Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,430)
  • Open Access

    ARTICLE

    A Cuckoo Search Detector Generation-based Negative Selection Algorithm

    Ayodele Lasisi1,*, Ali M. Aseere2

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 183-195, 2021, DOI:10.32604/csse.2021.015275 - 23 April 2021

    Abstract The negative selection algorithm (NSA) is an adaptive technique inspired by how the biological immune system discriminates the self from non-self. It asserts itself as one of the most important algorithms of the artificial immune system. A key element of the NSA is its great dependency on the random detectors in monitoring for any abnormalities. However, these detectors have limited performance. Redundant detectors are generated, leading to difficulties for detectors to effectively occupy the non-self space. To alleviate this problem, we propose the nature-inspired metaheuristic cuckoo search (CS), a stochastic global search algorithm, which improves… More >

  • Open Access

    ARTICLE

    Experimental Modal Damping Identification of a Mechanical Structure Using Video Magnification Technique

    Jaafar Hallal1,*, Mahmoud Fakih2, Hala Damerji3, Mohammad Hammoud4,5, Mehdi Chouman4,5

    Sound & Vibration, Vol.55, No.2, pp. 131-140, 2021, DOI:10.32604/sv.2021.015293 - 21 April 2021

    Abstract Vibration can be introduced in all mechanical fields in our life. Engineers try to avoid its negative effect leading in some cases to deformation in the machines. Many researches are dedicated to study the identification of damping especially in multi degree of freedom systems with particular attention to the source of energy dissipation. They focus on developing new tools or methods which may be used in real problems to obtain accurate results about the amount (or value) and the location of energy dissipation in the structure. The aim of this paper is to present an… More >

  • Open Access

    ARTICLE

    Combined Signal Processing Based Techniques and Feed Forward Neural Networks for Pathological Voice Detection and Classification

    T. Jayasree1,*, S.Emerald Shia2

    Sound & Vibration, Vol.55, No.2, pp. 141-161, 2021, DOI:10.32604/sv.2021.011734 - 21 April 2021

    Abstract This paper presents the pathological voice detection and classification techniques using signal processing based methodologies and Feed Forward Neural Networks (FFNN). The important pathological voices such as Autism Spectrum Disorder (ASD) and Down Syndrome (DS) are considered for analysis. These pathological voices are known to manifest in different ways in the speech of children and adults. Therefore, it is possible to discriminate ASD and DS children from normal ones using the acoustic features extracted from the speech of these subjects. The important attributes hidden in the pathological voices are extracted by applying different signal processing More >

  • Open Access

    ARTICLE

    A Broadcast Storm Detection and Treatment Method Based on Situational Awareness

    Zhe Zhu1, Mingjian Zhang2, Yong Liu1, Lan Ma1, Xin Liu1,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690 - 21 April 2021

    Abstract At present, the research of blockchain is very popular, but the practical application of blockchain is very few. The main reason is that the concurrency of blockchain is not enough to support application scenarios. After that, applications such as Intervalue increase the concurrency of blockchain transactions. However, due to the problems of network bandwidth and algorithm performance, there is always a broadcast storm, which affects the normal use of nodes in the whole network. However, the emergence of broadcast storms needs to rely on the node itself, which may be very slow. Even if developers… More >

  • Open Access

    ARTICLE

    A Fast Detection Method of Network Crime Based on User Portrait

    Yabin Xu1,2,*, Meishu Zhang2, Xiaowei Xu3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497 - 21 April 2021

    Abstract In order to quickly and accurately find the implementer of the network crime, based on the user portrait technology, a rapid detection method for users with abnormal behaviorsis proposed. This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance, and construct the user portrait including basic attribute tags, behavior attribute tags and abnormal behavior similarity tagsfor network users who have abnormal behaviors. When a network crime occurs, firstly get the corresponding tag values in all user portraits according to the category of the network crime. Then, use More >

  • Open Access

    ARTICLE

    XGBoost Algorithm under Differential Privacy Protection

    Yuanmin Shi1,2, Siran Yin1,2, Ze Chen1,2, Leiming Yan1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 9-16, 2021, DOI:10.32604/jihpp.2021.012193 - 21 April 2021

