Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    FeatherGuard: A Data-Driven Lightweight Error Protection Scheme for DNN Inference on Edge Devices

    Dong Hyun Lee1, Na Kyung Lee2, Young Seo Lee1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-17, 2026, DOI:10.32604/cmc.2025.069976 - 09 December 2025

    Abstract There has been an increasing emphasis on performing deep neural network (DNN) inference locally on edge devices due to challenges such as network congestion and security concerns. However, as DRAM process technology continues to scale down, the bit-flip errors in the memory of edge devices become more frequent, thereby leading to substantial DNN inference accuracy loss. Though several techniques have been proposed to alleviate the accuracy loss in edge environments, they require complex computations and additional parity bits for error correction, thus resulting in significant performance and storage overheads. In this paper, we propose FeatherGuard,… More >

  • Open Access

    REVIEW

    A Review of Machine Learning Techniques in Cyberbullying Detection

    Daniyar Sultan1,2,*, Batyrkhan Omarov3, Zhazira Kozhamkulova4, Gulnur Kazbekova5, Laura Alimzhanova1, Aigul Dautbayeva6, Yernar Zholdassov1, Rustam Abdrakhmanov3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5625-5640, 2023, DOI:10.32604/cmc.2023.033682 - 28 December 2022

    Abstract Automatic identification of cyberbullying is a problem that is gaining traction, especially in the Machine Learning areas. Not only is it complicated, but it has also become a pressing necessity, considering how social media has become an integral part of adolescents’ lives and how serious the impacts of cyberbullying and online harassment can be, particularly among teenagers. This paper contains a systematic literature review of modern strategies, machine learning methods, and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet. We undertake an in-depth review… More >

  • Open Access

    ARTICLE

    A Novel Workload-Aware and Optimized Write Cycles in NVRAM

    J. P. Shri Tharanyaa1,*, D. Sharmila2, R. Saravana Kumar3

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2667-2681, 2022, DOI:10.32604/cmc.2022.019889 - 07 December 2021

    Abstract With the emergence of the Internet of things (IoT), embedded systems have now changed its dimensionality and it is applied in various domains such as healthcare, home automation and mainly Industry 4.0. These Embedded IoT devices are mostly battery-driven. It has been analyzed that usage of Dynamic Random-Access Memory (DRAM) centered core memory is considered the most significant source of high energy utility in Embedded IoT devices. For achieving the low power consumption in these devices, Non-volatile memory (NVM) devices such as Parameter Random Access Memory (PRAM) and Spin-Transfer Torque Magnetic Random-Access Memory (STT-RAM) are… More >

  • Open Access

    RESIDENT’S CORNER

    Agenesis of the bladder with solitary renal dysplasia: management of a challenging condition

    O. Nazif, A. E. MacNeily

    Canadian Journal of Urology, Vol.11, No.2, pp. 2220-2222, 2004

    Abstract Bladder agenesis is an extremely rare congenital anomaly. We report a case of bladder agenesis in a newborn girl with a prolapsing ectopic ureter and solitary dysplastic kidney. The classification of this disorder and the management of this patient are reviewed. More >

Displaying 1-10 on page 1 of 4. Per Page