Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (416)
  • Open Access

    ARTICLE

    Optimizing Fully Convolutional Encoder-Decoder Network for Segmentation of Diabetic Eye Disease

    Abdul Qadir Khan1, Guangmin Sun1,*, Yu Li1, Anas Bilal2, Malik Abdul Manan1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2481-2504, 2023, DOI:10.32604/cmc.2023.043239

    Abstract In the emerging field of image segmentation, Fully Convolutional Networks (FCNs) have recently become prominent. However, their effectiveness is intimately linked with the correct selection and fine-tuning of hyperparameters, which can often be a cumbersome manual task. The main aim of this study is to propose a more efficient, less labour-intensive approach to hyperparameter optimization in FCNs for segmenting fundus images. To this end, our research introduces a hyperparameter-optimized Fully Convolutional Encoder-Decoder Network (FCEDN). The optimization is handled by a novel Genetic Grey Wolf Optimization (G-GWO) algorithm. This algorithm employs the Genetic Algorithm (GA) to generate a diverse set of… More >

  • Open Access

    ARTICLE

    Convolutional Neural Network Model for Fire Detection in Real-Time Environment

    Abdul Rehman, Dongsun Kim*, Anand Paul

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2289-2307, 2023, DOI:10.32604/cmc.2023.036435

    Abstract Disasters such as conflagration, toxic smoke, harmful gas or chemical leakage, and many other catastrophes in the industrial environment caused by hazardous distance from the peril are frequent. The calamities are causing massive fiscal and human life casualties. However, Wireless Sensors Network-based adroit monitoring and early warning of these dangerous incidents will hamper fiscal and social fiasco. The authors have proposed an early fire detection system uses machine and/or deep learning algorithms. The article presents an Intelligent Industrial Monitoring System (IIMS) and introduces an Industrial Smart Social Agent (ISSA) in the Industrial SIoT (ISIoT) paradigm. The proffered ISSA empowers smart… More >

  • Open Access

    ARTICLE

    Detecting Android Botnet Applications Using Convolution Neural Network

    Mamona Arshad1, Ahmad Karim1, Salman Naseer2, Shafiq Ahmad3, Mejdal Alqahtani3, Akber Abid Gardezi4, Muhammad Shafiq5,*, Jin-Ghoo Choi5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2123-2135, 2023, DOI:10.32604/cmc.2022.028680

    Abstract The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e., games applications, entertainment, online banking, social network sites, etc., and also allow the end users to perform a variety of activities. Because of activities, mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information, phishing, spamming, Distributed Denial of Services (DDoS), and malware dissemination. Botnet applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area. A… More >

  • Open Access

    ARTICLE

    A Monitoring Method for Transmission Tower Foots Displacement Based on Wind-Induced Vibration Response

    Zhicheng Liu1, Long Zhao1,*, Guanru Wen1, Peng Yuan2, Qiu Jin1

    Structural Durability & Health Monitoring, Vol.17, No.6, pp. 541-555, 2023, DOI:10.32604/sdhm.2023.029760

    Abstract The displacement of transmission tower feet can seriously affect the safe operation of the tower, and the accuracy of structural health monitoring methods is limited at the present stage. The application of deep learning method provides new ideas for structural health monitoring of towers, but the current amount of tower vibration fault data is restricted to provide adequate training data for Deep Learning (DL). In this paper, we propose a DT-DL based tower foot displacement monitoring method, which firstly simulates the wind-induced vibration response data of the tower under each fault condition by finite element method. Then the vibration signal… More > Graphic Abstract

    A Monitoring Method for Transmission Tower Foots Displacement Based on Wind-Induced Vibration Response

  • Open Access

    ARTICLE

    An Intelligent Sensor Data Preprocessing Method for OCT Fundus Image Watermarking Using an RCNN

    Jialun Lin1, Qiong Chen1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1549-1561, 2024, DOI:10.32604/cmes.2023.029631

    Abstract Watermarks can provide reliable and secure copyright protection for optical coherence tomography (OCT) fundus images. The effective image segmentation is helpful for promoting OCT image watermarking. However, OCT images have a large amount of low-quality data, which seriously affects the performance of segmentation methods. Therefore, this paper proposes an effective segmentation method for OCT fundus image watermarking using a rough convolutional neural network (RCNN). First, the rough-set-based feature discretization module is designed to preprocess the input data. Second, a dual attention mechanism for feature channels and spatial regions in the CNN is added to enable the model to adaptively select… More >

  • Open Access

    ARTICLE

    The Analysis of the Correlation between SPT and CPT Based on CNN-GA and Liquefaction Discrimination Research

