Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access


    A Lightweight Electronic Water Pump Shell Defect Detection Method Based on Improved YOLOv5s

    Qunbiao Wu1, Zhen Wang1,*, Haifeng Fang1, Junji Chen1, Xinfeng Wan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 961-979, 2023, DOI:10.32604/csse.2023.036239

    Abstract For surface defects in electronic water pump shells, the manual detection efficiency is low, prone to misdetection and leak detection, and encounters problems, such as uncertainty. To improve the speed and accuracy of surface defect detection, a lightweight detection method based on an improved YOLOv5s method is proposed to replace the traditional manual detection methods. In this method, the MobileNetV3 module replaces the backbone network of YOLOv5s, depth-separable convolution is introduced, the parameters and calculations are reduced, and CIoU_Loss is used as the loss function of the boundary box regression to improve its detection accuracy. A dataset of electronic pump… More >

  • Open Access


    Remote Sensing Plateau Forest Segmentation with Boundary Preserving Double Loss Function Collaborative Learning

    Ying Ma1, Jiaqi Zhang2,3,4, Pengyu Liu1,2,3,4,*, Zhihao Wei5, Lingfei Zhang1, Xiaowei Jia6

    Journal of New Media, Vol.4, No.4, pp. 165-177, 2022, DOI:10.32604/jnm.2022.026684

    Abstract Plateau forest plays an important role in the high-altitude ecosystem, and contributes to the global carbon cycle. Plateau forest monitoring request in-suit data from field investigation. With recent development of the remote sensing technic, large-scale satellite data become available for surface monitoring. Due to the various information contained in the remote sensing data, obtain accurate plateau forest segmentation from the remote sensing imagery still remain challenges. Recent developed deep learning (DL) models such as deep convolutional neural network (CNN) has been widely used in image processing tasks, and shows possibility for remote sensing segmentation. However, due to the unique characteristics… More >

  • Open Access


    Robust Vehicle Detection Based on Improved You Look Only Once

    Sunil Kumar1, Manisha Jailia1, Sudeep Varshney2, Nitish Pathak3, Shabana Urooj4,*, Nouf Abd Elmunim4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3561-3577, 2023, DOI:10.32604/cmc.2023.029999

    Abstract Vehicle detection is still challenging for intelligent transportation systems (ITS) to achieve satisfactory performance. The existing methods based on one stage and two-stage have intrinsic weakness in obtaining high vehicle detection performance. Due to advancements in detection technology, deep learning-based methods for vehicle detection have become more popular because of their higher detection accuracy and speed than the existing algorithms. This paper presents a robust vehicle detection technique based on Improved You Look Only Once (RVD-YOLOv5) to enhance vehicle detection accuracy. The proposed method works in three phases; in the first phase, the K-means algorithm performs data clustering on datasets… More >

  • Open Access


    Machine Learning-Based Channel State Estimators for 5G Wireless Communication Systems

    Mohamed Hassan Essai Ali1,*, Fahad Alraddady2, Mo’ath Y. Al-Thunaibat3, Shaima Elnazer2

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 755-778, 2023, DOI:10.32604/cmes.2022.022246

    Abstract For a 5G wireless communication system, a convolutional deep neural network (CNN) is employed to synthesize a robust channel state estimator (CSE). The proposed CSE extracts channel information from transmit-and-receive pairs through offline training to estimate the channel state information. Also, it utilizes pilots to offer more helpful information about the communication channel. The proposed CNN-CSE performance is compared with previously published results for Bidirectional/long short-term memory (BiLSTM/LSTM) NNs-based CSEs. The CNN-CSE achieves outstanding performance using sufficient pilots only and loses its functionality at limited pilots compared with BiLSTM and LSTM-based estimators. Using three different loss function-based classification layers and… More >

  • Open Access


    Image Color Rendering Based on Hinge-Cross-Entropy GAN in Internet of Medical Things

    Hong’an Li1, Min Zhang1,*, Dufeng Chen2, Jing Zhang1, Meng Yang3, Zhanli Li1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 779-794, 2023, DOI:10.32604/cmes.2022.022369

