Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (168)
  • Open Access

    ARTICLE

    A Hybrid Feature Fusion Traffic Sign Detection Algorithm Based on YOLOv7

    Bingyi Ren1,4, Juwei Zhang2,3,4,*, Tong Wang2,4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1425-1440, 2024, DOI:10.32604/cmc.2024.052667

    Abstract Autonomous driving technology has entered a period of rapid development, and traffic sign detection is one of the important tasks. Existing target detection networks are difficult to adapt to scenarios where target sizes are seriously imbalanced, and traffic sign targets are small and have unclear features, which makes detection more difficult. Therefore, we propose a Hybrid Feature Fusion Traffic Sign detection algorithm based on YOLOv7 (HFFT-YOLO). First, a self-attention mechanism is incorporated at the end of the backbone network to calculate feature interactions within scales; Secondly, the cross-scale fusion part of the neck introduces a… More >

  • Open Access

    ARTICLE

    An Enhanced GAN for Image Generation

    Chunwei Tian1,2,3,4, Haoyang Gao2,3, Pengwei Wang2, Bob Zhang1,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 105-118, 2024, DOI:10.32604/cmc.2024.052097

    Abstract Generative adversarial networks (GANs) with gaming abilities have been widely applied in image generation. However, gamistic generators and discriminators may reduce the robustness of the obtained GANs in image generation under varying scenes. Enhancing the relation of hierarchical information in a generation network and enlarging differences of different network architectures can facilitate more structural information to improve the generation effect for image generation. In this paper, we propose an enhanced GAN via improving a generator for image generation (EIGGAN). EIGGAN applies a spatial attention to a generator to extract salient information to enhance the truthfulness… More >

  • Open Access

    ARTICLE

    Two Stages Segmentation Algorithm of Breast Tumor in DCE-MRI Based on Multi-Scale Feature and Boundary Attention Mechanism

    Bing Li1,2,*, Liangyu Wang1, Xia Liu1,2, Hongbin Fan1, Bo Wang3, Shoudi Tong1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1543-1561, 2024, DOI:10.32604/cmc.2024.052009

    Abstract Nuclear magnetic resonance imaging of breasts often presents complex backgrounds. Breast tumors exhibit varying sizes, uneven intensity, and indistinct boundaries. These characteristics can lead to challenges such as low accuracy and incorrect segmentation during tumor segmentation. Thus, we propose a two-stage breast tumor segmentation method leveraging multi-scale features and boundary attention mechanisms. Initially, the breast region of interest is extracted to isolate the breast area from surrounding tissues and organs. Subsequently, we devise a fusion network incorporating multi-scale features and boundary attention mechanisms for breast tumor segmentation. We incorporate multi-scale parallel dilated convolution modules into… More >

  • Open Access

    ARTICLE

    Lightweight Res-Connection Multi-Branch Network for Highly Accurate Crowd Counting and Localization

    Mingze Li, Diwen Zheng, Shuhua Lu*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2105-2122, 2024, DOI:10.32604/cmc.2024.048928

    Abstract Crowd counting is a promising hotspot of computer vision involving crowd intelligence analysis, achieving tremendous success recently with the development of deep learning. However, there have been still many challenges including crowd multi-scale variations and high network complexity, etc. To tackle these issues, a lightweight Res-connection multi-branch network (LRMBNet) for highly accurate crowd counting and localization is proposed. Specifically, using improved ShuffleNet V2 as the backbone, a lightweight shallow extractor has been designed by employing the channel compression mechanism to reduce enormously the number of network parameters. A light multi-branch structure with different expansion rate… More >

  • Open Access

    ARTICLE

    A Novel Foreign Object Detection Method in Transmission Lines Based on Improved YOLOv8n

    Yakui Liu1,2,3,*, Xing Jiang1, Ruikang Xu1, Yihao Cui1, Chenhui Yu1, Jingqi Yang1, Jishuai Zhou1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1263-1279, 2024, DOI:10.32604/cmc.2024.048864

    Abstract The rapid pace of urban development has resulted in the widespread presence of construction equipment and increasingly complex conditions in transmission corridors. These conditions pose a serious threat to the safe operation of the power grid. Machine vision technology, particularly object recognition technology, has been widely employed to identify foreign objects in transmission line images. Despite its wide application, the technique faces limitations due to the complex environmental background and other auxiliary factors. To address these challenges, this study introduces an improved YOLOv8n. The traditional stepwise convolution and pooling layers are replaced with a spatial-depth… More >