    Abstract Privacy protection is a hot research topic in information security field. An improved XGBoost algorithm is proposed to protect the privacy in classification tasks. By combining with differential privacy protection, the XGBoost can improve the classification accuracy while protecting privacy information. When using CART regression tree to build a single decision tree, noise is added according to Laplace mechanism. Compared with random forest algorithm, this algorithm can reduce computation cost and prevent overfitting to a certain extent. The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the More >

  • Open Access

    ARTICLE

    Feature-Enhanced RefineDet: Fast Detection of Small Objects

    Lei Zhao*, Ming Zhao

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 1-8, 2021, DOI:10.32604/jihpp.2021.010065 - 21 April 2021

    Abstract Object detection has been studied for many years. The convolutional neural network has made great progress in the accuracy and speed of object detection. However, due to the low resolution of small objects and the representation of fuzzy features, one of the challenges now is how to effectively detect small objects in images. Existing target detectors for small objects: one is to use high-resolution images as input, the other is to increase the depth of the CNN network, but these two methods will undoubtedly increase the cost of calculation and time-consuming. In this paper, based… More >

  • Open Access

    ARTICLE

    Computational Technique for Effectiveness of Treatments Used in Curing SARS-CoV-2

    Wael Alosaimi1, Rajeev Kumar2,*, Abdullah Alharbi1, Hashem Alyami3, Alka Agrawal4, Gaurav Kaithwas5, Sanjay Singh6, Raees Ahmad Khan4

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 617-628, 2021, DOI:10.32604/iasc.2021.016703 - 20 April 2021

    Abstract COVID-19 pandemic has unleashed an unprecedented humanitarian crisis in the world at present. With each passing day, the number of patients afflicted with Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is rising at an alarming pace, so much so that some countries are now combating the second wave of the contagion. As the death ratio due to the Virus increases, the medical fraternity and pharmacologists are working relentlessly to identify and prescribe a standardized and effective course of treatment for treating COVID-19 patients. However, medical specialists are confused about opting for the most efficacious course… More >

  • Open Access

    ARTICLE

    Discrete Element Modelling of Dynamic Behaviour of Rockfills for Resisting High Speed Projectile Penetration

    Tingting Zhao1, Y. T. Feng2,*, Jie Zhang1, Zhihua Wang1, Zhiyong Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.2, pp. 721-735, 2021, DOI:10.32604/cmes.2021.015913 - 19 April 2021

    Abstract This paper presents a convex polyhedral based discrete element method for modelling the dynamic behaviour of rockfills for resisting high speed projectile penetration. The contact between two convex polyhedra is defined by the Minkowski overlap and determined by the GJK and EPA algorithm. The contact force is calculated by a Minkowski overlap based normal model. The rotational motion of polyhedral particles is solved by employing a quaternion based orientation representation scheme. The energy-conserving nature of the polyhedral DEM method ensures a robust and effective modelling of convex particle systems. The method is applied to simulate… More >

  • Open Access

    ARTICLE

    A Real-Time Integrated Face Mask Detector to Curtail Spread of Coronavirus

    Shilpa Sethi1, Mamta Kathuria1,*, Trilok Kaushik2

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.2, pp. 389-409, 2021, DOI:10.32604/cmes.2021.014478 - 19 April 2021

    Abstract Effective strategies to control COVID-19 pandemic need high attention to mitigate negatively impacted communal health and global economy, with the brim-full horizon yet to unfold. In the absence of effective antiviral and limited medical resources, many measures are recommended by WHO to control the infection rate and avoid exhausting the limited medical resources. Wearing mask is among the non-pharmaceutical intervention measures that can be used as barrier to primary route of SARS-CoV2 droplets expelled by presymptomatic or asymptomatic individuals. Regardless of discourse on medical resources and diversities in masks, all countries are mandating coverings over… More >

Displaying 3251-3260 on page 326 of 4430. Per Page