Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (196)
  • Open Access

    ARTICLE

    GL-YOLOv5: An Improved Lightweight Non-Dimensional Attention Algorithm Based on YOLOv5

    Yuefan Liu, Ducheng Zhang, Chen Guo*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3281-3299, 2024, DOI:10.32604/cmc.2024.057294 - 18 November 2024

    Abstract Craniocerebral injuries represent the primary cause of fatalities among riders involved in two-wheeler accidents; nevertheless, the prevalence of helmet usage among these riders remains alarmingly low. Consequently, the accurate identification of riders who are wearing safety helmets is of paramount importance. Current detection algorithms exhibit several limitations, including inadequate accuracy, substantial model size, and suboptimal performance in complex environments with small targets. To address these challenges, we propose a novel lightweight detection algorithm, termed GL-YOLOv5, which is an enhancement of the You Only Look Once version 5 (YOLOv5) framework. This model incorporates a Global DualPooling… More >

  • Open Access

    ARTICLE

    HGNN-ETC: Higher-Order Graph Neural Network Based on Chronological Relationships for Encrypted Traffic Classification

    Rongwei Yu, Xiya Guo*, Peihao Zhang, Kaijuan Zhang

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2643-2664, 2024, DOI:10.32604/cmc.2024.056165 - 18 November 2024

    Abstract Encrypted traffic plays a crucial role in safeguarding network security and user privacy. However, encrypting malicious traffic can lead to numerous security issues, making the effective classification of encrypted traffic essential. Existing methods for detecting encrypted traffic face two significant challenges. First, relying solely on the original byte information for classification fails to leverage the rich temporal relationships within network traffic. Second, machine learning and convolutional neural network methods lack sufficient network expression capabilities, hindering the full exploration of traffic’s potential characteristics. To address these limitations, this study introduces a traffic classification method that utilizes… More >

  • Open Access

    REVIEW

    Analyzing Real-Time Object Detection with YOLO Algorithm in Automotive Applications: A Review

    Carmen Gheorghe*, Mihai Duguleana, Razvan Gabriel Boboc, Cristian Cezar Postelnicu

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 1939-1981, 2024, DOI:10.32604/cmes.2024.054735 - 31 October 2024

    Abstract Identifying objects in real-time is a technology that is developing rapidly and has a huge potential for expansion in many technical fields. Currently, systems that use image processing to detect objects are based on the information from a single frame. A video camera positioned in the analyzed area captures the image, monitoring in detail the changes that occur between frames. The You Only Look Once (YOLO) algorithm is a model for detecting objects in images, that is currently known for the accuracy of the data obtained and the fast-working speed. This study proposes a comprehensive More >

  • Open Access

    ARTICLE

    Optimization Model Proposal for Traffic Differentiation in Wireless Sensor Networks

    Adisa Hasković Džubur*, Samir Čaušević, Belma Memić, Muhamed Begović, Elma Avdagić-Golub, Alem Čolaković

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1059-1084, 2024, DOI:10.32604/cmc.2024.055386 - 15 October 2024

    Abstract Wireless sensor networks (WSNs) are characterized by heterogeneous traffic types (audio, video, data) and diverse application traffic requirements. This paper introduces three traffic classes following the defined model of heterogeneous traffic differentiation in WSNs. The requirements for each class regarding sensitivity to QoS (Quality of Service) parameters, such as loss, delay, and jitter, are described. These classes encompass real-time and delay-tolerant traffic. Given that QoS evaluation is a multi-criteria decision-making problem, we employed the AHP (Analytical Hierarchy Process) method for multi-criteria optimization. As a result of this approach, we derived weight values for different traffic… More >

  • Open Access

    ARTICLE

    Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems

    Naeem Raza1, Muhammad Asif Habib1, Mudassar Ahmad1, Qaisar Abbas2,*, Mutlaq B. Aldajani2, Muhammad Ahsan Latif3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 911-931, 2024, DOI:10.32604/cmc.2024.055049 - 15 October 2024

    Abstract Vision-based vehicle detection in adverse weather conditions such as fog, haze, and mist is a challenging research area in the fields of autonomous vehicles, collision avoidance, and Internet of Things (IoT)-enabled edge/fog computing traffic surveillance and monitoring systems. Efficient and cost-effective vehicle detection at high accuracy and speed in foggy weather is essential to avoiding road traffic collisions in real-time. To evaluate vision-based vehicle detection performance in foggy weather conditions, state-of-the-art Vehicle Detection in Adverse Weather Nature (DAWN) and Foggy Driving (FD) datasets are self-annotated using the YOLO LABEL tool and customized to four vehicle… More >

