Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access


    Leaky Cable Fixture Detection in Railway Tunnel Based on RW DCGAN and Compressed GS-YOLOv5

    Suhang Li1, Yunzuo Zhang1,*, Ruixue Liu2, Jiayu Zhang1, Zhouchen Song1, Yutai Wang1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1163-1180, 2023, DOI:10.32604/iasc.2023.037902

    Abstract The communication system of high-speed trains in railway tunnels needs to be built with leaky cables fixed on the tunnel wall with special fixtures. To ensure safety, checking the regular leaky cable fixture is necessary to eliminate the potential danger. At present, the existing fixture detection algorithms are difficult to take into account detection accuracy and speed at the same time. The faulty fixture is also insufficient and difficult to obtain, seriously affecting the model detection effect. To solve these problems, an innovative detection method is proposed in this paper. Firstly, we presented the Res-Net… More >

  • Open Access


    Improving Date Fruit Classification Using CycleGAN-Generated Dataset

    Dina M. Ibrahim1,2,*, Nada M. Elshennawy2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 331-348, 2022, DOI:10.32604/cmes.2022.016419

    Abstract Dates are an important part of human nutrition. Dates are high in essential nutrients and provide a number of health benefits. Date fruits are also known to protect against a number of diseases, including cancer and heart disease. Date fruits have several sizes, colors, tastes, and values. There are a lot of challenges facing the date producers. One of the most significant challenges is the classification and sorting of dates. But there is no public dataset for date fruits, which is a major limitation in order to improve the performance of convolutional neural networks (CNN)… More >

  • Open Access


    Reinforced CNN Forensic Discriminator to Detect Document Forgery by DCGAN

    Seo-young Lim, Jeongho Cho*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6039-6051, 2022, DOI:10.32604/cmc.2022.024862

    Abstract Recently, the technology of digital image forgery based on a generative adversarial network (GAN) has considerably improved to the extent that it is difficult to distinguish it from the original image with the naked eye by compositing and editing a person's face or a specific part with the original image. Thus, much attention has been paid to digital image forgery as a social issue. Further, document forgery through GANs can completely change the meaning and context in a document, and it is difficult to identify whether the document is forged or not, which is dangerous.… More >

  • Open Access


    A New Method of Image Restoration Technology Based on WGAN

    Wei Fang1,2,*, Enming Gu1, Weinan Yi1, Weiqing Wang1, Victor S. Sheng3

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 689-698, 2022, DOI:10.32604/csse.2022.020176

    Abstract With the development of image restoration technology based on deep learning, more complex problems are being solved, especially in image semantic inpainting based on context. Nowadays, image semantic inpainting techniques are becoming more mature. However, due to the limitations of memory, the instability of training, and the lack of sample diversity, the results of image restoration are still encountering difficult problems, such as repairing the content of glitches which cannot be well integrated with the original image. Therefore, we propose an image inpainting network based on Wasserstein generative adversarial network (WGAN) distance. With the corresponding More >

  • Open Access


    Adversarial Examples Generation Algorithm through DCGAN

    Biying Deng1, Ziyong Ran1, Jixin Chen1, Desheng Zheng1,*, Qiao Yang2, Lulu Tian3

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 889-898, 2021, DOI:10.32604/iasc.2021.019727

    Abstract In recent years, due to the popularization of deep learning technology, more and more attention has been paid to the security of deep neural networks. A wide variety of machine learning algorithms can attack neural networks and make its classification and judgement of target samples wrong. However, the previous attack algorithms are based on the calculation of the corresponding model to generate unique adversarial examples, and cannot extract attack features and generate corresponding samples in batches. In this paper, Generative Adversarial Networks (GAN) is used to learn the distribution of adversarial examples generated by FGSM More >

  • Open Access


    A New Sequential Image Prediction Method Based on LSTM and DCGAN

    Wei Fang1, 2, Feihong Zhang1, *, Yewen Ding1, Jack Sheng3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 217-231, 2020, DOI:10.32604/cmc.2020.06395

    Abstract Image recognition technology is an important field of artificial intelligence. Combined with the development of machine learning technology in recent years, it has great researches value and commercial value. As a matter of fact, a single recognition function can no longer meet people’s needs, and accurate image prediction is the trend that people pursue. This paper is based on Long Short-Term Memory (LSTM) and Deep Convolution Generative Adversarial Networks (DCGAN), studies and implements a prediction model by using radar image data. We adopt a stack cascading strategy in designing network connection which can control of More >

  • Open Access


    A Method for Improving CNN-Based Image Recognition Using DCGAN

    Wei Fang1,2, Feihong Zhang1,*, Victor S. Sheng3, Yewen Ding1

    CMC-Computers, Materials & Continua, Vol.57, No.1, pp. 167-178, 2018, DOI:10.32604/cmc.2018.02356

    Abstract Image recognition has always been a hot research topic in the scientific community and industry. The emergence of convolutional neural networks(CNN) has made this technology turned into research focus on the field of computer vision, especially in image recognition. But it makes the recognition result largely dependent on the number and quality of training samples. Recently, DCGAN has become a frontier method for generating images, sounds, and videos. In this paper, DCGAN is used to generate sample that is difficult to collect and proposed an efficient design method of generating model. We combine DCGAN with More >

Displaying 1-10 on page 1 of 7. Per Page