Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,937)
  • Open Access

    ARTICLE

    Research on Robustness of Charging Station Networks under Multiple Recommended Charging Methods for Electric Vehicles

    Lei Feng1, Miao Liu1, Yexun Yuan1, Chi Zhang2, Peng Geng1,*

    Journal on Internet of Things, Vol.6, pp. 1-16, 2024, DOI:10.32604/jiot.2024.053584

    Abstract With the rapid development of electric vehicles, the requirements for charging stations are getting higher and higher. In this study, we constructed a charging station topology network in Nanjing through the Space-L method, mapping charging stations as network nodes and constructing edges through road relationships. The experiment introduced five EV charging recommendation strategies (based on distance, number of fast charging piles, user preference, price, and overall rating) used to simulate disordered charging caused by different user preferences, and the impact of the network dynamic robustness in case of node failure is explored by simulating the… More >

  • Open Access

    ARTICLE

    Track Defects Recognition Based on Axle-Box Vibration Acceleration and Deep-Learning Techniques

    Xianxian Yin1, Shimin Yin1, Yiming Bu2, Xiukun Wei3,*

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 623-640, 2024, DOI:10.32604/sdhm.2024.050195

    Abstract As an important component of load transfer, various fatigue damages occur in the track as the rail service life and train traffic increase gradually, such as rail corrugation, rail joint damage, uneven thermite welds, rail squats fastener defects, etc. Real-time recognition of track defects plays a vital role in ensuring the safe and stable operation of rail transit. In this paper, an intelligent and innovative method is proposed to detect the track defects by using axle-box vibration acceleration and deep learning network, and the coexistence of the above-mentioned typical track defects in the track system… More >

  • Open Access

    ARTICLE

    Fake News Detection Based on Cross-Modal Message Aggregation and Gated Fusion Network

    Fangfang Shan1,2,*, Mengyao Liu1,2, Menghan Zhang1,2, Zhenyu Wang1,2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1521-1542, 2024, DOI:10.32604/cmc.2024.053937

    Abstract Social media has become increasingly significant in modern society, but it has also turned into a breeding ground for the propagation of misleading information, potentially causing a detrimental impact on public opinion and daily life. Compared to pure text content, multmodal content significantly increases the visibility and share ability of posts. This has made the search for efficient modality representations and cross-modal information interaction methods a key focus in the field of multimodal fake news detection. To effectively address the critical challenge of accurately detecting fake news on social media, this paper proposes a fake… More >

  • Open Access

    ARTICLE

    Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols

    Ibrahim Alameri1,*, Tawfik Al-Hadhrami2, Anjum Nazir3, Abdulsamad Ebrahim Yahya4, Atef Gharbi5

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 319-339, 2024, DOI:10.32604/cmc.2024.052999

    Abstract This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network (MANET) routing protocols: Destination Sequenced Distance Vector (DSDV), Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zone Routing Protocol (ZRP). In this paper, the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis, Mann-Whitney, and Friedman. It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns. The study is premised upon the Quality of More >

  • Open Access

    ARTICLE

    Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network

    Wei Wu, Liang Yu, Liping Yang*, Yadong Zhang, Peng Wang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 587-603, 2024, DOI:10.32604/cmc.2024.052655

    Abstract As an open network architecture, Wireless Computing Power Networks (WCPN) pose new challenges for achieving efficient and secure resource management in networks, because of issues such as insecure communication channels and untrusted device terminals. Blockchain, as a shared, immutable distributed ledger, provides a secure resource management solution for WCPN. However, integrating blockchain into WCPN faces challenges like device heterogeneity, monitoring communication states, and dynamic network nature. Whereas Digital Twins (DT) can accurately maintain digital models of physical entities through real-time data updates and self-learning, enabling continuous optimization of WCPN, improving synchronization performance, ensuring real-time accuracy, More >

  • Open Access

    ARTICLE

    EDU-GAN: Edge Enhancement Generative Adversarial Networks with Dual-Domain Discriminators for Inscription Images Denoising

    Yunjing Liu1,, Erhu Zhang1,2,,*, Jingjing Wang3, Guangfeng Lin2, Jinghong Duan4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1633-1653, 2024, DOI:10.32604/cmc.2024.052611

    Abstract Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research issue. Different from natural images, character images pay more attention to stroke information. However, existing models mainly consider pixel-level information while ignoring structural information of the character, such as its edge and glyph, resulting in reconstructed images with mottled local structure and character damage. To solve these problems, we propose a novel generative adversarial network (GAN) framework based on an edge-guided generator and a discriminator constructed by a dual-domain U-Net framework, i.e., EDU-GAN. Unlike existing frameworks, the generator introduces the… More >

  • Open Access

    ARTICLE

    Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias

    Batyrkhan Omarov1,2,*, Meirzhan Baikuvekov1, Daniyar Sultan1, Nurzhan Mukazhanov3, Madina Suleimenova2, Maigul Zhekambayeva3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 341-359, 2024, DOI:10.32604/cmc.2024.052437

    Abstract This research introduces an innovative ensemble approach, combining Deep Residual Networks (ResNets) and Bidirectional Gated Recurrent Units (BiGRU), augmented with an Attention Mechanism, for the classification of heart arrhythmias. The escalating prevalence of cardiovascular diseases necessitates advanced diagnostic tools to enhance accuracy and efficiency. The model leverages the deep hierarchical feature extraction capabilities of ResNets, which are adept at identifying intricate patterns within electrocardiogram (ECG) data, while BiGRU layers capture the temporal dynamics essential for understanding the sequential nature of ECG signals. The integration of an Attention Mechanism refines the model’s focus on critical segments… More >

  • Open Access

    ARTICLE

    An Enhanced GAN for Image Generation

    Chunwei Tian1,2,3,4, Haoyang Gao2,3, Pengwei Wang2, Bob Zhang1,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 105-118, 2024, DOI:10.32604/cmc.2024.052097

    Abstract Generative adversarial networks (GANs) with gaming abilities have been widely applied in image generation. However, gamistic generators and discriminators may reduce the robustness of the obtained GANs in image generation under varying scenes. Enhancing the relation of hierarchical information in a generation network and enlarging differences of different network architectures can facilitate more structural information to improve the generation effect for image generation. In this paper, we propose an enhanced GAN via improving a generator for image generation (EIGGAN). EIGGAN applies a spatial attention to a generator to extract salient information to enhance the truthfulness… More >

  • Open Access

    ARTICLE

    Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS

    Kenian Wang1,2,*, Yuan Hong1,2, Chunxiao Li2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1123-1142, 2024, DOI:10.32604/cmc.2024.052088

    Abstract With the exponential increase in information security risks, ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment. However, experts possess a limited understanding of fundamental security elements, such as assets, threats, and vulnerabilities, due to the confidentiality of airborne networks, resulting in cognitive uncertainty. Therefore, the Pythagorean fuzzy Analytic Hierarchy Process (AHP) Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks. First, Pythagorean fuzzy AHP is employed to construct an index system… More >

  • Open Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 195-215, 2024, DOI:10.32604/cmc.2024.052070

    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

Displaying 1-10 on page 1 of 2937. Per Page