  • Open Access

    ARTICLE

    The Machine Learning Ensemble for Analyzing Internet of Things Networks: Botnet Detection and Device Identification

    Seung-Ju Han, Seong-Su Yoon, Ieck-Chae Euom*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1495-1518, 2024, DOI:10.32604/cmes.2024.053457 - 27 September 2024

    Abstract The rapid proliferation of Internet of Things (IoT) technology has facilitated automation across various sectors. Nevertheless, this advancement has also resulted in a notable surge in cyberattacks, notably botnets. As a result, research on network analysis has become vital. Machine learning-based techniques for network analysis provide a more extensive and adaptable approach in comparison to traditional rule-based methods. In this paper, we propose a framework for analyzing communications between IoT devices using supervised learning and ensemble techniques and present experimental results that validate the efficacy of the proposed framework. The results indicate that using the More >

  • Open Access

    ARTICLE

    Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence

    Il Hwan Ji1, Ju Hyeon Lee1, Seungho Jeon2, Jung Taek Seo2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1519-1549, 2024, DOI:10.32604/cmes.2024.053437 - 27 September 2024

    Abstract In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lack of performance of each component, such as computing resources like CPUs and batteries, to encrypt and decrypt data. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomical financial and human casualties. For this reason, the application of encrypted communication to IoT has been required, and the application of encrypted communication to IoT has become possible due to improvements in the computing performance of IoT devices and the development… More >

  • Open Access

    ARTICLE

    Simulation and Traffic Safety Assessment of Heavy-Haul Railway Train-Bridge Coupling System under Earthquake Action

    Liangwei Jiang1,2, Wei Zhang2, Hongyin Yang1,2,3,*, Xiucheng Zhang1, Jinghan Wu2, Zhangjun Liu2

    Structural Durability & Health Monitoring, Vol.18, No.6, pp. 835-851, 2024, DOI:10.32604/sdhm.2024.051125 - 20 September 2024

    Abstract Aiming at the problem that it is difficult to obtain the explicit expression of the structural matrix in the traditional train-bridge coupling vibration analysis, a combined simulation system of train-bridge coupling system (TBCS) under earthquake (MAETB) is developed based on the cooperative work of MATLAB and ANSYS. The simulation system is used to analyze the dynamic parameters of the TBCS of a prestressed concrete continuous rigid frame bridge benchmark model of a heavy-haul railway. The influence of different driving speeds, seismic wave intensities, and traveling wave effects on the dynamic response of the TBCS under More >

  • Open Access

    ARTICLE

    Network Traffic Synthesis and Simulation Framework for Cybersecurity Exercise Systems

    Dong-Wook Kim1, Gun-Yoon Sin2, Kwangsoo Kim3, Jaesik Kang3, Sun-Young Im3, Myung-Mook Han1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3637-3653, 2024, DOI:10.32604/cmc.2024.054108 - 12 September 2024

    Abstract In the rapidly evolving field of cybersecurity, the challenge of providing realistic exercise scenarios that accurately mimic real-world threats has become increasingly critical. Traditional methods often fall short in capturing the dynamic and complex nature of modern cyber threats. To address this gap, we propose a comprehensive framework designed to create authentic network environments tailored for cybersecurity exercise systems. Our framework leverages advanced simulation techniques to generate scenarios that mirror actual network conditions faced by professionals in the field. The cornerstone of our approach is the use of a conditional tabular generative adversarial network (CTGAN),… More >

  • Open Access

    ARTICLE

    EV Charging Station Load Prediction in Coupled Urban Transportation and Distribution Networks

    Benxin Li*, Xuanming Chang

    Energy Engineering, Vol.121, No.10, pp. 3001-3018, 2024, DOI:10.32604/ee.2024.051332 - 11 September 2024

    Abstract The increasingly large number of electric vehicles (EVs) has resulted in a growing concern for EV charging station load prediction for the purpose of comprehensively evaluating the influence of the charging load on distribution networks. To address this issue, an EV charging station load prediction method is proposed in coupled urban transportation and distribution networks. Firstly, a finer dynamic urban transportation network model is formulated considering both nodal and path resistance. Then, a finer EV power consumption model is proposed by considering the influence of traffic congestion and ambient temperature. Thirdly, the Monte Carlo method… More > Graphic Abstract

    EV Charging Station Load Prediction in Coupled Urban Transportation and Distribution Networks

Displaying 1-10 on page 1 of 196. Per Page