Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (463)
  • Open Access

    REVIEW

    Structural Modal Parameter Recognition and Related Damage Identification Methods under Environmental Excitations: A Review

    Chao Zhang1, Shang-Xi Lai1, Hua-Ping Wang1,2,*

    Structural Durability & Health Monitoring, Vol.19, No.1, pp. 25-54, 2025, DOI:10.32604/sdhm.2024.053662 - 15 November 2024

    Abstract Modal parameters can accurately characterize the structural dynamic properties and assess the physical state of the structure. Therefore, it is particularly significant to identify the structural modal parameters according to the monitoring data information in the structural health monitoring (SHM) system, so as to provide a scientific basis for structural damage identification and dynamic model modification. In view of this, this paper reviews methods for identifying structural modal parameters under environmental excitation and briefly describes how to identify structural damages based on the derived modal parameters. The paper primarily introduces data-driven modal parameter recognition methods… More >

  • Open Access

    REVIEW

    AI-Driven Pattern Recognition in Medicinal Plants: A Comprehensive Review and Comparative Analysis

    Mohd Asif Hajam1, Tasleem Arif1, Akib Mohi Ud Din Khanday2, Mudasir Ahmad Wani3,*, Muhammad Asim3,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2077-2131, 2024, DOI:10.32604/cmc.2024.057136 - 18 November 2024

    Abstract The pharmaceutical industry increasingly values medicinal plants due to their perceived safety and cost-effectiveness compared to modern drugs. Throughout the extensive history of medicinal plant usage, various plant parts, including flowers, leaves, and roots, have been acknowledged for their healing properties and employed in plant identification. Leaf images, however, stand out as the preferred and easily accessible source of information. Manual plant identification by plant taxonomists is intricate, time-consuming, and prone to errors, relying heavily on human perception. Artificial intelligence (AI) techniques offer a solution by automating plant recognition processes. This study thoroughly examines cutting-edge… More >

  • Open Access

    ARTICLE

    DC-FIPD: Fraudulent IP Identification Method Based on Homology Detection

    Yuanyuan Ma1, Ang Chen1, Cunzhi Hou1, Ruixia Jin2, Jinghui Zhang1, Ruixiang Li3,4,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3301-3323, 2024, DOI:10.32604/cmc.2024.056854 - 18 November 2024

    Abstract Currently, telecom fraud is expanding from the traditional telephone network to the Internet, and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights. However, existing telecom fraud identification methods based on blacklists, reputation, content and behavioral characteristics have good identification performance in the telephone network, but it is difficult to apply to the Internet where IP (Internet Protocol) addresses change dynamically. To address this issue, we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise) clustering (DC-FIPD). First, we… More >

  • Open Access

    ARTICLE

    Identification of M2 macrophage-related genes for establishing a prognostic model in pancreatic cancer: FCGR3A as key gene

    ZHEN WANG1, JUN FU1, SAISAI ZHU1, HAODONG TANG2, KUI SHI1, JIHUA YANG3, MENG WANG3, MENGGE WU1, DUNFENG QI1,*

    Oncology Research, Vol.32, No.12, pp. 1851-1866, 2024, DOI:10.32604/or.2024.055286 - 13 November 2024

    Abstract Background: Pancreatic ductal adenocarcinoma (PDAC) has a rich and complex tumor immune microenvironment (TIME). M2 macrophages are among the most extensively infiltrated immune cells in the TIME and are necessary for the growth and migration of cancers. However, the mechanisms and targets mediating M2 macrophage infiltration in pancreatic cancer remain elusive. Methods: The M2 macrophage infiltration score of patients was assessed using the xCell algorithm. Using weighted gene co-expression network analysis (WGCNA), module genes associated with M2 macrophages were identified, and a predictive model was designed. The variations in immunological cell patterns, cancer mutations, and… More > Graphic Abstract

    Identification of M2 macrophage-related genes for establishing a prognostic model in pancreatic cancer: <i>FCGR3A</i> as key gene

  • Open Access

    PROCEEDINGS

    Identification of the Anisotropic Thermal-Mechanical Properties of Sheet Metals Using the Virtual Fields Method

    Jiawei Fu1,2,*, Yahui Cai1, Bowen Zhang1, Zengxiang Qi1, Lehua Qi1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.4, pp. 1-1, 2024, DOI:10.32604/icces.2024.013007

    Abstract The accurate characterization of the anisotropic thermal-mechanical constitutive properties of structural sheet metals at elevated temperatures and under nonuniform stress/strain states is crucial for the precise hot plastic forming and structural behavior evaluation of an engineering sheet part. Traditional thermal-mechanical testing methods rely on the assumption of states homogeneity, leading to a large number of tests required for the characterization of material anisotropy and nonlinearity at various high temperatures. In this work, a highly efficient identification method is proposed that allows the simultaneous characterization of the anisotropic yielding, strain hardening and elasto-plasticity thermal softening material More >

