Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,369)
  • Open Access

    ARTICLE

    The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network

    Qiang Fu1, Jun Wang1,*, Changfu Si1, Jiawei Liu2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 329-349, 2024, DOI:10.32604/cmc.2024.048117

    Abstract As industrialization and informatization become more deeply intertwined, industrial control networks have entered an era of intelligence. The connection between industrial control networks and the external internet is becoming increasingly close, which leads to frequent security accidents. This paper proposes a model for the industrial control network. It includes a malware containment strategy that integrates intrusion detection, quarantine, and monitoring. Based on this model, the role of key nodes in the spread of malware is studied, a comparison experiment is conducted to validate the impact of the containment strategy. In addition, the dynamic behavior of the model is analyzed, the… More >

  • Open Access

    ARTICLE

    A Dual Discriminator Method for Generalized Zero-Shot Learning

    Tianshu Wei1, Jinjie Huang1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1599-1612, 2024, DOI:10.32604/cmc.2024.048098

    Abstract Zero-shot learning enables the recognition of new class samples by migrating models learned from semantic features and existing sample features to things that have never been seen before. The problems of consistency of different types of features and domain shift problems are two of the critical issues in zero-shot learning. To address both of these issues, this paper proposes a new modeling structure. The traditional approach mapped semantic features and visual features into the same feature space; based on this, a dual discriminator approach is used in the proposed model. This dual discriminator approach can further enhance the consistency between… More >

  • Open Access

    ARTICLE

    ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things

    Yan Xiang1,2, Daofeng Li1,2,*, Xinyi Meng1,2, Chengfeng Dong1,2, Guanglin Qin1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1005-1023, 2024, DOI:10.32604/cmc.2024.047143

    Abstract The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasing demands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has caught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. This has resulted in a myriad of security challenges, including information leakage, malware propagation, and financial loss, among others. Consequently, developing an intrusion detection system to identify both active and potential intrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practical intrusion detection… More >

  • Open Access

    ARTICLE

    Reinforcement Learning Based Quantization Strategy Optimal Assignment Algorithm for Mixed Precision

    Yuejiao Wang, Zhong Ma*, Chaojie Yang, Yu Yang, Lu Wei

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 819-836, 2024, DOI:10.32604/cmc.2024.047108

    Abstract The quantization algorithm compresses the original network by reducing the numerical bit width of the model, which improves the computation speed. Because different layers have different redundancy and sensitivity to data bit width. Reducing the data bit width will result in a loss of accuracy. Therefore, it is difficult to determine the optimal bit width for different parts of the network with guaranteed accuracy. Mixed precision quantization can effectively reduce the amount of computation while keeping the model accuracy basically unchanged. In this paper, a hardware-aware mixed precision quantization strategy optimal assignment algorithm adapted to low bit width is proposed,… More >

  • Open Access

    ARTICLE

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    Naglaa F. Soliman1, Fatma E. Fadl-Allah2, Walid El-Shafai3,4,*, Mahmoud I. Aly2, Maali Alabdulhafith1, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 201-241, 2024, DOI:10.32604/cmc.2024.046757

    Abstract The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away from unauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and encryption. This paper is mainly… More >

  • Open Access

    ARTICLE

    Multimodal Social Media Fake News Detection Based on Similarity Inference and Adversarial Networks

    Fangfang Shan1,2,*, Huifang Sun1,2, Mengyi Wang1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 581-605, 2024, DOI:10.32604/cmc.2024.046202

    Abstract As social networks become increasingly complex, contemporary fake news often includes textual descriptions of events accompanied by corresponding images or videos. Fake news in multiple modalities is more likely to create a misleading perception among users. While early research primarily focused on text-based features for fake news detection mechanisms, there has been relatively limited exploration of learning shared representations in multimodal (text and visual) contexts. To address these limitations, this paper introduces a multimodal model for detecting fake news, which relies on similarity reasoning and adversarial networks. The model employs Bidirectional Encoder Representation from Transformers (BERT) and Text Convolutional Neural… More >

  • Open Access

    ARTICLE

    Circ_0053943 complexed with IGF2BP3 drives uveal melanoma progression via regulating N6-methyladenosine modification of Epidermal growth factor receptor

