Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (250)
  • Open Access

    ARTICLE

    MSADCN: Multi-Scale Attentional Densely Connected Network for Automated Bone Age Assessment

    Yanjun Yu1, Lei Yu1,*, Huiqi Wang2, Haodong Zheng1, Yi Deng1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2225-2243, 2024, DOI:10.32604/cmc.2024.047641

    Abstract Bone age assessment (BAA) helps doctors determine how a child’s bones grow and develop in clinical medicine. Traditional BAA methods rely on clinician expertise, leading to time-consuming predictions and inaccurate results. Most deep learning-based BAA methods feed the extracted critical points of images into the network by providing additional annotations. This operation is costly and subjective. To address these problems, we propose a multi-scale attentional densely connected network (MSADCN) in this paper. MSADCN constructs a multi-scale dense connectivity mechanism, which can avoid overfitting, obtain the local features effectively and prevent gradient vanishing even in limited training data. First, MSADCN designs… More >

  • Open Access

    ARTICLE

    Social Robot Detection Method with Improved Graph Neural Networks

    Zhenhua Yu, Liangxue Bai, Ou Ye*, Xuya Cong

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1773-1795, 2024, DOI:10.32604/cmc.2023.047130

    Abstract Social robot accounts controlled by artificial intelligence or humans are active in social networks, bringing negative impacts to network security and social life. Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships, which makes it difficult to accurately describe the difference between the topological relations of nodes, resulting in low detection accuracy of social robots. This paper proposes a social robot detection method with the use of an improved neural network. First, social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social… More >

  • Open Access

    ARTICLE

    Learning Epipolar Line Window Attention for Stereo Image Super-Resolution Reconstruction

    Xue Li, Hongying Zhang*, Zixun Ye, Xiaoru Huang

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2847-2864, 2024, DOI:10.32604/cmc.2024.047093

    Abstract Transformer-based stereo image super-resolution reconstruction (Stereo SR) methods have significantly improved image quality. However, existing methods have deficiencies in paying attention to detailed features and do not consider the offset of pixels along the epipolar lines in complementary views when integrating stereo information. To address these challenges, this paper introduces a novel epipolar line window attention stereo image super-resolution network (EWASSR). For detail feature restoration, we design a feature extractor based on Transformer and convolutional neural network (CNN), which consists of (shifted) window-based self-attention ((S)W-MSA) and feature distillation and enhancement blocks (FDEB). This combination effectively solves the problem of global… More >

  • Open Access

    ARTICLE

    An Underwater Target Detection Algorithm Based on Attention Mechanism and Improved YOLOv7

    Liqiu Ren, Zhanying Li*, Xueyu He, Lingyan Kong, Yinghao Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2829-2845, 2024, DOI:10.32604/cmc.2024.047028

    Abstract For underwater robots in the process of performing target detection tasks, the color distortion and the uneven quality of underwater images lead to great difficulties in the feature extraction process of the model, which is prone to issues like error detection, omission detection, and poor accuracy. Therefore, this paper proposed the CER-YOLOv7(CBAM-EIOU-RepVGG-YOLOv7) underwater target detection algorithm. To improve the algorithm’s capability to retain valid features from both spatial and channel perspectives during the feature extraction phase, we have added a Convolutional Block Attention Module (CBAM) to the backbone network. The Reparameterization Visual Geometry Group (RepVGG) module is inserted into the… More >

  • Open Access

    ARTICLE

    Attention Guided Multi Scale Feature Fusion Network for Automatic Prostate Segmentation

    Yuchun Li1,4, Mengxing Huang1,*, Yu Zhang2, Zhiming Bai3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1649-1668, 2024, DOI:10.32604/cmc.2023.046883

    Abstract The precise and automatic segmentation of prostate magnetic resonance imaging (MRI) images is vital for assisting doctors in diagnosing prostate diseases. In recent years, many advanced methods have been applied to prostate segmentation, but due to the variability caused by prostate diseases, automatic segmentation of the prostate presents significant challenges. In this paper, we propose an attention-guided multi-scale feature fusion network (AGMSF-Net) to segment prostate MRI images. We propose an attention mechanism for extracting multi-scale features, and introduce a 3D transformer module to enhance global feature representation by adding it during the transition phase from encoder to decoder. In the… More >

  • Open Access

    ARTICLE

    Multilevel Attention Unet Segmentation Algorithm for Lung Cancer Based on CT Images

