Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (68)
  • Open Access

    ARTICLE

    A Recurrent Neural Network for Multimodal Anomaly Detection by Using Spatio-Temporal Audio-Visual Data

    Sameema Tariq1, Ata-Ur- Rehman2,3, Maria Abubakar2, Waseem Iqbal4, Hatoon S. Alsagri5, Yousef A. Alduraywish5, Haya Abdullah A. Alhakbani5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2493-2515, 2024, DOI:10.32604/cmc.2024.055787 - 18 November 2024

    Abstract In video surveillance, anomaly detection requires training machine learning models on spatio-temporal video sequences. However, sometimes the video-only data is not sufficient to accurately detect all the abnormal activities. Therefore, we propose a novel audio-visual spatiotemporal autoencoder specifically designed to detect anomalies for video surveillance by utilizing audio data along with video data. This paper presents a competitive approach to a multi-modal recurrent neural network for anomaly detection that combines separate spatial and temporal autoencoders to leverage both spatial and temporal features in audio-visual data. The proposed model is trained to produce low reconstruction error… More >

  • Open Access

    ARTICLE

    Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm

    Brij Bhooshan Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4895-4916, 2024, DOI:10.32604/cmc.2024.050815 - 12 September 2024

    Abstract Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape, necessitating the development of more sophisticated detection methods. Traditional machine learning approaches to phishing detection have relied heavily on feature engineering and have often fallen short in adapting to the dynamically changing patterns of phishing Uniform Resource Locator (URLs). Addressing these challenge, we introduce a framework that integrates the sequential data processing strengths of a Recurrent Neural Network (RNN) with the hyperparameter optimization prowess of the Whale Optimization Algorithm (WOA). Our model capitalizes on an extensive Kaggle dataset, featuring over 11,000 URLs, each More >

  • Open Access

    ARTICLE

    A Harmonic Approach to Handwriting Style Synthesis Using Deep Learning

    Mahatir Ahmed Tusher1, Saket Choudary Kongara1, Sagar Dhanraj Pande2, SeongKi Kim3,*, Salil Bharany4,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4063-4080, 2024, DOI:10.32604/cmc.2024.049007 - 20 June 2024

    Abstract The challenging task of handwriting style synthesis requires capturing the individuality and diversity of human handwriting. The majority of currently available methods use either a generative adversarial network (GAN) or a recurrent neural network (RNN) to generate new handwriting styles. This is why these techniques frequently fall short of producing diverse and realistic text pictures, particularly for terms that are not commonly used. To resolve that, this research proposes a novel deep learning model that consists of a style encoder and a text generator to synthesize different handwriting styles. This network excels in generating conditional… More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Gender Classification Accuracy across Varied Geographic Regions through the Application of Deep Learning Algorithms to Speech Signals

    Abhishek Singhal*, Devendra Kumar Sharma

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 609-625, 2024, DOI:10.32604/csse.2023.046730 - 20 May 2024

    Abstract This article presents an exhaustive comparative investigation into the accuracy of gender identification across diverse geographical regions, employing a deep learning classification algorithm for speech signal analysis. In this study, speech samples are categorized for both training and testing purposes based on their geographical origin. Category 1 comprises speech samples from speakers outside of India, whereas Category 2 comprises live-recorded speech samples from Indian speakers. Testing speech samples are likewise classified into four distinct sets, taking into consideration both geographical origin and the language spoken by the speakers. Significantly, the results indicate a noticeable difference… More >

  • Open Access

    ARTICLE

    Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN)

    Abeer Abdullah Alsadhan1, Abdullah A. Al-Atawi2, Hanen karamti3, Abid Jameel4, Islam Zada5, Tan N. Nguyen6,*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 135-155, 2024, DOI:10.32604/iasc.2023.041130 - 21 May 2024

