Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Perpendicular-Cutdepth: Perpendicular Direction Depth Cutting Data Augmentation Method

    Le Zou1, Linsong Hu1, Yifan Wang1, Zhize Wu2, Xiaofeng Wang1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 927-941, 2024, DOI:10.32604/cmc.2024.048889

    Abstract Depth estimation is an important task in computer vision. Collecting data at scale for monocular depth estimation is challenging, as this task requires simultaneously capturing RGB images and depth information. Therefore, data augmentation is crucial for this task. Existing data augmentation methods often employ pixel-wise transformations, which may inadvertently disrupt edge features. In this paper, we propose a data augmentation method for monocular depth estimation, which we refer to as the Perpendicular-Cutdepth method. This method involves cutting real-world depth maps along perpendicular directions and pasting them onto input images, thereby diversifying the data without compromising edge features. To validate the… More >

  • Open Access

    ARTICLE

    Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier

    Khaled Soliman1,*, Mohamed Sobh2, Ayman M. Bahaa-Eldin2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1419-1439, 2024, DOI:10.32604/cmc.2024.048883

    Abstract The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leads to wide losses for various organizations. These dangers have proven that signature-based approaches are insufficient to prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious Executable Detection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE) files in hosts using Windows operating systems through collecting PE headers and applying machine learning mechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031 benign files and 179,071 malware samples from diverse sources to ensure the efficiency… More >

  • Open Access

    ARTICLE

    A Hybrid Level Set Optimization Design Method of Functionally Graded Cellular Structures Considering Connectivity

    Yan Dong1,2, Kang Zhao1, Liang Gao1, Hao Li1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1-18, 2024, DOI:10.32604/cmc.2024.048870

    Abstract With the continuous advancement in topology optimization and additive manufacturing (AM) technology, the capability to fabricate functionally graded materials and intricate cellular structures with spatially varying microstructures has grown significantly. However, a critical challenge is encountered in the design of these structures–the absence of robust interface connections between adjacent microstructures, potentially resulting in diminished efficiency or macroscopic failure. A Hybrid Level Set Method (HLSM) is proposed, specifically designed to enhance connectivity among non-uniform microstructures, contributing to the design of functionally graded cellular structures. The HLSM introduces a pioneering algorithm for effectively blending heterogeneous microstructure interfaces. Initially, an interpolation algorithm is… More >

  • Open Access

    ARTICLE

    A Novel Foreign Object Detection Method in Transmission Lines Based on Improved YOLOv8n

    Yakui Liu1,2,3,*, Xing Jiang1, Ruikang Xu1, Yihao Cui1, Chenhui Yu1, Jingqi Yang1, Jishuai Zhou1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1263-1279, 2024, DOI:10.32604/cmc.2024.048864

    Abstract The rapid pace of urban development has resulted in the widespread presence of construction equipment and increasingly complex conditions in transmission corridors. These conditions pose a serious threat to the safe operation of the power grid. Machine vision technology, particularly object recognition technology, has been widely employed to identify foreign objects in transmission line images. Despite its wide application, the technique faces limitations due to the complex environmental background and other auxiliary factors. To address these challenges, this study introduces an improved YOLOv8n. The traditional stepwise convolution and pooling layers are replaced with a spatial-depth convolution (SPD-Conv) module, aiming to… More >

  • Open Access

    ARTICLE

    Efficient Unsupervised Image Stitching Using Attention Mechanism with Deep Homography Estimation

    Chunbin Qin*, Xiaotian Ran

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1319-1334, 2024, DOI:10.32604/cmc.2024.048850

    Abstract Traditional feature-based image stitching techniques often encounter obstacles when dealing with images lacking unique attributes or suffering from quality degradation. The scarcity of annotated datasets in real-life scenes severely undermines the reliability of supervised learning methods in image stitching. Furthermore, existing deep learning architectures designed for image stitching are often too bulky to be deployed on mobile and peripheral computing devices. To address these challenges, this study proposes a novel unsupervised image stitching method based on the YOLOv8 (You Only Look Once version 8) framework that introduces deep homography networks and attention mechanisms. The methodology is partitioned into three distinct… More >

