Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,237)
  • Open Access

    ARTICLE

    Quick Weighing of Passing Vehicles Using the Transfer-Learning-Enhanced Convolutional Neural Network

    Wangchen Yan1,*, Jinbao Yang1, Xin Luo2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2507-2524, 2024, DOI:10.32604/cmes.2023.044709

    Abstract Transfer learning could reduce the time and resources required by the training of new models and be therefore important for generalized applications of the trained machine learning algorithms. In this study, a transfer learning-enhanced convolutional neural network (CNN) was proposed to identify the gross weight and the axle weight of moving vehicles on the bridge. The proposed transfer learning-enhanced CNN model was expected to weigh different bridges based on a small amount of training datasets and provide high identification accuracy. First of all, a CNN algorithm for bridge weigh-in-motion (B-WIM) technology was proposed to identify the axle weight and the… More >

  • Open Access

    ARTICLE

    MDCN: Modified Dense Convolution Network Based Disease Classification in Mango Leaves

    Chirag Chandrashekar1, K. P. Vijayakumar1,*, K. Pradeep1, A. Balasundaram1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2511-2533, 2024, DOI:10.32604/cmc.2024.047697

    Abstract The most widely farmed fruit in the world is mango. Both the production and quality of the mangoes are hampered by many diseases. These diseases need to be effectively controlled and mitigated. Therefore, a quick and accurate diagnosis of the disorders is essential. Deep convolutional neural networks, renowned for their independence in feature extraction, have established their value in numerous detection and classification tasks. However, it requires large training datasets and several parameters that need careful adjustment. The proposed Modified Dense Convolutional Network (MDCN) provides a successful classification scheme for plant diseases affecting mango leaves. This model employs the strength… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have been deployed and have demonstrated… More >

  • Open Access

    ARTICLE

    Social Robot Detection Method with Improved Graph Neural Networks

    Zhenhua Yu, Liangxue Bai, Ou Ye*, Xuya Cong

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1773-1795, 2024, DOI:10.32604/cmc.2023.047130

    Abstract Social robot accounts controlled by artificial intelligence or humans are active in social networks, bringing negative impacts to network security and social life. Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships, which makes it difficult to accurately describe the difference between the topological relations of nodes, resulting in low detection accuracy of social robots. This paper proposes a social robot detection method with the use of an improved neural network. First, social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social… More >

  • Open Access

    ARTICLE

    DGConv: A Novel Convolutional Neural Network Approach for Weld Seam Depth Image Detection

    Pengchao Li1,2,3,*, Fang Xu1,2,3,4, Jintao Wang1,2, Haibing Guo4, Mingmin Liu4, Zhenjun Du4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1755-1771, 2024, DOI:10.32604/cmc.2023.047057

    Abstract We propose a novel image segmentation algorithm to tackle the challenge of limited recognition and segmentation performance in identifying welding seam images during robotic intelligent operations. Initially, to enhance the capability of deep neural networks in extracting geometric attributes from depth images, we developed a novel deep geometric convolution operator (DGConv). DGConv is utilized to construct a deep local geometric feature extraction module, facilitating a more comprehensive exploration of the intrinsic geometric information within depth images. Secondly, we integrate the newly proposed deep geometric feature module with the Fully Convolutional Network (FCN8) to establish a high-performance deep neural network algorithm… More >

  • Open Access

    ARTICLE

    Binary Program Vulnerability Mining Based on Neural Network

    Zhenhui Li1, Shuangping Xing1, Lin Yu1, Huiping Li1, Fan Zhou1, Guangqiang Yin1, Xikai Tang2, Zhiguo Wang1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1861-1879, 2024, DOI:10.32604/cmc.2023.046595

    Abstract Software security analysts typically only have access to the executable program and cannot directly access the source code of the program. This poses significant challenges to security analysis. While it is crucial to identify vulnerabilities in such non-source code programs, there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods. However, these tools suffer from some shortcomings. In terms of targeted fuzzing, the path searching for target points is not streamlined enough, and the completely random testing leads to an excessively large search space. Additionally, when it comes to code similarity analysis,… More >

  • Open Access

    ARTICLE

    A Method for Detecting and Recognizing Yi Character Based on Deep Learning

    Haipeng Sun1,2, Xueyan Ding1,2,*, Jian Sun1,2, Hua Yu3, Jianxin Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2721-2739, 2024, DOI:10.32604/cmc.2024.046449

    Abstract Aiming at the challenges associated with the absence of a labeled dataset for Yi characters and the complexity of Yi character detection and recognition, we present a deep learning-based approach for Yi character detection and recognition. In the detection stage, an improved Differentiable Binarization Network (DBNet) framework is introduced to detect Yi characters, in which the Omni-dimensional Dynamic Convolution (ODConv) is combined with the ResNet-18 feature extraction module to obtain multi-dimensional complementary features, thereby improving the accuracy of Yi character detection. Then, the feature pyramid network fusion module is used to further extract Yi character image features, improving target recognition… More >

  • Open Access

    ARTICLE

    Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems

    Sang-min Lee, Namgi Kim*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1897-1914, 2024, DOI:10.32604/cmc.2023.046346

    Abstract Recommendation Information Systems (RIS) are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet. Graph Convolution Network (GCN) algorithms have been employed to implement the RIS efficiently. However, the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process. To address this issue, we propose a Weighted Forwarding method using the GCN (WF-GCN) algorithm. The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning. By applying the WF-GCN… More >

  • Open Access

    ARTICLE

    AutoRhythmAI: A Hybrid Machine and Deep Learning Approach for Automated Diagnosis of Arrhythmias

    S. Jayanthi*, S. Prasanna Devi

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2137-2158, 2024, DOI:10.32604/cmc.2024.045975

    Abstract In healthcare, the persistent challenge of arrhythmias, a leading cause of global mortality, has sparked extensive research into the automation of detection using machine learning (ML) algorithms. However, traditional ML and AutoML approaches have revealed their limitations, notably regarding feature generalization and automation efficiency. This glaring research gap has motivated the development of AutoRhythmAI, an innovative solution that integrates both machine and deep learning to revolutionize the diagnosis of arrhythmias. Our approach encompasses two distinct pipelines tailored for binary-class and multi-class arrhythmia detection, effectively bridging the gap between data preprocessing and model selection. To validate our system, we have rigorously… More >

  • Open Access

    ARTICLE

    Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction

    Bin Luo1,2,3, Liangguo Chen1,2,3, Shuhua Ruan1,2,3,*, Yonggang Luo2,3,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1731-1754, 2024, DOI:10.32604/cmc.2023.045739

    Abstract Considering the stealthiness and persistence of Advanced Persistent Threats (APTs), system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a host. Rule-based provenance graph APT detection approaches require elaborate rules and cannot detect unknown attacks, and existing learning-based approaches are limited by the lack of available APT attack samples or generally only perform graph-level anomaly detection, which requires lots of manual efforts to locate attack entities. This paper proposes an APT-exploited process detection approach called ThreatSniffer, which constructs the benign provenance graph from attack-free audit logs, fits normal system entity… More >

Displaying 21-30 on page 3 of 1237. Per Page