Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (315)
  • Open Access

    REVIEW

    Artificial Intelligence for Maximizing Agricultural Input Use Efficiency: Exploring Nutrient, Water and Weed Management Strategies

    Sumit Sow1,#, Shivani Ranjan1,#,*, Mahmoud F. Seleiman2,3, Hiba M. Alkharabsheh4,*, Mukesh Kumar1, Navnit Kumar1, Smruti Ranjan Padhan5, Dhirendra Kumar Roy1, Dibyajyoti Nath6, Harun Gitari7, Daniel O. Wasonga8

    Phyton-International Journal of Experimental Botany, Vol.93, No.7, pp. 1569-1598, 2024, DOI:10.32604/phyton.2024.052241

    Abstract Agriculture plays a crucial role in the economy, and there is an increasing global emphasis on automating agricultural processes. With the tremendous increase in population, the demand for food and employment has also increased significantly. Agricultural methods traditionally used to meet these requirements are no longer adequate, requiring solutions to issues such as excessive herbicide use and the use of chemical fertilizers. Integration of technologies such as the Internet of Things, wireless communication, machine learning, artificial intelligence (AI), and deep learning shows promise in addressing these challenges. However, there is a lack of comprehensive documentation… More >

  • Open Access

    ARTICLE

    Phishing Attacks Detection Using Ensemble Machine Learning Algorithms

    Nisreen Innab1, Ahmed Abdelgader Fadol Osman2, Mohammed Awad Mohammed Ataelfadiel2, Marwan Abu-Zanona3,*, Bassam Mohammad Elzaghmouri4, Farah H. Zawaideh5, Mouiad Fadeil Alawneh6

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1325-1345, 2024, DOI:10.32604/cmc.2024.051778

    Abstract Phishing, an Internet fraud where individuals are deceived into revealing critical personal and account information, poses a significant risk to both consumers and web-based institutions. Data indicates a persistent rise in phishing attacks. Moreover, these fraudulent schemes are progressively becoming more intricate, thereby rendering them more challenging to identify. Hence, it is imperative to utilize sophisticated algorithms to address this issue. Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors. Machine learning (ML) approaches can identify common characteristics in most phishing assaults. In this paper, we propose an ensemble approach… More >

  • Open Access

    ARTICLE

    Generating Factual Text via Entailment Recognition Task

    Jinqiao Dai, Pengsen Cheng, Jiayong Liu*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 547-565, 2024, DOI:10.32604/cmc.2024.051745

    Abstract Generating diverse and factual text is challenging and is receiving increasing attention. By sampling from the latent space, variational autoencoder-based models have recently enhanced the diversity of generated text. However, existing research predominantly depends on summarization models to offer paragraph-level semantic information for enhancing factual correctness. The challenge lies in effectively generating factual text using sentence-level variational autoencoder-based models. In this paper, a novel model called fact-aware conditional variational autoencoder is proposed to balance the factual correctness and diversity of generated text. Specifically, our model encodes the input sentences and uses them as facts to… More >

  • Open Access

    ARTICLE

    A Gaussian Noise-Based Algorithm for Enhancing Backdoor Attacks

    Hong Huang, Yunfei Wang*, Guotao Yuan, Xin Li

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 361-387, 2024, DOI:10.32604/cmc.2024.051633

    Abstract Deep Neural Networks (DNNs) are integral to various aspects of modern life, enhancing work efficiency. Nonetheless, their susceptibility to diverse attack methods, including backdoor attacks, raises security concerns. We aim to investigate backdoor attack methods for image categorization tasks, to promote the development of DNN towards higher security. Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples, and the meticulous data screening by developers, hindering practical attack implementation. To overcome these challenges, this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation (GN-TUAP) algorithm. This approach… More >

  • Open Access

    ARTICLE

    A New Speed Limit Recognition Methodology Based on Ensemble Learning: Hardware Validation

    Mohamed Karray1,*, Nesrine Triki2,*, Mohamed Ksantini2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 119-138, 2024, DOI:10.32604/cmc.2024.051562

    Abstract Advanced Driver Assistance Systems (ADAS) technologies can assist drivers or be part of automatic driving systems to support the driving process and improve the level of safety and comfort on the road. Traffic Sign Recognition System (TSRS) is one of the most important components of ADAS. Among the challenges with TSRS is being able to recognize road signs with the highest accuracy and the shortest processing time. Accordingly, this paper introduces a new real time methodology recognizing Speed Limit Signs based on a trio of developed modules. Firstly, the Speed Limit Detection (SLD) module uses… More >

