Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (59)
  • Open Access

    ARTICLE

    A Detection Method of Bolts on Axlebox Cover Based on Cascade Deep Convolutional Neural Network

    Ji Wang1, Liming Li1,2,3, Shubin Zheng1,3, Shuguang Zhao2, Xiaodong Chai1,3, Lele Peng1,3, Weiwei Qi1,3, Qianqian Tong1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1671-1706, 2023, DOI:10.32604/cmes.2022.022143

    Abstract Loosening detection; cascade deep convolutional neural network; object localization; saliency detection problem of bolts on axlebox covers. Firstly, an SSD network based on ResNet50 and CBAM module by improving bolt image features is proposed for locating bolts on axlebox covers. And then, the A2-PFN is proposed according to the slender features of the marker lines for extracting more accurate marker lines regions of the bolts. Finally, a rectangular approximation method is proposed to regularize the marker line regions as a way to calculate the angle of the marker line and plot all the angle values into an angle table, according… More > Graphic Abstract

    A Detection Method of Bolts on Axlebox Cover Based on Cascade Deep Convolutional Neural Network

  • Open Access

    ARTICLE

    Ghost-RetinaNet: Fast Shadow Detection Method for Photovoltaic Panels Based on Improved RetinaNet

    Jun Wu, Penghui Fan, Yingxin Sun, Weifeng Gui*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 1305-1321, 2023, DOI:10.32604/cmes.2022.020919

    Abstract Based on the artificial intelligence algorithm of RetinaNet, we propose the Ghost-RetinaNet in this paper, a fast shadow detection method for photovoltaic panels, to solve the problems of extreme target density, large overlap, high cost and poor real-time performance in photovoltaic panel shadow detection. Firstly, the Ghost CSP module based on Cross Stage Partial (CSP) is adopted in feature extraction network to improve the accuracy and detection speed. Based on extracted features, recursive feature fusion structure is mentioned to enhance the feature information of all objects. We introduce the SiLU activation function and CIoU Loss to increase the learning and… More >

  • Open Access

    ARTICLE

    Slope Collapse Detection Method Based on Deep Learning Technology

    Xindai An1, Di Wu1,2,*, Xiangwen Xie1, Kefeng Song1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 1091-1103, 2023, DOI:10.32604/cmes.2022.020670

    Abstract So far, slope collapse detection mainly depends on manpower, which has the following drawbacks: (1) low reliability, (2) high risk of human safe, (3) high labor cost. To improve the efficiency and reduce the human investment of slope collapse detection, this paper proposes an intelligent detection method based on deep learning technology for the task. In this method, we first use the deep learning-based image segmentation technology to find the slope area from the captured scene image. Then the foreground motion detection method is used for detecting the motion of the slope area. Finally, we design a lightweight convolutional neural… More >

  • Open Access

    ARTICLE

    User Interface-Based Repeated Sequence Detection Method for Authentication

    Shin Jin Kang1, Soo Kyun Kim2,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2573-2588, 2023, DOI:10.32604/iasc.2023.029893

    Abstract In this paper, we propose an authentication method that use mouse and keystroke dynamics to enhance online privacy and security. The proposed method identifies personalized repeated user interface (UI) sequences by analyzing mouse and keyboard data. To this end, an Apriori algorithm based on the keystroke-level model (KLM) of the human–computer interface domain was used. The proposed system can detect repeated UI sequences based on KLM for authentication in the software. The effectiveness of the proposed method is verified through access testing using commercial applications that require intensive UI interactions. The results show using our cognitive mouse-and-keystroke dynamics system can… More >

  • Open Access

    ARTICLE

    A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

    Mouna Bedoui1,*, Belgacem Bouallegue1,2, Abdelmoty M. Ahmed2, Belgacem Hamdi1,3, Mohsen Machhout1, Mahmoud1, M. Khattab2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2177-2193, 2023, DOI:10.32604/csse.2023.026516

    Abstract Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against… More >

  • Open Access

    ARTICLE

    Deep Learning Based Image Forgery Detection Methods

    Liang Xiu-jian1,2,*, Sun He2

    Journal of Cyber Security, Vol.4, No.2, pp. 119-133, 2022, DOI:10.32604/jcs.2022.032915