    Huan Wang1, Shi Qiu1,2,*, Benyue Zhang1, Lixuan Xiao3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1569-1589, 2024, DOI:10.32604/cmc.2023.046821

    Abstract Lung cancer is a malady of the lungs that gravely jeopardizes human health. Therefore, early detection and treatment are paramount for the preservation of human life. Lung computed tomography (CT) image sequences can explicitly delineate the pathological condition of the lungs. To meet the imperative for accurate diagnosis by physicians, expeditious segmentation of the region harboring lung cancer is of utmost significance. We utilize computer-aided methods to emulate the diagnostic process in which physicians concentrate on lung cancer in a sequential manner, erect an interpretable model, and attain segmentation of lung cancer. The specific advancements can be encapsulated as follows:… More >

  • Open Access

    ARTICLE

    Detection Algorithm of Laboratory Personnel Irregularities Based on Improved YOLOv7

    Yongliang Yang, Linghua Xu*, Maolin Luo, Xiao Wang, Min Cao

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2741-2765, 2024, DOI:10.32604/cmc.2024.046768

    Abstract Due to the complex environment of the university laboratory, personnel flow intensive, personnel irregular behavior is easy to cause security risks. Monitoring using mainstream detection algorithms suffers from low detection accuracy and slow speed. Therefore, the current management of personnel behavior mainly relies on institutional constraints, education and training, on-site supervision, etc., which is time-consuming and ineffective. Given the above situation, this paper proposes an improved You Only Look Once version 7 (YOLOv7) to achieve the purpose of quickly detecting irregular behaviors of laboratory personnel while ensuring high detection accuracy. First, to better capture the shape features of the target,… More >

  • Open Access

    ARTICLE

    Strengthening Network Security: Deep Learning Models for Intrusion Detection with Optimized Feature Subset and Effective Imbalance Handling

    Bayi Xu1, Lei Sun2,*, Xiuqing Mao2, Chengwei Liu3, Zhiyi Ding2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1995-2022, 2024, DOI:10.32604/cmc.2023.046478

    Abstract In recent years, frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security. This paper presents a novel intrusion detection system consisting of a data preprocessing stage and a deep learning model for accurately identifying network attacks. We have proposed four deep neural network models, which are constructed using architectures such as Convolutional Neural Networks (CNN), Bi-directional Long Short-Term Memory (BiLSTM), Bidirectional Gate Recurrent Unit (BiGRU), and Attention mechanism. These models have been evaluated for their detection performance on the NSL-KDD dataset.To enhance the compatibility between the data and the models, we apply various preprocessing… More >

  • Open Access

    ARTICLE

    A Method for Detecting and Recognizing Yi Character Based on Deep Learning

    Haipeng Sun1,2, Xueyan Ding1,2,*, Jian Sun1,2, Hua Yu3, Jianxin Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2721-2739, 2024, DOI:10.32604/cmc.2024.046449

    Abstract Aiming at the challenges associated with the absence of a labeled dataset for Yi characters and the complexity of Yi character detection and recognition, we present a deep learning-based approach for Yi character detection and recognition. In the detection stage, an improved Differentiable Binarization Network (DBNet) framework is introduced to detect Yi characters, in which the Omni-dimensional Dynamic Convolution (ODConv) is combined with the ResNet-18 feature extraction module to obtain multi-dimensional complementary features, thereby improving the accuracy of Yi character detection. Then, the feature pyramid network fusion module is used to further extract Yi character image features, improving target recognition… More >

  • Open Access

    ARTICLE

    Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction

    Bin Luo1,2,3, Liangguo Chen1,2,3, Shuhua Ruan1,2,3,*, Yonggang Luo2,3,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1731-1754, 2024, DOI:10.32604/cmc.2023.045739

    Abstract Considering the stealthiness and persistence of Advanced Persistent Threats (APTs), system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a host. Rule-based provenance graph APT detection approaches require elaborate rules and cannot detect unknown attacks, and existing learning-based approaches are limited by the lack of available APT attack samples or generally only perform graph-level anomaly detection, which requires lots of manual efforts to locate attack entities. This paper proposes an APT-exploited process detection approach called ThreatSniffer, which constructs the benign provenance graph from attack-free audit logs, fits normal system entity… More >

Displaying 11-20 on page 2 of 250. Per Page