Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    A Combined Method of Temporal Convolutional Mechanism and Wavelet Decomposition for State Estimation of Photovoltaic Power Plants

    Shaoxiong Wu1, Ruoxin Li1, Xiaofeng Tao1, Hailong Wu1,*, Ping Miao1, Yang Lu1, Yanyan Lu1, Qi Liu2, Li Pan2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3063-3077, 2024, DOI:10.32604/cmc.2024.055381 - 18 November 2024

    Abstract Time series prediction has always been an important problem in the field of machine learning. Among them, power load forecasting plays a crucial role in identifying the behavior of photovoltaic power plants and regulating their control strategies. Traditional power load forecasting often has poor feature extraction performance for long time series. In this paper, a new deep learning framework Residual Stacked Temporal Long Short-Term Memory (RST-LSTM) is proposed, which combines wavelet decomposition and time convolutional memory network to solve the problem of feature extraction for long sequences. The network framework of RST-LSTM consists of two More >

  • Open Access

    ARTICLE

    A Novel Filtering-Based Detection Method for Small Targets in Infrared Images

    Sanxia Shi, Yinglei Song*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2911-2934, 2024, DOI:10.32604/cmc.2024.055363 - 18 November 2024

    Abstract Infrared small target detection technology plays a pivotal role in critical military applications, including early warning systems and precision guidance for missiles and other defense mechanisms. Nevertheless, existing traditional methods face several significant challenges, including low background suppression ability, low detection rates, and high false alarm rates when identifying infrared small targets in complex environments. This paper proposes a novel infrared small target detection method based on a transformed Gaussian filter kernel and clustering approach. The method provides improved background suppression and detection accuracy compared to traditional techniques while maintaining simplicity and lower computational costs.… More >

  • Open Access

    ARTICLE

    Two-Stage Client Selection Scheme for Blockchain-Enabled Federated Learning in IoT

    Xiaojun Jin1, Chao Ma2,*, Song Luo2, Pengyi Zeng1, Yifei Wei1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2317-2336, 2024, DOI:10.32604/cmc.2024.055344 - 18 November 2024

    Abstract Federated learning enables data owners in the Internet of Things (IoT) to collaborate in training models without sharing private data, creating new business opportunities for building a data market. However, in practical operation, there are still some problems with federated learning applications. Blockchain has the characteristics of decentralization, distribution, and security. The blockchain-enabled federated learning further improve the security and performance of model training, while also expanding the application scope of federated learning. Blockchain has natural financial attributes that help establish a federated learning data market. However, the data of federated learning tasks may be… More >

  • Open Access

    ARTICLE

    LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques

    Shanjita Akter Prome1, Md Rafiqul Islam2,*, Md. Kowsar Hossain Sakib1, David Asirvatham1, Neethiahnanthan Ari Ragavan3, Cesar Sanin2, Edward Szczerbicki4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2845-2871, 2024, DOI:10.32604/cmc.2024.055311 - 18 November 2024

    Abstract Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions. The human face is a rich source of data that offers trustworthy markers of deception. The deception or lie detection systems are non-intrusive, cost-effective, and mobile by identifying facial expressions. Over the last decade, numerous studies have been conducted on deception detection using several advanced techniques. Researchers have focused their attention on inventing more effective and efficient solutions for the detection of deception. So, it could be challenging to spot trends, practical approaches, gaps, and chances for contribution.… More >

  • Open Access

    ARTICLE

    A Deep Learning Approach to Industrial Corrosion Detection

    Mehwash Farooqui1, Atta Rahman2,*, Latifa Alsuliman1, Zainab Alsaif1, Fatimah Albaik1, Cadi Alshammari1, Razan Sharaf1, Sunday Olatunji1, Sara Waslallah Althubaiti1, Hina Gull3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2587-2605, 2024, DOI:10.32604/cmc.2024.055262 - 18 November 2024

    Abstract The proposed study focuses on the critical issue of corrosion, which leads to significant economic losses and safety risks worldwide. A key area of emphasis is the accuracy of corrosion detection methods. While recent studies have made progress, a common challenge is the low accuracy of existing detection models. These models often struggle to reliably identify corrosion tendencies, which are crucial for minimizing industrial risks and optimizing resource use. The proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network (CNN), as well as two pretrained… More >

