Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (104)
  • Open Access

    ARTICLE

    Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network

    Jiaming Mao1,*, Mingming Zhang1, Mu Chen2, Lu Chen2, Fei Xia1, Lei Fan1, ZiXuan Wang3, Wenbing Zhao4

    Computer Systems Science and Engineering, Vol.39, No.3, pp. 373-390, 2021, DOI:10.32604/csse.2021.018086 - 12 August 2021

    Abstract The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning… More >

  • Open Access

    ARTICLE

    Conveyor Belt Detection Based on Deep Convolution GANs

    Xiaoli Hao1,*, Xiaojuan Meng1, Yueqin Zhang1, Jindong Xue2, Jinyue Xia3

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 601-613, 2021, DOI:10.32604/iasc.2021.017963 - 11 August 2021

    Abstract The belt conveyor is essential in coal mine underground transportation. The belt properties directly affect the safety of the conveyor. It is essential to monitor that the belt works well. Traditional non-contact detection methods are usually time-consuming, and they only identify a single instance of damage. In this paper, a new belt-tear detection method is developed, characterized by two time-scale update rules for a multi-class deep convolution generative adversarial network. To use this method, only a small amount of image data needs to be labeled, and batch normalization in the generator must be removed to… More >

  • Open Access

    ARTICLE

    Generating Cartoon Images from Face Photos with Cycle-Consistent Adversarial Networks

    Tao Zhang1,2, Zhanjie Zhang1,2,*, Wenjing Jia3, Xiangjian He3, Jie Yang4

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2733-2747, 2021, DOI:10.32604/cmc.2021.019305 - 21 July 2021

    Abstract The generative adversarial network (GAN) is first proposed in 2014, and this kind of network model is machine learning systems that can learn to measure a given distribution of data, one of the most important applications is style transfer. Style transfer is a class of vision and graphics problems where the goal is to learn the mapping between an input image and an output image. CYCLE-GAN is a classic GAN model, which has a wide range of scenarios in style transfer. Considering its unsupervised learning characteristics, the mapping is easy to be learned between an… More >

  • Open Access

    ARTICLE

    A Novel AlphaSRGAN for Underwater Image Super Resolution

    Aswathy K. Cherian*, E. Poovammal

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1537-1552, 2021, DOI:10.32604/cmc.2021.018213 - 21 July 2021

    Abstract Obtaining clear images of underwater scenes with descriptive details is an arduous task. Conventional imaging techniques fail to provide clear cut features and attributes that ultimately result in object recognition errors. Consequently, a need for a system that produces clear images for underwater image study has been necessitated. To overcome problems in resolution and to make better use of the Super-Resolution (SR) method, this paper introduces a novel method that has been derived from the Alpha Generative Adversarial Network (AlphaGAN) model, named Alpha Super Resolution Generative Adversarial Network (AlphaSRGAN). The model put forth in this… More >

  • Open Access

    ARTICLE

    Conveyor-Belt Detection of Conditional Deep Convolutional Generative Adversarial Network

    Xiaoli Hao1,*, Xiaojuan Meng1, Yueqin Zhang1, JinDong Xue2, Jinyue Xia3

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2671-2685, 2021, DOI:10.32604/cmc.2021.016856 - 21 July 2021

    Abstract In underground mining, the belt is a critical component, as its state directly affects the safe and stable operation of the conveyor. Most of the existing non-contact detection methods based on machine vision can only detect a single type of damage and they require pre-processing operations. This tends to cause a large amount of calculation and low detection precision. To solve these problems, in the work described in this paper a belt tear detection method based on a multi-class conditional deep convolutional generative adversarial network (CDCGAN) was designed. In the traditional DCGAN, the image generated… More >

  • Open Access

    ARTICLE

    COVID-19 Automatic Detection Using Deep Learning

    Yousef Sanajalwe1,2,*, Mohammed Anbar1, Salam Al-E’mari1

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 15-35, 2021, DOI:10.32604/csse.2021.017191 - 10 June 2021

