Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (61)
  • Open Access

    ARTICLE

    Vehicle Target Detection Method Based on Improved SSD Model

    Guanghui Yu1, Honghui Fan1, Hongyan Zhou1, Tao Wu1, Hongjin Zhu1, *

    Journal on Artificial Intelligence, Vol.2, No.3, pp. 125-135, 2020, DOI:10.32604/jai.2020.010501

    Abstract When we use traditional computer vision Inspection technology to locate the vehicles, we find that the results were unsatisfactory, because of the existence of diversified scenes and uncertainty. So, we present a new method based on improved SSD model. We adopt ResNet101 to enhance the feature extraction ability of algorithm model instead of the VGG16 used by the classic model. Meanwhile, the new method optimizes the loss function, such as the loss function of predicted offset, and makes the loss function drop more smoothly near zero points. In addition, the new method improves cross entropy loss function of category prediction,… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack on Content Centric Network

    Yabin Xu1, 2, 3, *, Ting Xu3, Xiaowei Xu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1075-1089, 2020, DOI:10.32604/cmc.2020.09849

    Abstract To improve the attack detection capability of content centric network (CCN), we propose a detection method of interest flooding attack (IFA) making use of the feature of self-similarity of traffic and the information entropy of content name of interest packet. On the one hand, taking advantage of the characteristics of self-similarity is very sensitive to traffic changes, calculating the Hurst index of the traffic, to identify initial IFA attacks. On the other hand, according to the randomness of user requests, calculating the information entropy of content name of the interest packets, to detect the severity of the IFA attack, is.… More >

  • Open Access

    ARTICLE

    Programming Logic Modeling and Cross-Program Defect Detection Method for Object-Oriented Code

    Yan Liu1, Wenyuan Fang1, Qiang Wei1, *, Yuan Zhao1, Liang Wang2

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 273-295, 2020, DOI:10.32604/cmc.2020.09659

    Abstract Code defects can lead to software vulnerability and even produce vulnerability risks. Existing research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to some extent. However, these detection techniques are mainly based on text features and have weak detection capabilities across programs. Compared with the uncertainty of the code and text caused by the developer’s personalization, the programming language has a stricter logical specification, which reflects the rules and requirements of the language itself and the developer’s potential way of thinking. This article replaces text analysis with programming logic modeling, breaks… More >

  • Open Access

    ARTICLE

    A Polyp Detection Method Based on FBnet

    Jingjing Wan1, Taiyue Chen2, *, Bolun Chen2, 3, *, Yongtao Yu2, Yiyun Sheng2, Xinggang Ma1

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1263-1272, 2020, DOI:10.32604/cmc.2020.010098

    Abstract The incidence of colorectal cancer (CRC) in China has increased in recent years. The mortality rate of CRC has become one of the highest among all cancers; CRC increasingly affects the health and quality of people’s lives. However, due to the insufficiency of medical resources in China, the workload on medical doctors has further increased. In the past few decades, the adult CRC mortality and morbidity rate dropped sharply, mainly because of CRC screening and removal of adenomatous polyps. However, due to the differences in polyp itself and the skills of endoscopists, the detection rate of polyps varies greatly. In… More >

  • Open Access

    ARTICLE

    A Lane Detection Method Based on Semantic Segmentation

    Ling Ding1, 2, Huyin Zhang1, *, Jinsheng Xiao3, *, Cheng Shu3, Shejie Lu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.3, pp. 1039-1053, 2020, DOI:10.32604/cmes.2020.08268

    Abstract This paper proposes a novel method of lane detection, which adopts VGG16 as the basis of convolutional neural network to extract lane line features by cavity convolution, wherein the lane lines are divided into dotted lines and solid lines. Expanding the field of experience through hollow convolution, the full connection layer of the network is discarded, the last largest pooling layer of the VGG16 network is removed, and the processing of the last three convolution layers is replaced by hole convolution. At the same time, CNN adopts the encoder and decoder structure mode, and uses the index function of the… More >

