Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,095)
  • Open Access

    ARTICLE

    Ghost-YOLO v8: An Attention-Guided Enhanced Small Target Detection Algorithm for Floating Litter on Water Surfaces

    Zhongmin Huangfu, Shuqing Li*, Luoheng Yan

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3713-3731, 2024, DOI:10.32604/cmc.2024.054188 - 12 September 2024

    Abstract Addressing the challenges in detecting surface floating litter in artificial lakes, including complex environments, uneven illumination, and susceptibility to noise and weather, this paper proposes an efficient and lightweight Ghost-YOLO (You Only Look Once) v8 algorithm. The algorithm integrates advanced attention mechanisms and a small-target detection head to significantly enhance detection performance and efficiency. Firstly, an SE (Squeeze-and-Excitation) mechanism is incorporated into the backbone network to fortify the extraction of resilient features and precise target localization. This mechanism models feature channel dependencies, enabling adaptive adjustment of channel importance, thereby improving recognition of floating litter targets.… More >

  • Open Access

    REVIEW

    A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era

    Abdullah Alabdulatif1, Navod Neranjan Thilakarathne2,*, Zaharaddeen Karami Lawal3,4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3917-3943, 2024, DOI:10.32604/cmc.2024.054150 - 12 September 2024

    Abstract The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems (CPSs) seamlessly integrate physical processes with advanced digital technologies. However, as industries become increasingly interconnected and reliant on smart digital technologies, the intersection of physical and cyber domains introduces novel security considerations, endangering the entire industrial ecosystem. The transition towards a more cooperative setting, including humans and machines in Industry 5.0, together with the growing intricacy and interconnection of CPSs, presents distinct and diverse security and privacy challenges. In this regard, this study provides a comprehensive review of security and privacy concerns pertaining… More >

  • Open Access

    ARTICLE

    Multi-Label Image Classification Based on Object Detection and Dynamic Graph Convolutional Networks

    Xiaoyu Liu, Yong Hu*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4413-4432, 2024, DOI:10.32604/cmc.2024.053938 - 12 September 2024

    Abstract Multi-label image classification is recognized as an important task within the field of computer vision, a discipline that has experienced a significant escalation in research endeavors in recent years. The widespread adoption of convolutional neural networks (CNNs) has catalyzed the remarkable success of architectures such as ResNet-101 within the domain of image classification. However, in multi-label image classification tasks, it is crucial to consider the correlation between labels. In order to improve the accuracy and performance of multi-label classification and fully combine visual and semantic features, many existing studies use graph convolutional networks (GCN) for… More >

  • Open Access

    ARTICLE

    IMTNet: Improved Multi-Task Copy-Move Forgery Detection Network with Feature Decoupling and Multi-Feature Pyramid

    Huan Wang1, Hong Wang1, Zhongyuan Jiang2,*, Qing Qian1, Yong Long1

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4603-4620, 2024, DOI:10.32604/cmc.2024.053740 - 12 September 2024

    Abstract Copy-Move Forgery Detection (CMFD) is a technique that is designed to identify image tampering and locate suspicious areas. However, the practicality of the CMFD is impeded by the scarcity of datasets, inadequate quality and quantity, and a narrow range of applicable tasks. These limitations significantly restrict the capacity and applicability of CMFD. To overcome the limitations of existing methods, a novel solution called IMTNet is proposed for CMFD by employing a feature decoupling approach. Firstly, this study formulates the objective task and network relationship as an optimization problem using transfer learning. Furthermore, it thoroughly discusses… More >

  • Open Access

    ARTICLE

    Abnormal Action Detection Based on Parameter-Efficient Transfer Learning in Laboratory Scenarios

    Changyu Liu1, Hao Huang1, Guogang Huang2,*, Chunyin Wu1, Yingqi Liang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4219-4242, 2024, DOI:10.32604/cmc.2024.053625 - 12 September 2024

    Abstract Laboratory safety is a critical area of broad societal concern, particularly in the detection of abnormal actions. To enhance the efficiency and accuracy of detecting such actions, this paper introduces a novel method called TubeRAPT (Tubelet Transformer based on Adapter and Prefix Training Module). This method primarily comprises three key components: the TubeR network, an adaptive clustering attention mechanism, and a prefix training module. These components work in synergy to address the challenge of knowledge preservation in models pre-trained on large datasets while maintaining training efficiency. The TubeR network serves as the backbone for spatio-temporal… More >