    Abstract Computer-aided diagnosis based on image color rendering promotes medical image analysis and doctor-patient communication by highlighting important information of medical diagnosis. To overcome the limitations of the color rendering method based on deep learning, such as poor model stability, poor rendering quality, fuzzy boundaries and crossed color boundaries, we propose a novel hinge-cross-entropy generative adversarial network (HCEGAN). The self-attention mechanism was added and improved to focus on the important information of the image. And the hinge-cross-entropy loss function was used to stabilize the training process of GAN models. In this study, we implement the HCEGAN model for image color rendering… More > Graphic Abstract

    Image Color Rendering Based on Hinge-Cross-Entropy GAN in Internet of Medical Things

  • Open Access


    Multilevel Modelling for Surgical Tool Calibration Using LINEX Loss Function

    Mansour F. Yassen1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1691-1706, 2022, DOI:10.32604/cmc.2022.029701

    Abstract Quantifying the tool–tissue interaction forces in surgery can be utilized in the training of inexperienced surgeons, assist them better use surgical tools and avoid applying excessive pressures. The voltages read from strain gauges are used to approximate the unknown values of implemented forces. To this objective, the force-voltage connection must be quantified in order to evaluate the interaction forces during surgery. The progress of appropriate statistical learning approaches to describe the link between the genuine force applied on the tissue and numerous outputs obtained from sensors installed on surgical equipment is a key problem. In this study, different probabilistic approaches… More >

  • Open Access


    Estimating Weibull Parameters Using Least Squares and Multilayer Perceptron vs. Bayes Estimation

    Walid Aydi1,3,*, Fuad S. Alduais2,4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4033-4050, 2022, DOI:10.32604/cmc.2022.023119

    Abstract The Weibull distribution is regarded as among the finest in the family of failure distributions. One of the most commonly used parameters of the Weibull distribution (WD) is the ordinary least squares (OLS) technique, which is useful in reliability and lifetime modeling. In this study, we propose an approach based on the ordinary least squares and the multilayer perceptron (MLP) neural network called the OLSMLP that is based on the resilience of the OLS method. The MLP solves the problem of heteroscedasticity that distorts the estimation of the parameters of the WD due to the presence of outliers, and eases… More >

  • Open Access


    MIA-UNet: Multi-Scale Iterative Aggregation U-Network for Retinal Vessel Segmentation

    Linfang Yu, Zhen Qin*, Yi Ding, Zhiguang Qin

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 805-828, 2021, DOI:10.32604/cmes.2021.017332

    Abstract As an important part of the new generation of information technology, the Internet of Things (IoT) has been widely concerned and regarded as an enabling technology of the next generation of health care system. The fundus photography equipment is connected to the cloud platform through the IoT, so as to realize the real-time uploading of fundus images and the rapid issuance of diagnostic suggestions by artificial intelligence. At the same time, important security and privacy issues have emerged. The data uploaded to the cloud platform involves more personal attributes, health status and medical application data of patients. Once leaked, abused… More >

  • Open Access


    Handling Class Imbalance in Online Transaction Fraud Detection

    Kanika1, Jimmy Singla1, Ali Kashif Bashir2, Yunyoung Nam3,*, Najam UI Hasan4, Usman Tariq5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2861-2877, 2022, DOI:10.32604/cmc.2022.019990

    Abstract With the rise of internet facilities, a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction. However, the fraud cases have also increased causing the loss of money to the consumers. Hence, an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time. Generally, the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem. In this research work, an… More >

  • Open Access


    Entropy Bayesian Analysis for the Generalized Inverse Exponential Distribution Based on URRSS

    Amer I. Al-Omari1, Amal S. Hassan2, Heba F. Nagy2, Ayed R. A. Al-Anzi3,*, Loai Alzoubi1

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3795-3811, 2021, DOI:10.32604/cmc.2021.019061

    Abstract This paper deals with the Bayesian estimation of Shannon entropy for the generalized inverse exponential distribution. Assuming that the observed samples are taken from the upper record ranked set sampling (URRSS) and upper record values (URV) schemes. Formulas of Bayesian estimators are derived depending on a gamma prior distribution considering the squared error, linear exponential and precautionary loss functions, in addition, we obtain Bayesian credible intervals. The random-walk Metropolis-Hastings algorithm is handled to generate Markov chain Monte Carlo samples from the posterior distribution. Then, the behavior of the estimates is examined at various record values. The output of the study… More >

Displaying 1-10 on page 1 of 14. Per Page  

Share Link

WeChat scan