Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Mild Cognitive Impairment Detection from Rey-Osterrieth Complex Figure Copy Drawings Using a Contrastive Loss Siamese Neural Network

    Juan Guerrero-Martín*, Eladio Estella-Nonay, Margarita Bachiller-Mayoral, Mariano Rincón

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4729-4752, 2025, DOI:10.32604/cmc.2025.066083 - 23 October 2025

    Abstract Neuropsychological tests, such as the Rey-Osterrieth complex figure (ROCF) test, help detect mild cognitive impairment (MCI) in adults by assessing cognitive abilities such as planning, organization, and memory. Furthermore, they are inexpensive and minimally invasive, making them excellent tools for early screening. In this paper, we propose the use of image analysis models to characterize the relationship between an individual’s ROCF drawing and their cognitive state. This task is usually framed as a classification problem and is solved using deep learning models, due to their success in the last decade. In order to achieve good… More >

  • Open Access

    ARTICLE

    Efficient Method for Trademark Image Retrieval: Leveraging Siamese and Triplet Networks with Examination-Informed Loss Adjustment

    Thanh Bui-Minh1, Nguyen Long Giang1, Luan Thanh Le2,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1203-1226, 2025, DOI:10.32604/cmc.2025.064403 - 09 June 2025

    Abstract Image-based similar trademark retrieval is a time-consuming and labor-intensive task in the trademark examination process. This paper aims to support trademark examiners by training Deep Convolutional Neural Network (DCNN) models for effective Trademark Image Retrieval (TIR). To achieve this goal, we first develop a novel labeling method that automatically generates hundreds of thousands of labeled similar and dissimilar trademark image pairs using accompanying data fields such as citation lists, Vienna classification (VC) codes, and trademark ownership information. This approach eliminates the need for manual labeling and provides a large-scale dataset suitable for training deep learning… More >

  • Open Access

    ARTICLE

    Label-Guided Scientific Abstract Generation with a Siamese Network Using Knowledge Graphs

    Haotong Wang*, Yves Lepage

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4141-4166, 2025, DOI:10.32604/cmc.2025.062806 - 19 May 2025

    Abstract Knowledge graphs convey precise semantic information that can be effectively interpreted by neural networks, and generating descriptive text based on these graphs places significant emphasis on content consistency. However, knowledge graphs are inadequate for providing additional linguistic features such as paragraph structure and expressive modes, making it challenging to ensure content coherence in generating text that spans multiple sentences. This lack of coherence can further compromise the overall consistency of the content within a paragraph. In this work, we present the generation of scientific abstracts by leveraging knowledge graphs, with a focus on enhancing both… More >

  • Open Access

    ARTICLE

    Lip-Audio Modality Fusion for Deep Forgery Video Detection

    Yong Liu1,4, Zhiyu Wang2,*, Shouling Ji3, Daofu Gong1,5, Lanxin Cheng1, Ruosi Cheng1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3499-3515, 2025, DOI:10.32604/cmc.2024.057859 - 17 February 2025

    Abstract In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC… More >

  • Open Access

    ARTICLE

    Multi-Stage-Based Siamese Neural Network for Seal Image Recognition

    Jianfeng Lu1,2, Xiangye Huang1, Caijin Li1, Renlin Xin1, Shanqing Zhang1,2, Mahmoud Emam1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 405-423, 2025, DOI:10.32604/cmes.2024.058121 - 17 December 2024

    Abstract Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting. Stamped seal inspection is commonly audited manually to ensure document authenticity. However, manual assessment of seal images is tedious and labor-intensive due to human errors, inconsistent placement, and completeness of the seal. Traditional image recognition systems are inadequate enough to identify seal types accurately, necessitating a neural network-based method for seal image recognition. However, neural network-based classification algorithms, such as Residual Networks (ResNet) and Visual Geometry Group with 16 layers… More >

  • Open Access

    ARTICLE

    A Novel Self-Supervised Learning Network for Binocular Disparity Estimation

    Jiawei Tian1, Yu Zhou1, Xiaobing Chen2, Salman A. AlQahtani3, Hongrong Chen4, Bo Yang4,*, Siyu Lu4, Wenfeng Zheng3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 209-229, 2025, DOI:10.32604/cmes.2024.057032 - 17 December 2024