  • Open Access

    ARTICLE

    5G Resource Allocation Using Feature Selection and Greylag Goose Optimization Algorithm

    Amel Ali Alhussan1, S. K. Towfek2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1179-1201, 2024, DOI:10.32604/cmc.2024.049874

    Abstract In the contemporary world of highly efficient technological development, fifth-generation technology (5G) is seen as a vital step forward with theoretical maximum download speeds of up to twenty gigabits per second (Gbps). As far as the current implementations are concerned, they are at the level of slightly below 1 Gbps, but this allowed a great leap forward from fourth generation technology (4G), as well as enabling significantly reduced latency, making 5G an absolute necessity for applications such as gaming, virtual conferencing, and other interactive electronic processes. Prospects of this change are not limited to connectivity… More >

  • Open Access

    ARTICLE

    Dynamic Hypergraph Modeling and Robustness Analysis for SIoT

    Yue Wan, Nan Jiang*, Ziyu Liu

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3017-3034, 2024, DOI:10.32604/cmes.2024.051101

    Abstract The Social Internet of Things (SIoT) integrates the Internet of Things (IoT) and social networks, taking into account the social attributes of objects and diversifying the relationship between humans and objects, which overcomes the limitations of the IoT’s focus on associations between objects. Artificial Intelligence (AI) technology is rapidly evolving. It is critical to build trustworthy and transparent systems, especially with system security issues coming to the surface. This paper emphasizes the social attributes of objects and uses hypergraphs to model the diverse entities and relationships in SIoT, aiming to build an SIoT hypergraph generation… More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Federated Learning in the Healthcare Area: Concept and Applications

    Deepak Upreti1, Eunmok Yang2, Hyunil Kim3,*, Changho Seo1,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2239-2274, 2024, DOI:10.32604/cmes.2024.048932

    Abstract Federated learning is an innovative machine learning technique that deals with centralized data storage issues while maintaining privacy and security. It involves constructing machine learning models using datasets spread across several data centers, including medical facilities, clinical research facilities, Internet of Things devices, and even mobile devices. The main goal of federated learning is to improve robust models that benefit from the collective knowledge of these disparate datasets without centralizing sensitive information, reducing the risk of data loss, privacy breaches, or data exposure. The application of federated learning in the healthcare industry holds significant promise More >

  • Open Access

    ARTICLE

    Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition

    Yi-Chun Lai1, Shu-Yin Chiang2, Yao-Chiang Kan3, Hsueh-Chun Lin4,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3783-3803, 2024, DOI:10.32604/cmc.2024.050376

    Abstract Artificial intelligence (AI) technology has become integral in the realm of medicine and healthcare, particularly in human activity recognition (HAR) applications such as fitness and rehabilitation tracking. This study introduces a robust coupling analysis framework that integrates four AI-enabled models, combining both machine learning (ML) and deep learning (DL) approaches to evaluate their effectiveness in HAR. The analytical dataset comprises 561 features sourced from the UCI-HAR database, forming the foundation for training the models. Additionally, the MHEALTH database is employed to replicate the modeling process for comparative purposes, while inclusion of the WISDM database, renowned… More > Graphic Abstract

    Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition

  • Open Access

    ARTICLE

    EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems

    Zhenjiang Dong1, Xin Ge1, Yuehua Huang1, Jiankuo Dong1, Jiang Xu2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4021-4044, 2024, DOI:10.32604/cmc.2024.049233

    Abstract This paper presents a comprehensive exploration into the integration of Internet of Things (IoT), big data analysis, cloud computing, and Artificial Intelligence (AI), which has led to an unprecedented era of connectivity. We delve into the emerging trend of machine learning on embedded devices, enabling tasks in resource-limited environments. However, the widespread adoption of machine learning raises significant privacy concerns, necessitating the development of privacy-preserving techniques. One such technique, secure multi-party computation (MPC), allows collaborative computations without exposing private inputs. Despite its potential, complex protocols and communication interactions hinder performance, especially on resource-constrained devices. Efforts… More >

Displaying 1-10 on page 1 of 315. Per Page