Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (135)
  • Open Access

    ARTICLE

    A Hybrid Deep Learning Approach for Green Energy Forecasting in Asian Countries

    Tao Yan1, Javed Rashid2,3, Muhammad Shoaib Saleem3,4, Sajjad Ahmad4, Muhammad Faheem5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2685-2708, 2024, DOI:10.32604/cmc.2024.058186 - 18 November 2024

    Abstract Electricity is essential for keeping power networks balanced between supply and demand, especially since it costs a lot to store. The article talks about different deep learning methods that are used to guess how much green energy different Asian countries will produce. The main goal is to make reliable and accurate predictions that can help with the planning of new power plants to meet rising demand. There is a new deep learning model called the Green-electrical Production Ensemble (GP-Ensemble). It combines three types of neural networks: convolutional neural networks (CNNs), gated recurrent units (GRUs), and… More >

  • Open Access

    ARTICLE

    An Investigation of Frequency-Domain Pruning Algorithms for Accelerating Human Activity Recognition Tasks Based on Sensor Data

    Jian Su1, Haijian Shao1,2,*, Xing Deng1, Yingtao Jiang2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2219-2242, 2024, DOI:10.32604/cmc.2024.057604 - 18 November 2024

    Abstract The rapidly advancing Convolutional Neural Networks (CNNs) have brought about a paradigm shift in various computer vision tasks, while also garnering increasing interest and application in sensor-based Human Activity Recognition (HAR) efforts. However, the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained systems. This paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain, which reduces the model’s depth and accelerates activity inference. Unlike traditional pruning methods that focus on the spatial domain and the importance of filters, this… More >

  • Open Access

    ARTICLE

    Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems

    Brij B. Gupta1,2,3,4,*, Akshat Gaurav5, Varsha Arya6,7, Razaz Waheeb Attar8, Shavi Bansal9, Ahmed Alhomoud10, Kwok Tai Chui11

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2165-2183, 2024, DOI:10.32604/cmes.2024.056473 - 31 October 2024

    Abstract Phishing attacks present a serious threat to enterprise systems, requiring advanced detection techniques to protect sensitive data. This study introduces a phishing email detection framework that combines Bidirectional Encoder Representations from Transformers (BERT) for feature extraction and CNN for classification, specifically designed for enterprise information systems. BERT’s linguistic capabilities are used to extract key features from email content, which are then processed by a convolutional neural network (CNN) model optimized for phishing detection. Achieving an accuracy of 97.5%, our proposed model demonstrates strong proficiency in identifying phishing emails. This approach represents a significant advancement in More >

  • Open Access

    ARTICLE

    Predicting Grain Orientations of 316 Stainless Steel Using Convolutional Neural Networks

    Dhia K. Suker, Ahmed R. Abdo*, Khalid Abdulkhaliq M. Alharbi

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 929-947, 2024, DOI:10.32604/iasc.2024.056341 - 31 October 2024

    Abstract This paper presents a deep learning Convolutional Neural Network (CNN) for predicting grain orientations from electron backscatter diffraction (EBSD) patterns. The proposed model consists of multiple neural network layers and has been trained on a dataset of EBSD patterns obtained from stainless steel 316 (SS316). Grain orientation changes when considering the effects of temperature and strain rate on material deformation. The deep learning CNN predicts material orientation using the EBSD method to address this challenge. The accuracy of this approach is evaluated by comparing the predicted crystal orientation with the actual orientation under different conditions, More >

  • Open Access

    ARTICLE

    Mural Anomaly Region Detection Algorithm Based on Hyperspectral Multiscale Residual Attention Network

    Bolin Guo1,2, Shi Qiu1,*, Pengchang Zhang1, Xingjia Tang3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1809-1833, 2024, DOI:10.32604/cmc.2024.056706 - 15 October 2024