    Abstract Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination, hindering accurate three-dimensional lesion reconstruction by surgical robots. This study proposes a novel end-to-end disparity estimation model to address these challenges. Our approach combines a Pseudo-Siamese neural network architecture with pyramid dilated convolutions, integrating multi-scale image information to enhance robustness against lighting interferences. This study introduces a Pseudo-Siamese structure-based disparity regression model that simplifies left-right image comparison, improving accuracy and efficiency. The model was evaluated using a dataset of stereo endoscopic videos captured by the Da Vinci surgical robot, comprising More >

  • Open Access

    ARTICLE

    Malware Detection Using Dual Siamese Network Model

    ByeongYeol An1, JeaHyuk Yang2, Seoyeon Kim2, Taeguen Kim3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 563-584, 2024, DOI:10.32604/cmes.2024.052403 - 20 August 2024

    Abstract This paper proposes a new approach to counter cyberattacks using the increasingly diverse malware in cyber security. Traditional signature detection methods that utilize static and dynamic features face limitations due to the continuous evolution and diversity of new malware. Recently, machine learning-based malware detection techniques, such as Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN), have gained attention. While these methods demonstrate high performance by leveraging static and dynamic features, they are limited in detecting new malware or variants because they learn based on the characteristics of existing malware. To overcome these limitations, malware… More >

  • Open Access

    ARTICLE

    Colorectal Cancer Segmentation Algorithm Based on Deep Features from Enhanced CT Images

    Shi Qiu1, Hongbing Lu1,*, Jun Shu2, Ting Liang3, Tao Zhou4

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2495-2510, 2024, DOI:10.32604/cmc.2024.052476 - 15 August 2024

    Abstract Colorectal cancer, a malignant lesion of the intestines, significantly affects human health and life, emphasizing the necessity of early detection and treatment. Accurate segmentation of colorectal cancer regions directly impacts subsequent staging, treatment methods, and prognostic outcomes. While colonoscopy is an effective method for detecting colorectal cancer, its data collection approach can cause patient discomfort. To address this, current research utilizes Computed Tomography (CT) imaging; however, conventional CT images only capture transient states, lacking sufficient representational capability to precisely locate colorectal cancer. This study utilizes enhanced CT images, constructing a deep feature network from the… More >

  • Open Access

    ARTICLE

    Electromyogram Based Personal Recognition Using Attention Mechanism for IoT Security

    Jin Su Kim, Sungbum Pan*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1663-1678, 2023, DOI:10.32604/cmc.2023.043998 - 29 November 2023

    Abstract As Internet of Things (IoT) technology develops, integrating network functions into diverse equipment introduces new challenges, particularly in dealing with counterfeit issues. Over the past few decades, research efforts have focused on leveraging electromyogram (EMG) for personal recognition, aiming to address security concerns. However, obtaining consistent EMG signals from the same individual is inherently challenging, resulting in data irregularity issues and consequently decreasing the accuracy of personal recognition. Notably, conventional studies in EMG-based personal recognition have overlooked the issue of data irregularities. This paper proposes an innovative approach to personal recognition that combines a siamese… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Robust Morphed Face Authentication Framework for Online Systems

    Harsh Mankodiya1, Priyal Palkhiwala1, Rajesh Gupta1,*, Nilesh Kumar Jadav1, Sudeep Tanwar1, Osama Alfarraj2, Amr Tolba2, Maria Simona Raboaca3,4,*, Verdes Marina5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1123-1142, 2023, DOI:10.32604/cmc.2023.038556 - 31 October 2023

    Abstract The amalgamation of artificial intelligence (AI) with various areas has been in the picture for the past few years. AI has enhanced the functioning of several services, such as accomplishing better budgets, automating multiple tasks, and data-driven decision-making. Conducting hassle-free polling has been one of them. However, at the onset of the coronavirus in 2020, almost all worldly affairs occurred online, and many sectors switched to digital mode. This allows attackers to find security loopholes in digital systems and exploit them for their lucrative business. This paper proposes a three-layered deep learning (DL)-based authentication framework More >

Displaying 1-10 on page 1 of 24. Per Page