Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (576)
  • Open Access

    ARTICLE

    EDU-GAN: Edge Enhancement Generative Adversarial Networks with Dual-Domain Discriminators for Inscription Images Denoising

    Yunjing Liu1,, Erhu Zhang1,2,,*, Jingjing Wang3, Guangfeng Lin2, Jinghong Duan4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1633-1653, 2024, DOI:10.32604/cmc.2024.052611

    Abstract Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research issue. Different from natural images, character images pay more attention to stroke information. However, existing models mainly consider pixel-level information while ignoring structural information of the character, such as its edge and glyph, resulting in reconstructed images with mottled local structure and character damage. To solve these problems, we propose a novel generative adversarial network (GAN) framework based on an edge-guided generator and a discriminator constructed by a dual-domain U-Net framework, i.e., EDU-GAN. Unlike existing frameworks, the generator introduces the… More >

  • Open Access

    ARTICLE

    An Enhanced GAN for Image Generation

    Chunwei Tian1,2,3,4, Haoyang Gao2,3, Pengwei Wang2, Bob Zhang1,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 105-118, 2024, DOI:10.32604/cmc.2024.052097

    Abstract Generative adversarial networks (GANs) with gaming abilities have been widely applied in image generation. However, gamistic generators and discriminators may reduce the robustness of the obtained GANs in image generation under varying scenes. Enhancing the relation of hierarchical information in a generation network and enlarging differences of different network architectures can facilitate more structural information to improve the generation effect for image generation. In this paper, we propose an enhanced GAN via improving a generator for image generation (EIGGAN). EIGGAN applies a spatial attention to a generator to extract salient information to enhance the truthfulness… More >

  • Open Access

    ARTICLE

    Two Stages Segmentation Algorithm of Breast Tumor in DCE-MRI Based on Multi-Scale Feature and Boundary Attention Mechanism

    Bing Li1,2,*, Liangyu Wang1, Xia Liu1,2, Hongbin Fan1, Bo Wang3, Shoudi Tong1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1543-1561, 2024, DOI:10.32604/cmc.2024.052009

    Abstract Nuclear magnetic resonance imaging of breasts often presents complex backgrounds. Breast tumors exhibit varying sizes, uneven intensity, and indistinct boundaries. These characteristics can lead to challenges such as low accuracy and incorrect segmentation during tumor segmentation. Thus, we propose a two-stage breast tumor segmentation method leveraging multi-scale features and boundary attention mechanisms. Initially, the breast region of interest is extracted to isolate the breast area from surrounding tissues and organs. Subsequently, we devise a fusion network incorporating multi-scale features and boundary attention mechanisms for breast tumor segmentation. We incorporate multi-scale parallel dilated convolution modules into… More >

  • Open Access

    ARTICLE

    Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1457-1490, 2024, DOI:10.32604/cmc.2024.051996

    Abstract This study describes improving network security by implementing and assessing an intrusion detection system (IDS) based on deep neural networks (DNNs). The paper investigates contemporary technical ways for enhancing intrusion detection performance, given the vital relevance of safeguarding computer networks against harmful activity. The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset, a popular benchmark for IDS research. The model performs well in both the training and validation stages, with 91.30% training accuracy and 94.38% validation accuracy. Thus, the model shows good learning and generalization capabilities with minor losses of… More >

  • Open Access

    ARTICLE

    Detecting XSS with Random Forest and Multi-Channel Feature Extraction

    Qiurong Qin, Yueqin Li*, Yajie Mi, Jinhui Shen, Kexin Wu, Zhenzhao Wang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 843-874, 2024, DOI:10.32604/cmc.2024.051769

    Abstract In the era of the Internet, widely used web applications have become the target of hacker attacks because they contain a large amount of personal information. Among these vulnerabilities, stealing private data through cross-site scripting (XSS) attacks is one of the most commonly used attacks by hackers. Currently, deep learning-based XSS attack detection methods have good application prospects; however, they suffer from problems such as being prone to overfitting, a high false alarm rate, and low accuracy. To address these issues, we propose a multi-stage feature extraction and fusion model for XSS detection based on… More >

