Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Deep Facial Emotion Recognition Using Local Features Based on Facial Landmarks for Security System

    Youngeun An, Jimin Lee, EunSang Bak*, Sungbum Pan*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1817-1832, 2023, DOI:10.32604/cmc.2023.039460 - 30 August 2023

    Abstract Emotion recognition based on facial expressions is one of the most critical elements of human-machine interfaces. Most conventional methods for emotion recognition using facial expressions use the entire facial image to extract features and then recognize specific emotions through a pre-trained model. In contrast, this paper proposes a novel feature vector extraction method using the Euclidean distance between the landmarks changing their positions according to facial expressions, especially around the eyes, eyebrows, nose, and mouth. Then, we apply a new classifier using an ensemble network to increase emotion recognition accuracy. The emotion recognition performance was More >

  • Open Access

    ARTICLE

    An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN

    Nouf Saeed Alotaibi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.039446 - 30 August 2023

    Abstract Intrusion Detection System (IDS) is a network security mechanism that analyses all users’ and applications’ traffic and detects malicious activities in real-time. The existing IDS methods suffer from lower accuracy and lack the required level of security to prevent sophisticated attacks. This problem can result in the system being vulnerable to attacks, which can lead to the loss of sensitive data and potential system failure. Therefore, this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification (LTH-CNN). Here, the Correlation Coefficient based Mayfly Optimization (CC-MA) algorithm is used to extract the… More >

  • Open Access

    ARTICLE

    Classification of Human Protein in Multiple Cells Microscopy Images Using CNN

    Lina Al-joudi, Muhammad Arif*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1763-1780, 2023, DOI:10.32604/cmc.2023.039413 - 30 August 2023

    Abstract The subcellular localization of human proteins is vital for understanding the structure of human cells. Proteins play a significant role within human cells, as many different groups of proteins are located in a specific location to perform a particular function. Understanding these functions will help in discovering many diseases and developing their treatments. The importance of imaging analysis techniques, specifically in proteomics research, is becoming more prevalent. Despite recent advances in deep learning techniques for analyzing microscopy images, classification models have faced critical challenges in achieving high performance. Most protein subcellular images have a significant… More >

  • Open Access

    ARTICLE

    Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology

    Sur Singh Rawat1,*, Youseef Alotaibi2, Nitima Malsa1, Vimal Gupta1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381 - 30 August 2023

    Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone… More >

  • Open Access

    ARTICLE

    Hyper-Tuned Convolutional Neural Networks for Authorship Verification in Digital Forensic Investigations

    Asif Rahim1, Yanru Zhong2, Tariq Ahmad3,*, Sadique Ahmad4,*, Mohammed A. ElAffendi4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1947-1976, 2023, DOI:10.32604/cmc.2023.039340 - 30 August 2023

    Abstract Authorship verification is a crucial task in digital forensic investigations, where it is often necessary to determine whether a specific individual wrote a particular piece of text. Convolutional Neural Networks (CNNs) have shown promise in solving this problem, but their performance highly depends on the choice of hyperparameters. In this paper, we explore the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification. We conduct experiments using a Hyper Tuned CNN model with three popular optimization algorithms: Adaptive Moment Estimation (ADAM), Stochastic Gradient Descent (SGD), and Root Mean Squared Propagation (RMSPROP).… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Action Classification Using One-Shot Object Detection

    Hyun Yoo1, Seo-El Lee2, Kyungyong Chung3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1343-1359, 2023, DOI:10.32604/cmc.2023.039263 - 30 August 2023

    Abstract Deep learning-based action classification technology has been applied to various fields, such as social safety, medical services, and sports. Analyzing an action on a practical level requires tracking multiple human bodies in an image in real-time and simultaneously classifying their actions. There are various related studies on the real-time classification of actions in an image. However, existing deep learning-based action classification models have prolonged response speeds, so there is a limit to real-time analysis. In addition, it has low accuracy of action of each object if multiple objects appear in the image. Also, it needs… More >

  • Open Access

    ARTICLE

    A Lightweight ABE Security Protection Scheme in Cloud Environment Based on Attribute Weight

    Lihong Guo*, Jie Yang, Haitao Wu

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1929-1946, 2023, DOI:10.32604/cmc.2023.039170 - 30 August 2023

    Abstract Attribute-based encryption (ABE) is a technique used to encrypt data, it has the flexibility of access control, high security, and resistance to collusion attacks, and especially it is used in cloud security protection. However, a large number of bilinear mappings are used in ABE, and the calculation of bilinear pairing is time-consuming. So there is the problem of low efficiency. On the other hand, the decryption key is not uniquely associated with personal identification information, if the decryption key is maliciously sold, ABE is unable to achieve accountability for the user. In practical applications, shared… More >

  • Open Access

    ARTICLE

    Feature Enhanced Stacked Auto Encoder for Diseases Detection in Brain MRI

    Umair Muneer Butt1,2,*, Rimsha Arif2, Sukumar Letchmunan1,*, Babur Hayat Malik2, Muhammad Adil Butt2

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2551-2570, 2023, DOI:10.32604/cmc.2023.039164 - 30 August 2023

    Abstract The detection of brain disease is an essential issue in medical and research areas. Deep learning techniques have shown promising results in detecting and diagnosing brain diseases using magnetic resonance imaging (MRI) images. These techniques involve training neural networks on large datasets of MRI images, allowing the networks to learn patterns and features indicative of different brain diseases. However, several challenges and limitations still need to be addressed further to improve the accuracy and effectiveness of these techniques. This paper implements a Feature Enhanced Stacked Auto Encoder (FESAE) model to detect brain diseases. The standard… More >

  • Open Access

    ARTICLE

    Developed Fall Detection of Elderly Patients in Internet of Healthcare Things

    Omar Reyad1,2, Hazem Ibrahim Shehata1,3, Mohamed Esmail Karar1,4,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1689-1700, 2023, DOI:10.32604/cmc.2023.039084 - 30 August 2023

    Abstract Falling is among the most harmful events older adults may encounter. With the continuous growth of the aging population in many societies, developing effective fall detection mechanisms empowered by machine learning technologies and easily integrable with existing healthcare systems becomes essential. This paper presents a new healthcare Internet of Health Things (IoHT) architecture built around an ensemble machine learning-based fall detection system (FDS) for older people. Compared to deep neural networks, the ensemble multi-stage random forest model allows the extraction of an optimal subset of fall detection features with minimal hyperparameters. The number of cascaded… More >

  • Open Access

    ARTICLE

    GRATDet: Smart Contract Vulnerability Detector Based on Graph Representation and Transformer

    Peng Gong1,2,3, Wenzhong Yang2,3,*, Liejun Wang2,3, Fuyuan Wei2,3, KeZiErBieKe HaiLaTi2,3, Yuanyuan Liao2,3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1439-1462, 2023, DOI:10.32604/cmc.2023.038878 - 30 August 2023

    Abstract Smart contracts have led to more efficient development in finance and healthcare, but vulnerabilities in contracts pose high risks to their future applications. The current vulnerability detection methods for contracts are either based on fixed expert rules, which are inefficient, or rely on simplistic deep learning techniques that do not fully leverage contract semantic information. Therefore, there is ample room for improvement in terms of detection precision. To solve these problems, this paper proposes a vulnerability detector based on deep learning techniques, graph representation, and Transformer, called GRATDet. The method first performs swapping, insertion, and symbolization… More >

Displaying 8601-8610 on page 861 of 31561. Per Page