Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    WebFLex: A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC

    Mai Alzamel1,*, Hamza Ali Rizvi2, Najwa Altwaijry1, Isra Al-Turaiki1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4177-4204, 2024, DOI:10.32604/cmc.2024.048370

    Abstract Scalability and information personal privacy are vital for training and deploying large-scale deep learning models. Federated learning trains models on exclusive information by aggregating weights from various devices and taking advantage of the device-agnostic environment of web browsers. Nevertheless, relying on a main central server for internet browser-based federated systems can prohibit scalability and interfere with the training process as a result of growing client numbers. Additionally, information relating to the training dataset can possibly be extracted from the distributed weights, potentially reducing the privacy of the local data used for training. In this research paper, we aim to investigate… More >

  • Open Access

    ARTICLE

    Deep Learning and Tensor-Based Multiple Clustering Approaches for Cyber-Physical-Social Applications

    Hongjun Zhang1,2, Hao Zhang2, Yu Lei3, Hao Ye1, Peng Li1,*, Desheng Shi1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4109-4128, 2024, DOI:10.32604/cmc.2024.048355

    Abstract The study delves into the expanding role of network platforms in our daily lives, encompassing various mediums like blogs, forums, online chats, and prominent social media platforms such as Facebook, Twitter, and Instagram. While these platforms offer avenues for self-expression and community support, they concurrently harbor negative impacts, fostering antisocial behaviors like phishing, impersonation, hate speech, cyberbullying, cyberstalking, cyberterrorism, fake news propagation, spamming, and fraud. Notably, individuals also leverage these platforms to connect with authorities and seek aid during disasters. The overarching objective of this research is to address the dual nature of network platforms by proposing innovative methodologies aimed… More >

  • Open Access

    ARTICLE

    Enhancing Dense Small Object Detection in UAV Images Based on Hybrid Transformer

    Changfeng Feng1, Chunping Wang2, Dongdong Zhang1, Renke Kou1, Qiang Fu1,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3993-4013, 2024, DOI:10.32604/cmc.2024.048351

    Abstract Transformer-based models have facilitated significant advances in object detection. However, their extensive computational consumption and suboptimal detection of dense small objects curtail their applicability in unmanned aerial vehicle (UAV) imagery. Addressing these limitations, we propose a hybrid transformer-based detector, H-DETR, and enhance it for dense small objects, leading to an accurate and efficient model. Firstly, we introduce a hybrid transformer encoder, which integrates a convolutional neural network-based cross-scale fusion module with the original encoder to handle multi-scale feature sequences more efficiently. Furthermore, we propose two novel strategies to enhance detection performance without incurring additional inference computation. Query filter is designed… More >

  • Open Access

    ARTICLE

    The Influence of Air Pollution Concentrations on Solar Irradiance Forecasting Using CNN-LSTM-mRMR Feature Extraction

    Ramiz Gorkem Birdal*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4015-4028, 2024, DOI:10.32604/cmc.2024.048324

    Abstract Maintaining a steady power supply requires accurate forecasting of solar irradiance, since clean energy resources do not provide steady power. The existing forecasting studies have examined the limited effects of weather conditions on solar radiation such as temperature and precipitation utilizing convolutional neural network (CNN), but no comprehensive study has been conducted on concentrations of air pollutants along with weather conditions. This paper proposes a hybrid approach based on deep learning, expanding the feature set by adding new air pollution concentrations, and ranking these features to select and reduce their size to improve efficiency. In order to improve the accuracy… More >

  • Open Access

    ARTICLE

    Lightweight Cross-Modal Multispectral Pedestrian Detection Based on Spatial Reweighted Attention Mechanism

    Lujuan Deng, Ruochong Fu*, Zuhe Li, Boyi Liu, Mengze Xue, Yuhao Cui

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4071-4089, 2024, DOI:10.32604/cmc.2024.048200

