Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    Research on Multimodal AIGC Video Detection for Identifying Fake Videos Generated by Large Models

    Yong Liu1,2, Tianning Sun3,*, Daofu Gong1,4, Li Di5, Xu Zhao1

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1161-1184, 2025, DOI:10.32604/cmc.2025.062330 - 29 August 2025

    Abstract To address the high-quality forged videos, traditional approaches typically have low recognition accuracy and tend to be easily misclassified. This paper tries to address the challenge of detecting high-quality deepfake videos by promoting the accuracy of Artificial Intelligence Generated Content (AIGC) video authenticity detection with a multimodal information fusion approach. First, a high-quality multimodal video dataset is collected and normalized, including resolution correction and frame rate unification. Next, feature extraction techniques are employed to draw out features from visual, audio, and text modalities. Subsequently, these features are fused into a multilayer perceptron and attention mechanisms-based More >

  • Open Access

    ARTICLE

    Optimization of Machine Learning Methods for Intrusion Detection in IoT

    Alireza Bahmani*

    Journal on Internet of Things, Vol.7, pp. 1-17, 2025, DOI:10.32604/jiot.2025.060786 - 24 June 2025

    Abstract With the development of the Internet of Things (IoT) technology and its widespread integration in various aspects of life, the risks associated with cyberattacks on these systems have increased significantly. Vulnerabilities in IoT devices, stemming from insecure designs and software weaknesses, have made attacks on them more complex and dangerous compared to traditional networks. Conventional intrusion detection systems are not fully capable of identifying and managing these risks in the IoT environment, making research and evaluation of suitable intrusion detection systems for IoT crucial. In this study, deep learning, multi-layer perceptron (MLP), Random Forest (RF),… More >

  • Open Access

    ARTICLE

    Prediction and Comparative Analysis of Rooftop PV Solar Energy Efficiency Considering Indoor and Outdoor Parameters under Real Climate Conditions Factors with Machine Learning Model

    Gökhan Şahin1,*, Ihsan Levent2, Gültekin Işık2, Wilfried van Sark1, Sabir Rustemli3

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1215-1248, 2025, DOI:10.32604/cmes.2025.063193 - 11 April 2025

    Abstract This research investigates the influence of indoor and outdoor factors on photovoltaic (PV) power generation at Utrecht University to accurately predict PV system performance by identifying critical impact factors and improving renewable energy efficiency. To predict plant efficiency, nineteen variables are analyzed, consisting of nine indoor photovoltaic panel characteristics (Open Circuit Voltage (Voc), Short Circuit Current (Isc), Maximum Power (Pmpp), Maximum Voltage (Umpp), Maximum Current (Impp), Filling Factor (FF), Parallel Resistance (Rp), Series Resistance (Rs), Module Temperature) and ten environmental factors (Air Temperature, Air Humidity, Dew Point, Air Pressure, Irradiation, Irradiation Propagation, Wind Speed, Wind… More >

  • Open Access

    ARTICLE

    TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional Networks

    Baoquan Liu1,3, Xi Chen2,3, Qingjun Yuan2,3, Degang Li2,3, Chunxiang Gu2,3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3179-3201, 2025, DOI:10.32604/cmc.2024.059688 - 17 February 2025

    Abstract With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based on GNN can deal with encrypted traffic well. However, existing GNN-based approaches ignore the relationship between client or server packets. In this paper, we design a network traffic topology based on GCN, called Flow Mapping Graph (FMG). FMG establishes sequential edges between vertexes by the arrival order of packets and establishes jump-order edges between vertexes by connecting packets in different bursts with the same direction. It not… More >

  • Open Access

    ARTICLE

    Multisource Data Fusion Using MLP for Human Activity Recognition

    Sujittra Sarakon1, Wansuree Massagram1,2, Kreangsak Tamee1,3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2109-2136, 2025, DOI:10.32604/cmc.2025.058906 - 17 February 2025

    Abstract This research investigates the application of multisource data fusion using a Multi-Layer Perceptron (MLP) for Human Activity Recognition (HAR). The study integrates four distinct open-source datasets—WISDM, DaLiAc, MotionSense, and PAMAP2—to develop a generalized MLP model for classifying six human activities. Performance analysis of the fused model for each dataset reveals accuracy rates of 95.83 for WISDM, 97 for DaLiAc, 94.65 for MotionSense, and 98.54 for PAMAP2. A comparative evaluation was conducted between the fused MLP model and the individual dataset models, with the latter tested on separate validation sets. The results indicate that the MLP More >

