Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,417)
  • Open Access

    ARTICLE

    Deep Learning Social Network Access Control Model Based on User Preferences

    Fangfang Shan1,2,*, Fuyang Li1, Zhenyu Wang1, Peiyu Ji1, Mengyi Wang1, Huifang Sun1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1029-1044, 2024, DOI:10.32604/cmes.2024.047665

    Abstract A deep learning access control model based on user preferences is proposed to address the issue of personal privacy leakage in social networks. Firstly, social users and social data entities are extracted from the social network and used to construct homogeneous and heterogeneous graphs. Secondly, a graph neural network model is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network. Then, high-order neighbor nodes, hidden neighbor nodes, displayed neighbor nodes, and social data nodes are used to update user nodes… More >

  • Open Access

    REVIEW

    A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts

    Huaiguang Wu, Yibo Peng, Yaqiong He*, Jinlin Fan

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 77-108, 2024, DOI:10.32604/cmes.2024.046758

    Abstract In recent years, the number of smart contracts deployed on blockchain has exploded. However, the issue of vulnerability has caused incalculable losses. Due to the irreversible and immutability of smart contracts, vulnerability detection has become particularly important. With the popular use of neural network model, there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts. This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts. Subsequently, it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection. These… More > Graphic Abstract

    A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts

  • Open Access

    ARTICLE

    An Image Fingerprint and Attention Mechanism Based Load Estimation Algorithm for Electric Power System

    Qing Zhu1,*, Linlin Gu1,2, Huijie Lin1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 577-591, 2024, DOI:10.32604/cmes.2023.043307

    Abstract With the rapid development of electric power systems, load estimation plays an important role in system operation and planning. Usually, load estimation techniques contain traditional, time series, regression analysis-based, and machine learning-based estimation. Since the machine learning-based method can lead to better performance, in this paper, a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed. First, an image fingerprint construction is proposed for training data. After the data preprocessing, the training data matrix is constructed by the cyclic shift and cubic spline interpolation. Then, the linear mapping and the gray-color transformation method are proposed to… More >

  • Open Access

    ARTICLE

    BCCLR: A Skeleton-Based Action Recognition with Graph Convolutional Network Combining Behavior Dependence and Context Clues

    Yunhe Wang1, Yuxin Xia2, Shuai Liu2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4489-4507, 2024, DOI:10.32604/cmc.2024.048813

    Abstract In recent years, skeleton-based action recognition has made great achievements in Computer Vision. A graph convolutional network (GCN) is effective for action recognition, modelling the human skeleton as a spatio-temporal graph. Most GCNs define the graph topology by physical relations of the human joints. However, this predefined graph ignores the spatial relationship between non-adjacent joint pairs in special actions and the behavior dependence between joint pairs, resulting in a low recognition rate for specific actions with implicit correlation between joint pairs. In addition, existing methods ignore the trend correlation between adjacent frames within an action and context clues, leading to… More >

  • Open Access

    ARTICLE

    Aspect-Level Sentiment Analysis Based on Deep Learning

    Mengqi Zhang1, Jiazhao Chai2, Jianxiang Cao3, Jialing Ji3, Tong Yi4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3743-3762, 2024, DOI:10.32604/cmc.2024.048486

    Abstract In recent years, deep learning methods have developed rapidly and found application in many fields, including natural language processing. In the field of aspect-level sentiment analysis, deep learning methods can also greatly improve the performance of models. However, previous studies did not take into account the relationship between user feature extraction and contextual terms. To address this issue, we use data feature extraction and deep learning combined to develop an aspect-level sentiment analysis method. To be specific, we design user comment feature extraction (UCFE) to distill salient features from users’ historical comments and transform them into representative user feature vectors.… More >

  • Open Access

    ARTICLE

    WebFLex: A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC

    Mai Alzamel1,*, Hamza Ali Rizvi2, Najwa Altwaijry1, Isra Al-Turaiki1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4177-4204, 2024, DOI:10.32604/cmc.2024.048370

