Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,640)
  • Open Access

    ARTICLE

    A Hybrid Feature Fusion Traffic Sign Detection Algorithm Based on YOLOv7

    Bingyi Ren1,4, Juwei Zhang2,3,4,*, Tong Wang2,4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1425-1440, 2024, DOI:10.32604/cmc.2024.052667

    Abstract Autonomous driving technology has entered a period of rapid development, and traffic sign detection is one of the important tasks. Existing target detection networks are difficult to adapt to scenarios where target sizes are seriously imbalanced, and traffic sign targets are small and have unclear features, which makes detection more difficult. Therefore, we propose a Hybrid Feature Fusion Traffic Sign detection algorithm based on YOLOv7 (HFFT-YOLO). First, a self-attention mechanism is incorporated at the end of the backbone network to calculate feature interactions within scales; Secondly, the cross-scale fusion part of the neck introduces a… More >

  • Open Access

    ARTICLE

    Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias

    Batyrkhan Omarov1,2,*, Meirzhan Baikuvekov1, Daniyar Sultan1, Nurzhan Mukazhanov3, Madina Suleimenova2, Maigul Zhekambayeva3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 341-359, 2024, DOI:10.32604/cmc.2024.052437

    Abstract This research introduces an innovative ensemble approach, combining Deep Residual Networks (ResNets) and Bidirectional Gated Recurrent Units (BiGRU), augmented with an Attention Mechanism, for the classification of heart arrhythmias. The escalating prevalence of cardiovascular diseases necessitates advanced diagnostic tools to enhance accuracy and efficiency. The model leverages the deep hierarchical feature extraction capabilities of ResNets, which are adept at identifying intricate patterns within electrocardiogram (ECG) data, while BiGRU layers capture the temporal dynamics essential for understanding the sequential nature of ECG signals. The integration of an Attention Mechanism refines the model’s focus on critical segments… More >

  • Open Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 195-215, 2024, DOI:10.32604/cmc.2024.052070

    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

  • Open Access

    ARTICLE

    Novel Fractal-Based Features for Low-Power Appliances in Non-Intrusive Load Monitoring

    Anam Mughees1,2,*, Muhammad Kamran1,3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 507-526, 2024, DOI:10.32604/cmc.2024.051820

    Abstract Non-intrusive load monitoring is a method that disaggregates the overall energy consumption of a building to estimate the electric power usage and operating status of each appliance individually. Prior studies have mostly concentrated on the identification of high-power appliances like HVAC systems while overlooking the existence of low-power appliances. Low-power consumer appliances have comparable power consumption patterns, which can complicate the detection task and can be mistaken as noise. This research tackles the problem of classification of low-power appliances and uses turn-on current transients to extract novel features and develop unique appliance signatures. A hybrid… More >

  • Open Access

    ARTICLE

    Generating Factual Text via Entailment Recognition Task

    Jinqiao Dai, Pengsen Cheng, Jiayong Liu*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 547-565, 2024, DOI:10.32604/cmc.2024.051745

    Abstract Generating diverse and factual text is challenging and is receiving increasing attention. By sampling from the latent space, variational autoencoder-based models have recently enhanced the diversity of generated text. However, existing research predominantly depends on summarization models to offer paragraph-level semantic information for enhancing factual correctness. The challenge lies in effectively generating factual text using sentence-level variational autoencoder-based models. In this paper, a novel model called fact-aware conditional variational autoencoder is proposed to balance the factual correctness and diversity of generated text. Specifically, our model encodes the input sentences and uses them as facts to… More >

  • Open Access

    ARTICLE

    A Gaussian Noise-Based Algorithm for Enhancing Backdoor Attacks

    Hong Huang, Yunfei Wang*, Guotao Yuan, Xin Li

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 361-387, 2024, DOI:10.32604/cmc.2024.051633

