Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (42)
  • Open Access

    ARTICLE

    FeatherGuard: A Data-Driven Lightweight Error Protection Scheme for DNN Inference on Edge Devices

    Dong Hyun Lee1, Na Kyung Lee2, Young Seo Lee1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-17, 2026, DOI:10.32604/cmc.2025.069976 - 09 December 2025

    Abstract There has been an increasing emphasis on performing deep neural network (DNN) inference locally on edge devices due to challenges such as network congestion and security concerns. However, as DRAM process technology continues to scale down, the bit-flip errors in the memory of edge devices become more frequent, thereby leading to substantial DNN inference accuracy loss. Though several techniques have been proposed to alleviate the accuracy loss in edge environments, they require complex computations and additional parity bits for error correction, thus resulting in significant performance and storage overheads. In this paper, we propose FeatherGuard,… More >

  • Open Access

    ARTICLE

    Subdivision-Based Isogeometric BEM with Deep Neural Network Acceleration for Acoustic Uncertainty Quantification under Ground Reflection Effects

    Yingying Guo1, Ziyu Cui2, Jibing Shen1, Pei Li3,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4519-4550, 2025, DOI:10.32604/cmc.2025.071504 - 23 October 2025

    Abstract Accurate simulation of acoustic wave propagation in complex structures is of great importance in engineering design, noise control, and related research areas. Although traditional numerical simulation methods can provide precise results, they often face high computational costs when applied to complex models or problems involving parameter uncertainties, particularly in the presence of multiple coupled parameters or intricate geometries. To address these challenges, this study proposes an efficient algorithm for simulating the acoustic field of structures with adhered sound-absorbing materials while accounting for ground reflection effects. The proposed method integrates Catmull-Clark subdivision surfaces with the boundary… More >

  • Open Access

    ARTICLE

    Energy Efficient and Resource Allocation in Cloud Computing Using QT-DNN and Binary Bird Swarm Optimization

    Puneet Sharma1, Dhirendra Prasad Yadav1, Bhisham Sharma2,*, Surbhi B. Khan3,4,*, Ahlam Almusharraf 5

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2179-2193, 2025, DOI:10.32604/cmc.2025.063190 - 29 August 2025

    Abstract The swift expansion of cloud computing has heightened the demand for energy-efficient and high-performance resource allocation solutions across extensive systems. This research presents an innovative hybrid framework that combines a Quantum Tensor-based Deep Neural Network (QT-DNN) with Binary Bird Swarm Optimization (BBSO) to enhance resource allocation while preserving Quality of Service (QoS). In contrast to conventional approaches, the QT-DNN accurately predicts task-resource mappings using tensor-based task representation, significantly minimizing computing overhead. The BBSO allocates resources dynamically, optimizing energy efficiency and task distribution. Experimental results from extensive simulations indicate the efficacy of the suggested strategy; the… More >

  • Open Access

    ARTICLE

    Active Protection Scheme of DNN Intellectual Property Rights Based on Feature Layer Selection and Hyperchaotic Mapping

    Xintao Duan1,2,*, Yinhang Wu1, Zhao Wang1, Chuan Qin3

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4887-4906, 2025, DOI:10.32604/cmc.2025.064620 - 30 July 2025

    Abstract Deep neural network (DNN) models have achieved remarkable performance across diverse tasks, leading to widespread commercial adoption. However, training high-accuracy models demands extensive data, substantial computational resources, and significant time investment, making them valuable assets vulnerable to unauthorized exploitation. To address this issue, this paper proposes an intellectual property (IP) protection framework for DNN models based on feature layer selection and hyper-chaotic mapping. Firstly, a sensitivity-based importance evaluation algorithm is used to identify the key feature layers for encryption, effectively protecting the core components of the model. Next, the L1 regularization criterion is applied to More >

  • Open Access

    ARTICLE

    An Adaptive Features Fusion Convolutional Neural Network for Multi-Class Agriculture Pest Detection

    Muhammad Qasim1,2, Syed M. Adnan Shah1, Qamas Gul Khan Safi1, Danish Mahmood2, Adeel Iqbal3,*, Ali Nauman3, Sung Won Kim3,*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4429-4445, 2025, DOI:10.32604/cmc.2025.065060 - 19 May 2025

    Abstract Grains are the most important food consumed globally, yet their yield can be severely impacted by pest infestations. Addressing this issue, scientists and researchers strive to enhance the yield-to-seed ratio through effective pest detection methods. Traditional approaches often rely on preprocessed datasets, but there is a growing need for solutions that utilize real-time images of pests in their natural habitat. Our study introduces a novel two-step approach to tackle this challenge. Initially, raw images with complex backgrounds are captured. In the subsequent step, feature extraction is performed using both hand-crafted algorithms (Haralick, LBP, and Color… More >

  • Open Access

    ARTICLE

    Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment

    Aljuaid Turkea Ayedh M1,2,*, Ainuddin Wahid Abdul Wahab1,*, Mohd Yamani Idna Idris1,3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4663-4686, 2024, DOI:10.32604/cmc.2024.055287 - 12 September 2024

    Abstract Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources. This paper proposes a method for enforcing access decisions that is adaptable and dynamic, based on multilayer hybrid deep learning techniques, particularly the Tabular Deep Neural Network TabularDNN method. This technique transforms… More >

  • Open Access

    ARTICLE

    IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN

    Yanhua Liu1,2,3, Yuting Han1,2,3, Hui Chen1,2,3, Baokang Zhao4,*, Xiaofeng Wang4, Ximeng Liu1,2,3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1851-1866, 2024, DOI:10.32604/cmc.2024.051194 - 15 August 2024

    Abstract As the scale of the networks continually expands, the detection of distributed denial of service (DDoS) attacks has become increasingly vital. We propose an intelligent detection model named IGED by using improved generalized entropy and deep neural network (DNN). The initial detection is based on improved generalized entropy to filter out as much normal traffic as possible, thereby reducing data volume. Then the fine detection is based on DNN to perform precise DDoS detection on the filtered suspicious traffic, enhancing the neural network’s generalization capabilities. Experimental results show that the proposed method can efficiently distinguish More >

  • Open Access

    ARTICLE

    An Example of a Supporting Combination by Using GA to Evolve More Advanced and Deeper CNN Architecture

    Bah Mamoudou*

    Journal on Artificial Intelligence, Vol.5, pp. 163-180, 2023, DOI:10.32604/jai.2023.045324 - 26 December 2023

    Abstract It has become an annual tradition for Convolutional Neural Networks (CNNs) to continuously improve their performance in image classification and other applications. These advancements are often attributed to the adoption of more intricate network architectures, such as modules and skip connections, as well as the practice of stacking additional layers to create increasingly complex networks. However, the quest to identify the most optimized model is a daunting task, given that state of the art Convolutional Neural Network (CNN) models are manually engineered. In this research paper, we leveraged a conventional Genetic Algorithm (GA) to craft More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952 - 29 November 2023

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267 - 26 May 2023

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here… More >

Displaying 1-10 on page 1 of 42. Per Page