Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (209)
  • Open Access

    ARTICLE

    An Artificial Intelligence-Based Framework for Fruits Disease Recognition Using Deep Learning

    Irfan Haider1, Muhammad Attique Khan1,*, Muhammad Nazir1, Taerang Kim2, Jae-Hyuk Cha2

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 529-554, 2024, DOI:10.32604/csse.2023.042080

    Abstract Fruit infections have an impact on both the yield and the quality of the crop. As a result, an automated recognition system for fruit leaf diseases is important. In artificial intelligence (AI) applications, especially in agriculture, deep learning shows promising disease detection and classification results. The recent AI-based techniques have a few challenges for fruit disease recognition, such as low-resolution images, small datasets for learning models, and irrelevant feature extraction. This work proposed a new fruit leaf leaf leaf disease recognition framework using deep learning features and improved pathfinder optimization. Three fruit types have been employed in this work for… More >

  • Open Access

    ARTICLE

    THERMO-HYDRAULICS OF TUBE BANKS WITH POROUS INTERCONNECTORS USING WATER AS COOLING FLUID

    P. V. Ramana, Arunn Narasimhan*, Dhiman Chatterjee

    Frontiers in Heat and Mass Transfer, Vol.3, No.2, pp. 1-6, 2012, DOI:10.5098/hmt.v3.2.3007

    Abstract The present experimental study investigates the effect of tube-to-tube porous interconnectors on the pressure drop and heat transfer (Nu) of tube banks. A copper wire mesh porous medium connects successive tubes of the in-line and staggered arrangement of six rows of tubes. The tubes are subjected to constant and uniform heat flux and cooled by forced convection using water as a cooling fluid in the laminar flow range (100 < ReDuct < 625). The inline configuration with the tube-to-tube porous medium inter-connectors provides marginal enhancement of heat transfer and 12% reduction in the pressure drop penalty respectively, compared to tube… More >

  • Open Access

    ARTICLE

    Generative Multi-Modal Mutual Enhancement Video Semantic Communications

    Yuanle Chen1, Haobo Wang1, Chunyu Liu1, Linyi Wang2, Jiaxin Liu1, Wei Wu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2985-3009, 2024, DOI:10.32604/cmes.2023.046837

    Abstract Recently, there have been significant advancements in the study of semantic communication in single-modal scenarios. However, the ability to process information in multi-modal environments remains limited. Inspired by the research and applications of natural language processing across different modalities, our goal is to accurately extract frame-level semantic information from videos and ultimately transmit high-quality videos. Specifically, we propose a deep learning-based Multi-Modal Mutual Enhancement Video Semantic Communication system, called M3E-VSC. Built upon a Vector Quantized Generative Adversarial Network (VQGAN), our system aims to leverage mutual enhancement among different modalities by using text as the main carrier of transmission. With it,… More >

  • Open Access

    ARTICLE

    Recommendation Method for Contrastive Enhancement of Neighborhood Information

    Hairong Wang, Beijing Zhou*, Lisi Zhang, He Ma

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 453-472, 2024, DOI:10.32604/cmc.2023.046560

    Abstract Knowledge graph can assist in improving recommendation performance and is widely applied in various personalized recommendation domains. However, existing knowledge-aware recommendation methods face challenges such as weak user-item interaction supervisory signals and noise in the knowledge graph. To tackle these issues, this paper proposes a neighbor information contrast-enhanced recommendation method by adding subtle noise to construct contrast views and employing contrastive learning to strengthen supervisory signals and reduce knowledge noise. Specifically, first, this paper adopts heterogeneous propagation and knowledge-aware attention networks to obtain multi-order neighbor embedding of users and items, mining the high-order neighbor information of users and items. Next,… More >

  • Open Access

    ARTICLE

    A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN

    Haizhen Wang1,2,*, Jinying Yan1,*, Na Jia1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 569-588, 2024, DOI:10.32604/cmc.2023.046055

    Abstract Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured content. The extraction of encrypted traffic attributes and their subsequent identification presents a formidable challenge. The existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets, with the dataset’s imbalance significantly affecting the model’s performance. In the present study, a new model, referred to as UD-VLD (Unbalanced Dataset-VAE-LSTM-DRN), was proposed to address above problem. The proposed model is an encrypted traffic identification model for handling unbalanced datasets. The encoder of the variational autoencoder (VAE) is combined… More >

