Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,812)
  • Open Access

    ARTICLE

    An Adaptive Hate Speech Detection Approach Using Neutrosophic Neural Networks for Social Media Forensics

    Yasmine M. Ibrahim1,2, Reem Essameldin3, Saad M. Darwish1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 243-262, 2024, DOI:10.32604/cmc.2024.047840

    Abstract Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due to the complex nature of language used in such platforms. Currently, several methods exist for classifying hate speech, but they still suffer from ambiguity when differentiating between hateful and offensive content and they also lack accuracy. The work suggested in this paper uses a combination of the Whale Optimization Algorithm (WOA) and Particle Swarm Optimization (PSO) to adjust the weights of two Multi-Layer Perceptron (MLPs) for neutrosophic sets classification. During the training process of the MLP, the WOA is employed to explore and determine… More >

  • Open Access

    ARTICLE

    Enhancing Skin Cancer Diagnosis with Deep Learning: A Hybrid CNN-RNN Approach

    Syeda Shamaila Zareen1,*, Guangmin Sun1,*, Mahwish Kundi2, Syed Furqan Qadri3, Salman Qadri4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1497-1519, 2024, DOI:10.32604/cmc.2024.047418

    Abstract Skin cancer diagnosis is difficult due to lesion presentation variability. Conventional methods struggle to manually extract features and capture lesions spatial and temporal variations. This study introduces a deep learning-based Convolutional and Recurrent Neural Network (CNN-RNN) model with a ResNet-50 architecture which used as the feature extractor to enhance skin cancer classification. Leveraging synergistic spatial feature extraction and temporal sequence learning, the model demonstrates robust performance on a dataset of 9000 skin lesion photos from nine cancer types. Using pre-trained ResNet-50 for spatial data extraction and Long Short-Term Memory (LSTM) for temporal dependencies, the model achieves a high average recognition… More >

  • Open Access

    ARTICLE

    Coal/Gangue Volume Estimation with Convolutional Neural Network and Separation Based on Predicted Volume and Weight

    Zenglun Guan1,2, Murad S. Alfarzaeai1,3,*, Eryi Hu1,3,*, Taqiaden Alshmeri4, Wang Peng3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 279-306, 2024, DOI:10.32604/cmc.2024.047159

    Abstract In the coal mining industry, the gangue separation phase imposes a key challenge due to the high visual similarity between coal and gangue. Recently, separation methods have become more intelligent and efficient, using new technologies and applying different features for recognition. One such method exploits the difference in substance density, leading to excellent coal/gangue recognition. Therefore, this study uses density differences to distinguish coal from gangue by performing volume prediction on the samples. Our training samples maintain a record of 3-side images as input, volume, and weight as the ground truth for the classification. The prediction process relies on a… More >

  • Open Access

    ARTICLE

    Reinforcement Learning Based Quantization Strategy Optimal Assignment Algorithm for Mixed Precision

    Yuejiao Wang, Zhong Ma*, Chaojie Yang, Yu Yang, Lu Wei

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 819-836, 2024, DOI:10.32604/cmc.2024.047108

    Abstract The quantization algorithm compresses the original network by reducing the numerical bit width of the model, which improves the computation speed. Because different layers have different redundancy and sensitivity to data bit width. Reducing the data bit width will result in a loss of accuracy. Therefore, it is difficult to determine the optimal bit width for different parts of the network with guaranteed accuracy. Mixed precision quantization can effectively reduce the amount of computation while keeping the model accuracy basically unchanged. In this paper, a hardware-aware mixed precision quantization strategy optimal assignment algorithm adapted to low bit width is proposed,… More >

  • Open Access

    ARTICLE

    MIDNet: Deblurring Network for Material Microstructure Images

    Jiaxiang Wang1, Zhengyi Li1, Peng Shi1, Hongying Yu2, Dongbai Sun1,3,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1187-1204, 2024, DOI:10.32604/cmc.2024.046929

