Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (574)
  • Open Access

    ARTICLE

    Big Model Strategy for Bridge Structural Health Monitoring Based on Data-Driven, Adaptive Method and Convolutional Neural Network (CNN) Group

    Yadong Xu1, Weixing Hong2, Mohammad Noori3,6,*, Wael A. Altabey4,*, Ahmed Silik5, Nabeel S.D. Farhan2

    Structural Durability & Health Monitoring, Vol.18, No.6, pp. 763-783, 2024, DOI:10.32604/sdhm.2024.053763

    Abstract This study introduces an innovative “Big Model” strategy to enhance Bridge Structural Health Monitoring (SHM) using a Convolutional Neural Network (CNN), time-frequency analysis, and fine element analysis. Leveraging ensemble methods, collaborative learning, and distributed computing, the approach effectively manages the complexity and scale of large-scale bridge data. The CNN employs transfer learning, fine-tuning, and continuous monitoring to optimize models for adaptive and accurate structural health assessments, focusing on extracting meaningful features through time-frequency analysis. By integrating Finite Element Analysis, time-frequency analysis, and CNNs, the strategy provides a comprehensive understanding of bridge health. Utilizing diverse sensor More >

  • Open Access

    ARTICLE

    A Novel Framework for Learning and Classifying the Imbalanced Multi-Label Data

    P. K. A. Chitra1, S. Appavu alias Balamurugan2, S. Geetha3, Seifedine Kadry4,5,6, Jungeun Kim7,*, Keejun Han8

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1367-1385, 2024, DOI:10.32604/csse.2023.034373

    Abstract A generalization of supervised single-label learning based on the assumption that each sample in a dataset may belong to more than one class simultaneously is called multi-label learning. The main objective of this work is to create a novel framework for learning and classifying imbalanced multi-label data. This work proposes a framework of two phases. The imbalanced distribution of the multi-label dataset is addressed through the proposed Borderline MLSMOTE resampling method in phase 1. Later, an adaptive weighted l21 norm regularized (Elastic-net) multi-label logistic regression is used to predict unseen samples in phase 2. The proposed… More >

  • Open Access

    ARTICLE

    Enhancing Safety in Autonomous Vehicle Navigation: An Optimized Path Planning Approach Leveraging Model Predictive Control

    Shih-Lin Lin*, Bo-Chen Lin

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3555-3572, 2024, DOI:10.32604/cmc.2024.055456

    Abstract This paper explores the application of Model Predictive Control (MPC) to enhance safety and efficiency in autonomous vehicle (AV) navigation through optimized path planning. The evolution of AV technology has progressed rapidly, moving from basic driver-assistance systems (Level 1) to fully autonomous capabilities (Level 5). Central to this advancement are two key functionalities: Lane-Change Maneuvers (LCM) and Adaptive Cruise Control (ACC). In this study, a detailed simulation environment is created to replicate the road network between Nantun and Wuri on National Freeway No. 1 in Taiwan. The MPC controller is deployed to optimize vehicle trajectories,… More >

  • Open Access

    ARTICLE

    Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment

    Aljuaid Turkea Ayedh M1,2,*, Ainuddin Wahid Abdul Wahab1,*, Mohd Yamani Idna Idris1,3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4663-4686, 2024, DOI:10.32604/cmc.2024.055287

    Abstract Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources. This paper proposes a method for enforcing access decisions that is adaptable and dynamic, based on multilayer hybrid deep learning techniques, particularly the Tabular Deep Neural Network TabularDNN method. This technique transforms… More >

  • Open Access

    ARTICLE

    Enhancing Unsupervised Domain Adaptation for Person Re-Identification with the Minimal Transfer Cost Framework

    Sheng Xu1, Shixiong Xiang2, Feiyu Meng1, Qiang Wu1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.055157

    Abstract In Unsupervised Domain Adaptation (UDA) for person re-identification (re-ID), the primary challenge is reducing the distribution discrepancy between the source and target domains. This can be achieved by implicitly or explicitly constructing an appropriate intermediate domain to enhance recognition capability on the target domain. Implicit construction is difficult due to the absence of intermediate state supervision, making smooth knowledge transfer from the source to the target domain a challenge. To explicitly construct the most suitable intermediate domain for the model to gradually adapt to the feature distribution changes from the source to the target domain,… More >