    Abstract Deep Neural Networks (DNNs) are integral to various aspects of modern life, enhancing work efficiency. Nonetheless, their susceptibility to diverse attack methods, including backdoor attacks, raises security concerns. We aim to investigate backdoor attack methods for image categorization tasks, to promote the development of DNN towards higher security. Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples, and the meticulous data screening by developers, hindering practical attack implementation. To overcome these challenges, this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation (GN-TUAP) algorithm. This approach… More >

  • Open Access

    ARTICLE

    A New Speed Limit Recognition Methodology Based on Ensemble Learning: Hardware Validation

    Mohamed Karray1,*, Nesrine Triki2,*, Mohamed Ksantini2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 119-138, 2024, DOI:10.32604/cmc.2024.051562

    Abstract Advanced Driver Assistance Systems (ADAS) technologies can assist drivers or be part of automatic driving systems to support the driving process and improve the level of safety and comfort on the road. Traffic Sign Recognition System (TSRS) is one of the most important components of ADAS. Among the challenges with TSRS is being able to recognize road signs with the highest accuracy and the shortest processing time. Accordingly, this paper introduces a new real time methodology recognizing Speed Limit Signs based on a trio of developed modules. Firstly, the Speed Limit Detection (SLD) module uses… More >

  • Open Access

    ARTICLE

    Cloud-Edge Collaborative Federated GAN Based Data Processing for IoT-Empowered Multi-Flow Integrated Energy Aggregation Dispatch

    Zhan Shi*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 973-994, 2024, DOI:10.32604/cmc.2024.051530

    Abstract The convergence of Internet of Things (IoT), 5G, and cloud collaboration offers tailored solutions to the rigorous demands of multi-flow integrated energy aggregation dispatch data processing. While generative adversarial networks (GANs) are instrumental in resource scheduling, their application in this domain is impeded by challenges such as convergence speed, inferior optimality searching capability, and the inability to learn from failed decision making feedbacks. Therefore, a cloud-edge collaborative federated GAN-based communication and computing resource scheduling algorithm with long-term constraint violation sensitiveness is proposed to address these challenges. The proposed algorithm facilitates real-time, energy-efficient data processing by More >

  • Open Access

    ARTICLE

    Pulmonary Edema and Pleural Effusion Detection Using EfficientNet-V1-B4 Architecture and AdamW Optimizer from Chest X-Rays Images

    Anas AbuKaraki1, Tawfi Alrawashdeh1, Sumaya Abusaleh1, Malek Zakarya Alksasbeh1,*, Bilal Alqudah1, Khalid Alemerien2, Hamzah Alshamaseen3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1055-1073, 2024, DOI:10.32604/cmc.2024.051420

    Abstract This paper presents a novel multiclass system designed to detect pleural effusion and pulmonary edema on chest X-ray images, addressing the critical need for early detection in healthcare. A new comprehensive dataset was formed by combining 28,309 samples from the ChestX-ray14, PadChest, and CheXpert databases, with 10,287, 6022, and 12,000 samples representing Pleural Effusion, Pulmonary Edema, and Normal cases, respectively. Consequently, the preprocessing step involves applying the Contrast Limited Adaptive Histogram Equalization (CLAHE) method to boost the local contrast of the X-ray samples, then resizing the images to 380 × 380 dimensions, followed by using the data… More >

  • Open Access

    ARTICLE

    Optimized Binary Neural Networks for Road Anomaly Detection: A TinyML Approach on Edge Devices

    Amna Khatoon1, Weixing Wang1,*, Asad Ullah2, Limin Li3,*, Mengfei Wang1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 527-546, 2024, DOI:10.32604/cmc.2024.051147

    Abstract Integrating Tiny Machine Learning (TinyML) with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level. Constrained devices efficiently implement a Binary Neural Network (BNN) for road feature extraction, utilizing quantization and compression through a pruning strategy. The modifications resulted in a 28-fold decrease in memory usage and a 25% enhancement in inference speed while only experiencing a 2.5% decrease in accuracy. It showcases its superiority over conventional detection algorithms in different road image scenarios. Although constrained by computer resources and training datasets, our results indicate opportunities for More >

Displaying 1-10 on page 1 of 3640. Per Page