Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (74)
  • Open Access

    ARTICLE

    SGT-Net: A Transformer-Based Stratified Graph Convolutional Network for 3D Point Cloud Semantic Segmentation

    Suyi Liu1,*, Jianning Chi1, Chengdong Wu1, Fang Xu2,3,4, Xiaosheng Yu1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4471-4489, 2024, DOI:10.32604/cmc.2024.049450

    Abstract In recent years, semantic segmentation on 3D point cloud data has attracted much attention. Unlike 2D images where pixels distribute regularly in the image domain, 3D point clouds in non-Euclidean space are irregular and inherently sparse. Therefore, it is very difficult to extract long-range contexts and effectively aggregate local features for semantic segmentation in 3D point cloud space. Most current methods either focus on local feature aggregation or long-range context dependency, but fail to directly establish a global-local feature extractor to complete the point cloud semantic segmentation tasks. In this paper, we propose a Transformer-based… More >

  • Open Access

    ARTICLE

    Spatial and Contextual Path Network for Image Inpainting

    Dengyong Zhang1,2, Yuting Zhao1,2, Feng Li1,2, Arun Kumar Sangaiah3,4,*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 115-133, 2024, DOI:10.32604/iasc.2024.040847

    Abstract Image inpainting is a kind of use known area of information technology to repair the loss or damage to the area. Image feature extraction is the core of image restoration. Getting enough space for information and a larger receptive field is very important to realize high-precision image inpainting. However, in the process of feature extraction, it is difficult to meet the two requirements of obtaining sufficient spatial information and large receptive fields at the same time. In order to obtain more spatial information and a larger receptive field at the same time, we put forward… More >

  • Open Access

    ARTICLE

    Combo Packet: An Encryption Traffic Classification Method Based on Contextual Information

    Yuancong Chai, Yuefei Zhu*, Wei Lin, Ding Li

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1223-1243, 2024, DOI:10.32604/cmc.2024.049904

    Abstract With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has become a core key technology in network supervision. In recent years, many different solutions have emerged in this field. Most methods identify and classify traffic by extracting spatiotemporal characteristics of data flows or byte-level features of packets. However, due to changes in data transmission mediums, such as fiber optics and satellites, temporal features can exhibit significant variations due to changes in communication links and transmission quality. Additionally, partial spatial features can change due to reasons like data reordering and retransmission.… More >

  • Open Access

    ARTICLE

    MSC-YOLO: Improved YOLOv7 Based on Multi-Scale Spatial Context for Small Object Detection in UAV-View

    Xiangyan Tang1,2, Chengchun Ruan1,2,*, Xiulai Li2,3, Binbin Li1,2, Cebin Fu1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 983-1003, 2024, DOI:10.32604/cmc.2024.047541

    Abstract Accurately identifying small objects in high-resolution aerial images presents a complex and crucial task in the field of small object detection on unmanned aerial vehicles (UAVs). This task is challenging due to variations in UAV flight altitude, differences in object scales, as well as factors like flight speed and motion blur. To enhance the detection efficacy of small targets in drone aerial imagery, we propose an enhanced You Only Look Once version 7 (YOLOv7) algorithm based on multi-scale spatial context. We build the MSC-YOLO model, which incorporates an additional prediction head, denoted as P2, to… More >

  • Open Access

    ARTICLE

    An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

    Linlin Yuan1,2, Tiantian Zhang1,3, Yuling Chen1,*, Yuxiang Yang1, Huang Li1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1561-1579, 2024, DOI:10.32604/cmc.2023.046907

    Abstract The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’ privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based… More >

  • Open Access

    ARTICLE

    BCCLR: A Skeleton-Based Action Recognition with Graph Convolutional Network Combining Behavior Dependence and Context Clues

    Yunhe Wang1, Yuxin Xia2, Shuai Liu2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4489-4507, 2024, DOI:10.32604/cmc.2024.048813

    Abstract In recent years, skeleton-based action recognition has made great achievements in Computer Vision. A graph convolutional network (GCN) is effective for action recognition, modelling the human skeleton as a spatio-temporal graph. Most GCNs define the graph topology by physical relations of the human joints. However, this predefined graph ignores the spatial relationship between non-adjacent joint pairs in special actions and the behavior dependence between joint pairs, resulting in a low recognition rate for specific actions with implicit correlation between joint pairs. In addition, existing methods ignore the trend correlation between adjacent frames within an action… More >

  • Open Access

    ARTICLE

    Extraction et mise en contexte spatial des propositions relatives au transport dans le Grand Débat National

    Jacques Fize1, Lucile Sautot2, Martin Lentschat3, Laurence Dujourdy4, Ludovic Journaux5, Mohamed Hilal6

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 329-354, 2022, DOI:10.3166/RIG.31.329-354©2022

    Abstract Le Grand Débat National, lancé début 2019 par Emmanuel Macron, président de la République, pour répondre au mouvement social des « Gilets jaunes », a permis de collecter les contributions de citoyens sur la transition écologique via une plateforme en ligne. Dans cet article, nous exploitons le corpus constitué par ces contributions pour identifier des zones où les participants demandent le développement de pistes cyclables et d’équipements ferroviaires. Pour cela, nous avons créé un modèle de classification permettant d’identifier les contributions traitant de la thématique du transport et proposé une méthode d’extraction de contributions traduisant More >

  • Open Access

    ARTICLE

    Implementation of a solar model and shadow plotting in the context of a 2D GIS

    A validation based on radiometric measurements

    Thomas Leduc, Xenia Stavropulos-Laffaille, Ignacio Requena-Ruiz

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 241-263, 2022, DOI:10.3166/RIG.31.241-263©2022

    Abstract The adaptation of public spaces to episodes of intense heat is now a major challenge for cities. With this in mind, this article presents a contribution aimed at delineating and handling the shadows on the ground or in a horizontal plane at a given height, whether it comes from buildings, street furniture or the tree cover. After a comparison with shadows obtained via two reference tools, we present two urban sites that mix shadows of different origins and, in addition, different indicators. The results of the simulations are compared with pyranometric surveys carried out on More >

  • Open Access

    ARTICLE

    Towards Lessening Learners’ Aversive Emotions and Promoting Their Mental Health: Developing and Validating a Measurement of English Speaking Demotivation in the Chinese EFL Context

    Chili Li1, Xinxin Zhao2, Ziwen Pan3, Ting Yi4, Long Qian5,6,*

    International Journal of Mental Health Promotion, Vol.26, No.2, pp. 161-175, 2024, DOI:10.32604/ijmhp.2023.029896

    Abstract While a plethora of studies has been conducted to explore demotivation and its impact on mental health in second language (L2) education, scanty research focuses on demotivation in L2 speaking learning. Particularly, little research explores the measures to quantify L2 speaking demotivation. The present two-phase study attempts to develop and validate an English Speaking Demotivation Scale (ESDS). To this end, an independent sample of 207 Chinese tertiary learners of English as a Foreign Language (EFL) participated in the development phase, and another group of 188 Chinese EFL learners was recruited for the validation of the… More >

  • Open Access

    ARTICLE

    Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study

    Shahad Alzahrani1, Hatim Alsuwat2, Emad Alsuwat3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1635-1654, 2024, DOI:10.32604/cmes.2023.044718

    Abstract Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables. However, the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data streams. One of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks, wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their performance. In this research paper, we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning algorithms. Our framework… More >

Displaying 1-10 on page 1 of 74. Per Page