Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,863)
  • Open Access

    ARTICLE

    Spinal Vertebral Fracture Detection and Fracture Level Assessment Based on Deep Learning

    Yuhang Wang1,*, Zhiqin He1, Qinmu Wu1, Tingsheng Lu2, Yu Tang1, Maoyun Zhu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1377-1398, 2024, DOI:10.32604/cmc.2024.047379

    Abstract This paper addresses the common orthopedic trauma of spinal vertebral fractures and aims to enhance doctors’ diagnostic efficiency. Therefore, a deep-learning-based automated diagnostic system with multi-label segmentation is proposed to recognize the condition of vertebral fractures. The whole spine Computed Tomography (CT) image is segmented into the fracture, normal, and background using U-Net, and the fracture degree of each vertebra is evaluated (Genant semi-qualitative evaluation). The main work of this paper includes: First, based on the spatial configuration network (SCN) structure, U-Net is used instead of the SCN feature extraction network. The attention mechanism and the residual connection between the… More >

  • Open Access

    ARTICLE

    ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things

    Yan Xiang1,2, Daofeng Li1,2,*, Xinyi Meng1,2, Chengfeng Dong1,2, Guanglin Qin1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1005-1023, 2024, DOI:10.32604/cmc.2024.047143

    Abstract The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasing demands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has caught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. This has resulted in a myriad of security challenges, including information leakage, malware propagation, and financial loss, among others. Consequently, developing an intrusion detection system to identify both active and potential intrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practical intrusion detection… More >

  • Open Access

    ARTICLE

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    Naglaa F. Soliman1, Fatma E. Fadl-Allah2, Walid El-Shafai3,4,*, Mahmoud I. Aly2, Maali Alabdulhafith1, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 201-241, 2024, DOI:10.32604/cmc.2024.046757

    Abstract The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away from unauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and encryption. This paper is mainly… More >

  • Open Access

    ARTICLE

    Automated Algorithms for Detecting and Classifying X-Ray Images of Spine Fractures

    Fayez Alfayez*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1539-1560, 2024, DOI:10.32604/cmc.2024.046443

    Abstract This paper emphasizes a faster digital processing time while presenting an accurate method for identifying spine fractures in X-ray pictures. The study focuses on efficiency by utilizing many methods that include picture segmentation, feature reduction, and image classification. Two important elements are investigated to reduce the classification time: Using feature reduction software and leveraging the capabilities of sophisticated digital processing hardware. The researchers use different algorithms for picture enhancement, including the Wiener and Kalman filters, and they look into two background correction techniques. The article presents a technique for extracting textural features and evaluates three picture segmentation algorithms and three… More >

  • Open Access

    ARTICLE

    Multimodal Social Media Fake News Detection Based on Similarity Inference and Adversarial Networks

    Fangfang Shan1,2,*, Huifang Sun1,2, Mengyi Wang1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 581-605, 2024, DOI:10.32604/cmc.2024.046202

    Abstract As social networks become increasingly complex, contemporary fake news often includes textual descriptions of events accompanied by corresponding images or videos. Fake news in multiple modalities is more likely to create a misleading perception among users. While early research primarily focused on text-based features for fake news detection mechanisms, there has been relatively limited exploration of learning shared representations in multimodal (text and visual) contexts. To address these limitations, this paper introduces a multimodal model for detecting fake news, which relies on similarity reasoning and adversarial networks. The model employs Bidirectional Encoder Representation from Transformers (BERT) and Text Convolutional Neural… More >

  • Open Access

    ARTICLE

    Double DQN Method For Botnet Traffic Detection System

    Yutao Hu1, Yuntao Zhao1,*, Yongxin Feng2, Xiangyu Ma1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 509-530, 2024, DOI:10.32604/cmc.2024.042216

