Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (61)
  • Open Access

    ARTICLE

    A Novel Ego Lanes Detection Method for Autonomous Vehicles

    Bilal Bataineh*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1941-1961, 2023, DOI:10.32604/iasc.2023.039868

    Abstract Autonomous vehicles are currently regarded as an interesting topic in the AI field. For such vehicles, the lane where they are traveling should be detected. Most lane detection methods identify the whole road area with all the lanes built on it. In addition to having a low accuracy rate and slow processing time, these methods require costly hardware and training datasets, and they fail under critical conditions. In this study, a novel detection algorithm for a lane where a car is currently traveling is proposed by combining simple traditional image processing with lightweight machine learning (ML) methods. First, a preparation… More >

  • Open Access

    ARTICLE

    Comparative Analysis of COVID-19 Detection Methods Based on Neural Network

    Inès Hilali-Jaghdam1,*, Azhari A Elhag2, Anis Ben Ishak3, Bushra M. Elamin Elnaim4, Omer Eltag Mohammed Elhag5, Feda Muhammed Abuhaimed1, S. Abdel-Khalek2,6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1127-1150, 2023, DOI:10.32604/cmc.2023.038915

    Abstract In 2019, the novel coronavirus disease 2019 (COVID-19) ravaged the world. As of July 2021, there are about 192 million infected people worldwide and 4.1365 million deaths. At present, the new coronavirus is still spreading and circulating in many places around the world, especially since the emergence of Delta variant strains has increased the risk of the COVID-19 pandemic again. The symptoms of COVID-19 are diverse, and most patients have mild symptoms, with fever, dry cough, and fatigue as the main manifestations, and about 15.7% to 32.0% of patients will develop severe symptoms. Patients are screened in hospitals or primary… More >

  • Open Access

    ARTICLE

    Unsupervised Log Anomaly Detection Method Based on Multi-Feature

    Shiming He1, Tuo Deng1, Bowen Chen1, R. Simon Sherratt2, Jin Wang1,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 517-541, 2023, DOI:10.32604/cmc.2023.037392

    Abstract Log anomaly detection is an important paradigm for system troubleshooting. Existing log anomaly detection based on Long Short-Term Memory (LSTM) networks is time-consuming to handle long sequences. Transformer model is introduced to promote efficiency. However, most existing Transformer-based log anomaly detection methods convert unstructured log messages into structured templates by log parsing, which introduces parsing errors. They only extract simple semantic feature, which ignores other features, and are generally supervised, relying on the amount of labeled data. To overcome the limitations of existing methods, this paper proposes a novel unsupervised log anomaly detection method based on multi-feature (UMFLog). UMFLog includes… More >

  • Open Access

    ARTICLE

    MEB-YOLO: An Efficient Vehicle Detection Method in Complex Traffic Road Scenes

    Yingkun Song1, Shunhe Hong1, Chentao Hu1, Pingan He2, Lingbing Tao1, Zhixin Tie1,3,*, Chengfu Ding4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5761-5784, 2023, DOI:10.32604/cmc.2023.038910

    Abstract Rapid and precise vehicle recognition and classification are essential for intelligent transportation systems, and road target detection is one of the most difficult tasks in the field of computer vision. The challenge in real-time road target detection is the ability to properly pinpoint relatively small vehicles in complicated environments. However, because road targets are prone to complicated backgrounds and sparse features, it is challenging to detect and identify vehicle kinds fast and reliably. We suggest a new vehicle detection model called MEB-YOLO, which combines Mosaic and MixUp data augmentation, Efficient Channel Attention (ECA) attention mechanism, Bidirectional Feature Pyramid Network (BiFPN)… More >

  • Open Access

    ARTICLE

    An Erebus Attack Detection Method Oriented to Blockchain Network Layer

    Qianyi Dai1,2,*, Bin Zhang1,2, Kaiyong Xu1,2, Shuqin Dong1,2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5395-5431, 2023, DOI:10.32604/cmc.2023.036033

    Abstract Recently, the Erebus attack has proved to be a security threat to the blockchain network layer, and the existing research has faced challenges in detecting the Erebus attack on the blockchain network layer. The cloud-based active defense and one-sidedness detection strategies are the hindrances in detecting Erebus attacks. This study designs a detection approach by establishing a ReliefF_WMRmR-based two-stage feature selection algorithm and a deep learning-based multimodal classification detection model for Erebus attacks and responding to security threats to the blockchain network layer. The goal is to improve the performance of Erebus attack detection methods, by combining the traffic behavior… More >

