Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (158)
  • Open Access

    REVIEW

    An Investigation on Open-RAN Specifications: Use Cases, Security Threats, Requirements, Discussions

    Heejae Park1, Tri-Hai Nguyen2, Laihyuk Park1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 13-41, 2024, DOI:10.32604/cmes.2024.052394

    Abstract The emergence of various technologies such as terahertz communications, Reconfigurable Intelligent Surfaces (RIS), and AI-powered communication services will burden network operators with rising infrastructure costs. Recently, the Open Radio Access Network (O-RAN) has been introduced as a solution for growing financial and operational burdens in Beyond 5G (B5G) and 6G networks. O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs. By disaggregating conventional Base Band Units (BBUs) into O-RAN Distributed Units (O-DU) and O-RAN Centralized Units (O-CU), O-RAN offers greater flexibility for upgrades and network automation. However, this openness introduces new security More >

  • Open Access

    ARTICLE

    Fitness Sharing Chaotic Particle Swarm Optimization (FSCPSO): A Metaheuristic Approach for Allocating Dynamic Virtual Machine (VM) in Fog Computing Architecture

    Prasanna Kumar Kannughatta Ranganna1, Siddesh Gaddadevara Matt2, Chin-Ling Chen3,4,*, Ananda Babu Jayachandra5, Yong-Yuan Deng4,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2557-2578, 2024, DOI:10.32604/cmc.2024.051634

    Abstract In recent decades, fog computing has played a vital role in executing parallel computational tasks, specifically, scientific workflow tasks. In cloud data centers, fog computing takes more time to run workflow applications. Therefore, it is essential to develop effective models for Virtual Machine (VM) allocation and task scheduling in fog computing environments. Effective task scheduling, VM migration, and allocation, altogether optimize the use of computational resources across different fog nodes. This process ensures that the tasks are executed with minimal energy consumption, which reduces the chances of resource bottlenecks. In this manuscript, the proposed framework… More >

  • Open Access

    ARTICLE

    Evolutionary Variational YOLOv8 Network for Fault Detection in Wind Turbines

    Hongjiang Wang1, Qingze Shen2,*, Qin Dai1, Yingcai Gao2, Jing Gao2, Tian Zhang3,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 625-642, 2024, DOI:10.32604/cmc.2024.051757

    Abstract Deep learning has emerged in many practical applications, such as image classification, fault diagnosis, and object detection. More recently, convolutional neural networks (CNNs), representative models of deep learning, have been used to solve fault detection. However, the current design of CNNs for fault detection of wind turbine blades is highly dependent on domain knowledge and requires a large amount of trial and error. For this reason, an evolutionary YOLOv8 network has been developed to automatically find the network architecture for wind turbine blade-based fault detection. YOLOv8 is a CNN-backed object detection model. Specifically, to reduce… More >

  • Open Access

    ARTICLE

    MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection

    Yu Yan1, Yu Yang1,*, Shen Fang1, Minna Gao2, Yiding Chen1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 875-896, 2024, DOI:10.32604/cmc.2024.051685

    Abstract In the face of the effective popularity of the Internet of Things (IoT), but the frequent occurrence of cybersecurity incidents, various cybersecurity protection means have been proposed and applied. Among them, Intrusion Detection System (IDS) has been proven to be stable and efficient. However, traditional intrusion detection methods have shortcomings such as low detection accuracy and inability to effectively identify malicious attacks. To address the above problems, this paper fully considers the superiority of deep learning models in processing high-dimensional data, and reasonable data type conversion methods can extract deep features and detect classification using… More >

  • Open Access

    ARTICLE

    Pulmonary Edema and Pleural Effusion Detection Using EfficientNet-V1-B4 Architecture and AdamW Optimizer from Chest X-Rays Images

    Anas AbuKaraki1, Tawfi Alrawashdeh1, Sumaya Abusaleh1, Malek Zakarya Alksasbeh1,*, Bilal Alqudah1, Khalid Alemerien2, Hamzah Alshamaseen3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1055-1073, 2024, DOI:10.32604/cmc.2024.051420

    Abstract This paper presents a novel multiclass system designed to detect pleural effusion and pulmonary edema on chest X-ray images, addressing the critical need for early detection in healthcare. A new comprehensive dataset was formed by combining 28,309 samples from the ChestX-ray14, PadChest, and CheXpert databases, with 10,287, 6022, and 12,000 samples representing Pleural Effusion, Pulmonary Edema, and Normal cases, respectively. Consequently, the preprocessing step involves applying the Contrast Limited Adaptive Histogram Equalization (CLAHE) method to boost the local contrast of the X-ray samples, then resizing the images to 380 × 380 dimensions, followed by using the data… More >