  • Open Access

    ARTICLE

    Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption

    Chan Hyeong Cho, Hyun Min Song*, Taek-Young Youn*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 1911-1931, 2024, DOI:10.32604/cmes.2024.053430 - 31 October 2024

    Abstract With the advancement of video recording devices and network infrastructure, we use surveillance cameras to protect our valuable assets. This paper proposes a novel system for encrypting personal information within recorded surveillance videos to enhance efficiency and security. The proposed method leverages Dlib’s CNN-based facial recognition technology to identify Regions of Interest (ROIs) within the video, linking these ROIs to generate unique IDs. These IDs are then combined with a master key to create entity-specific keys, which are used to encrypt the ROIs within the video. This system supports selective decryption, effectively protecting personal information More >

  • Open Access

    ARTICLE

    Arabic Dialect Identification in Social Media: A Comparative Study of Deep Learning and Transformer Approaches

    Enas Yahya Alqulaity1, Wael M.S. Yafooz1,*, Abdullah Alourani2, Ayman Jaradat3

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 907-928, 2024, DOI:10.32604/iasc.2024.055470 - 31 October 2024

    Abstract Arabic dialect identification is essential in Natural Language Processing (NLP) and forms a critical component of applications such as machine translation, sentiment analysis, and cross-language text generation. The difficulties in differentiating between Arabic dialects have garnered more attention in the last 10 years, particularly in social media. These difficulties result from the overlapping vocabulary of the dialects, the fluidity of online language use, and the difficulties in telling apart dialects that are closely related. Managing dialects with limited resources and adjusting to the ever-changing linguistic trends on social media platforms present additional challenges. A strong… More >

  • Open Access

    ARTICLE

    An Efficient Long Short-Term Memory and Gated Recurrent Unit Based Smart Vessel Trajectory Prediction Using Automatic Identification System Data

    Umar Zaman1, Junaid Khan2, Eunkyu Lee1,3, Sajjad Hussain4, Awatef Salim Balobaid5, Rua Yahya Aburasain5, Kyungsup Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1789-1808, 2024, DOI:10.32604/cmc.2024.056222 - 15 October 2024

    Abstract Maritime transportation, a cornerstone of global trade, faces increasing safety challenges due to growing sea traffic volumes. This study proposes a novel approach to vessel trajectory prediction utilizing Automatic Identification System (AIS) data and advanced deep learning models, including Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), Bidirectional LSTM (DBLSTM), Simple Recurrent Neural Network (SimpleRNN), and Kalman Filtering. The research implemented rigorous AIS data preprocessing, encompassing record deduplication, noise elimination, stationary simplification, and removal of insignificant trajectories. Models were trained using key navigational parameters: latitude, longitude, speed, and heading. Spatiotemporal aware processing through trajectory segmentation… More >

  • Open Access

    REVIEW

    Digital Image Steganographer Identification: A Comprehensive Survey

    Qianqian Zhang1,2,3, Yi Zhang1,2, Yuanyuan Ma3, Yanmei Liu1,2, Xiangyang Luo1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 105-131, 2024, DOI:10.32604/cmc.2024.055735 - 15 October 2024

    Abstract The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse. Identifying steganographer is essential in tracing secret information origins and preventing illicit covert communication online. Accurately discerning a steganographer from many normal users is challenging due to various factors, such as the complexity in obtaining the steganography algorithm, extracting highly separability features, and modeling the cover data. After extensive exploration, several methods have been proposed for steganographer identification. This paper presents a survey of existing studies. Firstly, we provide a concise introduction to the More >

  • Open Access

    REVIEW

    Exploring Frontier Technologies in Video-Based Person Re-Identification: A Survey on Deep Learning Approach

    Jiahe Wang1, Xizhan Gao1,*, Fa Zhu2, Xingchi Chen3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 25-51, 2024, DOI:10.32604/cmc.2024.054895 - 15 October 2024

    Abstract Video-based person re-identification (Re-ID), a subset of retrieval tasks, faces challenges like uncoordinated sample capturing, viewpoint variations, occlusions, cluttered backgrounds, and sequence uncertainties. Recent advancements in deep learning have significantly improved video-based person Re-ID, laying a solid foundation for further progress in the field. In order to enrich researchers’ insights into the latest research findings and prospective developments, we offer an extensive overview and meticulous analysis of contemporary video-based person Re-ID methodologies, with a specific emphasis on network architecture design and loss function design. Firstly, we introduce methods based on network architecture design and loss… More >

Displaying 1-10 on page 1 of 463. Per Page