Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,990)
  • Open Access

    ARTICLE

    YOLO-O2E: A Variant YOLO Model for Anomalous Rail Fastening Detection

    Zhuhong Chu1, Jianxun Zhang1,*, Chengdong Wang2, Changhui Yang3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1143-1161, 2024, DOI:10.32604/cmc.2024.052269

    Abstract Rail fasteners are a crucial component of the railway transportation safety system. These fasteners, distinguished by their high length-to-width ratio, frequently encounter elevated failure rates, necessitating manual inspection and maintenance. Manual inspection not only consumes time but also poses the risk of potential oversights. With the advancement of deep learning technology in rail fasteners, challenges such as the complex background of rail fasteners and the similarity in their states are addressed. We have proposed an efficient and high-precision rail fastener detection algorithm, named YOLO-O2E (you only look once-O2E). Firstly, we propose the EFOV (Enhanced Field… More >

  • Open Access

    ARTICLE

    Transformer-Based Cloud Detection Method for High-Resolution Remote Sensing Imagery

    Haotang Tan1, Song Sun2,*, Tian Cheng3, Xiyuan Shu2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 661-678, 2024, DOI:10.32604/cmc.2024.052208

    Abstract Cloud detection from satellite and drone imagery is crucial for applications such as weather forecasting and environmental monitoring. Addressing the limitations of conventional convolutional neural networks, we propose an innovative transformer-based method. This method leverages transformers, which are adept at processing data sequences, to enhance cloud detection accuracy. Additionally, we introduce a Cyclic Refinement Architecture that improves the resolution and quality of feature extraction, thereby aiding in the retention of critical details often lost during cloud detection. Our extensive experimental validation shows that our approach significantly outperforms established models, excelling in high-resolution feature extraction and More >

  • Open Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 195-215, 2024, DOI:10.32604/cmc.2024.052070

    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

  • Open Access

    ARTICLE

    Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1457-1490, 2024, DOI:10.32604/cmc.2024.051996

    Abstract This study describes improving network security by implementing and assessing an intrusion detection system (IDS) based on deep neural networks (DNNs). The paper investigates contemporary technical ways for enhancing intrusion detection performance, given the vital relevance of safeguarding computer networks against harmful activity. The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset, a popular benchmark for IDS research. The model performs well in both the training and validation stages, with 91.30% training accuracy and 94.38% validation accuracy. Thus, the model shows good learning and generalization capabilities with minor losses of… More >

  • Open Access

    ARTICLE

    Phishing Attacks Detection Using Ensemble Machine Learning Algorithms

    Nisreen Innab1, Ahmed Abdelgader Fadol Osman2, Mohammed Awad Mohammed Ataelfadiel2, Marwan Abu-Zanona3,*, Bassam Mohammad Elzaghmouri4, Farah H. Zawaideh5, Mouiad Fadeil Alawneh6

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1325-1345, 2024, DOI:10.32604/cmc.2024.051778

    Abstract Phishing, an Internet fraud where individuals are deceived into revealing critical personal and account information, poses a significant risk to both consumers and web-based institutions. Data indicates a persistent rise in phishing attacks. Moreover, these fraudulent schemes are progressively becoming more intricate, thereby rendering them more challenging to identify. Hence, it is imperative to utilize sophisticated algorithms to address this issue. Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors. Machine learning (ML) approaches can identify common characteristics in most phishing assaults. In this paper, we propose an ensemble approach… More >

  • Open Access

    ARTICLE

    Detecting XSS with Random Forest and Multi-Channel Feature Extraction

    Qiurong Qin, Yueqin Li*, Yajie Mi, Jinhui Shen, Kexin Wu, Zhenzhao Wang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 843-874, 2024, DOI:10.32604/cmc.2024.051769

    Abstract In the era of the Internet, widely used web applications have become the target of hacker attacks because they contain a large amount of personal information. Among these vulnerabilities, stealing private data through cross-site scripting (XSS) attacks is one of the most commonly used attacks by hackers. Currently, deep learning-based XSS attack detection methods have good application prospects; however, they suffer from problems such as being prone to overfitting, a high false alarm rate, and low accuracy. To address these issues, we propose a multi-stage feature extraction and fusion model for XSS detection based on… More >

  • Open Access

    ARTICLE

    Evolutionary Variational YOLOv8 Network for Fault Detection in Wind Turbines

    Hongjiang Wang1, Qingze Shen2,*, Qin Dai1, Yingcai Gao2, Jing Gao2, Tian Zhang3,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 625-642, 2024, DOI:10.32604/cmc.2024.051757

    Abstract Deep learning has emerged in many practical applications, such as image classification, fault diagnosis, and object detection. More recently, convolutional neural networks (CNNs), representative models of deep learning, have been used to solve fault detection. However, the current design of CNNs for fault detection of wind turbine blades is highly dependent on domain knowledge and requires a large amount of trial and error. For this reason, an evolutionary YOLOv8 network has been developed to automatically find the network architecture for wind turbine blade-based fault detection. YOLOv8 is a CNN-backed object detection model. Specifically, to reduce… More >

  • Open Access

    ARTICLE

    Improved YOLOv8n Model for Detecting Helmets and License Plates on Electric Bicycles

    Qunyue Mu1,2, Qiancheng Yu1,2,*, Chengchen Zhou1,2, Lei Liu1,2, Xulong Yu1,2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 449-466, 2024, DOI:10.32604/cmc.2024.051728

    Abstract Wearing helmets while riding electric bicycles can significantly reduce head injuries resulting from traffic accidents. To effectively monitor compliance, the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles. However, manual enforcement by traffic police is time-consuming and labor-intensive. Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques. This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles, addressing these challenges. The More >

  • Open Access

    ARTICLE

    MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection

    Yu Yan1, Yu Yang1,*, Shen Fang1, Minna Gao2, Yiding Chen1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 875-896, 2024, DOI:10.32604/cmc.2024.051685

    Abstract In the face of the effective popularity of the Internet of Things (IoT), but the frequent occurrence of cybersecurity incidents, various cybersecurity protection means have been proposed and applied. Among them, Intrusion Detection System (IDS) has been proven to be stable and efficient. However, traditional intrusion detection methods have shortcomings such as low detection accuracy and inability to effectively identify malicious attacks. To address the above problems, this paper fully considers the superiority of deep learning models in processing high-dimensional data, and reasonable data type conversion methods can extract deep features and detect classification using… More >

  • Open Access

    ARTICLE

    Target Detection on Water Surfaces Using Fusion of Camera and LiDAR Based Information

    Yongguo Li, Yuanrong Wang, Jia Xie*, Caiyin Xu, Kun Zhang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 467-486, 2024, DOI:10.32604/cmc.2024.051426

    Abstract To address the challenges of missed detections in water surface target detection using solely visual algorithms in unmanned surface vehicle (USV) perception, this paper proposes a method based on the fusion of visual and LiDAR point-cloud projection for water surface target detection. Firstly, the visual recognition component employs an improved YOLOv7 algorithm based on a self-built dataset for the detection of water surface targets. This algorithm modifies the original YOLOv7 architecture to a Slim-Neck structure, addressing the problem of excessive redundant information during feature extraction in the original YOLOv7 network model. Simultaneously, this modification simplifies… More >

Displaying 11-20 on page 2 of 2990. Per Page