Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (310)
  • Open Access

    ARTICLE

    A Hand Features Based Fusion Recognition Network with Enhancing Multi-Modal Correlation

    Wei Wu*, Yuan Zhang, Yunpeng Li, Chuanyang Li, Yan Hao

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 537-555, 2024, DOI:10.32604/cmes.2024.049174

    Abstract Fusing hand-based features in multi-modal biometric recognition enhances anti-spoofing capabilities. Additionally, it leverages inter-modal correlation to enhance recognition performance. Concurrently, the robustness and recognition performance of the system can be enhanced through judiciously leveraging the correlation among multimodal features. Nevertheless, two issues persist in multi-modal feature fusion recognition: Firstly, the enhancement of recognition performance in fusion recognition has not comprehensively considered the inter-modality correlations among distinct modalities. Secondly, during modal fusion, improper weight selection diminishes the salience of crucial modal features, thereby diminishing the overall recognition performance. To address these two issues, we introduce an enhanced DenseNet multimodal recognition network… More > Graphic Abstract

    A Hand Features Based Fusion Recognition Network with Enhancing Multi-Modal Correlation

  • Open Access

    ARTICLE

    Aerodynamic Features of High-Speed Maglev Trains with Different Marshaling Lengths Running on a Viaduct under Crosswinds

    Zun-Di Huang1, Zhen-Bin Zhou1,2,3, Ning Chang1, Zheng-Wei Chen2,3,*, Su-Mei Wang2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 975-996, 2024, DOI:10.32604/cmes.2024.047664

    Abstract The safety and stability of high-speed maglev trains traveling on viaducts in crosswinds critically depend on their aerodynamic characteristics. Therefore, this paper uses an improved delayed detached eddy simulation (IDDES) method to investigate the aerodynamic features of high-speed maglev trains with different marshaling lengths under crosswinds. The effects of marshaling lengths (varying from 3-car to 8-car groups) on the train’s aerodynamic performance, surface pressure, and the flow field surrounding the train were investigated using the three-dimensional unsteady compressible Navier-Stokes (N-S) equations. The results showed that the marshaling lengths had minimal influence on the aerodynamic performance of the head and middle… More > Graphic Abstract

    Aerodynamic Features of High-Speed Maglev Trains with Different Marshaling Lengths Running on a Viaduct under Crosswinds

  • Open Access

    ARTICLE

    Identification prognostic features related to sphingolipid metabolism and experimental validation of TRIM47 in hepatocellular carcinoma

    JIAN TANG1, CHENQIANG ZHU1, YUN CHEN1, YUNLONG WU1, MING HE1, YI ZHOU2, MINGHUA XIE2,*

    BIOCELL, Vol.48, No.4, pp. 639-651, 2024, DOI:10.32604/biocell.2024.047562

    Abstract Background: The specific impact of sphingolipid metabolism on developing hepatocellular Carcinoma (HCC) remains unclear. This study aims to explore the relationship between sphingolipid metabolism and HCC prognosis, immune response, and drug sensitivity. Methods: Data were obtained from The Cancer Genome Atlas (TCGA)-Hepatocellular Carcinoma (LIHC) and Gene Expression Omnibus (GEO, GSE14520 datasets). 47 sphingolipid metabolism genes were obtained from the Kyoto Encyclopedia of Genes and Genomes (KEGG) database. After classifying HCC samples using the Non-negative Matrix Factorization (NMF) clustering method, differentially expressed genes were screened. Then, 8 risk genes were obtained by univariate analysis, survival random forest reduction and lasso analysis.… More > Graphic Abstract

    Identification prognostic features related to sphingolipid metabolism and experimental validation of TRIM47 in hepatocellular carcinoma

  • Open Access

    ARTICLE

    Causality-Driven Common and Label-Specific Features Learning

    Yuting Xu1,*, Deqing Zhang1, Huaibei Guo2, Mengyue Wang1

    Journal on Artificial Intelligence, Vol.6, pp. 53-69, 2024, DOI:10.32604/jai.2024.049083

