Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (35)
  • Open Access

    ARTICLE

    Robust Multi-Label Cartoon Character Classification on the Novel Kral Sakir Dataset Using Deep Learning Techniques

    Candan Tumer1, Erdal Guvenoglu2, Volkan Tunali3,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5135-5158, 2025, DOI:10.32604/cmc.2025.067840 - 23 October 2025

    Abstract Automated cartoon character recognition is crucial for applications in content indexing, filtering, and copyright protection, yet it faces a significant challenge in animated media due to high intra-class visual variability, where characters frequently alter their appearance. To address this problem, we introduce the novel Kral Sakir dataset, a public benchmark of 16,725 images specifically curated for the task of multi-label cartoon character classification under these varied conditions. This paper conducts a comprehensive benchmark study, evaluating the performance of state-of-the-art pretrained Convolutional Neural Networks (CNNs), including DenseNet, ResNet, and VGG, against a custom baseline model trained More >

  • Open Access

    REVIEW

    Evaluation of State-of-the-Art Deep Learning Techniques for Plant Disease and Pest Detection

    MD Tausif Mallick1, Saptarshi Banerjee2, Nityananda Thakur3, Himadri Nath Saha4,*, Amlan Chakrabarti1

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 121-180, 2025, DOI:10.32604/cmc.2025.065250 - 29 August 2025

    Abstract Addressing plant diseases and pests is not just crucial; it’s a matter of utmost importance for enhancing crop production and preventing economic losses. Recent advancements in artificial intelligence, machine learning, and deep learning have revolutionised the precision and efficiency of this process, surpassing the limitations of manual identification. This study comprehensively reviews modern computer-based techniques, including recent advances in artificial intelligence, for detecting diseases and pests through images. This paper uniquely categorises methodologies into hyperspectral imaging, non-visualisation techniques, visualisation approaches, modified deep learning architectures, and transformer models, helping researchers gain detailed, insightful understandings. The exhaustive… More >

  • Open Access

    ARTICLE

    URLLC Service in UAV Rate-Splitting Multiple Access: Adapting Deep Learning Techniques for Wireless Network

    Reem Alkanhel1,#, Abuzar B. M. Adam2,#, Samia Allaoua Chelloug1, Dina S. M. Hassan1,*, Mohammed Saleh Ali Muthanna3, Ammar Muthanna4

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 607-624, 2025, DOI:10.32604/cmc.2025.063206 - 09 June 2025

    Abstract The 3GPP standard defines the requirements for next-generation wireless networks, with particular attention to Ultra-Reliable Low-Latency Communications (URLLC), critical for applications such as Unmanned Aerial Vehicles (UAVs). In this context, Non-Orthogonal Multiple Access (NOMA) has emerged as a promising technique to improve spectrum efficiency and user fairness by allowing multiple users to share the same frequency resources. However, optimizing key parameters–such as beamforming, rate allocation, and UAV trajectory–presents significant challenges due to the nonconvex nature of the problem, especially under stringent URLLC constraints. This paper proposes an advanced deep learning-driven approach to address the resulting… More >

  • Open Access

    ARTICLE

    Advanced Techniques for Dynamic Malware Detection and Classification in Digital Security Using Deep Learning

    Taher Alzahrani*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4575-4606, 2025, DOI:10.32604/cmc.2025.063448 - 19 May 2025

    Abstract The rapid evolution of malware presents a critical cybersecurity challenge, rendering traditional signature-based detection methods ineffective against novel variants. This growing threat affects individuals, organizations, and governments, highlighting the urgent need for robust malware detection mechanisms. Conventional machine learning-based approaches rely on static and dynamic malware analysis and often struggle to detect previously unseen threats due to their dependency on predefined signatures. Although machine learning algorithms (MLAs) offer promising detection capabilities, their reliance on extensive feature engineering limits real-time applicability. Deep learning techniques mitigate this issue by automating feature extraction but may introduce computational overhead,… More >

  • Open Access

    ARTICLE

    An Enhanced Lung Cancer Detection Approach Using Dual-Model Deep Learning Technique

    Sumaia Mohamed Elhassan1, Saad Mohamed Darwish1,*, Saleh Mesbah Elkaffas2

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 835-867, 2025, DOI:10.32604/cmes.2024.058770 - 17 December 2024