    Abstract Scanning electron microscopy (SEM) is a crucial tool in the field of materials science, providing valuable insights into the microstructural characteristics of materials. Unfortunately, SEM images often suffer from blurriness caused by improper hardware calibration or imaging automation errors, which present challenges in analyzing and interpreting material characteristics. Consequently, rectifying the blurring of these images assumes paramount significance to enable subsequent analysis. To address this issue, we introduce a Material Images Deblurring Network (MIDNet) built upon the foundation of the Nonlinear Activation Free Network (NAFNet). MIDNet is meticulously tailored to address the blurring in images capturing the microstructure of materials.… More >

  • Open Access

    ARTICLE

    Multimodal Social Media Fake News Detection Based on Similarity Inference and Adversarial Networks

    Fangfang Shan1,2,*, Huifang Sun1,2, Mengyi Wang1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 581-605, 2024, DOI:10.32604/cmc.2024.046202

    Abstract As social networks become increasingly complex, contemporary fake news often includes textual descriptions of events accompanied by corresponding images or videos. Fake news in multiple modalities is more likely to create a misleading perception among users. While early research primarily focused on text-based features for fake news detection mechanisms, there has been relatively limited exploration of learning shared representations in multimodal (text and visual) contexts. To address these limitations, this paper introduces a multimodal model for detecting fake news, which relies on similarity reasoning and adversarial networks. The model employs Bidirectional Encoder Representation from Transformers (BERT) and Text Convolutional Neural… More >

  • Open Access

    ARTICLE

    A Hand Features Based Fusion Recognition Network with Enhancing Multi-Modal Correlation

    Wei Wu*, Yuan Zhang, Yunpeng Li, Chuanyang Li, Yan Hao

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 537-555, 2024, DOI:10.32604/cmes.2024.049174

    Abstract Fusing hand-based features in multi-modal biometric recognition enhances anti-spoofing capabilities. Additionally, it leverages inter-modal correlation to enhance recognition performance. Concurrently, the robustness and recognition performance of the system can be enhanced through judiciously leveraging the correlation among multimodal features. Nevertheless, two issues persist in multi-modal feature fusion recognition: Firstly, the enhancement of recognition performance in fusion recognition has not comprehensively considered the inter-modality correlations among distinct modalities. Secondly, during modal fusion, improper weight selection diminishes the salience of crucial modal features, thereby diminishing the overall recognition performance. To address these two issues, we introduce an enhanced DenseNet multimodal recognition network… More > Graphic Abstract

    A Hand Features Based Fusion Recognition Network with Enhancing Multi-Modal Correlation

  • Open Access

    ARTICLE

    NFHP-RN: A Method of Few-Shot Network Attack Detection Based on the Network Flow Holographic Picture-ResNet

    Tao Yi1,3, Xingshu Chen1,2,*, Mingdong Yang3, Qindong Li1, Yi Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 929-955, 2024, DOI:10.32604/cmes.2024.048793

    Abstract Due to the rapid evolution of Advanced Persistent Threats (APTs) attacks, the emergence of new and rare attack samples, and even those never seen before, make it challenging for traditional rule-based detection methods to extract universal rules for effective detection. With the progress in techniques such as transfer learning and meta-learning, few-shot network attack detection has progressed. However, challenges in few-shot network attack detection arise from the inability of time sequence flow features to adapt to the fixed length input requirement of deep learning, difficulties in capturing rich information from original flow in the case of insufficient samples, and the… More >

  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions for real-time mobile applications, especially… More >

  • Open Access

    ARTICLE

    A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information

    Hao Jiang1, Yuerong Liao1, Dongdong Zhao2, Wenjian Luo3, Xingyi Zhang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1045-1075, 2024, DOI:10.32604/cmes.2024.048653

    Abstract Due to the presence of a large amount of personal sensitive information in social networks, privacy preservation issues in social networks have attracted the attention of many scholars. Inspired by the self-nonself discrimination paradigm in the biological immune system, the negative representation of information indicates features such as simplicity and efficiency, which is very suitable for preserving social network privacy. Therefore, we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks, called AttNetNRI. Specifically, a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the… More >

Displaying 21-30 on page 3 of 2812. Per Page