Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,782)
  • Open Access

    ARTICLE

    Attention Guided Multi Scale Feature Fusion Network for Automatic Prostate Segmentation

    Yuchun Li1,4, Mengxing Huang1,*, Yu Zhang2, Zhiming Bai3

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046883

    Abstract The precise and automatic segmentation of prostate magnetic resonance imaging (MRI) images is vital for assisting doctors in diagnosing prostate diseases. In recent years, many advanced methods have been applied to prostate segmentation, but due to the variability caused by prostate diseases, automatic segmentation of the prostate presents significant challenges. In this paper, we propose an attention-guided multi-scale feature fusion network (AGMSF-Net) to segment prostate MRI images. We propose an attention mechanism for extracting multi-scale features, and introduce a 3D transformer module to enhance global feature representation by adding it during the transition phase from encoder to decoder. In the… More >

  • Open Access

    ARTICLE

    Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems

    Sang-min Lee, Namgi Kim*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046346

    Abstract Recommendation Information Systems (RIS) are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet. Graph Convolution Network (GCN) algorithms have been employed to implement the RIS efficiently. However, the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process. To address this issue, we propose a Weighted Forwarding method using the GCN (WF-GCN) algorithm. The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning. By applying the WF-GCN… More >

  • Open Access

    ARTICLE

    Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence

    Ali Hamid Farea1,*, Omar H. Alhazmi1, Kerem Kucuk2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045794

    Abstract While emerging technologies such as the Internet of Things (IoT) have many benefits, they also pose considerable security challenges that require innovative solutions, including those based on artificial intelligence (AI), given that these techniques are increasingly being used by malicious actors to compromise IoT systems. Although an ample body of research focusing on conventional AI methods exists, there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures. To contribute to this nascent research stream, a novel AI-driven security system denoted as “AI2AI” is presented in this work. AI2AI employs AI techniques to… More >

  • Open Access

    ARTICLE

    Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction

    Bin Luo1,2,3, Liangguo Chen1,2,3, Shuhua Ruan1,2,3,*, Yonggang Luo2,3,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045739

    Abstract Considering the stealthiness and persistence of Advanced Persistent Threats (APTs), system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a host. Rule-based provenance graph APT detection approaches require elaborate rules and cannot detect unknown attacks, and existing learning-based approaches are limited by the lack of available APT attack samples or generally only perform graph-level anomaly detection, which requires lots of manual efforts to locate attack entities. This paper proposes an APT-exploited process detection approach called ThreatSniffer, which constructs the benign provenance graph from attack-free audit logs, fits normal system entity… More >

  • Open Access

    ARTICLE

    An Experimental Study on the Effect of a Nanofluid on Oil-Water Relative Permeability

    Hui Tian1, Dandan Zhao1, Yannan Wu2,3,*, Xingyu Yi1, Jun Ma1, Xiang Zhou4

    FDMP-Fluid Dynamics & Materials Processing, Vol., , DOI:10.32604/fdmp.2023.044833

    Abstract

    The low porosity and low permeability of tight oil reservoirs call for improvements in the current technologies for oil recovery. Traditional chemical solutions with large molecular size cannot effectively flow through the nano-pores of the reservoir. In this study, the feasibility of Nanofluids has been investigated using a high pressure high temperature core-holder and nuclear magnetic resonance (NMR). The results of the experiments indicate that the specified Nanofluids can enhance the tight oil recovery significantly. The water and oil relative permeability curve shifts to the high water saturation side after Nanofluid flooding, thereby demonstrating an increase in the water wettability… More > Graphic Abstract

    An Experimental Study on the Effect of a Nanofluid on Oil-Water Relative Permeability

  • Open Access

    ARTICLE

    Movement Function Assessment Based on Human Pose Estimation from Multi-View

    Lingling Chen1,2,*, Tong Liu1, Zhuo Gong1, Ding Wang1

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.037865

    Abstract Human pose estimation is a basic and critical task in the field of computer vision that involves determining the position (or spatial coordinates) of the joints of the human body in a given image or video. It is widely used in motion analysis, medical evaluation, and behavior monitoring. In this paper, the authors propose a method for multi-view human pose estimation. Two image sensors were placed orthogonally with respect to each other to capture the pose of the subject as they moved, and this yielded accurate and comprehensive results of three-dimensional (3D) motion reconstruction that helped capture their multi-directional poses.… More >

  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu1,2, Xiao Zhang1,2,3,*, Jinjiang Wang1,2, Yuchen Zhang1,2, Yulong Shi1,2, Linxuan Su1,2, Leijie Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047340

    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage and access. The on-chain system,… More >

  • Open Access

    ARTICLE

    Multi-Objective Equilibrium Optimizer for Feature Selection in High-Dimensional English Speech Emotion Recognition

    Liya Yue1, Pei Hu2, Shu-Chuan Chu3, Jeng-Shyang Pan3,4,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.046962

    Abstract Speech emotion recognition (SER) uses acoustic analysis to find features for emotion recognition and examines variations in voice that are caused by emotions. The number of features acquired with acoustic analysis is extremely high, so we introduce a hybrid filter-wrapper feature selection algorithm based on an improved equilibrium optimizer for constructing an emotion recognition system. The proposed algorithm implements multi-objective emotion recognition with the minimum number of selected features and maximum accuracy. First, we use the information gain and Fisher Score to sort the features extracted from signals. Then, we employ a multi-objective ranking method to evaluate these features and… More >

  • Open Access

    ARTICLE

    Enhanced Wolf Pack Algorithm (EWPA) and Dense-kUNet Segmentation for Arterial Calcifications in Mammograms

    Afnan M. Alhassan*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.046427

    Abstract Breast Arterial Calcification (BAC) is a mammographic decision dissimilar to cancer and commonly observed in elderly women. Thus identifying BAC could provide an expense, and be inaccurate. Recently Deep Learning (DL) methods have been introduced for automatic BAC detection and quantification with increased accuracy. Previously, classification with deep learning had reached higher efficiency, but designing the structure of DL proved to be an extremely challenging task due to overfitting models. It also is not able to capture the patterns and irregularities presented in the images. To solve the overfitting problem, an optimal feature set has been formed by Enhanced Wolf… More >

  • Open Access

    ARTICLE

    AutoRhythmAI: A Hybrid Machine and Deep Learning Approach for Automated Diagnosis of Arrhythmias

    S. Jayanthi*, S. Prasanna Devi

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.045975

    Abstract In healthcare, the persistent challenge of arrhythmias, a leading cause of global mortality, has sparked extensive research into the automation of detection using machine learning (ML) algorithms. However, traditional ML and AutoML approaches have revealed their limitations, notably regarding feature generalization and automation efficiency. This glaring research gap has motivated the development of AutoRhythmAI, an innovative solution that integrates both machine and deep learning to revolutionize the diagnosis of arrhythmias. Our approach encompasses two distinct pipelines tailored for binary-class and multi-class arrhythmia detection, effectively bridging the gap between data preprocessing and model selection. To validate our system, we have rigorously… More >

Displaying 631-640 on page 64 of 2782. Per Page