  • Open Access

    ARTICLE

    Learning Dual-Layer User Representation for Enhanced Item Recommendation

    Fuxi Zhu1, Jin Xie2,*, Mohammed Alshahrani3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 949-971, 2024, DOI:10.32604/cmc.2024.051046

    Abstract User representation learning is crucial for capturing different user preferences, but it is also critical challenging because user intentions are latent and dispersed in complex and different patterns of user-generated data, and thus cannot be measured directly. Text-based data models can learn user representations by mining latent semantics, which is beneficial to enhancing the semantic function of user representations. However, these technologies only extract common features in historical records and cannot represent changes in user intentions. However, sequential feature can express the user’s interests and intentions that change time by time. But the sequential recommendation… More >

  • Open Access

    ARTICLE

    Fully Completed Spherical Fuzzy Approach-Based Z Numbers (PHI Model) for Enhanced Group Expert Consensus

    Phi-Hung Nguyen*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1655-1675, 2024, DOI:10.32604/cmc.2024.050713

    Abstract This study aims to establish an expert consensus and enhance the efficacy of decision-making processes by integrating Spherical Fuzzy Sets (SFSs) and Z-Numbers (SFZs). A novel group expert consensus technique, the PHI model, is developed to address the inherent limitations of both SFSs and the traditional Delphi technique, particularly in uncertain, complex scenarios. In such contexts, the accuracy of expert knowledge and the confidence in their judgments are pivotal considerations. This study provides the fundamental operational principles and aggregation operators associated with SFSs and Z-numbers, encompassing weighted geometric and arithmetic operators alongside fully developed operators… More >

  • Open Access

    ARTICLE

    Enhanced Arithmetic Optimization Algorithm Guided by a Local Search for the Feature Selection Problem

    Sana Jawarneh*

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 511-525, 2024, DOI:10.32604/iasc.2024.047126

    Abstract High-dimensional datasets present significant challenges for classification tasks. Dimensionality reduction, a crucial aspect of data preprocessing, has gained substantial attention due to its ability to improve classification performance. However, identifying the optimal features within high-dimensional datasets remains a computationally demanding task, necessitating the use of efficient algorithms. This paper introduces the Arithmetic Optimization Algorithm (AOA), a novel approach for finding the optimal feature subset. AOA is specifically modified to address feature selection problems based on a transfer function. Additionally, two enhancements are incorporated into the AOA algorithm to overcome limitations such as limited precision, slow More >

  • Open Access

    ARTICLE

    FDSC-YOLOv8: Advancements in Automated Crack Identification for Enhanced Safety in Underground Engineering

    Rui Wang1, Zhihui Liu2,*, Hongdi Liu3, Baozhong Su4, Chuanyi Ma5

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3035-3049, 2024, DOI:10.32604/cmes.2024.050806

    Abstract In underground engineering, the detection of structural cracks on tunnel surfaces stands as a pivotal task in ensuring the health and reliability of tunnel structures. However, the dim and dusty environment inherent to underground engineering poses considerable challenges to crack segmentation. This paper proposes a crack segmentation algorithm termed as Focused Detection for Subsurface Cracks YOLOv8 (FDSC-YOLOv8) specifically designed for underground engineering structural surfaces. Firstly, to improve the extraction of multi-layer convolutional features, the fixed convolutional module is replaced with a deformable convolutional module. Secondly, the model’s receptive field is enhanced by introducing a multi-branch More >

  • Open Access

    ARTICLE

    Heat Transfer Enhancement of the Absorber Tube in a Parabolic Trough Solar Collector through the Insertion of Novel Cylindrical Turbulators

    Yasser Jebbar1,2,*, Fadhil Fluiful2, Wisam Khudhayer3

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.6, pp. 1279-1297, 2024, DOI:10.32604/fdmp.2024.050753

    Abstract This study includes an experimental and numerical analysis of the performances of a parabolic trough collector (PTC) with and without cylindrical turbulators. The PTC is designed with dimensions of 2.00 m in length and 1.00 m in width. The related reflector is made of lined sheets of aluminum, and the tubes are made of stainless steel used for the absorption of heat. They have an outer diameter of 0.051 m and a wall thickness of 0.002 m. Water, used as a heat transfer fluid (HTF), flows through the absorber tube at a mass flow rate… More >

Displaying 1-10 on page 1 of 576. Per Page