Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset

    Mohammed Zakariah1, Salman A. AlQahtani2,*, Abdulaziz M. Alawwad1, Abdullilah A. Alotaibi3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 4025-4054, 2023, DOI:10.32604/cmc.2023.043752

    Abstract Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based traffic. By consuming time and resources, intrusive traffic hampers the efficient operation of network infrastructure. An effective strategy for preventing, detecting, and mitigating intrusion incidents will increase productivity. A crucial element of secure network traffic is Intrusion Detection System (IDS). An IDS system may be host-based or network-based to monitor intrusive network activity. Finding unusual internet traffic has become a severe security risk for intelligent devices. These systems are negatively impacted by several attacks, which are slowing computation. In addition, networked… More >

  • Open Access

    ARTICLE

    Abnormal Behavior Detection Using Deep-Learning-Based Video Data Structuring

    Min-Jeong Kim1, Byeong-Uk Jeon1, Hyun Yoo2, Kyungyong Chung3,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2371-2386, 2023, DOI:10.32604/iasc.2023.040310

    Abstract With the increasing number of digital devices generating a vast amount of video data, the recognition of abnormal image patterns has become more important. Accordingly, it is necessary to develop a method that achieves this task using object and behavior information within video data. Existing methods for detecting abnormal behaviors only focus on simple motions, therefore they cannot determine the overall behavior occurring throughout a video. In this study, an abnormal behavior detection method that uses deep learning (DL)-based video-data structuring is proposed. Objects and motions are first extracted from continuous images by combining existing DL-based image analysis models. The… More >

  • Open Access

    ARTICLE

    Partially Deep-Learning Encryption Technique

    Hamdy M. Mousa*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4277-4291, 2023, DOI:10.32604/cmc.2023.034593

    Abstract The biggest problem facing the world is information security in the digital era. Information protection and integrity are hot topics at all times, so many techniques have been introduced to transmit and store data securely. The increase in computing power is increasing the number of security breaches and attacks at a higher rate than before on average. Thus, a number of existing security systems are at risk of hacking. This paper proposes an encryption technique called Partial Deep-Learning Encryption Technique (PD-LET) to achieve data security. PD-LET includes several stages for encoding and decoding digital data. Data preprocessing, convolution layer of… More >

  • Open Access

    ARTICLE

    Robust Vehicle Detection Based on Improved You Look Only Once

    Sunil Kumar1, Manisha Jailia1, Sudeep Varshney2, Nitish Pathak3, Shabana Urooj4,*, Nouf Abd Elmunim4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3561-3577, 2023, DOI:10.32604/cmc.2023.029999

    Abstract Vehicle detection is still challenging for intelligent transportation systems (ITS) to achieve satisfactory performance. The existing methods based on one stage and two-stage have intrinsic weakness in obtaining high vehicle detection performance. Due to advancements in detection technology, deep learning-based methods for vehicle detection have become more popular because of their higher detection accuracy and speed than the existing algorithms. This paper presents a robust vehicle detection technique based on Improved You Look Only Once (RVD-YOLOv5) to enhance vehicle detection accuracy. The proposed method works in three phases; in the first phase, the K-means algorithm performs data clustering on datasets… More >

  • Open Access

    ARTICLE

    An Optimized Deep-Learning-Based Low Power Approximate Multiplier Design

    M. Usharani1,*, B. Sakthivel2, S. Gayathri Priya3, T. Nagalakshmi4, J. Shirisha5

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1647-1657, 2023, DOI:10.32604/csse.2023.027744

    Abstract Approximate computing is a popular field for low power consumption that is used in several applications like image processing, video processing, multimedia and data mining. This Approximate computing is majorly performed with an arithmetic circuit particular with a multiplier. The multiplier is the most essential element used for approximate computing where the power consumption is majorly based on its performance. There are several researchers are worked on the approximate multiplier for power reduction for a few decades, but the design of low power approximate multiplier is not so easy. This seems a bigger challenge for digital industries to design an… More >