    Abstract Lung cancer continues to be a leading cause of cancer-related deaths worldwide, emphasizing the critical need for improved diagnostic techniques. Early detection of lung tumors significantly increases the chances of successful treatment and survival. However, current diagnostic methods often fail to detect tumors at an early stage or to accurately pinpoint their location within the lung tissue. Single-model deep learning technologies for lung cancer detection, while beneficial, cannot capture the full range of features present in medical imaging data, leading to incomplete or inaccurate detection. Furthermore, it may not be robust enough to handle the… More >

  • Open Access

    PROCEEDINGS

    Automated Vulnerability Detection Using Deep Learning Technique

    Guan-Yan Yang1,*, Yi-Heng Ko1, Farn Wang1, Kuo-Hui Yeh2, Haw-Shiang Chang1, Hsueh Yi Chen1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.32, No.1, pp. 1-4, 2024, DOI:10.32604/icces.2024.013297

    Abstract 1 Introduction
    Ensuring the absence of exploitable vulnerabilities within applications has always been a critical aspect of software development [1-3]. Traditional code security testing methods often rely on manual inspection or rule-based approaches, which can be time-consuming and prone to human errors. With the recent advancements in natural language processing, deep learning has emerged as a viable approach for code security testing. In this work, we investigated the application of deep learning techniques to code security testing to enhance the efficiency and effectiveness of security analysis in the software development process. In 2022, Wartschinski et al.… More >

  • Open Access

    ARTICLE

    Enhancing Solar Energy Production Forecasting Using Advanced Machine Learning and Deep Learning Techniques: A Comprehensive Study on the Impact of Meteorological Data

    Nataliya Shakhovska1,2,*, Mykola Medykovskyi1, Oleksandr Gurbych1,3, Mykhailo Mamchur1,3, Mykhailo Melnyk1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3147-3163, 2024, DOI:10.32604/cmc.2024.056542 - 18 November 2024

    Abstract The increasing adoption of solar photovoltaic systems necessitates accurate forecasting of solar energy production to enhance grid stability, reliability, and economic benefits. This study explores advanced machine learning (ML) and deep learning (DL) techniques for predicting solar energy generation, emphasizing the significant impact of meteorological data. A comprehensive dataset, encompassing detailed weather conditions and solar energy metrics, was collected and preprocessed to improve model accuracy. Various models were developed and trained with different preprocessing stages. Finally, three datasets were prepared. A novel hour-based prediction wrapper was introduced, utilizing external sunrise and sunset data to restrict… More >

  • Open Access

    ARTICLE

    LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques

    Shanjita Akter Prome1, Md Rafiqul Islam2,*, Md. Kowsar Hossain Sakib1, David Asirvatham1, Neethiahnanthan Ari Ragavan3, Cesar Sanin2, Edward Szczerbicki4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2845-2871, 2024, DOI:10.32604/cmc.2024.055311 - 18 November 2024

    Abstract Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions. The human face is a rich source of data that offers trustworthy markers of deception. The deception or lie detection systems are non-intrusive, cost-effective, and mobile by identifying facial expressions. Over the last decade, numerous studies have been conducted on deception detection using several advanced techniques. Researchers have focused their attention on inventing more effective and efficient solutions for the detection of deception. So, it could be challenging to spot trends, practical approaches, gaps, and chances for contribution.… More >

  • Open Access

    ARTICLE

    Performance of Deep Learning Techniques in Leaf Disease Detection

    Robertas Damasevicius1,*, Faheem Mahmood2, Yaseen Zaman3, Sobia Dastgeer2, Sajid Khan2

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1349-1366, 2024, DOI:10.32604/csse.2024.050359 - 13 September 2024

    Abstract Plant diseases must be identified as soon as possible since they have an impact on the growth of the corresponding species. Consequently, the identification of leaf diseases is essential in this field of agriculture. Diseases brought on by bacteria, viruses, and fungi are a significant factor in reduced crop yields. Numerous machine learning models have been applied in the identification of plant diseases, however, with the recent developments in deep learning, this field of study seems to hold huge potential for improved accuracy. This study presents an effective method that uses image processing and deep… More >

  • Open Access

    ARTICLE

    Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment

    Aljuaid Turkea Ayedh M1,2,*, Ainuddin Wahid Abdul Wahab1,*, Mohd Yamani Idna Idris1,3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4663-4686, 2024, DOI:10.32604/cmc.2024.055287 - 12 September 2024

    Abstract Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources. This paper proposes a method for enforcing access decisions that is adaptable and dynamic, based on multilayer hybrid deep learning techniques, particularly the Tabular Deep Neural Network TabularDNN method. This technique transforms… More >

Displaying 1-10 on page 1 of 35. Per Page