  • Open Access

    ARTICLE

    Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning

    Shijie Tang1,2, Yong Ding1,3,4,*, Huiyong Wang5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1129-1150, 2025, DOI:10.32604/cmc.2024.059143 - 03 January 2025

    Abstract As more and more devices in Cyber-Physical Systems (CPS) are connected to the Internet, physical components such as programmable logic controller (PLC), sensors, and actuators are facing greater risks of network attacks, and fast and accurate attack detection techniques are crucial. The key problem in distinguishing between normal and abnormal sequences is to model sequential changes in a large and diverse field of time series. To address this issue, we propose an anomaly detection method based on distributed deep learning. Our method uses a bilateral filtering algorithm for sequential sequences to remove noise in the More >

  • Open Access

    ARTICLE

    Dynamic Multi-Layer Perceptron for Fetal Health Classification Using Cardiotocography Data

    Uddagiri Sirisha1,, Parvathaneni Naga Srinivasu2,3,*, Panguluri Padmavathi4, Seongki Kim5,, Aruna Pavate6, Jana Shafi7, Muhammad Fazal Ijaz8,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2301-2330, 2024, DOI:10.32604/cmc.2024.053132 - 15 August 2024

    Abstract Fetal health care is vital in ensuring the health of pregnant women and the fetus. Regular check-ups need to be taken by the mother to determine the status of the fetus’ growth and identify any potential problems. To know the status of the fetus, doctors monitor blood reports, Ultrasounds, cardiotocography (CTG) data, etc. Still, in this research, we have considered CTG data, which provides information on heart rate and uterine contractions during pregnancy. Several researchers have proposed various methods for classifying the status of fetus growth. Manual processing of CTG data is time-consuming and unreliable.… More >

  • Open Access

    ARTICLE

    Recommendation System Based on Perceptron and Graph Convolution Network

    Zuozheng Lian1,2, Yongchao Yin1, Haizhen Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3939-3954, 2024, DOI:10.32604/cmc.2024.049780 - 20 June 2024

    Abstract The relationship between users and items, which cannot be recovered by traditional techniques, can be extracted by the recommendation algorithm based on the graph convolution network. The current simple linear combination of these algorithms may not be sufficient to extract the complex structure of user interaction data. This paper presents a new approach to address such issues, utilizing the graph convolution network to extract association relations. The proposed approach mainly includes three modules: Embedding layer, forward propagation layer, and score prediction layer. The embedding layer models users and items according to their interaction information and… More >

  • Open Access

    ARTICLE

    Efficient Object Segmentation and Recognition Using Multi-Layer Perceptron Networks

    Aysha Naseer1, Nouf Abdullah Almujally2, Saud S. Alotaibi3, Abdulwahab Alazeb4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1381-1398, 2024, DOI:10.32604/cmc.2023.042963 - 30 January 2024

    Abstract Object segmentation and recognition is an imperative area of computer vision and machine learning that identifies and separates individual objects within an image or video and determines classes or categories based on their features. The proposed system presents a distinctive approach to object segmentation and recognition using Artificial Neural Networks (ANNs). The system takes RGB images as input and uses a k-means clustering-based segmentation technique to fragment the intended parts of the images into different regions and label them based on their characteristics. Then, two distinct kinds of features are obtained from the segmented images More >

  • Open Access

    ARTICLE

    Automatic Sentimental Analysis by Firefly with Levy and Multilayer Perceptron

    D. Elangovan1,*, V. Subedha2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2797-2808, 2023, DOI:10.32604/csse.2023.031988 - 03 April 2023

    Abstract The field of sentiment analysis (SA) has grown in tandem with the aid of social networking platforms to exchange opinions and ideas. Many people share their views and ideas around the world through social media like Facebook and Twitter. The goal of opinion mining, commonly referred to as sentiment analysis, is to categorise and forecast a target’s opinion. Depending on if they provide a positive or negative perspective on a given topic, text documents or sentences can be classified. When compared to sentiment analysis, text categorization may appear to be a simple process, but number… More >

Displaying 1-10 on page 1 of 21. Per Page