Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    Lightweight Airborne Vision Abnormal Behavior Detection Algorithm Based on Dual-Path Feature Optimization

    Baixuan Han1, Yueping Peng1,*, Zecong Ye2, Hexiang Hao1, Xuekai Zhang1, Wei Tang1, Wenchao Kang1, Qilong Li1

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.071071 - 09 December 2025

    Abstract Aiming at the problem of imbalance between detection accuracy and algorithm model lightweight in UAV aerial image target detection algorithm, a lightweight multi-category abnormal behavior detection algorithm based on improved YOLOv11n is designed. By integrating multi-head grouped self-attention mechanism and Partial-Conv, a two-way feature grouping fusion module (DFPF) was designed, which carried out effective channel segmentation and fusion strategies to reduce redundant calculations and memory access. C3K2 module was improved, and then unstructured pruning and feature distillation technology were used. The algorithm model is lightweight, and the feature extraction ability for airborne visual abnormal behavior… More >

  • Open Access

    ARTICLE

    A Lightweight Multimodal Deep Fusion Network for Face Antis Poofing with Cross-Axial Attention and Deep Reinforcement Learning Technique

    Diyar Wirya Omar Ameenulhakeem*, Osman Nuri Uçan

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5671-5702, 2025, DOI:10.32604/cmc.2025.070422 - 23 October 2025

    Abstract Face antispoofing has received a lot of attention because it plays a role in strengthening the security of face recognition systems. Face recognition is commonly used for authentication in surveillance applications. However, attackers try to compromise these systems by using spoofing techniques such as using photos or videos of users to gain access to services or information. Many existing methods for face spoofing face difficulties when dealing with new scenarios, especially when there are variations in background, lighting, and other environmental factors. Recent advancements in deep learning with multi-modality methods have shown their effectiveness in… More >

  • Open Access

    ARTICLE

    Cyclical Training Framework with Graph Feature Optimization for Knowledge Graph Reasoning

    Xiaotong Han1,2, Yunqi Jiang2,3, Haitao Wang1,2, Yuan Tian1,2,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1951-1971, 2025, DOI:10.32604/cmc.2025.060134 - 16 April 2025

    Abstract Knowledge graphs (KGs), which organize real-world knowledge in triples, often suffer from issues of incompleteness. To address this, multi-hop knowledge graph reasoning (KGR) methods have been proposed for interpretable knowledge graph completion. The primary approaches to KGR can be broadly classified into two categories: reinforcement learning (RL)-based methods and sequence-to-sequence (seq2seq)-based methods. While each method has its own distinct advantages, they also come with inherent limitations. To leverage the strengths of each method while addressing their weaknesses, we propose a cyclical training method that alternates for several loops between the seq2seq training phase and the… More >

  • Open Access

    ARTICLE

    Improved Leaf Chlorophyll Content Estimation with Deep Learning and Feature Optimization Using Hyperspectral Measurements

    Xianfeng Zhou1,2,*, Ruiju Sun1, Zhaojie Zhang1, Yuanyuan Song1, Lijiao Jin1, Lin Yuan3

    Phyton-International Journal of Experimental Botany, Vol.94, No.2, pp. 503-519, 2025, DOI:10.32604/phyton.2025.060827 - 06 March 2025

    Abstract An accurate and robust estimation of leaf chlorophyll content (LCC) is very important to better know the process of material and energy exchange between plants and the environment. Compared with traditional remote sensing methods, abundant research has made progress in agronomic parameter retrieval using different CNN frameworks. Nevertheless, limited reports have paid attention to the problems, i.e., limited measured data, hyperspectral redundancy, and model convergence issues, when concerning CNN models for parameter estimation. Therefore, the present study tried to analyze the effects of synthetic data size expansion employing a Gaussian process regression (GPR) model for… More >

  • Open Access

    ARTICLE

    Salient Object Detection Based on Multi-Strategy Feature Optimization

    Libo Han1,2, Sha Tao1,2, Wen Xia3, Weixin Sun3, Li Yan3, Wanlin Gao1,2,3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2431-2449, 2025, DOI:10.32604/cmc.2024.057833 - 17 February 2025

