Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (527)
  • Open Access


    NFHP-RN: A Method of Few-Shot Network Attack Detection Based on the Network Flow Holographic Picture-ResNet

    Tao Yi1,3, Xingshu Chen1,2,*, Mingdong Yang3, Qindong Li1, Yi Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 929-955, 2024, DOI:10.32604/cmes.2024.048793

    Abstract Due to the rapid evolution of Advanced Persistent Threats (APTs) attacks, the emergence of new and rare attack samples, and even those never seen before, make it challenging for traditional rule-based detection methods to extract universal rules for effective detection. With the progress in techniques such as transfer learning and meta-learning, few-shot network attack detection has progressed. However, challenges in few-shot network attack detection arise from the inability of time sequence flow features to adapt to the fixed length input requirement of deep learning, difficulties in capturing rich information from original flow in the case of insufficient samples, and the… More >

  • Open Access


    Perception Enhanced Deep Deterministic Policy Gradient for Autonomous Driving in Complex Scenarios

    Lyuchao Liao1,2, Hankun Xiao2,*, Pengqi Xing2, Zhenhua Gan1,2, Youpeng He2, Jiajun Wang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 557-576, 2024, DOI:10.32604/cmes.2024.047452

    Abstract Autonomous driving has witnessed rapid advancement; however, ensuring safe and efficient driving in intricate scenarios remains a critical challenge. In particular, traffic roundabouts bring a set of challenges to autonomous driving due to the unpredictable entry and exit of vehicles, susceptibility to traffic flow bottlenecks, and imperfect data in perceiving environmental information, rendering them a vital issue in the practical application of autonomous driving. To address the traffic challenges, this work focused on complex roundabouts with multi-lane and proposed a Perception Enhanced Deep Deterministic Policy Gradient (PE-DDPG) for Autonomous Driving in the Roundabouts. Specifically, the model incorporates an enhanced variational… More >

  • Open Access


    An Image Fingerprint and Attention Mechanism Based Load Estimation Algorithm for Electric Power System

    Qing Zhu1,*, Linlin Gu1,2, Huijie Lin1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 577-591, 2024, DOI:10.32604/cmes.2023.043307

    Abstract With the rapid development of electric power systems, load estimation plays an important role in system operation and planning. Usually, load estimation techniques contain traditional, time series, regression analysis-based, and machine learning-based estimation. Since the machine learning-based method can lead to better performance, in this paper, a deep learning-based load estimation algorithm using image fingerprint and attention mechanism is proposed. First, an image fingerprint construction is proposed for training data. After the data preprocessing, the training data matrix is constructed by the cyclic shift and cubic spline interpolation. Then, the linear mapping and the gray-color transformation method are proposed to… More >

  • Open Access


    Scheme Based on Multi-Level Patch Attention and Lesion Localization for Diabetic Retinopathy Grading

    Zhuoqun Xia1, Hangyu Hu1, Wenjing Li2,3, Qisheng Jiang1, Lan Pu1, Yicong Shu1, Arun Kumar Sangaiah4,5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 409-430, 2024, DOI:10.32604/cmes.2024.030052

    Abstract Early screening of diabetes retinopathy (DR) plays an important role in preventing irreversible blindness. Existing research has failed to fully explore effective DR lesion information in fundus maps. Besides, traditional attention schemes have not considered the impact of lesion type differences on grading, resulting in unreasonable extraction of important lesion features. Therefore, this paper proposes a DR diagnosis scheme that integrates a multi-level patch attention generator (MPAG) and a lesion localization module (LLM). Firstly, MPAG is used to predict patches of different sizes and generate a weighted attention map based on the prediction score and the types of lesions contained… More >

  • Open Access


    Study on Flame-retardant Mechanism of Epoxy Resin containing Polyvinylphenylsilsesquioxane


    Journal of Polymer Materials, Vol.36, No.4, pp. 381-389, 2019, DOI:10.32381/JPM.2019.36.04.7