  • Open Access

    ARTICLE

    Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments

    Wenming Wang1,2,3,*, Zhiquan Liu1, Shumin Zhang1, Guijiang Liu1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2517-2545, 2024, DOI:10.32604/cmc.2024.055184 - 18 November 2024

    Abstract Advancements in the vehicular network technology enable real-time interconnection, data sharing, and intelligent cooperative driving among vehicles. However, malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users. Trust mechanisms serve as an effective solution to this issue. In recent years, many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes, incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area. In this paper, we propose a distributed vehicular network scheme based on trust scores. Specifically, the designed architecture partitions multiple More >

  • Open Access

    ARTICLE

    A Concise and Varied Visual Features-Based Image Captioning Model with Visual Selection

    Alaa Thobhani1,*, Beiji Zou1, Xiaoyan Kui1, Amr Abdussalam2, Muhammad Asim3, Naveed Ahmed4, Mohammed Ali Alshara4,5

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2873-2894, 2024, DOI:10.32604/cmc.2024.054841 - 18 November 2024

    Abstract Image captioning has gained increasing attention in recent years. Visual characteristics found in input images play a crucial role in generating high-quality captions. Prior studies have used visual attention mechanisms to dynamically focus on localized regions of the input image, improving the effectiveness of identifying relevant image regions at each step of caption generation. However, providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these features. Consequently, this leads to enhanced captioning network performance. In light… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments

    Bassam Mohammad Elzaghmouri1, Yosef Hasan Fayez Jbara2, Said Elaiwat3, Nisreen Innab4,*, Ahmed Abdelgader Fadol Osman5, Mohammed Awad Mohammed Ataelfadiel5, Farah H. Zawaideh6, Mouiad Fadeil Alawneh7, Asef Al-Khateeb8, Marwan Abu-Zanona8

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2299-2316, 2024, DOI:10.32604/cmc.2024.054836 - 18 November 2024

    Abstract As the Internet of Things (IoT) continues to expand, incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats, necessitating robust defense mechanisms. This paper presents an innovative hybrid deep learning architecture that excels at detecting IoT threats in real-world settings. Our proposed model combines Convolutional Neural Networks (CNN), Bidirectional Long Short-Term Memory (BLSTM), Gated Recurrent Units (GRU), and Attention mechanisms into a cohesive framework. This integrated structure aims to enhance the detection and classification of complex cyber threats while accommodating the operational constraints of diverse IoT systems.… More >

  • Open Access

    REVIEW

    First Principles Calculations for Corrosion in Mg-Li-Al Alloys with Focus on Corrosion Resistance: A Comprehensive Review

    Muhammad Abdullah Khan1, Muhammad Usman2, Yuhong Zhao1,3,4,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1905-1952, 2024, DOI:10.32604/cmc.2024.054691 - 18 November 2024

    Abstract This comprehensive review examines the structural, mechanical, electronic, and thermodynamic properties of Mg-Li-Al alloys, focusing on their corrosion resistance and mechanical performance enhancement. Utilizing first-principles calculations based on Density Functional Theory (DFT) and the quasi-harmonic approximation (QHA), the combined properties of the Mg-Li-Al phase are explored, revealing superior incompressibility, shear resistance, and stiffness compared to individual elements. The review highlights the brittleness of the alloy, supported by B/G ratios, Cauchy pressures, and Poisson’s ratios. Electronic structure analysis shows metallic behavior with varied covalent bonding characteristics, while Mulliken population analysis emphasizes significant electron transfer within the… More >

  • Open Access

    ARTICLE

    A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography

    Jiajun Liu1, Lina Tan1,*, Zhili Zhou2, Weijin Jiang1, Yi Li1, Peng Chen1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3221-3240, 2024, DOI:10.32604/cmc.2024.054542 - 18 November 2024

    Abstract Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data. One issue with these methods is that as the steganographic capacity increases, the number of images stored in the database grows exponentially. This makes it challenging to build and manage a large image database. To improve the image library utilization and anti-attack capability of the steganography system, we propose an efficient coverless scheme based on dynamically matched substrings. We utilize You Only Look Once (YOLO) for selecting optimal objects and create a mapping dictionary between these objects and scrambling factors.… More >

Displaying 1401-1410 on page 141 of 7234. Per Page