Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    Enhanced Differentiable Architecture Search Based on Asymptotic Regularization

    Cong Jin1, Jinjie Huang1,2,*, Yuanjian Chen1, Yuqing Gong1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1547-1568, 2024, DOI:10.32604/cmc.2023.047489 - 27 February 2024

    Abstract In differentiable search architecture search methods, a more efficient search space design can significantly improve the performance of the searched architecture, thus requiring people to carefully define the search space with different complexity according to various operations. Meanwhile rationalizing the search strategies to explore the well-defined search space will further improve the speed and efficiency of architecture search. With this in mind, we propose a faster and more efficient differentiable architecture search method, AllegroNAS. Firstly, we introduce a more efficient search space enriched by the introduction of two redefined convolution modules. Secondly, we utilize a… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387 - 27 February 2024

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have… More >

  • Open Access

    REVIEW

    A Review of the Application of Artificial Intelligence in Orthopedic Diseases

    Xinlong Diao, Xiao Wang*, Junkang Qin, Qinmu Wu, Zhiqin He, Xinghong Fan

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2617-2665, 2024, DOI:10.32604/cmc.2024.047377 - 27 February 2024

    Abstract In recent years, Artificial Intelligence (AI) has revolutionized people’s lives. AI has long made breakthrough progress in the field of surgery. However, the research on the application of AI in orthopedics is still in the exploratory stage. The paper first introduces the background of AI and orthopedic diseases, addresses the shortcomings of traditional methods in the detection of fractures and orthopedic diseases, draws out the advantages of deep learning and machine learning in image detection, and reviews the latest results of deep learning and machine learning applied to orthopedic image detection in recent years, describing… More >

  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu1,2, Xiao Zhang1,2,3,*, Jinjiang Wang1,2, Yuchen Zhang1,2, Yulong Shi1,2, Linxuan Su1,2, Leijie Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2159-2179, 2024, DOI:10.32604/cmc.2024.047340 - 27 February 2024

    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage… More >

  • Open Access

    ARTICLE

    ASLP-DL —A Novel Approach Employing Lightweight Deep Learning Framework for Optimizing Accident Severity Level Prediction

    Saba Awan1,*, Zahid Mehmood2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2535-2555, 2024, DOI:10.32604/cmc.2024.047337 - 27 February 2024

    Abstract Highway safety researchers focus on crash injury severity, utilizing deep learning—specifically, deep neural networks (DNN), deep convolutional neural networks (D-CNN), and deep recurrent neural networks (D-RNN)—as the preferred method for modeling accident severity. Deep learning’s strength lies in handling intricate relationships within extensive datasets, making it popular for accident severity level (ASL) prediction and classification. Despite prior success, there is a need for an efficient system recognizing ASL in diverse road conditions. To address this, we present an innovative Accident Severity Level Prediction Deep Learning (ASLP-DL) framework, incorporating DNN, D-CNN, and D-RNN models fine-tuned through More >

  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2245-2267, 2024, DOI:10.32604/cmc.2023.047323 - 27 February 2024

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership More >

  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1881-1895, 2024, DOI:10.32604/cmc.2023.047243 - 27 February 2024

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust… More >

  • Open Access

    ARTICLE

    CVTD: A Robust Car-Mounted Video Text Detector

    Di Zhou1, Jianxun Zhang1,*, Chao Li2, Yifan Guo1, Bowen Li1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1821-1842, 2024, DOI:10.32604/cmc.2023.047236 - 27 February 2024

    Abstract Text perception is crucial for understanding the semantics of outdoor scenes, making it a key requirement for building intelligent systems for driver assistance or autonomous driving. Text information in car-mounted videos can assist drivers in making decisions. However, Car-mounted video text images pose challenges such as complex backgrounds, small fonts, and the need for real-time detection. We proposed a robust Car-mounted Video Text Detector (CVTD). It is a lightweight text detection model based on ResNet18 for feature extraction, capable of detecting text in arbitrary shapes. Our model efficiently extracted global text positions through the Coordinate Attention Threshold Activation… More >

  • Open Access

    ARTICLE

    RRT Autonomous Detection Algorithm Based on Multiple Pilot Point Bias Strategy and Karto SLAM Algorithm

    Lieping Zhang1,2, Xiaoxu Shi1,2, Liu Tang1,2, Yilin Wang3, Jiansheng Peng4, Jianchu Zou4,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2111-2136, 2024, DOI:10.32604/cmc.2024.047235 - 27 February 2024

    Abstract A Rapid-exploration Random Tree (RRT) autonomous detection algorithm based on the multi-guide-node deflection strategy and Karto Simultaneous Localization and Mapping (SLAM) algorithm was proposed to solve the problems of low efficiency of detecting frontier boundary points and drift distortion in the process of map building in the traditional RRT algorithm in the autonomous detection strategy of mobile robot. Firstly, an RRT global frontier boundary point detection algorithm based on the multi-guide-node deflection strategy was put forward, which introduces the reference value of guide nodes’ deflection probability into the random sampling function so that the global… More >

  • Open Access

    ARTICLE

    Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System

    Zhiqing Dong1, Zhao Zhang1,*, Hongyan Zhou2, Xuebo Chen2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1977-1993, 2024, DOI:10.32604/cmc.2024.047233 - 27 February 2024

    Abstract With the advent of the information security era, it is necessary to guarantee the privacy, accuracy, and dependable transfer of pictures. This study presents a new approach to the encryption and compression of color images. It is predicated on 2D compressed sensing (CS) and the hyperchaotic system. First, an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security. Then, the processed images are concurrently encrypted and compressed using 2D CS. Among them, chaotic sequences replace traditional random measurement matrices to increase the system’s security. Third, the processed images are More >

Displaying 2051-2060 on page 206 of 7234. Per Page