  • Open Access

    ARTICLE

    Diabetic Retinopathy Detection: A Hybrid Intelligent Approach

    Atta Rahman1,*, Mustafa Youldash2, Ghaida Alshammari2, Abrar Sebiany2, Joury Alzayat2, Manar Alsayed2, Mona Alqahtani2, Noor Aljishi2

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4561-4576, 2024, DOI:10.32604/cmc.2024.055106

    Abstract Diabetes is a serious health condition that can cause several issues in human body organs such as the heart and kidney as well as a serious eye disease called diabetic retinopathy (DR). Early detection and treatment are crucial to prevent complete blindness or partial vision loss. Traditional detection methods, which involve ophthalmologists examining retinal fundus images, are subjective, expensive, and time-consuming. Therefore, this study employs artificial intelligence (AI) technology to perform faster and more accurate binary classifications and determine the presence of DR. In this regard, we employed three promising machine learning models namely, support… More >

  • Open Access

    ARTICLE

    AMAD: Adaptive Mapping Approach for Datacenter Networks, an Energy-Friend Resource Allocation Framework via Repeated Leader Follower Game

    Ahmad Nahar Quttoum1,*, Muteb Alshammari2

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4577-4601, 2024, DOI:10.32604/cmc.2024.054102

    Abstract Cloud Datacenter Network (CDN) providers usually have the option to scale their network structures to allow for far more resource capacities, though such scaling options may come with exponential costs that contradict their utility objectives. Yet, besides the cost of the physical assets and network resources, such scaling may also impose more loads on the electricity power grids to feed the added nodes with the required energy to run and cool, which comes with extra costs too. Thus, those CDN providers who utilize their resources better can certainly afford their services at lower price-units when… More >

  • Open Access

    ARTICLE

    Abnormal Action Detection Based on Parameter-Efficient Transfer Learning in Laboratory Scenarios

    Changyu Liu1, Hao Huang1, Guogang Huang2,*, Chunyin Wu1, Yingqi Liang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4219-4242, 2024, DOI:10.32604/cmc.2024.053625

    Abstract Laboratory safety is a critical area of broad societal concern, particularly in the detection of abnormal actions. To enhance the efficiency and accuracy of detecting such actions, this paper introduces a novel method called TubeRAPT (Tubelet Transformer based on Adapter and Prefix Training Module). This method primarily comprises three key components: the TubeR network, an adaptive clustering attention mechanism, and a prefix training module. These components work in synergy to address the challenge of knowledge preservation in models pre-trained on large datasets while maintaining training efficiency. The TubeR network serves as the backbone for spatio-temporal… More >

  • Open Access

    ARTICLE

    Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization

    Ahmad Yahiya Ahmad Bani Ahmad1, Jafar Alzubi2, Sophers James3, Vincent Omollo Nyangaresi4,5,*, Chanthirasekaran Kutralakani6, Anguraju Krishnan7

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4791-4812, 2024, DOI:10.32604/cmc.2024.052771

    Abstract In recent years, wearable devices-based Human Activity Recognition (HAR) models have received significant attention. Previously developed HAR models use hand-crafted features to recognize human activities, leading to the extraction of basic features. The images captured by wearable sensors contain advanced features, allowing them to be analyzed by deep learning algorithms to enhance the detection and recognition of human actions. Poor lighting and limited sensor capabilities can impact data quality, making the recognition of human actions a challenging task. The unimodal-based HAR approaches are not suitable in a real-time environment. Therefore, an updated HAR model is… More >

  • Open Access

    ARTICLE

    A Graph with Adaptive Adjacency Matrix for Relation Extraction

    Run Yang1,2,3, Yanping Chen1,2,3,*, Jiaxin Yan1,2,3, Yongbin Qin1,2,3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4129-4147, 2024, DOI:10.32604/cmc.2024.051675

    Abstract The relation is a semantic expression relevant to two named entities in a sentence. Since a sentence usually contains several named entities, it is essential to learn a structured sentence representation that encodes dependency information specific to the two named entities. In related work, graph convolutional neural networks are widely adopted to learn semantic dependencies, where a dependency tree initializes the adjacency matrix. However, this approach has two main issues. First, parsing a sentence heavily relies on external toolkits, which can be error-prone. Second, the dependency tree only encodes the syntactical structure of a sentence,… More >

Displaying 1-10 on page 1 of 574. Per Page