    Abstract At present, salient object detection (SOD) has achieved considerable progress. However, the methods that perform well still face the issue of inadequate detection accuracy. For example, sometimes there are problems of missed and false detections. Effectively optimizing features to capture key information and better integrating different levels of features to enhance their complementarity are two significant challenges in the domain of SOD. In response to these challenges, this study proposes a novel SOD method based on multi-strategy feature optimization. We propose the multi-size feature extraction module (MSFEM), which uses the attention mechanism, the multi-level feature… More >

  • Open Access

    ARTICLE

    Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System

    Abdullah Alabdulatif1, Navod Neranjan Thilakarathne2,*, Mohamed Aashiq3,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3655-3683, 2024, DOI:10.32604/cmc.2024.054610 - 12 September 2024

    Abstract The increasing prevalence of Internet of Things (IoT) devices has introduced a new phase of connectivity in recent years and, concurrently, has opened the floodgates for growing cyber threats. Among the myriad of potential attacks, Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic. As IoT devices often lack the inherent security measures found in more mature computing platforms, the need for robust DoS/DDoS detection systems tailored to IoT is paramount for… More >

  • Open Access

    ARTICLE

    An Automated Classification Technique for COVID-19 Using Optimized Deep Learning Features

    Ejaz Khan1, Muhammad Zia Ur Rehman2, Fawad Ahmed3, Suliman A. Alsuhibany4,*, Muhammad Zulfiqar Ali5, Jawad Ahmad6

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3799-3814, 2023, DOI:10.32604/csse.2023.037131 - 03 April 2023

    Abstract In 2020, COVID-19 started spreading throughout the world. This deadly infection was identified as a virus that may affect the lungs and, in severe cases, could be the cause of death. The polymerase chain reaction (PCR) test is commonly used to detect this virus through the nasal passage or throat. However, the PCR test exposes health workers to this deadly virus. To limit human exposure while detecting COVID-19, image processing techniques using deep learning have been successfully applied. In this paper, a strategy based on deep learning is employed to classify the COVID-19 virus. To… More >

  • Open Access

    ARTICLE

    A Novel Efficient Patient Monitoring FER System Using Optimal DL-Features

    Mousa Alhajlah*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6161-6175, 2023, DOI:10.32604/cmc.2023.032505 - 28 December 2022

    Abstract Automated Facial Expression Recognition (FER) serves as the backbone of patient monitoring systems, security, and surveillance systems. Real-time FER is a challenging task, due to the uncontrolled nature of the environment and poor quality of input frames. In this paper, a novel FER framework has been proposed for patient monitoring. Preprocessing is performed using contrast-limited adaptive enhancement and the dataset is balanced using augmentation. Two lightweight efficient Convolution Neural Network (CNN) models MobileNetV2 and Neural search Architecture Network Mobile (NasNetMobile) are trained, and feature vectors are extracted. The Whale Optimization Algorithm (WOA) is utilized to More >

  • Open Access

    ARTICLE

    Plant Identification Using Fitness-Based Position Update in Whale Optimization Algorithm

    Ayman Altameem1, Sandeep Kumar2, Ramesh Chandra Poonia3, Abdul Khader Jilani Saudagar4,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4719-4736, 2022, DOI:10.32604/cmc.2022.022177 - 14 January 2022

    Abstract Since the beginning of time, humans have relied on plants for food, energy, and medicine. Plants are recognized by leaf, flower, or fruit and linked to their suitable cluster. Classification methods are used to extract and select traits that are helpful in identifying a plant. In plant leaf image categorization, each plant is assigned a label according to its classification. The purpose of classifying plant leaf images is to enable farmers to recognize plants, leading to the management of plants in several aspects. This study aims to present a modified whale optimization algorithm and categorizes More >

  • Open Access

    ARTICLE

    Hybrid Active Contour Mammographic Mass Segmentation and Classification

    K. Yuvaraj*, U. S. Ragupathy

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 823-834, 2022, DOI:10.32604/csse.2022.018837 - 24 September 2021

    Abstract This research implements a novel segmentation of mammographic mass. Three methods are proposed, namely, segmentation of mass based on iterative active contour, automatic region growing, and fully automatic mask selection-based active contour techniques. In the first method, iterative threshold is performed for manual cropped preprocessed image, and active contour is applied thereafter. To overcome manual cropping in the second method, an automatic seed selection followed by region growing is performed. Given that the result is only a few images owing to over segmentation, the third method uses a fully automatic active contour. Results of the… More >

Displaying 1-10 on page 1 of 11. Per Page