  • Open Access

    ARTICLE

    A Novel Detection Method for Pavement Crack with Encoder-Decoder Architecture

    Yalong Yang1,2,3, Wenjing Xu1,2,3, Yinfeng Zhu4, Liangliang Su1,2,3,*, Gongquan Zhang1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 761-773, 2023, DOI:10.32604/cmes.2023.027010

    Abstract As a current popular method, intelligent detection of cracks is of great significance to road safety, so deep learning has gradually attracted attention in the field of crack image detection. The nonlinear structure, low contrast and discontinuity of cracks bring great challenges to existing crack detection methods based on deep learning. Therefore, an end-to-end deep convolutional neural network (AttentionCrack) is proposed for automatic crack detection to overcome the inaccuracy of boundary location between crack and non-crack pixels. The AttentionCrack network is built on U-Net based encoder-decoder architecture, and an attention mechanism is incorporated into the multi-scale convolutional feature to enhance… More >

  • Open Access

    ARTICLE

    Milling Fault Detection Method Based on Fault Tree Analysis and Hierarchical Belief Rule Base

    Xiaoyu Cheng1, Mingxian Long1, Wei He1,2,*, Hailong Zhu1

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2821-2844, 2023, DOI:10.32604/csse.2023.037330

    Abstract Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base. The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model. However, due to the complexity of the milling system structure and the uncertainty of the milling failure index, it is often impossible to construct model expert knowledge effectively. Therefore, a milling system fault detection method based on fault tree analysis and hierarchical BRB (FTBRB) is proposed. Firstly, the proposed method uses a fault tree and hierarchical BRB modeling. Through fault tree analysis (FTA),… More >

  • Open Access

    ARTICLE

    Intrusion Detection Method Based on Active Incremental Learning in Industrial Internet of Things Environment

    Zeyong Sun1, Guo Ran2, Zilong Jin1,3,*

    Journal on Internet of Things, Vol.4, No.2, pp. 99-111, 2022, DOI:10.32604/jiot.2022.037416

    Abstract Intrusion detection is a hot field in the direction of network security. Classical intrusion detection systems are usually based on supervised machine learning models. These offline-trained models usually have better performance in the initial stages of system construction. However, due to the diversity and rapid development of intrusion techniques, the trained models are often difficult to detect new attacks. In addition, very little noisy data in the training process often has a considerable impact on the performance of the intrusion detection system. This paper proposes an intrusion detection system based on active incremental learning with the adaptive capability to solve… More >

  • Open Access

    ARTICLE

    A Lightweight Electronic Water Pump Shell Defect Detection Method Based on Improved YOLOv5s

    Qunbiao Wu1, Zhen Wang1,*, Haifeng Fang1, Junji Chen1, Xinfeng Wan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 961-979, 2023, DOI:10.32604/csse.2023.036239

    Abstract For surface defects in electronic water pump shells, the manual detection efficiency is low, prone to misdetection and leak detection, and encounters problems, such as uncertainty. To improve the speed and accuracy of surface defect detection, a lightweight detection method based on an improved YOLOv5s method is proposed to replace the traditional manual detection methods. In this method, the MobileNetV3 module replaces the backbone network of YOLOv5s, depth-separable convolution is introduced, the parameters and calculations are reduced, and CIoU_Loss is used as the loss function of the boundary box regression to improve its detection accuracy. A dataset of electronic pump… More >

  • Open Access

    ARTICLE

    A Convolutional Autoencoder Based Fault Detection Method for Metro Railway Turnout

    Chen Chen1,2, Xingqiu Li2,3,*, Kai Huang4, Zhongwei Xu1, Meng Mei1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 471-485, 2023, DOI:10.32604/cmes.2023.024033

    Abstract Railway turnout is one of the critical equipment of Switch & Crossing (S&C) Systems in railway, related to the train’s safety and operation efficiency. With the advancement of intelligent sensors, data-driven fault detection technology for railway turnout has become an important research topic. However, little research in the literature has investigated the capability of data-driven fault detection technology for metro railway turnout. This paper presents a convolutional autoencoder-based fault detection method for the metro railway turnout considering human field inspection scenarios. First, the one-dimensional original time-series signal is converted into a two-dimensional image by data pre-processing and 2D representation. Next,… More >

Displaying 11-20 on page 2 of 61. Per Page