Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (316)
  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264 - 23 July 2020

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to More >

  • Open Access

    ARTICLE

    Applying Stack Bidirectional LSTM Model to Intrusion Detection

    Ziyong Ran1, Desheng Zheng1, *, Yanling Lai1, Lulu Tian2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 309-320, 2020, DOI:10.32604/cmc.2020.010102 - 23 July 2020

    Abstract Nowadays, Internet has become an indispensable part of daily life and is used in many fields. Due to the large amount of Internet traffic, computers are subject to various security threats, which may cause serious economic losses and even endanger national security. It is hoped that an effective security method can systematically classify intrusion data in order to avoid leakage of important data or misuse of data. As machine learning technology matures, deep learning is widely used in various industries. Combining deep learning with network security and intrusion detection is the current trend. In this… More >

  • Open Access

    ARTICLE

    A High Gain, Noise Cancelling 2515-4900 MHz CMOS LNA for China Mobile 5G Communication Application

    Xiaorong Zhao1, Weili Cheng2, Hongjin Zhu1, Chunpeng Ge3, Gengyuan Zhou1, *, Zhongjun Fu1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1139-1151, 2020, DOI:10.32604/cmc.2020.010220 - 10 June 2020

    Abstract With the development of the times, people’s requirements for communication technology are becoming higher and higher. 4G communication technology has been unable to meet development needs, and 5G communication technology has emerged as the times require. This article proposes the design of a low-noise amplifier (LNA) that will be used in the 5G band of China Mobile Communications. A low noise amplifier for mobile 5G communication is designed based on Taiwan Semiconductor Manufacturing Company (TSMC) 0.13 μm Radio Frequency (RF) Complementary Metal Oxide Semiconductor (CMOS) process. The LNA employs self-cascode devices in currentreuse configuration to… More >

  • Open Access

    ARTICLE

    Performance Anomaly Detection in Web Services: An RNN- Based Approach Using Dynamic Quality of Service Features

    Muhammad Hasnain1, Seung Ryul Jeong2, *, Muhammad Fermi Pasha3, Imran Ghani4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 729-752, 2020, DOI:10.32604/cmc.2020.010394 - 10 June 2020

    Abstract Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framework that uses dynamic features of quality of service that are collected in a simulated setup. Three variants of recurrent neural networks-SimpleRNN, long short term memory, and gated recurrent unit are evaluated. The results reveal that the proposed method effectively detects anomalies in More >

  • Open Access

    REVIEW

    Current status of gene therapy in melanoma treatment

    YONGLU WANG1,2,*, WEI YOU1, XUEMING LI3,4,*

    BIOCELL, Vol.44, No.2, pp. 167-174, 2020, DOI:10.32604/biocell.2020.09023 - 27 May 2020

    Abstract Melanoma is the deadliest type of skin cancer and which has a high ability of metastasis. Surgery is an effective method to treat I or II stage melanoma patients. However, there are few treatment options for metastatic melanoma. Gene therapy is one of the attractive options and is considered as the future direction for treating melanoma. This review mainly discusses the properties and challenges of the various gene therapies in melanoma, especially the delivery systems and gene targeting. More >

  • Open Access

    ARTICLE

    Visual Relationship Detection with Contextual Information

    Yugang Li1, 2, *, Yongbin Wang1, Zhe Chen2, Yuting Zhu3

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1575-1589, 2020, DOI:10.32604/cmc.2020.07451 - 30 April 2020

    Abstract Understanding an image goes beyond recognizing and locating the objects in it, the relationships between objects also very important in image understanding. Most previous methods have focused on recognizing local predictions of the relationships. But real-world image relationships often determined by the surrounding objects and other contextual information. In this work, we employ this insight to propose a novel framework to deal with the problem of visual relationship detection. The core of the framework is a relationship inference network, which is a recurrent structure designed for combining the global contextual information of the object to More >

  • Open Access

    ARTICLE

    3-Dimensional Bag of Visual Words Framework on Action Recognition

    Shiqi Wang1, Yimin Yang1, *, Ruizhong Wei1, Qingming Jonathan Wu2

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1081-1091, 2020, DOI:10.32604/cmc.2020.09648 - 30 April 2020

    Abstract Human motion recognition plays a crucial role in the video analysis framework. However, a given video may contain a variety of noises, such as an unstable background and redundant actions, that are completely different from the key actions. These noises pose a great challenge to human motion recognition. To solve this problem, we propose a new method based on the 3-Dimensional (3D) Bag of Visual Words (BoVW) framework. Our method includes two parts: The first part is the video action feature extractor, which can identify key actions by analyzing action features. In the video action More >

  • Open Access

    ARTICLE

    OTT Messages Modeling and Classification Based on Recurrent Neural Networks

    Guangyong Yang1, Jianqiu Zeng1, Mengke Yang2, *, Yifei Wei3, Xiangqing Wang3, Zulfiqar Hussain Pathan4

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 769-785, 2020, DOI:10.32604/cmc.2020.07528 - 01 May 2020

    Abstract A vast amount of information has been produced in recent years, which brings a huge challenge to information management. The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages. In this paper, we propose a nine-rectangle-grid information model according to the information value and privacy, and then present information use policies based on the rough set theory. Recurrent neural networks were employed to classify OTT messages. The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages, ending with More >

  • Open Access

    ARTICLE

    Multiscale Analysis of the Effect of Debris on Fretting Wear Process Using a Semi-Concurrent Method

    Shengjie Wang1, Tongyan Yue2, Magd Abdel Wahab3, 4, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 17-35, 2020, DOI:10.32604/cmc.2020.07790

    Abstract Fretting wear is a phenomenon, in which wear happens between two oscillatory moving contact surfaces in microscale amplitude. In this paper, the effect of debris between pad and specimen is analyzed by using a semi-concurrent multiscale method. Firstly, the macroscale fretting wear model is performed. Secondly, the part with the wear profile is imported from the macroscale model to a microscale model after running in stage. Thirdly, an effective pad’s radius is extracted by analyzing the contact pressure in order to take into account the effect of the debris. Finally, the effective radius is up-scaled More >

  • Open Access

    ARTICLE

    Overlapping surgeries: defining the “critical portions” of the procedure

    Joon Yau Leong, Brian Calio, Mihir Shah, Patrick Sullivan, Edouard J. Trabulsi, Leonard G. Gomella, Costas D. Lallas

    Canadian Journal of Urology, Vol.26, No.2, pp. 9694-9698, 2019

    Abstract Introduction: An important aspect of overlapping surgery is to determine the “critical portion” of an operation. Currently, there are no guidelines that standardize the critical portions of common urologic procedures. We sought to determine the relationship between the critical portions of common urologic operations as defined by the primary surgeon compared to the trainee at a single academic medical center.
    Materials and methods: In an open-ended survey of the Urology Department at Thomas Jefferson University, attending surgeons and urology residents were asked to list five of their most commonly performed surgeries and subsequently identify what they defined… More >

Displaying 241-250 on page 25 of 316. Per Page