  • Open Access

    ARTICLE

    Restoration of the JPEG Maximum Lossy Compressed Face Images with Hourglass Block-GAN

    Jongwook Si1, Sungyoung Kim2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2893-2908, 2024, DOI:10.32604/cmc.2023.046081

    Abstract In the context of high compression rates applied to Joint Photographic Experts Group (JPEG) images through lossy compression techniques, image-blocking artifacts may manifest. This necessitates the restoration of the image to its original quality. The challenge lies in regenerating significantly compressed images into a state in which these become identifiable. Therefore, this study focuses on the restoration of JPEG images subjected to substantial degradation caused by maximum lossy compression using Generative Adversarial Networks (GAN). The generator in this network is based on the U-Net architecture. It features a new hourglass structure that preserves the characteristics… More >

  • Open Access

    ARTICLE

    Loss to Specialized Cardiology Follow-Up in Adults Living with Congenital Heart Disease

    Cheryl Dickson1,2,4, Danielle Osborn1, David Baker1,4, Judith Fethney3, David S. Celermajer1,4, Rachael Cordina1,4,*

    Congenital Heart Disease, Vol.19, No.1, pp. 49-63, 2024, DOI:10.32604/chd.2023.044874

    Abstract Background: Much has been written about the loss to follow-up in the transition between pediatric and adult Congenital Heart Disease (CHD) care centers. Much less is understood about the loss to follow-up (LTF) after a successful transition. This is critical too, as patients lost to specialised care are more likely to experience morbidity and premature mortality. Aims: To understand the prevalence and reasons for loss to follow-up (LTF) at a large Australian Adult Congenital Heart Disease (ACHD) centre. Methods: Patients with moderate or highly complex CHD and gaps in care of >3 years (defined as LTF)… More >

  • Open Access

    ARTICLE

    EXPERIMENTAL INVESTIGATION OF HEAT LOSS FROM HEMISPHERICAL SOLAR CONCENTRATOR RECEIVER

    Milind S. Patila,*, Ramchandra S. Jahagirdarb, Eknath R. Deorea,†

    Frontiers in Heat and Mass Transfer, Vol.3, No.3, pp. 1-5, 2012, DOI:10.5098/hmt.v3.3.3008

    Abstract Convection heat loss inevitably occurs in receivers of high concentrating solar concentrators. All the concentrators are need to be tack during the operation and hence the position of the receiver is changing continually. The angle of the receiver axis will then play an important role in the heat loss. Few researches were reported for the hemispherical cavity receivers numerically. The paper presented here is an experimental investigation natural convection heat loss from hemispherical cavity receiver. Cavity receiver of diameter 540 mm was tested. It is observed that the heat loss was minimum for 90° and More >

  • Open Access

    ARTICLE

    Color and Gloss Changes of a Lignin-Based Polyurethane Coating under Accelerated Weathering

    Fatemeh Hassani Khorshidi1, Saeed Kazemi Najafi1, Farhood Najafi2,*, Antonio Pizzi3,*, Dick Sandberg4, Rabi Behrooz1

    Journal of Renewable Materials, Vol.12, No.2, pp. 305-323, 2024, DOI:10.32604/jrm.2023.043953

    Abstract The purpose of this research study was to investigate the properties of polyurethane coatings based on lignin nano-particles. For this purpose, the prepared coatings were applied to pine wood surfaces and weathered artificially. Subsequently, color and gloss of the coatings were measured before and after the weathering test. Field emission scanning electron microscopy (FE-SEM) micrographs prepared from the coatings showed that the average size of nano-particles in the polyurethane substrate was approximately 500 nm. Nuclear magnetic resonance (13C-NMR) spectroscopy showed that strong urethane bonds were formed in the nano-lignin-based polyurethane. Differential calorimetric analysis (DSC) test revealed… More > Graphic Abstract

    Color and Gloss Changes of a Lignin-Based Polyurethane Coating under Accelerated Weathering

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have… More >

Displaying 1-10 on page 1 of 168. Per Page