  • Open Access

    ARTICLE

    A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning

    Jieren Cheng1, 2, Junqi Li2, *, Xiangyan Tang2, Victor S. Sheng3, Chen Zhang2, Mengyang Li2

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1423-1443, 2020, DOI:10.32604/cmc.2020.06176

    Abstract Distributed Denial of Service (DDoS) attack has become one of the most destructive network attacks which can pose a mortal threat to Internet security. Existing detection methods cannot effectively detect early attacks. In this paper, we propose a detection method of DDoS attacks based on generalized multiple kernel learning (GMKL) combining with the constructed parameter R. The super-fusion feature value (SFV) and comprehensive degree of feature (CDF) are defined to describe the characteristic of attack flow and normal flow. A method for calculating R based on SFV and CDF is proposed to select the combination of kernel function and regularization… More >

  • Open Access

    ARTICLE

    Fire Detection Method Based on Improved Fruit Fly Optimization-Based SVM

    Fangming Bi1, 2, Xuanyi Fu1, 2, Wei Chen1, 2, 3, *, Weidong Fang4, Xuzhi Miao1, 2, Biruk Assefa1, 5

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 199-216, 2020, DOI:10.32604/cmc.2020.06258

    Abstract Aiming at the defects of the traditional fire detection methods, which are caused by false positives and false negatives in large space buildings, a fire identification detection method based on video images is proposed. The algorithm first uses the hybrid Gaussian background modeling method and the RGB color model to perform fire prejudgment on the video image, which can eliminate most non-fire interferences. Secondly, the traditional regional growth algorithm is improved and the fire image segmentation effect is effectively improved. Then, based on the segmented image, the dynamic and static features of the fire flame are further analyzed and extracted… More >

  • Open Access

    ARTICLE

    Research on Privacy Disclosure Detection Method in Social Networks Based on Multi-Dimensional Deep Learning

    Yabin Xu1, 2, *, Xuyang Meng1, Yangyang Li3, Xiaowei Xu4, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 137-155, 2020, DOI:10.32604/cmc.2020.05825

    Abstract In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users, this paper takes microblog as the research object to study the detection of privacy disclosure in social networks. First, we perform fast privacy leak detection on the currently published text based on the fastText model. In the case that the text to be published contains certain private information, we fully consider the aggregation effect of the private information leaked by different channels, and establish a convolution neural network model based on multi-dimensional features (MF-CNN) to detect privacy disclosure comprehensively and… More >

  • Open Access

    ABSTRACT

    The Tap-Scan Damage Detection Method for Bridge Structures

    Zhihai Xiang, Xiaowei Dai, Yao Zhang, Longqi Wang, Qiuhai Lu

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.16, No.4, pp. 123-124, 2011, DOI:10.3970/icces.2011.016.123

    Abstract In this talk, we are going to introduce a new method that can detect the damage in bridge structures through the acceleration of a passing vehicle mounted with a tapping device. This method was inspired by the hunting behavior of woodpeckers and the idea of obtaining natural frequencies of bridge structures through the dynamic response of a passing vehicle [1].

    Based on a simple vehicle-bridge interaction model, we analytically found out that the vehicle acceleration contains the damage information, which can be represented by the instantaneous stiffness Z as follows: (1)
    where yB is the deflection of bridge,… More >

  • Open Access

    ARTICLE

    Frequency Shift Curve Based Damage Detection Method for Beam Structures

    Y. Zhang1,2, Z.H. Xiang1,3

    CMC-Computers, Materials & Continua, Vol.26, No.1, pp. 19-36, 2011, DOI:10.3970/cmc.2011.026.019

    Abstract Vibration based damage detection methods play an important role in the maintenance of beam structures such as bridges. However, most of them require the accurate measurement of structural mode shapes, which may not be easily satisfied in practice. Since the measurement of frequencies is more accurate than that of mode shapes, this paper proposes a frequency shift curve (FSC) method, based on the equivalence between the FSC due to auxiliary mass and the mode shape square, which has been demonstrated to be effective in structural damage detection. Two damage indices based on the FSC are developed, which are called the… More >

Displaying 51-60 on page 6 of 61. Per Page