale (CES-D) and examines its consistency across various living environments and temporal stability in a cohort of Chinese teenagers. Method: In the initial phase, 1,042 adolescents furnished demographic details and undertook the CES-D assessment. After a three-month interval, 967 of these participants repeated the CES-D evaluation. The… More >

  • Open Access

    ARTICLE

    CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems

    Talal Albalawi, P. Ganeshkumar*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3511-3528, 2024, DOI:10.32604/cmc.2024.046396 - 26 March 2024

    Abstract The Internet of Things (IoT) is a growing technology that allows the sharing of data with other devices across wireless networks. Specifically, IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks. In this framework, a Covariance Linear Learning Embedding Selection (CL2ES) methodology is used at first to extract the features highly associated with the IoT intrusions. Then, the Kernel Distributed Bayes Classifier (KDBC) is created to forecast attacks based on the probability distribution More >

  • Open Access

    ARTICLE

    Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection

    Chengsheng Yuan1,2, Baojie Cui1,2, Zhili Zhou3, Xinting Li4,*, Qingming Jonathan Wu5

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 899-914, 2024, DOI:10.32604/cmc.2023.045854 - 30 January 2024

    Abstract In recent years, deep learning has been the mainstream technology for fingerprint liveness detection (FLD) tasks because of its remarkable performance. However, recent studies have shown that these deep fake fingerprint detection (DFFD) models are not resistant to attacks by adversarial examples, which are generated by the introduction of subtle perturbations in the fingerprint image, allowing the model to make fake judgments. Most of the existing adversarial example generation methods are based on gradient optimization, which is easy to fall into local optimal, resulting in poor transferability of adversarial attacks. In addition, the perturbation added… More >

  • Open Access

    ARTICLE

    New Configurations of the Fuzzy Fractional Differential Boussinesq Model with Application in Ocean Engineering and Their Analysis in Statistical Theory

    Yu-Ming Chu1, Saima Rashid2,*, Shazia Karim3, Anam Sultan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1573-1611, 2023, DOI:10.32604/cmes.2023.027724 - 26 June 2023

    Abstract The fractional-order Boussinesq equations (FBSQe) are investigated in this work to see if they can effectively improve the situation where the shallow water equation cannot directly handle the dispersion wave. The fuzzy forms of analytical FBSQe solutions are first derived using the Adomian decomposition method. It also occurs on the sea floor as opposed to at the functionality. A set of dynamical partial differential equations (PDEs) in this article exemplify an unconfined aquifer flow implication. This methodology can accurately simulate climatological intrinsic waves, so the ripples are spread across a large demographic zone. The Aboodh… More >

  • Open Access

    ARTICLE

    Genotypic Divergence, Photosynthetic Efficiency, Sodium Extrusion, and Osmoprotectant Regulation Conferred Salt Tolerance in Sorghum

    Ashaduzzaman Sagar1 , Md. Sabibul Haque1, Md. Alamgir Hossain1, Md. Nesar Uddin1, Jannat E. Tajkia1, Md. Ashik Mia1, Toufika Hossain Shabi2, Md. Solaiman Ali Fakir1, Md. Abdul Kader3,4,5, Walid Soufan6, Md. Atikur Rahman7, Muhammad Aamir Iqbal8, Mohammad Sohidul Islam9, Ayman El Sabagh10,*, A. K. M. Zakir Hossain1,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.8, pp. 2349-2368, 2023, DOI:10.32604/phyton.2023.028974 - 25 June 2023

    Abstract Salt stress is one of the major limitations to modern agriculture that negatively influences plant growth and productivity. Salt tolerant cultivar can provide excellent solution to enhance stress tolerance with plant fitness to unfavorable environments. Therefore, this study was aimed to screen salt tolerant sorghum genotypes through evaluating of different morphological, biochemical, and physiological attributes in response to salinity stress. In this study, we have been evaluated total six sorghum genotypes including Hybrid sorgo, Debgiri, BD-703, BD-706, BD-707, and BD-725 under salt stress (12 dS m−1 NaCl). The response variables included length and weight of root… More >

  • Open Access

    ARTICLE

    A New Model for Network Security Situation Assessment of the Industrial Internet

    Ming Cheng1, Shiming Li1,3,*, Yuhe Wang1, Guohui Zhou1, Peng Han1, Yan Zhao2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2527-2555, 2023, DOI:10.32604/cmc.2023.036427 - 31 March 2023

    Abstract To address the problem of network security situation assessment in the Industrial Internet, this paper adopts the evidential reasoning (ER)algorithm and belief rule base (BRB) method to establish an assessment model. First, this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge. Second, the evaluation indicators are fused with expert knowledge and the ER algorithm. According to the fusion results, a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established, and the… More >

  • Open Access

    ARTICLE

    No-Reference Blur Assessment Based on Re-Blurring Using Markov Basis

    Gurwinder Kaur*, Ashwani Kumar

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 281-296, 2023, DOI:10.32604/iasc.2023.026393 - 06 June 2022

    Abstract Blur is produced in a digital image due to low pass filtering, moving objects or defocus of the camera lens during capture. Image viewers are annoyed by blur artefact and the image's perceived quality suffers as a result. The high-quality input is relevant to communication service providers and imaging product makers because it may help them improve their processes. Human-based blur assessment is time-consuming, expensive and must adhere to subjective evaluation standards. This paper presents a revolutionary no-reference blur assessment algorithm based on re-blurring blurred images using a special mask developed with a Markov basis… More >

Displaying 1-10 on page 1 of 37. Per Page