  • Open Access

    REVIEW

    Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

    Shafi Ullah1, Sibghat Ullah Bazai1,*, Mohammad Imran2, Qazi Mudassar Ilyas3,*, Abid Mehmood4, Muhammad Asim Saleem5, Muhmmad Aasim Rafique3, Arsalan Haider6, Ilyas Khan7, Sajid Iqbal3, Yonis Gulzar4, Kauser Hameed3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 93-115, 2024, DOI:10.32604/cmc.2024.048796

    Abstract Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine-type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the data and devices becomes challenging… More >

  • Open Access

    ARTICLE

    Alternative Method of Constructing Granular Neural Networks

    Yushan Yin1, Witold Pedrycz1,2, Zhiwu Li1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 623-650, 2024, DOI:10.32604/cmc.2024.048787

    Abstract Utilizing granular computing to enhance artificial neural network architecture, a new type of network emerges—the granular neural network (GNN). GNNs offer distinct advantages over their traditional counterparts: The ability to process both numerical and granular data, leading to improved interpretability. This paper proposes a novel design method for constructing GNNs, drawing inspiration from existing interval-valued neural networks built upon NNNs. However, unlike the proposed algorithm in this work, which employs interval values or triangular fuzzy numbers for connections, existing methods rely on a pre-defined numerical network. This new method utilizes a uniform distribution of information granularity to granulate connections with… More >

  • Open Access

    ARTICLE

    Safety-Constrained Multi-Agent Reinforcement Learning for Power Quality Control in Distributed Renewable Energy Networks

    Yongjiang Zhao, Haoyi Zhong, Chang Cyoon Lim*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 449-471, 2024, DOI:10.32604/cmc.2024.048771

    Abstract This paper examines the difficulties of managing distributed power systems, notably due to the increasing use of renewable energy sources, and focuses on voltage control challenges exacerbated by their variable nature in modern power grids. To tackle the unique challenges of voltage control in distributed renewable energy networks, researchers are increasingly turning towards multi-agent reinforcement learning (MARL). However, MARL raises safety concerns due to the unpredictability in agent actions during their exploration phase. This unpredictability can lead to unsafe control measures. To mitigate these safety concerns in MARL-based voltage control, our study introduces a novel approach: Safety-Constrained Multi-Agent Reinforcement Learning… More >

  • Open Access

    ARTICLE

    Sentiment Analysis of Low-Resource Language Literature Using Data Processing and Deep Learning

    Aizaz Ali1, Maqbool Khan1,2, Khalil Khan3, Rehan Ullah Khan4, Abdulrahman Aloraini4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 713-733, 2024, DOI:10.32604/cmc.2024.048712

    Abstract Sentiment analysis, a crucial task in discerning emotional tones within the text, plays a pivotal role in understanding public opinion and user sentiment across diverse languages. While numerous scholars conduct sentiment analysis in widely spoken languages such as English, Chinese, Arabic, Roman Arabic, and more, we come to grappling with resource-poor languages like Urdu literature which becomes a challenge. Urdu is a uniquely crafted language, characterized by a script that amalgamates elements from diverse languages, including Arabic, Parsi, Pashtu, Turkish, Punjabi, Saraiki, and more. As Urdu literature, characterized by distinct character sets and linguistic features, presents an additional hurdle due… More >

  • Open Access

    ARTICLE

    Attention-Enhanced Voice Portrait Model Using Generative Adversarial Network

    Jingyi Mao, Yuchen Zhou, Yifan Wang, Junyu Li, Ziqing Liu, Fanliang Bu*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 837-855, 2024, DOI:10.32604/cmc.2024.048703

    Abstract Voice portrait technology has explored and established the relationship between speakers’ voices and their facial features, aiming to generate corresponding facial characteristics by providing the voice of an unknown speaker. Due to its powerful advantages in image generation, Generative Adversarial Networks (GANs) have now been widely applied across various fields. The existing Voice2Face methods for voice portraits are primarily based on GANs trained on voice-face paired datasets. However, voice portrait models solely constructed on GANs face limitations in image generation quality and struggle to maintain facial similarity. Additionally, the training process is relatively unstable, thereby affecting the overall generative performance… More >

Displaying 11-20 on page 2 of 5350. Per Page