Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20,686)
  • Open Access

    ARTICLE

    Fusion of Spiral Convolution-LSTM for Intrusion Detection Modeling

    Fei Wang, Zhen Dong*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2315-2329, 2024, DOI:10.32604/cmc.2024.048443

    Abstract Aiming at the problems of low accuracy and slow convergence speed of current intrusion detection models, SpiralConvolution is combined with Long Short-Term Memory Network to construct a new intrusion detection model. The dataset is first preprocessed using solo thermal encoding and normalization functions. Then the spiral convolution-Long Short-Term Memory Network model is constructed, which consists of spiral convolution, a two-layer long short-term memory network, and a classifier. It is shown through experiments that the model is characterized by high accuracy, small model computation, and fast convergence speed relative to previous deep learning models. The model uses a new neural network… More >

  • Open Access

    ARTICLE

    A Study on the Explainability of Thyroid Cancer Prediction: SHAP Values and Association-Rule Based Feature Integration Framework

    Sujithra Sankar1,*, S. Sathyalakshmi2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3111-3138, 2024, DOI:10.32604/cmc.2024.048408

    Abstract In the era of advanced machine learning techniques, the development of accurate predictive models for complex medical conditions, such as thyroid cancer, has shown remarkable progress. Accurate predictive models for thyroid cancer enhance early detection, improve resource allocation, and reduce overtreatment. However, the widespread adoption of these models in clinical practice demands predictive performance along with interpretability and transparency. This paper proposes a novel association-rule based feature-integrated machine learning model which shows better classification and prediction accuracy than present state-of-the-art models. Our study also focuses on the application of SHapley Additive exPlanations (SHAP) values as a powerful tool for explaining… More >

  • Open Access

    ARTICLE

    Customized Convolutional Neural Network for Accurate Detection of Deep Fake Images in Video Collections

    Dmitry Gura1,2, Bo Dong3,*, Duaa Mehiar4, Nidal Al Said5

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1995-2014, 2024, DOI:10.32604/cmc.2024.048238

    Abstract The motivation for this study is that the quality of deep fakes is constantly improving, which leads to the need to develop new methods for their detection. The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection, which is then used as input to the CNN. The customized Convolutional Neural Network method is the date augmented-based CNN model to generate ‘fake data’ or ‘fake images’. This study was carried out using Python and its libraries. We used 242 films from the dataset gathered by the Deep Fake Detection Challenge, of which 199… More >

  • Open Access

    ARTICLE

    Enhancing Deep Learning Semantics: The Diffusion Sampling and Label-Driven Co-Attention Approach

    Chunhua Wang1,2, Wenqian Shang1,2,*, Tong Yi3,*, Haibin Zhu4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1939-1956, 2024, DOI:10.32604/cmc.2024.048135

    Abstract The advent of self-attention mechanisms within Transformer models has significantly propelled the advancement of deep learning algorithms, yielding outstanding achievements across diverse domains. Nonetheless, self-attention mechanisms falter when applied to datasets with intricate semantic content and extensive dependency structures. In response, this paper introduces a Diffusion Sampling and Label-Driven Co-attention Neural Network (DSLD), which adopts a diffusion sampling method to capture more comprehensive semantic information of the data. Additionally, the model leverages the joint correlation information of labels and data to introduce the computation of text representation, correcting semantic representation biases in the data, and increasing the accuracy of semantic… More >

  • Open Access

    ARTICLE

    Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs

    Nagaraju Pacharla, K. Srinivasa Reddy*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3089-3110, 2024, DOI:10.32604/cmc.2024.048133

    Abstract With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing system to fix the issues.… More >

  • Open Access

    ARTICLE

    An Intelligent Framework for Resilience Recovery of FANETs with Spatio-Temporal Aggregation and Multi-Head Attention Mechanism

    Zhijun Guo1, Yun Sun2,*, Ying Wang1, Chaoqi Fu3, Jilong Zhong4,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2375-2398, 2024, DOI:10.32604/cmc.2024.048112