    Abstract In this study, a novel flame retardant polyvinylphenylsilsesquioxane (PVP) was added into epoxy resin (EP) to prepare EP/PVP (FREP) composites. The results of cone calorimeter measurement showed that in comparison with virgin EP, the peak heat release rate (PHRR) and total heat release (THR) of FREP were reduced by 27.3% and 10.4%, respectively. Moreover, the thermal degradation behavior of FREP was studied by the Kissinger and Ozawa-Flynn-Wall methods. The results suggested that the addition of PVP greatly enhanced the thermal stability of EP in the final stage, which could be attributed to that the branched silicone with vinyl and phenyl… More >

  • Open Access


    Lightweight Cross-Modal Multispectral Pedestrian Detection Based on Spatial Reweighted Attention Mechanism

    Lujuan Deng, Ruochong Fu*, Zuhe Li, Boyi Liu, Mengze Xue, Yuhao Cui

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4071-4089, 2024, DOI:10.32604/cmc.2024.048200

    Abstract Multispectral pedestrian detection technology leverages infrared images to provide reliable information for visible light images, demonstrating significant advantages in low-light conditions and background occlusion scenarios. However, while continuously improving cross-modal feature extraction and fusion, ensuring the model’s detection speed is also a challenging issue. We have devised a deep learning network model for cross-modal pedestrian detection based on Resnet50, aiming to focus on more reliable features and enhance the model’s detection efficiency. This model employs a spatial attention mechanism to reweight the input visible light and infrared image data, enhancing the model’s focus on different spatial positions and sharing the… More >

  • Open Access


    Data Secure Storage Mechanism for IIoT Based on Blockchain

    Jin Wang1,2, Guoshu Huang1, R. Simon Sherratt3, Ding Huang4, Jia Ni4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4029-4048, 2024, DOI:10.32604/cmc.2024.047468

    Abstract With the development of Industry 4.0 and big data technology, the Industrial Internet of Things (IIoT) is hampered by inherent issues such as privacy, security, and fault tolerance, which pose certain challenges to the rapid development of IIoT. Blockchain technology has immutability, decentralization, and autonomy, which can greatly improve the inherent defects of the IIoT. In the traditional blockchain, data is stored in a Merkle tree. As data continues to grow, the scale of proofs used to validate it grows, threatening the efficiency, security, and reliability of blockchain-based IIoT. Accordingly, this paper first analyzes the inefficiency of the traditional blockchain… More >

  • Open Access


    Predicting Traffic Flow Using Dynamic Spatial-Temporal Graph Convolution Networks

    Yunchang Liu1,*, Fei Wan1, Chengwu Liang2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4343-4361, 2024, DOI:10.32604/cmc.2024.047211

    Abstract Traffic flow prediction plays a key role in the construction of intelligent transportation system. However, due to its complex spatio-temporal dependence and its uncertainty, the research becomes very challenging. Most of the existing studies are based on graph neural networks that model traffic flow graphs and try to use fixed graph structure to deal with the relationship between nodes. However, due to the time-varying spatial correlation of the traffic network, there is no fixed node relationship, and these methods cannot effectively integrate the temporal and spatial features. This paper proposes a novel temporal-spatial dynamic graph convolutional network (TSADGCN). The dynamic… More >

  • Open Access


    Fake News Detection Based on Text-Modal Dominance and Fusing Multiple Multi-Model Clues

    Lifang Fu1, Huanxin Peng2,*, Changjin Ma2, Yuhan Liu2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4399-4416, 2024, DOI:10.32604/cmc.2024.047053

    Abstract In recent years, how to efficiently and accurately identify multi-model fake news has become more challenging. First, multi-model data provides more evidence but not all are equally important. Secondly, social structure information has proven to be effective in fake news detection and how to combine it while reducing the noise information is critical. Unfortunately, existing approaches fail to handle these problems. This paper proposes a multi-model fake news detection framework based on Tex-modal Dominance and fusing Multiple Multi-model Cues (TD-MMC), which utilizes three valuable multi-model clues: text-model importance, text-image complementary, and text-image inconsistency. TD-MMC is dominated by textural content and… More >

  • Open Access


    A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

    Fauziyah1, Zhaoshun Wang1,*, Mujahid Tabassum2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4417-4452, 2024, DOI:10.32604/cmc.2024.046797

    Abstract In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning… More >

Displaying 1-10 on page 1 of 527. Per Page