Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (62)
  • Open Access

    ARTICLE

    Adversarial Defense Technology for Small Infrared Targets

    Tongan Yu1, Yali Xue1,*, Yiming He1, Shan Cui2, Jun Hong2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1235-1250, 2024, DOI:10.32604/cmc.2024.056075 - 15 October 2024

    Abstract With the rapid development of deep learning-based detection algorithms, deep learning is widely used in the field of infrared small target detection. However, well-designed adversarial samples can fool human visual perception, directly causing a serious decline in the detection quality of the recognition model. In this paper, an adversarial defense technology for small infrared targets is proposed to improve model robustness. The adversarial samples with strong migration can not only improve the generalization of defense technology, but also save the training cost. Therefore, this study adopts the concept of maximizing multidimensional feature distortion, applying noise… More >

  • Open Access

    ARTICLE

    Grazing Pressure and Plant Functional Types in Puna Highlands, Northwestern Argentina

    Quiroga Mendiola Mariana1,2,*, Tálamo Andrés3,4

    Phyton-International Journal of Experimental Botany, Vol.93, No.5, pp. 1067-1080, 2024, DOI:10.32604/phyton.2024.050556 - 28 May 2024

    Abstract The Puna grasslands support grazing systems that produce meat and wool in multi-species herds, especially from llama (Lama glama) and sheep. However, it is yet unknown whether grazing pressure can modify grassland structure and Plant Functional Types diversity and cover in Puna grasslands. We analyzed the relationship between grazing pressure and Plant Functional Types by comparing transects located near stockyards (high grazing pressure) and far from them (low pressure) and by evaluating the relationship between the Plant Functional Types cover to a Grazing Pressure Index (GPI). This index incorporates the heterogeneity of traditional pastoral management. At… More >

  • Open Access

    ARTICLE

    Generalized nth-Order Perturbation Method Based on Loop Subdivision Surface Boundary Element Method for Three-Dimensional Broadband Structural Acoustic Uncertainty Analysis

    Ruijin Huo1,2,3, Qingxiang Pei1,2,3, Xiaohui Yuan1,*, Yanming Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 2053-2077, 2024, DOI:10.32604/cmes.2024.049185 - 20 May 2024

    Abstract In this paper, a generalized th-order perturbation method based on the isogeometric boundary element method is proposed for the uncertainty analysis of broadband structural acoustic scattering problems. The Burton-Miller method is employed to solve the problem of non-unique solutions that may be encountered in the external acoustic field, and the th-order discretization formulation of the boundary integral equation is derived. In addition, the computation of loop subdivision surfaces and the subdivision rules are introduced. In order to confirm the effectiveness of the algorithm, the computed results are contrasted and analyzed with the results under Monte More >

  • Open Access

    ARTICLE

    Radiation Effect on Heat Transfer Analysis of MHD Flow of Upper Convected Maxwell Fluid between a Porous and a Moving Plate

    P. Pai Nityanand, B. Devaki, G. Bhat Pareekshith, V. S. Sampath Kumar*

    Frontiers in Heat and Mass Transfer, Vol.22, No.2, pp. 655-673, 2024, DOI:10.32604/fhmt.2024.050237 - 20 May 2024

    Abstract The study in this manuscript aims to analyse the impact of thermal radiation on the two-dimensional magnetohydrodynamic flow of upper convected Maxwell (UCM) fluid between parallel plates. The lower plate is porous and stationary, while the top plate is impermeable and moving. The equations that describe the flow are transformed into non-linear ordinary differential equations with boundary conditions by employing similarity transformations. The Homotopy Perturbation Method (HPM) is then employed to approach the obtained non-linear ordinary differential equations and get an approximate analytical solution. The analysis includes plotting the velocity profile for different Reynolds number… More >

  • Open Access

    ARTICLE

    Research on the MPPT of Photovoltaic Power Generation Based on Improved WOA and P&O under Partial Shading Conditions

    Jian Zhong, Lei Zhang*, Ling Qin

    Energy Engineering, Vol.121, No.4, pp. 951-971, 2024, DOI:10.32604/ee.2023.041433 - 26 March 2024

