Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (150)
  • Open Access

    ARTICLE

    A Harmonic Approach to Handwriting Style Synthesis Using Deep Learning

    Mahatir Ahmed Tusher1, Saket Choudary Kongara1, Sagar Dhanraj Pande2, SeongKi Kim3,*, Salil Bharany4,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4063-4080, 2024, DOI:10.32604/cmc.2024.049007 - 20 June 2024

    Abstract The challenging task of handwriting style synthesis requires capturing the individuality and diversity of human handwriting. The majority of currently available methods use either a generative adversarial network (GAN) or a recurrent neural network (RNN) to generate new handwriting styles. This is why these techniques frequently fall short of producing diverse and realistic text pictures, particularly for terms that are not commonly used. To resolve that, this research proposes a novel deep learning model that consists of a style encoder and a text generator to synthesize different handwriting styles. This network excels in generating conditional… More >

  • Open Access

    ARTICLE

    Abnormal State Detection in Lithium-ion Battery Using Dynamic Frequency Memory and Correlation Attention LSTM Autoencoder

    Haoyi Zhong, Yongjiang Zhao, Chang Gyoon Lim*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1757-1781, 2024, DOI:10.32604/cmes.2024.049208 - 20 May 2024

    Abstract This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery (LiB) time series data. As the energy sector increasingly focuses on integrating distributed energy resources, Virtual Power Plants (VPP) have become a vital new framework for energy management. LiBs are key in this context, owing to their high-efficiency energy storage capabilities essential for VPP operations. However, LiBs are prone to various abnormal states like overcharging, over-discharging, and internal short circuits, which impede power transmission efficiency. Traditional methods for detecting such abnormalities in LiB are too broad and lack precision for the dynamic and… More >

  • Open Access

    ARTICLE

    Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network

    Ruchun Jia1, Jianwei Zhang1,*, Yi Lin1, Yunxiang Han1, Feike Yang2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2523-2546, 2024, DOI:10.32604/cmc.2024.047543 - 15 May 2024

    Abstract In order to enhance the accuracy of Air Traffic Control (ATC) cybersecurity attack detection, in this paper, a new clustering detection method is designed for air traffic control network security attacks. The feature set for ATC cybersecurity attacks is constructed by setting the feature states, adding recursive features, and determining the feature criticality. The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data. An autoencoder is introduced into the AI (artificial intelligence) algorithm to encode and… More >

  • Open Access

    ARTICLE

    A Lightweight Network with Dual Encoder and Cross Feature Fusion for Cement Pavement Crack Detection

    Zhong Qu1,*, Guoqing Mu1, Bin Yuan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 255-273, 2024, DOI:10.32604/cmes.2024.048175 - 16 April 2024

    Abstract Automatic crack detection of cement pavement chiefly benefits from the rapid development of deep learning, with convolutional neural networks (CNN) playing an important role in this field. However, as the performance of crack detection in cement pavement improves, the depth and width of the network structure are significantly increased, which necessitates more computing power and storage space. This limitation hampers the practical implementation of crack detection models on various platforms, particularly portable devices like small mobile devices. To solve these problems, we propose a dual-encoder-based network architecture that focuses on extracting more comprehensive fracture feature… More > Graphic Abstract

    A Lightweight Network with Dual Encoder and Cross Feature Fusion for Cement Pavement Crack Detection

  • Open Access

    ARTICLE

    BSTFNet: An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features

    Hong Huang1, Xingxing Zhang1,*, Ye Lu1, Ze Li1, Shaohua Zhou2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3929-3951, 2024, DOI:10.32604/cmc.2024.047918 - 26 March 2024

    Abstract While encryption technology safeguards the security of network communications, malicious traffic also uses encryption protocols to obscure its malicious behavior. To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic, we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features, called BERT-based Spatio-Temporal Features Network (BSTFNet). At the packet-level granularity, the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers (BERT)… More >

  • Open Access

    ARTICLE

    TEAM: Transformer Encoder Attention Module for Video Classification

    Hae Sung Park1, Yong Suk Choi2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 451-477, 2024, DOI:10.32604/csse.2023.043245 - 19 March 2024

    Abstract Much like humans focus solely on object movement to understand actions, directing a deep learning model’s attention to the core contexts within videos is crucial for improving video comprehension. In the recent study, Video Masked Auto-Encoder (VideoMAE) employs a pre-training approach with a high ratio of tube masking and reconstruction, effectively mitigating spatial bias due to temporal redundancy in full video frames. This steers the model’s focus toward detailed temporal contexts. However, as the VideoMAE still relies on full video frames during the action recognition stage, it may exhibit a progressive shift in attention towards… More >

  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1881-1895, 2024, DOI:10.32604/cmc.2023.047243 - 27 February 2024

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust… More >

  • Open Access

    ARTICLE

    Enhancing Multicriteria-Based Recommendations by Alleviating Scalability and Sparsity Issues Using Collaborative Denoising Autoencoder

    S. Abinaya*, K. Uttej Kumar

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2269-2286, 2024, DOI:10.32604/cmc.2024.047167 - 27 February 2024

    Abstract A Recommender System (RS) is a crucial part of several firms, particularly those involved in e-commerce. In conventional RS, a user may only offer a single rating for an item-that is insufficient to perceive consumer preferences. Nowadays, businesses in industries like e-learning and tourism enable customers to rate a product using a variety of factors to comprehend customers’ preferences. On the other hand, the collaborative filtering (CF) algorithm utilizing AutoEncoder (AE) is seen to be effective in identifying user-interested items. However, the cost of these computations increases nonlinearly as the number of items and users… More >

  • Open Access

    ARTICLE

    Classification of Conversational Sentences Using an Ensemble Pre-Trained Language Model with the Fine-Tuned Parameter

    R. Sujatha, K. Nimala*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1669-1686, 2024, DOI:10.32604/cmc.2023.046963 - 27 February 2024

    Abstract Sentence classification is the process of categorizing a sentence based on the context of the sentence. Sentence categorization requires more semantic highlights than other tasks, such as dependence parsing, which requires more syntactic elements. Most existing strategies focus on the general semantics of a conversation without involving the context of the sentence, recognizing the progress and comparing impacts. An ensemble pre-trained language model was taken up here to classify the conversation sentences from the conversation corpus. The conversational sentences are classified into four categories: information, question, directive, and commission. These classification label sequences are for… More >

  • Open Access

    ARTICLE

    Machine Learning Techniques Using Deep Instinctive Encoder-Based Feature Extraction for Optimized Breast Cancer Detection

    Vaishnawi Priyadarshni1, Sanjay Kumar Sharma1, Mohammad Khalid Imam Rahmani2,*, Baijnath Kaushik3, Rania Almajalid2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2441-2468, 2024, DOI:10.32604/cmc.2024.044963 - 27 February 2024

    Abstract Breast cancer (BC) is one of the leading causes of death among women worldwide, as it has emerged as the most commonly diagnosed malignancy in women. Early detection and effective treatment of BC can help save women’s lives. Developing an efficient technology-based detection system can lead to non-destructive and preliminary cancer detection techniques. This paper proposes a comprehensive framework that can effectively diagnose cancerous cells from benign cells using the Curated Breast Imaging Subset of the Digital Database for Screening Mammography (CBIS-DDSM) data set. The novelty of the proposed framework lies in the integration of More >

Displaying 11-20 on page 2 of 150. Per Page