    Ruihan Bai1, Feng Shen2,*, Zihao Zhao3, Zhiping Zhang4, Qisi Yu4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1159-1182, 2024, DOI:10.32604/cmes.2023.029562

    Abstract The objective of this study is to investigate the methods for soil liquefaction discrimination. Typically, predicting soil liquefaction potential involves conducting the standard penetration test (SPT), which requires field testing and can be time-consuming and labor-intensive. In contrast, the cone penetration test (CPT) provides a more convenient method and offers detailed and continuous information about soil layers. In this study, the feature matrix based on CPT data is proposed to predict the standard penetration test blow count N. The feature matrix comprises the CPT characteristic parameters at specific depths, such as tip resistance qc, sleeve resistance fs, and depth H.… More >

  • Open Access

    ARTICLE

    Fast and Accurate Detection of Masked Faces Using CNNs and LBPs

    Sarah M. Alhammad1, Doaa Sami Khafaga1,*, Aya Y. Hamed2, Osama El-Koumy3, Ehab R. Mohamed3, Khalid M. Hosny3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2939-2952, 2023, DOI:10.32604/csse.2023.041011

    Abstract Face mask detection has several applications, including real-time surveillance, biometrics, etc. Identifying face masks is also helpful for crowd control and ensuring people wear them publicly. With monitoring personnel, it is impossible to ensure that people wear face masks; automated systems are a much superior option for face mask detection and monitoring. This paper introduces a simple and efficient approach for masked face detection. The architecture of the proposed approach is very straightforward; it combines deep learning and local binary patterns to extract features and classify them as masked or unmasked. The proposed system requires hardware with minimal power consumption… More >

  • Open Access

    ARTICLE

    Enhanced 3D Point Cloud Reconstruction for Light Field Microscopy Using U-Net-Based Convolutional Neural Networks

    Shariar Md Imtiaz1, Ki-Chul Kwon1, F. M. Fahmid Hossain1, Md. Biddut Hossain1, Rupali Kiran Shinde1, Sang-Keun Gil2, Nam Kim1,*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2921-2937, 2023, DOI:10.32604/csse.2023.040205

    Abstract This article describes a novel approach for enhancing the three-dimensional (3D) point cloud reconstruction for light field microscopy (LFM) using U-net architecture-based fully convolutional neural network (CNN). Since the directional view of the LFM is limited, noise and artifacts make it difficult to reconstruct the exact shape of 3D point clouds. The existing methods suffer from these problems due to the self-occlusion of the model. This manuscript proposes a deep fusion learning (DL) method that combines a 3D CNN with a U-Net-based model as a feature extractor. The sub-aperture images obtained from the light field microscopy are aligned to form… More >

  • Open Access

    ARTICLE

    Chinese Cyber Threat Intelligence Named Entity Recognition via RoBERTa-wwm-RDCNN-CRF

    Zhen Zhen1, Jian Gao1,2,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 299-323, 2023, DOI:10.32604/cmc.2023.042090

    Abstract In recent years, cyber attacks have been intensifying and causing great harm to individuals, companies, and countries. The mining of cyber threat intelligence (CTI) can facilitate intelligence integration and serve well in combating cyber attacks. Named Entity Recognition (NER), as a crucial component of text mining, can structure complex CTI text and aid cybersecurity professionals in effectively countering threats. However, current CTI NER research has mainly focused on studying English CTI. In the limited studies conducted on Chinese text, existing models have shown poor performance. To fully utilize the power of Chinese pre-trained language models (PLMs) and conquer the problem… More >

  • Open Access

    ARTICLE

    EMU-Net: Automatic Brain Tumor Segmentation and Classification Using Efficient Modified U-Net

    Mohammed Aly1,*, Abdullah Shawan Alotaibi2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 557-582, 2023, DOI:10.32604/cmc.2023.042493

    Abstract Tumor segmentation is a valuable tool for gaining insights into tumors and improving treatment outcomes. Manual segmentation is crucial but time-consuming. Deep learning methods have emerged as key players in automating brain tumor segmentation. In this paper, we propose an efficient modified U-Net architecture, called EMU-Net, which is applied to the BraTS 2020 dataset. Our approach is organized into two distinct phases: classification and segmentation. In this study, our proposed approach encompasses the utilization of the gray-level co-occurrence matrix (GLCM) as the feature extraction algorithm, convolutional neural networks (CNNs) as the classification algorithm, and the chi-square method for feature selection.… More >

Displaying 31-40 on page 4 of 416. Per Page