    Abstract Partial shading conditions (PSCs) caused by uneven illumination become one of the most common problems in photovoltaic (PV) systems, which can make the PV power-voltage (P-V) characteristics curve show multi-peaks. Traditional maximum power point tracking (MPPT) methods have shortcomings in tracking to the global maximum power point (GMPP), resulting in a dramatic decrease in output power. In order to solve the above problems, intelligent algorithms are used in MPPT. However, the existing intelligent algorithms have some disadvantages, such as slow convergence speed and large search oscillation. Therefore, an improved whale algorithm (IWOA) combined with the More >

  • Open Access

    ARTICLE

    KSKV: Key-Strategy for Key-Value Data Collection with Local Differential Privacy

    Dan Zhao1, Yang You2, Chuanwen Luo3,*, Ting Chen4,*, Yang Liu5

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3063-3083, 2024, DOI:10.32604/cmes.2023.045400 - 11 March 2024

    Abstract In recent years, the research field of data collection under local differential privacy (LDP) has expanded its focus from elementary data types to include more complex structural data, such as set-value and graph data. However, our comprehensive review of existing literature reveals that there needs to be more studies that engage with key-value data collection. Such studies would simultaneously collect the frequencies of keys and the mean of values associated with each key. Additionally, the allocation of the privacy budget between the frequencies of keys and the means of values for each key does not… More >

  • Open Access

    ARTICLE

    VeriFace: Defending against Adversarial Attacks in Face Verification Systems

    Awny Sayed1, Sohair Kinlany2, Alaa Zaki2, Ahmed Mahfouz2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3151-3166, 2023, DOI:10.32604/cmc.2023.040256 - 08 October 2023

    Abstract Face verification systems are critical in a wide range of applications, such as security systems and biometric authentication. However, these systems are vulnerable to adversarial attacks, which can significantly compromise their accuracy and reliability. Adversarial attacks are designed to deceive the face verification system by adding subtle perturbations to the input images. These perturbations can be imperceptible to the human eye but can cause the system to misclassify or fail to recognize the person in the image. To address this issue, we propose a novel system called VeriFace that comprises two defense mechanisms, adversarial detection,… More >

  • Open Access

    ARTICLE

    HEAT TRANSFER ANALYSIS OF MHD CASSON FLUID FLOW BETWEEN TWO POROUS PLATES WITH DIFFERENT PERMEABILITY

    V.S. Sampath Kumar, N.P. Pai , B. Devaki

    Frontiers in Heat and Mass Transfer, Vol.20, pp. 1-13, 2023, DOI:10.5098/hmt.20.30

    Abstract In the present study, we consider Casson fluid flow between two porous plates with permeability criteria in the presence of heat transfer and magnetic effect. A proper set of similarity transformations simplify the Navier-Stokes equations to non-linear ODEs with boundary conditions. The homotopy perturbation method is an efficient and stable method which is used to get solutions. Further, the results obtained are compared with the solution computed through an effective and efficient finite difference approach. The purpose of this analysis is to study the four different cases arise viz: suction, injection, mixed suction and mixed More >

  • Open Access

    ARTICLE

    Cover Enhancement Method for Audio Steganography Based on Universal Adversarial Perturbations with Sample Diversification

    Jiangchuan Li, Peisong He*, Jiayong Liu, Jie Luo, Qiang Xia

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4893-4915, 2023, DOI:10.32604/cmc.2023.036819 - 29 April 2023

    Abstract Steganography techniques, such as audio steganography, have been widely used in covert communication. However, the deep neural network, especially the convolutional neural network (CNN), has greatly threatened the security of audio steganography. Besides, existing adversarial attacks-based countermeasures cannot provide general perturbation, and the transferability against unknown steganography detection methods is weak. This paper proposes a cover enhancement method for audio steganography based on universal adversarial perturbations with sample diversification to address these issues. Universal adversarial perturbation is constructed by iteratively optimizing adversarial perturbation, which applies adversarial attack techniques, such as Deepfool. Moreover, the sample diversification… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430 - 31 October 2022

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature… More >

Displaying 1-10 on page 1 of 62. Per Page