Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Multilayer Neural Network Based Speech Emotion Recognition for Smart Assistance

    Sandeep Kumar1, MohdAnul Haq2, Arpit Jain3, C. Andy Jason4, Nageswara Rao Moparthi1, Nitin Mittal5, Zamil S. Alzamil2,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1523-1540, 2023, DOI:10.32604/cmc.2023.028631

    Abstract Day by day, biometric-based systems play a vital role in our daily lives. This paper proposed an intelligent assistant intended to identify emotions via voice message. A biometric system has been developed to detect human emotions based on voice recognition and control a few electronic peripherals for alert actions. This proposed smart assistant aims to provide a support to the people through buzzer and light emitting diodes (LED) alert signals and it also keep track of the places like households, hospitals and remote areas, etc. The proposed approach is able to detect seven emotions: worry, surprise, neutral, sadness, happiness, hate… More >

  • Open Access

    ARTICLE

    Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security

    V. Sridhar1, K.V. Ranga Rao2, Saddam Hussain3,*, Syed Sajid Ullah4, Roobaea Alroobaea5, Maha Abdelhaq6, Raed Alsaqour7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1693-1708, 2023, DOI:10.32604/cmc.2023.028129

    Abstract Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Multivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access (MRRWPBA-NOMA) technique is introduced for network communication. In the downlink transmission, each mobile device's resources and their characteristics like energy, bandwidth, and trust are measured. Followed by, the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts

    Yuan Zhuang1, Baobao Wang1, Jianguo Sun2,*, Haoyang Liu1, Shuqi Yang1, Qingan Da3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1011-1024, 2023, DOI:10.32604/cmc.2023.028058

    Abstract Recently, security issues of smart contracts are arising great attention due to the enormous financial loss caused by vulnerability attacks. There is an increasing need to detect similar codes for hunting vulnerability with the increase of critical security issues in smart contracts. Binary similarity detection that quantitatively measures the given code diffing has been widely adopted to facilitate critical security analysis. However, due to the difference between common programs and smart contract, such as diversity of bytecode generation and highly code homogeneity, directly adopting existing graph matching and machine learning based techniques to smart contracts suffers from low accuracy, poor… More >

  • Open Access

    ARTICLE

    Deep Learning and SVM-Based Approach for Indian Licence Plate Character Recognition

    Nitin Sharma1, Mohd Anul Haq2, Pawan Kumar Dahiya3, B. R. Marwah4, Reema Lalit5, Nitin Mittal6, Ismail Keshta7,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 881-895, 2023, DOI:10.32604/cmc.2023.027899

    Abstract Every developing country relies on transportation, and there has been an exponential expansion in the development of various sorts of vehicles with various configurations, which is a major component strengthening the automobile sector. India is a developing country with increasing road traffic, which has resulted in challenges such as increased road accidents and traffic oversight issues. In the lack of a parametric technique for accurate vehicle recognition, which is a major worry in terms of reliability, high traffic density also leads to mayhem at checkpoints and toll plazas. A system that combines an intelligent domain approach with more sustainability indices… More >

  • Open Access

    ARTICLE

    Modified Differential Evolution Algorithm for Solving Dynamic Optimization with Existence of Infeasible Environments

    Mohamed A. Meselhi*, Saber M. Elsayed, Daryl L. Essam, Ruhul A. Sarker

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1-17, 2023, DOI:10.32604/cmc.2023.027448

    Abstract Dynamic constrained optimization is a challenging research topic in which the objective function and/or constraints change over time. In such problems, it is commonly assumed that all problem instances are feasible. In reality some instances can be infeasible due to various practical issues, such as a sudden change in resource requirements or a big change in the availability of resources. Decision-makers have to determine whether a particular instance is feasible or not, as infeasible instances cannot be solved as there are no solutions to implement. In this case, locating the nearest feasible solution would be valuable information for the decision-makers.… More >

  • Open Access

    ARTICLE

    Speech Enhancement via Mask-Mapping Based Residual Dense Network

    Lin Zhou1,*, Xijin Chen1, Chaoyan Wu1, Qiuyue Zhong1, Xu Cheng2, Yibin Tang3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1259-1277, 2023, DOI:10.32604/cmc.2023.027379

    Abstract Masking-based and spectrum mapping-based methods are the two main algorithms of speech enhancement with deep neural network (DNN). But the mapping-based methods only utilizes the phase of noisy speech, which limits the upper bound of speech enhancement performance. Masking-based methods need to accurately estimate the masking which is still the key problem. Combining the advantages of above two types of methods, this paper proposes the speech enhancement algorithm MM-RDN (masking-mapping residual dense network) based on masking-mapping (MM) and residual dense network (RDN). Using the logarithmic power spectrogram (LPS) of consecutive frames, MM estimates the ideal ratio masking (IRM) matrix of… More >

  • Open Access

    ARTICLE

    Lightweight Multi-scale Convolutional Neural Network for Rice Leaf Disease Recognition

    Chang Zhang1, Ruiwen Ni1, Ye Mu1,2,3,4, Yu Sun1,2,3,4,*, Thobela Louis Tyasi5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 983-994, 2023, DOI:10.32604/cmc.2023.027269

    Abstract In the field of agricultural information, the identification and prediction of rice leaf disease have always been the focus of research, and deep learning (DL) technology is currently a hot research topic in the field of pattern recognition. The research and development of high-efficiency, high-quality and low-cost automatic identification methods for rice diseases that can replace humans is an important means of dealing with the current situation from a technical perspective. This paper mainly focuses on the problem of huge parameters of the Convolutional Neural Network (CNN) model and proposes a recognition model that combines a multi-scale convolution module with… More >

  • Open Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel1,*, Ramón Alcarria1, Joaquin Chung2, Rajkumar Kettimuthu2, Tomás Robles1, Iván Armuelles3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787

    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in 5G networks. We categorize those… More >

  • Open Access

    ARTICLE

    Profiling Astronomical Objects Using Unsupervised Learning Approach

    Theerapat Sangpetch1, Tossapon Boongoen1,*, Natthakan Iam-On2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1641-1655, 2023, DOI:10.32604/cmc.2023.026739

    Abstract Attempts to determine characters of astronomical objects have been one of major and vibrant activities in both astronomy and data science fields. Instead of a manual inspection, various automated systems are invented to satisfy the need, including the classification of light curve profiles. A specific Kaggle competition, namely Photometric LSST Astronomical Time-Series Classification Challenge (PLAsTiCC), is launched to gather new ideas of tackling the abovementioned task using the data set collected from the Large Synoptic Survey Telescope (LSST) project. Almost all proposed methods fall into the supervised family with a common aim to categorize each object into one of pre-defined… More >

  • Open Access

    ARTICLE

    GRU-based Buzzer Ensemble for Abnormal Detection in Industrial Control Systems

    Hyo-Seok Kim1, Chang-Gyoon Lim2, Sang-Joon Lee3, Yong-Min Kim4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1749-1763, 2023, DOI:10.32604/cmc.2023.026708

    Abstract Recently, Industrial Control Systems (ICSs) have been changing from a closed environment to an open environment because of the expansion of digital transformation, smart factories, and Industrial Internet of Things (IIoT). Since security accidents that occur in ICSs can cause national confusion and human casualties, research on detecting abnormalities by using normal operation data learning is being actively conducted. The single technique proposed by existing studies does not detect abnormalities well or provide satisfactory results. In this paper, we propose a GRU-based Buzzer Ensemble for Abnormal Detection (GBE-AD) model for detecting anomalies in industrial control systems to ensure rapid response… More >

Displaying 1411-1420 on page 142 of 5350. Per Page