    ANDI ZHAO1,2,#, YUE WANG3,#, ZIJIN WANG1,2, QING SHAO1,2, QI GONG1,2, HUI ZHU1,2, SHIYA SHEN1,2, HU LIU1,2,*, XUEJUAN CHEN1,2,*

    Oncology Research, Vol.32, No.5, pp. 983-998, 2024, DOI:10.32604/or.2024.045972

    Abstract Numerous studies have characterized the critical role of circular RNAs (circRNAs) as regulatory factors in the progression of multiple cancers. However, the biological functions of circRNAs and their underlying molecular mechanisms in the progression of uveal melanoma (UM) remain enigmatic. In this study, we identified a novel circRNA, circ_0053943, through re-analysis of UM microarray data and quantitative RT-PCR. Circ_0053943 was found to be upregulated in UM and to promote the proliferation and metastatic ability of UM cells in both in vitro and in vivo settings. Mechanistically, circ_0053943 was observed to bind to the KH1 and KH2 domains of insulin-like growth… More > Graphic Abstract

    <i>Circ_0053943</i> complexed with IGF2BP3 drives uveal melanoma progression via regulating N6-methyladenosine modification of <i>Epidermal growth factor receptor</i>

  • Open Access

    ARTICLE

    Detection of Student Engagement in E-Learning Environments Using EfficientnetV2-L Together with RNN-Based Models

    Farhad Mortezapour Shiri1,*, Ehsan Ahmadi2, Mohammadreza Rezaee1, Thinagaran Perumal1

    Journal on Artificial Intelligence, Vol.6, pp. 85-103, 2024, DOI:10.32604/jai.2024.048911

    Abstract Automatic detection of student engagement levels from videos, which is a spatio-temporal classification problem is crucial for enhancing the quality of online education. This paper addresses this challenge by proposing four novel hybrid end-to-end deep learning models designed for the automatic detection of student engagement levels in e-learning videos. The evaluation of these models utilizes the DAiSEE dataset, a public repository capturing student affective states in e-learning scenarios. The initial model integrates EfficientNetV2-L with Gated Recurrent Unit (GRU) and attains an accuracy of 61.45%. Subsequently, the second model combines EfficientNetV2-L with bidirectional GRU (Bi-GRU), yielding an accuracy of 61.56%. The… More >

  • Open Access

    ARTICLE

    Analysis of Color Landscape Characteristics in “Beautiful Village” of China Based on 3D Real Scene Models

    Yiyi Cen1,3, Wenzheng Jia2, Wen Dai3,*, Chun Wang4, He Wu1

    Revue Internationale de Géomatique, Vol.33, pp. 93-109, 2024, DOI:10.32604/rig.2024.050273

    Abstract Color, as a significant element of village landscapes, serves various functions such as enhancing aesthetic appeal and attractiveness, conveying emotions and cultural values. To explore the three-dimensional spatial characteristics of color landscapes in beautiful villages, this study conducted a comparative experiment involving eight provincial-level beautiful villages and eight ordinary villages in Jinzhai County. Landscape pattern indices were used to analyze the color landscape patterns on the facades of these villages, complemented by a quantitative analysis of color attributes using the Munsell color system. The results indicate that (1) Natural landscape colors in beautiful villages are primarily concentrated in the yellow-red… More >

  • Open Access

    ARTICLE

    A Deep Learning Model for Insurance Claims Predictions

    Umar Isa Abdulkadir*, Anil Fernando*

    Journal on Artificial Intelligence, Vol.6, pp. 71-83, 2024, DOI:10.32604/jai.2024.045332

    Abstract One of the significant issues the insurance industry faces is its ability to predict future claims related to individual policyholders. As risk varies from one policyholder to another, the industry has faced the challenge of using various risk factors to accurately predict the likelihood of claims by policyholders using historical data. Traditional machine-learning models that use neural networks are recognized as exceptional algorithms with predictive capabilities. This study aims to develop a deep learning model using sequential deep regression techniques for insurance claim prediction using historical data obtained from Kaggle with 1339 cases and eight variables. This study adopted a… More >

Displaying 41-50 on page 5 of 4369. Per Page