    Abstract In multi-label learning, the label-specific features learning framework can effectively solve the dimensional catastrophe problem brought by high-dimensional data. The classification performance and robustness of the model are effectively improved. Most existing label-specific features learning utilizes the cosine similarity method to measure label correlation. It is well known that the correlation between labels is asymmetric. However, existing label-specific features learning only considers the private features of labels in classification and does not take into account the common features of labels. Based on this, this paper proposes a Causality-driven Common and Label-specific Features Learning, named CCSF algorithm. Firstly, the causal learning… More >

  • Open Access

    ARTICLE

    Aspect-Level Sentiment Analysis Based on Deep Learning

    Mengqi Zhang1, Jiazhao Chai2, Jianxiang Cao3, Jialing Ji3, Tong Yi4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3743-3762, 2024, DOI:10.32604/cmc.2024.048486

    Abstract In recent years, deep learning methods have developed rapidly and found application in many fields, including natural language processing. In the field of aspect-level sentiment analysis, deep learning methods can also greatly improve the performance of models. However, previous studies did not take into account the relationship between user feature extraction and contextual terms. To address this issue, we use data feature extraction and deep learning combined to develop an aspect-level sentiment analysis method. To be specific, we design user comment feature extraction (UCFE) to distill salient features from users’ historical comments and transform them into representative user feature vectors.… More >

  • Open Access

    ARTICLE

    BSTFNet: An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features

    Hong Huang1, Xingxing Zhang1,*, Ye Lu1, Ze Li1, Shaohua Zhou2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3929-3951, 2024, DOI:10.32604/cmc.2024.047918

    Abstract While encryption technology safeguards the security of network communications, malicious traffic also uses encryption protocols to obscure its malicious behavior. To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic, we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features, called BERT-based Spatio-Temporal Features Network (BSTFNet). At the packet-level granularity, the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers (BERT) model. At the byte-level granularity,… More >

  • Open Access

    ARTICLE

    Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features

    Qazi Mazhar ul Haq1, Fahim Arif2,3, Khursheed Aurangzeb4, Noor ul Ain3, Javed Ali Khan5, Saddaf Rubab6, Muhammad Shahid Anwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4379-4397, 2024, DOI:10.32604/cmc.2024.047172

    Abstract Software project outcomes heavily depend on natural language requirements, often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements. Researchers are exploring machine learning to predict software bugs, but a more precise and general approach is needed. Accurate bug prediction is crucial for software evolution and user training, prompting an investigation into deep and ensemble learning methods. However, these studies are not generalized and efficient when extended to other datasets. Therefore, this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification problems. The methods involved feature selection, which is used to… More >

  • Open Access

    ARTICLE

    Nodule Detection Using Local Binary Pattern Features to Enhance Diagnostic Decisions

    Umar Rashid1,2,*, Arfan Jaffar1,2, Muhammad Rashid3, Mohammed S. Alshuhri4, Sheeraz Akram1,4,5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3377-3390, 2024, DOI:10.32604/cmc.2024.046320

    Abstract Pulmonary nodules are small, round, or oval-shaped growths on the lungs. They can be benign (noncancerous) or malignant (cancerous). The size of a nodule can range from a few millimeters to a few centimeters in diameter. Nodules may be found during a chest X-ray or other imaging test for an unrelated health problem. In the proposed methodology pulmonary nodules can be classified into three stages. Firstly, a 2D histogram thresholding technique is used to identify volume segmentation. An ant colony optimization algorithm is used to determine the optimal threshold value. Secondly, geometrical features such as lines, arcs, extended arcs, and… More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the… More >

  • Open Access

    ARTICLE

    Road Traffic Monitoring from Aerial Images Using Template Matching and Invariant Features

    Asifa Mehmood Qureshi1, Naif Al Mudawi2, Mohammed Alonazi3, Samia Allaoua Chelloug4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3683-3701, 2024, DOI:10.32604/cmc.2024.043611

    Abstract Road traffic monitoring is an imperative topic widely discussed among researchers. Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides. However, aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area. To this end, different models have shown the ability to recognize and track vehicles. However, these methods are not mature enough to produce accurate results in complex road scenes. Therefore, this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts. The extracted frames… More >

Displaying 1-10 on page 1 of 310. Per Page