    Abstract Scalability and information personal privacy are vital for training and deploying large-scale deep learning models. Federated learning trains models on exclusive information by aggregating weights from various devices and taking advantage of the device-agnostic environment of web browsers. Nevertheless, relying on a main central server for internet browser-based federated systems can prohibit scalability and interfere with the training process as a result of growing client numbers. Additionally, information relating to the training dataset can possibly be extracted from the distributed weights, potentially reducing the privacy of the local data used for training. In this research paper, we aim to investigate… More >

  • Open Access

    ARTICLE

    Deep Learning and Tensor-Based Multiple Clustering Approaches for Cyber-Physical-Social Applications

    Hongjun Zhang1,2, Hao Zhang2, Yu Lei3, Hao Ye1, Peng Li1,*, Desheng Shi1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4109-4128, 2024, DOI:10.32604/cmc.2024.048355

    Abstract The study delves into the expanding role of network platforms in our daily lives, encompassing various mediums like blogs, forums, online chats, and prominent social media platforms such as Facebook, Twitter, and Instagram. While these platforms offer avenues for self-expression and community support, they concurrently harbor negative impacts, fostering antisocial behaviors like phishing, impersonation, hate speech, cyberbullying, cyberstalking, cyberterrorism, fake news propagation, spamming, and fraud. Notably, individuals also leverage these platforms to connect with authorities and seek aid during disasters. The overarching objective of this research is to address the dual nature of network platforms by proposing innovative methodologies aimed… More >

  • Open Access

    ARTICLE

    An Enhanced Ensemble-Based Long Short-Term Memory Approach for Traffic Volume Prediction

    Duy Quang Tran1, Huy Q. Tran2,*, Minh Van Nguyen3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3585-3602, 2024, DOI:10.32604/cmc.2024.047760

    Abstract With the advancement of artificial intelligence, traffic forecasting is gaining more and more interest in optimizing route planning and enhancing service quality. Traffic volume is an influential parameter for planning and operating traffic structures. This study proposed an improved ensemble-based deep learning method to solve traffic volume prediction problems. A set of optimal hyperparameters is also applied for the suggested approach to improve the performance of the learning process. The fusion of these methodologies aims to harness ensemble empirical mode decomposition’s capacity to discern complex traffic patterns and long short-term memory’s proficiency in learning temporal relationships. Firstly, a dataset for… More >

  • Open Access

    ARTICLE

    Olive Leaf Disease Detection via Wavelet Transform and Feature Fusion of Pre-Trained Deep Learning Models

    Mahmood A. Mahmood1,2,*, Khalaf Alsalem1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3431-3448, 2024, DOI:10.32604/cmc.2024.047604

    Abstract Olive trees are susceptible to a variety of diseases that can cause significant crop damage and economic losses. Early detection of these diseases is essential for effective management. We propose a novel transformed wavelet, feature-fused, pre-trained deep learning model for detecting olive leaf diseases. The proposed model combines wavelet transforms with pre-trained deep-learning models to extract discriminative features from olive leaf images. The model has four main phases: preprocessing using data augmentation, three-level wavelet transformation, learning using pre-trained deep learning models, and a fused deep learning model. In the preprocessing phase, the image dataset is augmented using techniques such as… More >

  • Open Access

    ARTICLE

    Multi-Branch High-Dimensional Guided Transformer-Based 3D Human Posture Estimation

    Xianhua Li1,2,*, Haohao Yu1, Shuoyu Tian1, Fengtao Lin3, Usama Masood1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3551-3564, 2024, DOI:10.32604/cmc.2024.047336

    Abstract The human pose paradigm is estimated using a transformer-based multi-branch multidimensional directed the three-dimensional (3D) method that takes into account self-occlusion, badly posedness, and a lack of depth data in the per-frame 3D posture estimation from two-dimensional (2D) mapping to 3D mapping. Firstly, by examining the relationship between the movements of different bones in the human body, four virtual skeletons are proposed to enhance the cyclic constraints of limb joints. Then, multiple parameters describing the skeleton are fused and projected into a high-dimensional space. Utilizing a multi-branch network, motion features between bones and overall motion features are extracted to mitigate… More >

Displaying 21-30 on page 3 of 1417. Per Page