    Abstract Increasingly advanced image processing technology has made digital image editing easier and easier. With image processing software at one’s fingertips, one can easily alter the content of an image, and the altered image is so realistic that it is illegible to the naked eye. These tampered images have posed a serious threat to personal privacy, social order, and national security. Therefore, detecting and locating tampered areas in images has important practical significance, and has become an important research topic in the field of multimedia information security. In recent years, deep learning technology has been widely used in image tampering localization,… More >

  • Open Access

    ARTICLE

    Performance Analysis of Breast Cancer Detection Method Using ANFIS Classification Approach

    K. Nagalakshmi1,*, S. Dr. Suriya2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 501-517, 2023, DOI:10.32604/csse.2023.022687

    Abstract Breast cancer is one of the deadly diseases prevailing in women. Earlier detection and diagnosis might prevent the death rate. Effective diagnosis of breast cancer remains a significant challenge, and early diagnosis is essential to avoid the most severe manifestations of the disease. The existing systems have computational complexity and classification accuracy problems over various breast cancer databases. In order to overcome the above-mentioned issues, this work introduces an efficient classification and segmentation process. Hence, there is a requirement for developing a fully automatic methodology for screening the cancer regions. This paper develops a fully automated method for breast cancer… More >

  • Open Access

    ARTICLE

    A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems

    K. Muthulakshmi1,*, N. Krishnaraj2, R. S. Ravi Sankar3, A. Balakumar4, S. Kanimozhi5, B. Kiruthika6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2083-2096, 2022, DOI:10.32604/iasc.2022.026628

    Abstract In recent times, Cyber-physical system (CPS) integrates the cyber systems and physical world for performing critical processes that are started from the development in digital electronics. The sensors deployed in CPS are commonly employed for monitoring and controlling processes that are susceptible to anomalies. For identifying and detecting anomalies, an effective anomaly detection system (ADS) is developed. But ADS faces high false alarms and miss detection rate, which led to the degraded performance in CPS applications. This study develops a novel deep learning (DL) approach for anomaly detection in sensor-based CPS using Bidirectional Long Short Term Memory with Red Deer… More >

  • Open Access

    ARTICLE

    Research on Known Vulnerability Detection Method Based on Firmware Analysis

    Wenjing Wang1, Tengteng Zhao1, Xiaolong Li1,*, Lei Huang1, Wei Zhang1, Hui Guo2

    Journal of Cyber Security, Vol.4, No.1, pp. 1-15, 2022, DOI:10.32604/jcs.2022.026816

    Abstract At present, the network security situation is becoming more and more serious. Malicious network attacks such as computer viruses, Trojans and hacker attacks are becoming more and more rampant. National and group network attacks such as network information war and network terrorism have a serious damage to the production and life of the whole society. At the same time, with the rapid development of Internet of Things and the arrival of 5G era, IoT devices as an important part of industrial Internet system, have become an important target of infiltration attacks by hostile forces. This paper describes the challenges facing… More >

  • Open Access

    ARTICLE

    Cooperative Detection Method for DDoS Attacks Based on Blockchain

    Jieren Cheng1,2, Xinzhi Yao1,2,*, Hui Li3, Hao Lu4, Naixue Xiong5, Ping Luo1,2, Le Liu1,2, Hao Guo1,2, Wen Feng1,2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 103-117, 2022, DOI:10.32604/csse.2022.025668

    Abstract Distributed Denial of Service (DDoS) attacks is always one of the major problems for service providers. Using blockchain to detect DDoS attacks is one of the current popular methods. However, the problems of high time overhead and cost exist in the most of the blockchain methods for detecting DDoS attacks. This paper proposes a blockchain-based collaborative detection method for DDoS attacks. First, the trained DDoS attack detection model is encrypted by the Intel Software Guard Extensions (SGX), which provides high security for uploading the DDoS attack detection model to the blockchain. Secondly, the service provider uploads the encrypted model to… More >

Displaying 21-30 on page 3 of 59. Per Page