  • Open Access

    ARTICLE

    MADDPG-D2: An Intelligent Dynamic Task Allocation Algorithm Based on Multi-Agent Architecture Driven by Prior Knowledge

    Tengda Li, Gang Wang, Qiang Fu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2559-2586, 2024, DOI:10.32604/cmes.2024.052039

    Abstract Aiming at the problems of low solution accuracy and high decision pressure when facing large-scale dynamic task allocation (DTA) and high-dimensional decision space with single agent, this paper combines the deep reinforcement learning (DRL) theory and an improved Multi-Agent Deep Deterministic Policy Gradient (MADDPG-D2) algorithm with a dual experience replay pool and a dual noise based on multi-agent architecture is proposed to improve the efficiency of DTA. The algorithm is based on the traditional Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm, and considers the introduction of a double noise mechanism to increase the action exploration… More >

  • Open Access

    ARTICLE

    Optimised CNN Architectures for Handwritten Arabic Character Recognition

    Salah Alghyaline*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4905-4924, 2024, DOI:10.32604/cmc.2024.052016

    Abstract Handwritten character recognition is considered challenging compared with machine-printed characters due to the different human writing styles. Arabic is morphologically rich, and its characters have a high similarity. The Arabic language includes 28 characters. Each character has up to four shapes according to its location in the word (at the beginning, middle, end, and isolated). This paper proposed 12 CNN architectures for recognizing handwritten Arabic characters. The proposed architectures were derived from the popular CNN architectures, such as VGG, ResNet, and Inception, to make them applicable to recognizing character-size images. The experimental results on three More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain

    Sohaib Latif1,*, M. Saad Bin Ilyas1, Azhar Imran2, Hamad Ali Abosaq3, Abdulaziz Alzubaidi4, Vincent Karovič Jr.5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 353-379, 2024, DOI:10.32604/iasc.2024.047080

    Abstract The Internet of Things (IoT) is growing rapidly and impacting almost every aspect of our lives, from wearables and healthcare to security, traffic management, and fleet management systems. This has generated massive volumes of data and security, and data privacy risks are increasing with the advancement of technology and network connections. Traditional access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF failure. Additionally, conventional privacy preservation methods have high latency costs and overhead for resource-constrained devices. Previous machine learning approaches were… More >

  • Open Access

    ARTICLE

    Audio-Text Multimodal Speech Recognition via Dual-Tower Architecture for Mandarin Air Traffic Control Communications

    Shuting Ge1,2, Jin Ren2,3,*, Yihua Shi4, Yujun Zhang1, Shunzhi Yang2, Jinfeng Yang2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3215-3245, 2024, DOI:10.32604/cmc.2023.046746

    Abstract In air traffic control communications (ATCC), misunderstandings between pilots and controllers could result in fatal aviation accidents. Fortunately, advanced automatic speech recognition technology has emerged as a promising means of preventing miscommunications and enhancing aviation safety. However, most existing speech recognition methods merely incorporate external language models on the decoder side, leading to insufficient semantic alignment between speech and text modalities during the encoding phase. Furthermore, it is challenging to model acoustic context dependencies over long distances due to the longer speech sequences than text, especially for the extended ATCC data. To address these issues,… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Mask Identification System Using ResNet Transfer Learning Architecture

    Arpit Jain1, Nageswara Rao Moparthi1, A. Swathi2, Yogesh Kumar Sharma1, Nitin Mittal3, Ahmed Alhussen4, Zamil S. Alzamil5,*, MohdAnul Haq5

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 341-362, 2024, DOI:10.32604/csse.2023.036973

    Abstract Recently, the coronavirus disease 2019 has shown excellent attention in the global community regarding health and the economy. World Health Organization (WHO) and many others advised controlling Corona Virus Disease in 2019. The limited treatment resources, medical resources, and unawareness of immunity is an essential horizon to unfold. Among all resources, wearing a mask is the primary non-pharmaceutical intervention to stop the spreading of the virus caused by Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) droplets. All countries made masks mandatory to prevent infection. For such enforcement, automatic and effective face detection systems are crucial.… More >

Displaying 1-10 on page 1 of 158. Per Page