    Abstract Due to the time-varying topology and possible disturbances in a conflict environment, it is still challenging to maintain the mission performance of flying Ad hoc networks (FANET), which limits the application of Unmanned Aerial Vehicle (UAV) swarms in harsh environments. This paper proposes an intelligent framework to quickly recover the cooperative coverage mission by aggregating the historical spatio-temporal network with the attention mechanism. The mission resilience metric is introduced in conjunction with connectivity and coverage status information to simplify the optimization model. A spatio-temporal node pooling method is proposed to ensure all node location features can be updated after destruction… More >

  • Open Access

    ARTICLE

    A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction

    Jun Li1,2, Minqing Zhang1,2,*, Ke Niu1, Yingnan Zhang1, Xiaoyuan Yang1,2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2085-2103, 2024, DOI:10.32604/cmc.2024.048095

    Abstract Among steganalysis techniques, detection against MV (motion vector) domain-based video steganography in the HEVC (High Efficiency Video Coding) standard remains a challenging issue. For the purpose of improving the detection performance, this paper proposes a steganalysis method that can perfectly detect MV-based steganography in HEVC. Firstly, we define the local optimality of MVP (Motion Vector Prediction) based on the technology of AMVP (Advanced Motion Vector Prediction). Secondly, we analyze that in HEVC video, message embedding either using MVP index or MVD (Motion Vector Difference) may destroy the above optimality of MVP. And then, we define the optimal rate of MVP… More >

  • Open Access

    ARTICLE

    A Heuristic Radiomics Feature Selection Method Based on Frequency Iteration and Multi-Supervised Training Mode

    Zhigao Zeng1,2, Aoting Tang1,2, Shengqiu Yi1,2, Xinpan Yuan1,2, Yanhui Zhu1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2277-2293, 2024, DOI:10.32604/cmc.2024.047989

    Abstract Radiomics is a non-invasive method for extracting quantitative and higher-dimensional features from medical images for diagnosis. It has received great attention due to its huge application prospects in recent years. We can know that the number of features selected by the existing radiomics feature selection methods is basically about ten. In this paper, a heuristic feature selection method based on frequency iteration and multiple supervised training mode is proposed. Based on the combination between features, it decomposes all features layer by layer to select the optimal features for each layer, then fuses the optimal features to form a local optimal… More >

  • Open Access

    ARTICLE

    A Novel Approach to Breast Tumor Detection: Enhanced Speckle Reduction and Hybrid Classification in Ultrasound Imaging

    K. Umapathi1,*, S. Shobana1, Anand Nayyar2, Judith Justin3, R. Vanithamani3, Miguel Villagómez Galindo4, Mushtaq Ahmad Ansari5, Hitesh Panchal6,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1875-1901, 2024, DOI:10.32604/cmc.2024.047961

    Abstract Breast cancer detection heavily relies on medical imaging, particularly ultrasound, for early diagnosis and effective treatment. This research addresses the challenges associated with computer-aided diagnosis (CAD) of breast cancer from ultrasound images. The primary challenge is accurately distinguishing between malignant and benign tumors, complicated by factors such as speckle noise, variable image quality, and the need for precise segmentation and classification. The main objective of the research paper is to develop an advanced methodology for breast ultrasound image classification, focusing on speckle noise reduction, precise segmentation, feature extraction, and machine learning-based classification. A unique approach is introduced that combines Enhanced… More >

  • Open Access

    ARTICLE

    Graph Convolutional Networks Embedding Textual Structure Information for Relation Extraction

    Chuyuan Wei*, Jinzhe Li, Zhiyuan Wang, Shanshan Wan, Maozu Guo

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3299-3314, 2024, DOI:10.32604/cmc.2024.047811

    Abstract Deep neural network-based relational extraction research has made significant progress in recent years, and it provides data support for many natural language processing downstream tasks such as building knowledge graph, sentiment analysis and question-answering systems. However, previous studies ignored much unused structural information in sentences that could enhance the performance of the relation extraction task. Moreover, most existing dependency-based models utilize self-attention to distinguish the importance of context, which hardly deals with multiple-structure information. To efficiently leverage multiple structure information, this paper proposes a dynamic structure attention mechanism model based on textual structure information, which deeply integrates word embedding, named… More >

Displaying 51-60 on page 6 of 20686. Per Page