    Abstract IoT (Internet of Things) devices are being used more and more in a variety of businesses and for a variety of tasks, such as environmental data collection in both civilian and military situations. They are a desirable attack target for malware intended to infect specific IoT devices due to their growing use in a variety of applications and their increasing computational and processing power. In this study, we investigate the possibility of detecting IoT malware using recurrent neural networks (RNNs). RNN is used in the proposed method to investigate the execution operation codes of ARM-based More >

  • Open Access

    ARTICLE

    Sentiment Analysis of Low-Resource Language Literature Using Data Processing and Deep Learning

    Aizaz Ali1, Maqbool Khan1,2, Khalil Khan3, Rehan Ullah Khan4, Abdulrahman Aloraini4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 713-733, 2024, DOI:10.32604/cmc.2024.048712 - 25 April 2024

    Abstract Sentiment analysis, a crucial task in discerning emotional tones within the text, plays a pivotal role in understanding public opinion and user sentiment across diverse languages. While numerous scholars conduct sentiment analysis in widely spoken languages such as English, Chinese, Arabic, Roman Arabic, and more, we come to grappling with resource-poor languages like Urdu literature which becomes a challenge. Urdu is a uniquely crafted language, characterized by a script that amalgamates elements from diverse languages, including Arabic, Parsi, Pashtu, Turkish, Punjabi, Saraiki, and more. As Urdu literature, characterized by distinct character sets and linguistic features,… More >

  • Open Access

    ARTICLE

    Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network

    Mohammad Mehdi Sharifi Nevisi1, Elnaz Bashir2, Diego Martín3,*, Seyedkian Rezvanjou4, Farzaneh Shoushtari5, Ehsan Ghafourian2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3971-3991, 2024, DOI:10.32604/cmc.2024.047875 - 26 March 2024

    Abstract This paper focuses on wireless-powered communication systems, which are increasingly relevant in the Internet of Things (IoT) due to their ability to extend the operational lifetime of devices with limited energy. The main contribution of the paper is a novel approach to minimize the secrecy outage probability (SOP) in these systems. Minimizing SOP is crucial for maintaining the confidentiality and integrity of data, especially in situations where the transmission of sensitive data is critical. Our proposed method harnesses the power of an improved biogeography-based optimization (IBBO) to effectively train a recurrent neural network (RNN). The… More >

  • Open Access

    ARTICLE

    Automated Machine Learning Algorithm Using Recurrent Neural Network to Perform Long-Term Time Series Forecasting

    Ying Su1, Morgan C. Wang1, Shuai Liu2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3529-3549, 2024, DOI:10.32604/cmc.2024.047189 - 26 March 2024

    Abstract Long-term time series forecasting stands as a crucial research domain within the realm of automated machine learning (AutoML). At present, forecasting, whether rooted in machine learning or statistical learning, typically relies on expert input and necessitates substantial manual involvement. This manual effort spans model development, feature engineering, hyper-parameter tuning, and the intricate construction of time series models. The complexity of these tasks renders complete automation unfeasible, as they inherently demand human intervention at multiple junctures. To surmount these challenges, this article proposes leveraging Long Short-Term Memory, which is the variant of Recurrent Neural Networks, harnessing… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172 - 26 March 2024

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent… More >

  • Open Access

    ARTICLE

    Fake News Classification: Past, Current, and Future

    Muhammad Usman Ghani Khan1, Abid Mehmood2, Mourad Elhadef2, Shehzad Ashraf Chaudhry2,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2225-2249, 2023, DOI:10.32604/cmc.2023.038303 - 29 November 2023

    Abstract The proliferation of deluding data such as fake news and phony audits on news web journals, online publications, and internet business apps has been aided by the availability of the web, cell phones, and social media. Individuals can quickly fabricate comments and news on social media. The most difficult challenge is determining which news is real or fake. Accordingly, tracking down programmed techniques to recognize fake news online is imperative. With an emphasis on false news, this study presents the evolution of artificial intelligence techniques for detecting spurious social media content. This study shows past,… More >

Displaying 1-10 on page 1 of 68. Per Page