    Abstract Multispectral pedestrian detection technology leverages infrared images to provide reliable information for visible light images, demonstrating significant advantages in low-light conditions and background occlusion scenarios. However, while continuously improving cross-modal feature extraction and fusion, ensuring the model’s detection speed is also a challenging issue. We have devised a deep learning network model for cross-modal pedestrian detection based on Resnet50, aiming to focus on more reliable features and enhance the model’s detection efficiency. This model employs a spatial attention mechanism to reweight the input visible light and infrared image data, enhancing the model’s focus on different spatial positions and sharing the… More >

  • Open Access

    ARTICLE

    Enhancing PDF Malware Detection through Logistic Model Trees

    Muhammad Binsawad*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3645-3663, 2024, DOI:10.32604/cmc.2024.048183

    Abstract Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity, and because of its complexity and evasiveness, it is challenging to identify using traditional signature-based detection approaches. The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses, highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies. The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree. Using a dataset from the Canadian Institute for Cybersecurity, a comparative analysis is carried out with well-known machine learning… More >

  • Open Access

    ARTICLE

    Differentially Private Support Vector Machines with Knowledge Aggregation

    Teng Wang, Yao Zhang, Jiangguo Liang, Shuai Wang, Shuanggen Liu*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3891-3907, 2024, DOI:10.32604/cmc.2024.048115

    Abstract With the widespread data collection and processing, privacy-preserving machine learning has become increasingly important in addressing privacy risks related to individuals. Support vector machine (SVM) is one of the most elementary learning models of machine learning. Privacy issues surrounding SVM classifier training have attracted increasing attention. In this paper, we investigate Differential Privacy-compliant Federated Machine Learning with Dimensionality Reduction, called FedDPDR-DPML, which greatly improves data utility while providing strong privacy guarantees. Considering in distributed learning scenarios, multiple participants usually hold unbalanced or small amounts of data. Therefore, FedDPDR-DPML enables multiple participants to collaboratively learn a global model based on weighted… More >

  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu1, Zhe Zhang1, Shengrong Hu2, Song Sun3,*, Dapeng Liu4, Zhenyu Qiu5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099

    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on… More >

  • Open Access

    ARTICLE

    Federated Machine Learning Based Fetal Health Prediction Empowered with Bio-Signal Cardiotocography

    Muhammad Umar Nasir1, Omar Kassem Khalil2, Karamath Ateeq3, Bassam SaleemAllah Almogadwy4, Muhammad Adnan Khan5, Muhammad Hasnain Azam6, Khan Muhammad Adnan7,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3303-3321, 2024, DOI:10.32604/cmc.2024.048035

    Abstract Cardiotocography measures the fetal heart rate in the fetus during pregnancy to ensure physical health because cardiotocography gives data about fetal heart rate and uterine shrinkages which is very beneficial to detect whether the fetus is normal or suspect or pathologic. Various cardiotocography measures infer wrongly and give wrong predictions because of human error. The traditional way of reading the cardiotocography measures is the time taken and belongs to numerous human errors as well. Fetal condition is very important to measure at numerous stages and give proper medications to the fetus for its well-being. In the current period Machine learning… More >

  • Open Access

    ARTICLE

    RL and AHP-Based Multi-Timescale Multi-Clock Source Time Synchronization for Distribution Power Internet of Things

    Jiangang Lu, Ruifeng Zhao*, Zhiwen Yu, Yue Dai, Kaiwen Zeng

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4453-4469, 2024, DOI:10.32604/cmc.2024.048020

    Abstract Time synchronization (TS) is crucial for ensuring the secure and reliable functioning of the distribution power Internet of Things (IoT). Multi-clock source time synchronization (MTS) has significant advantages of high reliability and accuracy but still faces challenges such as optimization of the multi-clock source selection and the clock source weight calculation at different timescales, and the coupling of synchronization latency jitter and pulse phase difference. In this paper, the multi-timescale MTS model is conducted, and the reinforcement learning (RL) and analytic hierarchy process (AHP)-based multi-timescale MTS algorithm is designed to improve the weighted summation of synchronization latency jitter standard deviation… More >

Displaying 371-380 on page 38 of 22233. Per Page