  • Open Access

    ARTICLE

    Deep-Learning-Based Production Decline Curve Analysis in the Gas Reservoir through Sequence Learning Models

    Shaohua Gu1,2, Jiabao Wang3, Liang Xue3,*, Bin Tu3, Mingjin Yang3, Yuetian Liu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1579-1599, 2022, DOI:10.32604/cmes.2022.019435

    Abstract Production performance prediction of tight gas reservoirs is crucial to the estimation of ultimate recovery, which has an important impact on gas field development planning and economic evaluation. Owing to the model’s simplicity, the decline curve analysis method has been widely used to predict production performance. The advancement of deep-learning methods provides an intelligent way of analyzing production performance in tight gas reservoirs. In this paper, a sequence learning method to improve the accuracy and efficiency of tight gas production forecasting is proposed. The sequence learning methods used in production performance analysis herein include the recurrent neural network (RNN), long… More >

  • Open Access

    ARTICLE

    Deep Learning-based Wireless Signal Classification in the IoT Environment

    Hyeji Roh, Sheungmin Oh, Hajun Song, Jinseo Han, Sangsoon Lim*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5717-5732, 2022, DOI:10.32604/cmc.2022.024135

    Abstract With the development of the Internet of Things (IoT), diverse wireless devices are increasing rapidly. Those devices have different wireless interfaces that generate incompatible wireless signals. Each signal has its own physical characteristics with signal modulation and demodulation scheme. When there exist different wireless devices, they can suffer from severe Cross-Technology Interferences (CTI). To reduce the communication overhead due to the CTI in the real IoT environment, a central coordinator can be able to detect and identify wireless signals existing in the same communication areas. This paper investigates how to classify various radio signals using Convolutional Neural Networks (CNN), Long… More >

  • Open Access

    ARTICLE

    Efficient Deep-Learning-Based Autoencoder Denoising Approach for Medical Image Diagnosis

    Walid El-Shafai1, Samy Abd El-Nabi1,2, El-Sayed M. El-Rabaie1, Anas M. Ali1,2, Naglaa F. Soliman3,*, Abeer D. Algarni3, Fathi E. Abd El-Samie1,3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6107-6125, 2022, DOI:10.32604/cmc.2022.020698

    Abstract Effective medical diagnosis is dramatically expensive, especially in third-world countries. One of the common diseases is pneumonia, and because of the remarkable similarity between its types and the limited number of medical images for recent diseases related to pneumonia, the medical diagnosis of these diseases is a significant challenge. Hence, transfer learning represents a promising solution in transferring knowledge from generic tasks to specific tasks. Unfortunately, experimentation and utilization of different models of transfer learning do not achieve satisfactory results. In this study, we suggest the implementation of an automatic detection model, namely CADTra, to efficiently diagnose pneumonia-related diseases. This… More >

  • Open Access

    RETRACTION

    Deep-Learning-Empowered 3D Reconstruction for Dehazed Images in IoTEnhanced Smart Cities

    Jing Zhang1,2, Xin Qi3,*, San Hlaing Myint3, Zheng Wen4

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2809-2809, 2021, DOI:10.32604/cmc.2021.17410

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    PotholeEye+: Deep-Learning Based Pavement Distress Detection System toward Smart Maintenance

    Juyoung Park1,*, Jung Hee Lee1, Junseong Bang2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.3, pp. 965-976, 2021, DOI:10.32604/cmes.2021.014669

    Abstract

    We propose a mobile system, called PotholeEye+, for automatically monitoring the surface of a roadway and detecting the pavement distress in real-time through analysis of a video. PotholeEye+ pre-processes the images, extracts features, and classifies the distress into a variety of types, while the road manager is driving. Every day for a year, we have tested PotholeEye+ on real highway involving real settings, a camera, a mini computer, a GPS receiver, and so on. Consequently, PotholeEye+ detected the pavement distress with accuracy of 92%, precision of 87% and recall 74% averagely during driving at an average speed of 110 km/h… More >

Displaying 1-10 on page 1 of 14. Per Page