    Abstract Mural paintings hold significant historical information and possess substantial artistic and cultural value. However, murals are inevitably damaged by natural environmental factors such as wind and sunlight, as well as by human activities. For this reason, the study of damaged areas is crucial for mural restoration. These damaged regions differ significantly from undamaged areas and can be considered abnormal targets. Traditional manual visual processing lacks strong characterization capabilities and is prone to omissions and false detections. Hyperspectral imaging can reflect the material properties more effectively than visual characterization methods. Thus, this study employs hyperspectral imaging… More >

  • Open Access

    ARTICLE

    A Pooling Method Developed for Use in Convolutional Neural Networks

    İsmail Akgül*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 751-770, 2024, DOI:10.32604/cmes.2024.052549 - 20 August 2024

    Abstract In convolutional neural networks, pooling methods are used to reduce both the size of the data and the number of parameters after the convolution of the models. These methods reduce the computational amount of convolutional neural networks, making the neural network more efficient. Maximum pooling, average pooling, and minimum pooling methods are generally used in convolutional neural networks. However, these pooling methods are not suitable for all datasets used in neural network applications. In this study, a new pooling approach to the literature is proposed to increase the efficiency and success rates of convolutional neural… More >

  • Open Access

    ARTICLE

    Enhancing Communication Accessibility: UrSL-CNN Approach to Urdu Sign Language Translation for Hearing-Impaired Individuals

    Khushal Das1, Fazeel Abid2, Jawad Rasheed3,4,*, Kamlish5, Tunc Asuroglu6,*, Shtwai Alsubai7, Safeeullah Soomro8

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 689-711, 2024, DOI:10.32604/cmes.2024.051335 - 20 August 2024

    Abstract Deaf people or people facing hearing issues can communicate using sign language (SL), a visual language. Many works based on rich source language have been proposed; however, the work using poor resource language is still lacking. Unlike other SLs, the visuals of the Urdu Language are different. This study presents a novel approach to translating Urdu sign language (UrSL) using the UrSL-CNN model, a convolutional neural network (CNN) architecture specifically designed for this purpose. Unlike existing works that primarily focus on languages with rich resources, this study addresses the challenge of translating a sign language… More >

  • Open Access

    ARTICLE

    Resilience Augmentation in Unmanned Weapon Systems via Multi-Layer Attention Graph Convolutional Neural Networks

    Kexin Wang*, Yingdong Gou, Dingrui Xue*, Jiancheng Liu, Wanlong Qi, Gang Hou, Bo Li

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2941-2962, 2024, DOI:10.32604/cmc.2024.052893 - 15 August 2024

    Abstract The collective Unmanned Weapon System-of-Systems (UWSOS) network represents a fundamental element in modern warfare, characterized by a diverse array of unmanned combat platforms interconnected through heterogeneous network architectures. Despite its strategic importance, the UWSOS network is highly susceptible to hostile infiltrations, which significantly impede its battlefield recovery capabilities. Existing methods to enhance network resilience predominantly focus on basic graph relationships, neglecting the crucial higher-order dependencies among nodes necessary for capturing multi-hop meta-paths within the UWSOS. To address these limitations, we propose the Enhanced-Resilience Multi-Layer Attention Graph Convolutional Network (E-MAGCN), designed to augment the adaptability of More >

  • Open Access

    REVIEW

    AI-Driven Learning Management Systems: Modern Developments, Challenges and Future Trends during the Age of ChatGPT

    Sameer Qazi1,*, Muhammad Bilal Kadri2, Muhammad Naveed1,*, Bilal A. Khawaja3, Sohaib Zia Khan4, Muhammad Mansoor Alam5,6,7, Mazliham Mohd Su’ud6

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3289-3314, 2024, DOI:10.32604/cmc.2024.048893 - 15 August 2024

    Abstract COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus. The foremost and most prime sector among those affected were schools, colleges, and universities. The education system of entire nations had shifted to online education during this time. Many shortcomings of Learning Management Systems (LMSs) were detected to support education in an online mode that spawned the research in Artificial Intelligence (AI) based tools that are being developed by the research community to improve the effectiveness of LMSs. This paper presents a detailed survey of the different enhancements to LMSs, which… More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779 - 11 July 2024

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

Displaying 1-10 on page 1 of 135. Per Page