  • Open Access

    ARTICLE

    ProNet Adaptive Retinal Vessel Segmentation Algorithm Based on Improved UperNet Network

    Sijia Zhu1,*, Pinxiu Wang2, Ke Shen1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 283-302, 2024, DOI:10.32604/cmc.2023.045506

    Abstract This paper proposes a new network structure, namely the ProNet network. Retinal medical image segmentation can help clinical diagnosis of related eye diseases and is essential for subsequent rational treatment. The baseline model of the ProNet network is UperNet (Unified perceptual parsing Network), and the backbone network is ConvNext (Convolutional Network). A network structure based on depth-separable convolution and 1 × 1 convolution is used, which has good performance and robustness. We further optimise ProNet mainly in two aspects. One is data enhancement using increased noise and slight angle rotation, which can significantly increase the diversity of data and help… More >

  • Open Access

    ARTICLE

    Tubular Heat Enhancement Using Twisted Tape Inserts with Large Holes

    Ali Jaber Abdulhamed*, Aws Al-Akam, Wisam J. Khudhayer, Ali Sabri Allw

    Energy Engineering, Vol.121, No.2, pp. 273-290, 2024, DOI:10.32604/ee.2023.045583

    Abstract Heat augmentation techniques play a vital role in the heating and cooling processes in industries, including solar collectors and many applications that utilize heat exchangers. Several studies are based on inserting fillers inside the tubes to enhance heat transfer. This investigation considered the effects of twisted tapes with large holes on a tubular heat exchanger’s (HX) heat transmission, pressure drop, and thermal boosting factor. In the experimental section, counter-swirl flow generators used twisted tapes with pairs of 1.0 cm-diameter holes and changes in porosity (Rp) at 1.30% and 2.70%. In the experiments, air was utilized as a working fluid in… More >

  • Open Access

    ARTICLE

    Infrared Small Target Detection Algorithm Based on ISTD-CenterNet

    Ning Li*, Shucai Huang, Daozhi Wei

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3511-3531, 2023, DOI:10.32604/cmc.2023.045987

    Abstract This paper proposes a real-time detection method to improve the Infrared small target detection CenterNet (ISTD-CenterNet) network for detecting small infrared targets in complex environments. The method eliminates the need for an anchor frame, addressing the issues of low accuracy and slow speed. HRNet is used as the framework for feature extraction, and an ECBAM attention module is added to each stage branch for intelligent identification of the positions of small targets and significant objects. A scale enhancement module is also added to obtain a high-level semantic representation and fine-resolution prediction map for the entire infrared image. Besides, an improved… More >

  • Open Access

    ARTICLE

    A Fusion of Residual Blocks and Stack Auto Encoder Features for Stomach Cancer Classification

    Abdul Haseeb1, Muhammad Attique Khan2,*, Majed Alhaisoni3, Ghadah Aldehim4, Leila Jamel4, Usman Tariq5, Taerang Kim6, Jae-Hyuk Cha6

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3895-3920, 2023, DOI:10.32604/cmc.2023.045244

    Abstract Diagnosing gastrointestinal cancer by classical means is a hazardous procedure. Years have witnessed several computerized solutions for stomach disease detection and classification. However, the existing techniques faced challenges, such as irrelevant feature extraction, high similarity among different disease symptoms, and the least-important features from a single source. This paper designed a new deep learning-based architecture based on the fusion of two models, Residual blocks and Auto Encoder. First, the Hyper-Kvasir dataset was employed to evaluate the proposed work. The research selected a pre-trained convolutional neural network (CNN) model and improved it with several residual blocks. This process aims to improve… More >

  • Open Access

    ARTICLE

    The Detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement

    Xuanchen Zhou1,2,3, Wenzhong Yang2,3,*, Liejun Wang2,3, Fuyuan Wei2,3, KeZiErBieKe HaiLaTi2,3, Yuanyuan Liao2,3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 4073-4087, 2023, DOI:10.32604/cmc.2023.040253

    Abstract With the increasing popularity of Ethereum, smart contracts have become a prime target for fraudulent activities such as Ponzi, honeypot, gambling, and phishing schemes. While some researchers have studied intelligent fraud detection, most research has focused on identifying Ponzi contracts, with little attention given to detecting and preventing gambling or phishing contracts. There are three main issues with current research. Firstly, there exists a severe data imbalance between fraudulent and non-fraudulent contracts. Secondly, the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts. Lastly, most prior studies have used… More >

Displaying 11-20 on page 2 of 209. Per Page