    Abstract In the face of the increasingly severe Botnet problem on the Internet, how to effectively detect Botnet traffic in real-time has become a critical problem. Although the existing deep Q network (DQN) algorithm in Deep reinforcement learning can solve the problem of real-time updating, its prediction results are always higher than the actual results. In Botnet traffic detection, although it performs well in the training set, the accuracy rate of predicting traffic is as high as%; however, in the test set, its accuracy has declined, and it is impossible to adjust its prediction strategy on time based on new data… More >

  • Open Access

    ARTICLE

    Detection of Student Engagement in E-Learning Environments Using EfficientnetV2-L Together with RNN-Based Models

    Farhad Mortezapour Shiri1,*, Ehsan Ahmadi2, Mohammadreza Rezaee1, Thinagaran Perumal1

    Journal on Artificial Intelligence, Vol.6, pp. 85-103, 2024, DOI:10.32604/jai.2024.048911

    Abstract Automatic detection of student engagement levels from videos, which is a spatio-temporal classification problem is crucial for enhancing the quality of online education. This paper addresses this challenge by proposing four novel hybrid end-to-end deep learning models designed for the automatic detection of student engagement levels in e-learning videos. The evaluation of these models utilizes the DAiSEE dataset, a public repository capturing student affective states in e-learning scenarios. The initial model integrates EfficientNetV2-L with Gated Recurrent Unit (GRU) and attains an accuracy of 61.45%. Subsequently, the second model combines EfficientNetV2-L with bidirectional GRU (Bi-GRU), yielding an accuracy of 61.56%. The… More >

  • Open Access

    ARTICLE

    NFHP-RN: A Method of Few-Shot Network Attack Detection Based on the Network Flow Holographic Picture-ResNet

    Tao Yi1,3, Xingshu Chen1,2,*, Mingdong Yang3, Qindong Li1, Yi Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 929-955, 2024, DOI:10.32604/cmes.2024.048793

    Abstract Due to the rapid evolution of Advanced Persistent Threats (APTs) attacks, the emergence of new and rare attack samples, and even those never seen before, make it challenging for traditional rule-based detection methods to extract universal rules for effective detection. With the progress in techniques such as transfer learning and meta-learning, few-shot network attack detection has progressed. However, challenges in few-shot network attack detection arise from the inability of time sequence flow features to adapt to the fixed length input requirement of deep learning, difficulties in capturing rich information from original flow in the case of insufficient samples, and the… More >

  • Open Access

    ARTICLE

    A Lightweight Network with Dual Encoder and Cross Feature Fusion for Cement Pavement Crack Detection

    Zhong Qu1,*, Guoqing Mu1, Bin Yuan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 255-273, 2024, DOI:10.32604/cmes.2024.048175

    Abstract Automatic crack detection of cement pavement chiefly benefits from the rapid development of deep learning, with convolutional neural networks (CNN) playing an important role in this field. However, as the performance of crack detection in cement pavement improves, the depth and width of the network structure are significantly increased, which necessitates more computing power and storage space. This limitation hampers the practical implementation of crack detection models on various platforms, particularly portable devices like small mobile devices. To solve these problems, we propose a dual-encoder-based network architecture that focuses on extracting more comprehensive fracture feature information and combines cross-fusion modules… More > Graphic Abstract

    A Lightweight Network with Dual Encoder and Cross Feature Fusion for Cement Pavement Crack Detection

  • Open Access

    REVIEW

    A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts

    Huaiguang Wu, Yibo Peng, Yaqiong He*, Jinlin Fan

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 77-108, 2024, DOI:10.32604/cmes.2024.046758

    Abstract In recent years, the number of smart contracts deployed on blockchain has exploded. However, the issue of vulnerability has caused incalculable losses. Due to the irreversible and immutability of smart contracts, vulnerability detection has become particularly important. With the popular use of neural network model, there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts. This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts. Subsequently, it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection. These… More > Graphic Abstract

    A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts

Displaying 21-30 on page 3 of 2863. Per Page