Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,256)
  • Open Access

    ARTICLE

    The Influence of Air Pollution Concentrations on Solar Irradiance Forecasting Using CNN-LSTM-mRMR Feature Extraction

    Ramiz Gorkem Birdal*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4015-4028, 2024, DOI:10.32604/cmc.2024.048324

    Abstract Maintaining a steady power supply requires accurate forecasting of solar irradiance, since clean energy resources do not provide steady power. The existing forecasting studies have examined the limited effects of weather conditions on solar radiation such as temperature and precipitation utilizing convolutional neural network (CNN), but no comprehensive study has been conducted on concentrations of air pollutants along with weather conditions. This paper proposes a hybrid approach based on deep learning, expanding the feature set by adding new air pollution concentrations, and ranking these features to select and reduce their size to improve efficiency. In order to improve the accuracy… More >

  • Open Access

    ARTICLE

    Lightweight Cross-Modal Multispectral Pedestrian Detection Based on Spatial Reweighted Attention Mechanism

    Lujuan Deng, Ruochong Fu*, Zuhe Li, Boyi Liu, Mengze Xue, Yuhao Cui

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4071-4089, 2024, DOI:10.32604/cmc.2024.048200

    Abstract Multispectral pedestrian detection technology leverages infrared images to provide reliable information for visible light images, demonstrating significant advantages in low-light conditions and background occlusion scenarios. However, while continuously improving cross-modal feature extraction and fusion, ensuring the model’s detection speed is also a challenging issue. We have devised a deep learning network model for cross-modal pedestrian detection based on Resnet50, aiming to focus on more reliable features and enhance the model’s detection efficiency. This model employs a spatial attention mechanism to reweight the input visible light and infrared image data, enhancing the model’s focus on different spatial positions and sharing the… More >

  • Open Access

    ARTICLE

    BSTFNet: An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features

    Hong Huang1, Xingxing Zhang1,*, Ye Lu1, Ze Li1, Shaohua Zhou2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3929-3951, 2024, DOI:10.32604/cmc.2024.047918

    Abstract While encryption technology safeguards the security of network communications, malicious traffic also uses encryption protocols to obscure its malicious behavior. To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic, we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features, called BERT-based Spatio-Temporal Features Network (BSTFNet). At the packet-level granularity, the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers (BERT) model. At the byte-level granularity,… More >

  • Open Access

    ARTICLE

    Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network

    Mohammad Mehdi Sharifi Nevisi1, Elnaz Bashir2, Diego Martín3,*, Seyedkian Rezvanjou4, Farzaneh Shoushtari5, Ehsan Ghafourian2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3971-3991, 2024, DOI:10.32604/cmc.2024.047875

    Abstract This paper focuses on wireless-powered communication systems, which are increasingly relevant in the Internet of Things (IoT) due to their ability to extend the operational lifetime of devices with limited energy. The main contribution of the paper is a novel approach to minimize the secrecy outage probability (SOP) in these systems. Minimizing SOP is crucial for maintaining the confidentiality and integrity of data, especially in situations where the transmission of sensitive data is critical. Our proposed method harnesses the power of an improved biogeography-based optimization (IBBO) to effectively train a recurrent neural network (RNN). The proposed IBBO introduces an innovative… More >

  • Open Access

    ARTICLE

    Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction

    Sureka Sivavelu, Venkatesh Palanisamy*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3469-3487, 2024, DOI:10.32604/cmc.2024.047407

    Abstract The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software with defects negatively impacts operational costs and finally affects customer satisfaction. Numerous approaches exist to predict software defects. However, the timely and accurate software bugs are the major challenging issues. To improve the timely and accurate software defect prediction, a novel technique called Nonparametric Statistical feature scaled QuAdratic regressive convolution Deep nEural Network (SQADEN) is introduced. The proposed SQADEN technique mainly includes two major processes namely metric… More >

  • Open Access

    ARTICLE

    Path Planning for AUVs Based on Improved APF-AC Algorithm

    Guojun Chen*, Danguo Cheng, Wei Chen, Xue Yang, Tiezheng Guo

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3721-3741, 2024, DOI:10.32604/cmc.2024.047325

    Abstract With the increase in ocean exploration activities and underwater development, the autonomous underwater vehicle (AUV) has been widely used as a type of underwater automation equipment in the detection of underwater environments. However, nowadays AUVs generally have drawbacks such as weak endurance, low intelligence, and poor detection ability. The research and implementation of path-planning methods are the premise of AUVs to achieve actual tasks. To improve the underwater operation ability of the AUV, this paper studies the typical problems of path-planning for the ant colony algorithm and the artificial potential field algorithm. In response to the limitations of a single… More >

  • Open Access

    REVIEW

    A Review of Computing with Spiking Neural Networks

    Jiadong Wu, Yinan Wang*, Zhiwei Li*, Lun Lu, Qingjiang Li

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2909-2939, 2024, DOI:10.32604/cmc.2024.047240

    Abstract Artificial neural networks (ANNs) have led to landmark changes in many fields, but they still differ significantly from the mechanisms of real biological neural networks and face problems such as high computing costs, excessive computing power, and so on. Spiking neural networks (SNNs) provide a new approach combined with brain-like science to improve the computational energy efficiency, computational architecture, and biological credibility of current deep learning applications. In the early stage of development, its poor performance hindered the application of SNNs in real-world scenarios. In recent years, SNNs have made great progress in computational performance and practicability compared with the… More >

  • Open Access

    ARTICLE

    Automated Machine Learning Algorithm Using Recurrent Neural Network to Perform Long-Term Time Series Forecasting

    Ying Su1, Morgan C. Wang1, Shuai Liu2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3529-3549, 2024, DOI:10.32604/cmc.2024.047189

    Abstract Long-term time series forecasting stands as a crucial research domain within the realm of automated machine learning (AutoML). At present, forecasting, whether rooted in machine learning or statistical learning, typically relies on expert input and necessitates substantial manual involvement. This manual effort spans model development, feature engineering, hyper-parameter tuning, and the intricate construction of time series models. The complexity of these tasks renders complete automation unfeasible, as they inherently demand human intervention at multiple junctures. To surmount these challenges, this article proposes leveraging Long Short-Term Memory, which is the variant of Recurrent Neural Networks, harnessing memory cells and gating mechanisms… More >

  • Open Access

    ARTICLE

    A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images

    Yuejie Li1,2,*, Shijun Li3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3041-3070, 2024, DOI:10.32604/cmc.2023.045741

    Abstract 6G is envisioned as the next generation of wireless communication technology, promising unprecedented data speeds, ultra-low Latency, and ubiquitous Connectivity. In tandem with these advancements, blockchain technology is leveraged to enhance computer vision applications’ security, trustworthiness, and transparency. With the widespread use of mobile devices equipped with cameras, the ability to capture and recognize Chinese characters in natural scenes has become increasingly important. Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount, such as facial recognition or personal healthcare monitoring. Users can control their visual data and grant or revoke access as needed. Recognizing Chinese characters from images… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks (RNN) integrated with… More >

Displaying 21-30 on page 3 of 1256. Per Page