  • Open Access

    ARTICLE

    FIBTNet: Building Change Detection for Remote Sensing Images Using Feature Interactive Bi-Temporal Network

    Jing Wang1,2,*, Tianwen Lin1, Chen Zhang1, Jun Peng1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4621-4641, 2024, DOI:10.32604/cmc.2024.053206 - 12 September 2024

    Abstract In this paper, a feature interactive bi-temporal change detection network (FIBTNet) is designed to solve the problem of pseudo change in remote sensing image building change detection. The network improves the accuracy of change detection through bi-temporal feature interaction. FIBTNet designs a bi-temporal feature exchange architecture (EXA) and a bi-temporal difference extraction architecture (DFA). EXA improves the feature exchange ability of the model encoding process through multiple space, channel or hybrid feature exchange methods, while DFA uses the change residual (CR) module to improve the ability of the model decoding process to extract different features More >

  • Open Access

    ARTICLE

    Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System

    Farhan Amin, Gyu Sang Choi*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3507-3521, 2024, DOI:10.32604/cmc.2024.053183 - 12 September 2024

    Abstract Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community. The call detail records (CDR) of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior. It is evident from the recent literature that cyber-physical systems (CPS) were used in the analytics and modeling of telecom data. In addition, CPS is used to provide valuable services in smart cities. In general, a typical telecom company has millions of subscribers and thus generates massive amounts of data. From this aspect, data storage, analysis, and processing… More >

  • Open Access

    ARTICLE

    Internet of Things Enabled DDoS Attack Detection Using Pigeon Inspired Optimization Algorithm with Deep Learning Approach

    Turki Ali Alghamdi, Saud S. Alotaibi*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4047-4064, 2024, DOI:10.32604/cmc.2024.052796 - 12 September 2024

    Abstract Internet of Things (IoTs) provides better solutions in various fields, namely healthcare, smart transportation, home, etc. Recognizing Denial of Service (DoS) outbreaks in IoT platforms is significant in certifying the accessibility and integrity of IoT systems. Deep learning (DL) models outperform in detecting complex, non-linear relationships, allowing them to effectually severe slight deviations from normal IoT activities that may designate a DoS outbreak. The uninterrupted observation and real-time detection actions of DL participate in accurate and rapid detection, permitting proactive reduction events to be executed, hence securing the IoT network’s safety and functionality. Subsequently, this… More >

  • Open Access

    ARTICLE

    Robust and Discriminative Feature Learning via Mutual Information Maximization for Object Detection in Aerial Images

    Xu Sun, Yinhui Yu*, Qing Cheng

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4149-4171, 2024, DOI:10.32604/cmc.2024.052725 - 12 September 2024

    Abstract Object detection in unmanned aerial vehicle (UAV) aerial images has become increasingly important in military and civil applications. General object detection models are not robust enough against interclass similarity and intraclass variability of small objects, and UAV-specific nuisances such as uncontrolled weather conditions. Unlike previous approaches focusing on high-level semantic information, we report the importance of underlying features to improve detection accuracy and robustness from the information-theoretic perspective. Specifically, we propose a robust and discriminative feature learning approach through mutual information maximization (RD-MIM), which can be integrated into numerous object detection methods for aerial images.… More >

  • Open Access

    ARTICLE

    Spatial Attention Integrated EfficientNet Architecture for Breast Cancer Classification with Explainable AI

    Sannasi Chakravarthy1, Bharanidharan Nagarajan2, Surbhi Bhatia Khan3,7,*, Vinoth Kumar Venkatesan2, Mahesh Thyluru Ramakrishna4, Ahlam Al Musharraf5, Khursheed Aurungzeb6

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 5029-5045, 2024, DOI:10.32604/cmc.2024.052531 - 12 September 2024

    Abstract Breast cancer is a type of cancer responsible for higher mortality rates among women. The cruelty of breast cancer always requires a promising approach for its earlier detection. In light of this, the proposed research leverages the representation ability of pretrained EfficientNet-B0 model and the classification ability of the XGBoost model for the binary classification of breast tumors. In addition, the above transfer learning model is modified in such a way that it will focus more on tumor cells in the input mammogram. Accordingly, the work proposed an EfficientNet-B0 having a Spatial Attention Layer with More >

Displaying 41-50 on page 5 of 3095. Per Page