    Abstract The novel coronavirus disease 2019 (COVID-19) is a pandemic disease that is currently affecting over 200 countries around the world and impacting billions of people. The first step to mitigate and control its spread is to identify and isolate the infected people. But, because of the lack of reverse transcription polymerase chain reaction (RT-CPR) tests, it is important to discover suspected COVID-19 cases as early as possible, such as by scan analysis and chest X-ray by radiologists. However, chest X-ray analysis is relatively time-consuming since it requires more than 15 minutes per case. In this… More >

  • Open Access

    ARTICLE

    GAN-GLS: Generative Lyric Steganography Based on Generative Adversarial Networks

    Cuilin Wang1, Yuling Liu1,*, Yongju Tong1, Jingwen Wang2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1375-1390, 2021, DOI:10.32604/cmc.2021.017950 - 04 June 2021

    Abstract Steganography based on generative adversarial networks (GANs) has become a hot topic among researchers. Due to GANs being unsuitable for text fields with discrete characteristics, researchers have proposed GAN-based steganography methods that are less dependent on text. In this paper, we propose a new method of generative lyrics steganography based on GANs, called GAN-GLS. The proposed method uses the GAN model and the large-scale lyrics corpus to construct and train a lyrics generator. In this method, the GAN uses a previously generated line of a lyric as the input sentence in order to generate the… More >

  • Open Access

    ARTICLE

    Speech Enhancement via Residual Dense Generative Adversarial Network

    Lin Zhou1,*, Qiuyue Zhong1, Tianyi Wang1, Siyuan Lu1, Hongmei Hu2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 279-289, 2021, DOI:10.32604/csse.2021.016524 - 19 May 2021

    Abstract Generative adversarial networks (GANs) are paid more attention to dealing with the end-to-end speech enhancement in recent years. Various GAN-based enhancement methods are presented to improve the quality of reconstructed speech. However, the performance of these GAN-based methods is worse than those of masking-based methods. To tackle this problem, we propose speech enhancement method with a residual dense generative adversarial network (RDGAN) contributing to map the log-power spectrum (LPS) of degraded speech to the clean one. In detail, a residual dense block (RDB) architecture is designed to better estimate the LPS of clean speech, which… More >

  • Open Access

    ARTICLE

    Image-to-Image Style Transfer Based on the Ghost Module

    Yan Jiang1, Xinrui Jia1, Liguo Zhang1,2,*, Ye Yuan1, Lei Chen3, Guisheng Yin1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4051-4067, 2021, DOI:10.32604/cmc.2021.016481 - 06 May 2021

    Abstract The technology for image-to-image style transfer (a prevalent image processing task) has developed rapidly. The purpose of style transfer is to extract a texture from the source image domain and transfer it to the target image domain using a deep neural network. However, the existing methods typically have a large computational cost. To achieve efficient style transfer, we introduce a novel Ghost module into the GANILLA architecture to produce more feature maps from cheap operations. Then we utilize an attention mechanism to transform images with various styles. We optimize the original generative adversarial network (GAN) More >

  • Open Access

    ARTICLE

    Evolutionary GAN–Based Data Augmentation for Cardiac Magnetic Resonance Image

    Ying Fu1,2,*, Minxue Gong1, Guang Yang1, Hong Wei3, Jiliu Zhou1,2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1359-1374, 2021, DOI:10.32604/cmc.2021.016536 - 22 March 2021

    Abstract Generative adversarial networks (GANs) have considerable potential to alleviate challenges linked to data scarcity. Recent research has demonstrated the good performance of this method for data augmentation because GANs synthesize semantically meaningful data from standard signal distribution. The goal of this study was to solve the overfitting problem that is caused by the training process of convolution networks with a small dataset. In this context, we propose a data augmentation method based on an evolutionary generative adversarial network for cardiac magnetic resonance images to extend the training data. In our structure of the evolutionary GAN,… More >

Displaying 81-90 on page 9 of 104. Per Page