Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,016)
  • Open Access

    ARTICLE

    A Study of the Effect of the Miller Cycle on the Combustion of a Supercharged Marine Diesel Engine

    Lingjie Zhao, Cong Li*

    Energy Engineering, Vol.121, No.5, pp. 1363-1380, 2024, DOI:10.32604/ee.2024.046918

    Abstract The Miller cycle is a program that effectively reduces NOx emissions from marine diesel engines by lowering the maximum combustion temperature in the cylinder, thereby reducing NOx emissions. To effectively investigate the impact of Miller cycle optimum combustion performance and emission capability under high load conditions, this study will perform a one-dimensional simulation of the performance of a marine diesel engine, as well as a three-dimensional simulation of the combustion in the cylinder. A 6-cylinder four-stroke single-stage supercharged diesel engine is taken as the research object. The chassis dynamometer and other related equipment are used to build the test system,… More >

  • Open Access

    ARTICLE

    Complementary-Label Adversarial Domain Adaptation Fault Diagnosis Network under Time-Varying Rotational Speed and Weakly-Supervised Conditions

    Siyuan Liu1,*, Jinying Huang2, Jiancheng Ma1, Licheng Jing2, Yuxuan Wang2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 761-777, 2024, DOI:10.32604/cmc.2024.049484

    Abstract Recent research in cross-domain intelligence fault diagnosis of machinery still has some problems, such as relatively ideal speed conditions and sample conditions. In engineering practice, the rotational speed of the machine is often transient and time-varying, which makes the sample annotation increasingly expensive. Meanwhile, the number of samples collected from different health states is often unbalanced. To deal with the above challenges, a complementary-label (CL) adversarial domain adaptation fault diagnosis network (CLADAN) is proposed under time-varying rotational speed and weakly-supervised conditions. In the weakly supervised learning condition, machine prior information is used for sample annotation via cost-friendly complementary label learning.… More >

  • Open Access

    ARTICLE

    Upper and Lower Bounds of the α-Universal Triple I Method for Unified Interval Implications

    Yiming Tang1,2, Jianwei Gao1,*, Yifan Huang1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1063-1088, 2024, DOI:10.32604/cmc.2024.049341

    Abstract The α-universal triple I (α-UTI) method is a recognized scheme in the field of fuzzy reasoning, which was proposed by our research group previously. The robustness of fuzzy reasoning determines the quality of reasoning algorithms to a large extent, which is quantified by calculating the disparity between the output of fuzzy reasoning with interference and the output without interference. Therefore, in this study, the interval robustness (embodied as the interval stability) of the α-UTI method is explored in the interval-valued fuzzy environment. To begin with, the stability of the α-UTI method is explored for the case of an individual rule,… More >

  • Open Access

    ARTICLE

    Efficient Unsupervised Image Stitching Using Attention Mechanism with Deep Homography Estimation

    Chunbin Qin*, Xiaotian Ran

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1319-1334, 2024, DOI:10.32604/cmc.2024.048850

    Abstract Traditional feature-based image stitching techniques often encounter obstacles when dealing with images lacking unique attributes or suffering from quality degradation. The scarcity of annotated datasets in real-life scenes severely undermines the reliability of supervised learning methods in image stitching. Furthermore, existing deep learning architectures designed for image stitching are often too bulky to be deployed on mobile and peripheral computing devices. To address these challenges, this study proposes a novel unsupervised image stitching method based on the YOLOv8 (You Only Look Once version 8) framework that introduces deep homography networks and attention mechanisms. The methodology is partitioned into three distinct… More >

  • Open Access

    ARTICLE

    E2E-MFERC: A Multi-Face Expression Recognition Model for Group Emotion Assessment

    Lin Wang1, Juan Zhao2, Hu Song3, Xiaolong Xu4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1105-1135, 2024, DOI:10.32604/cmc.2024.048688

    Abstract In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assess students’ group emotions can provide educators with more comprehensive and intuitive classroom effect analysis, thereby continuously promoting the improvement of teaching quality. However, most existing multi-face expression recognition methods adopt a multi-stage approach, with an overall complex process, poor real-time performance, and insufficient generalization ability. In addition, the existing facial expression datasets are mostly single face images, which are of low quality and lack specificity, also restricting the development of this research. This paper aims to propose an end-to-end high-performance multi-face expression recognition algorithm model suitable… More >

  • Open Access

    ARTICLE

    Weakly Supervised Network with Scribble-Supervised and Edge-Mask for Road Extraction from High-Resolution Remote Sensing Images

    Supeng Yu1, Fen Huang1,*, Chengcheng Fan2,3,4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 549-562, 2024, DOI:10.32604/cmc.2024.048608

    Abstract Significant advancements have been achieved in road surface extraction based on high-resolution remote sensing image processing. Most current methods rely on fully supervised learning, which necessitates enormous human effort to label the image. Within this field, other research endeavors utilize weakly supervised methods. These approaches aim to reduce the expenses associated with annotation by leveraging sparsely annotated data, such as scribbles. This paper presents a novel technique called a weakly supervised network using scribble-supervised and edge-mask (WSSE-net). This network is a three-branch network architecture, whereby each branch is equipped with a distinct decoder module dedicated to road extraction tasks. One… More >

  • Open Access

    ARTICLE

    A Study on Enhancing Chip Detection Efficiency Using the Lightweight Van-YOLOv8 Network

    Meng Huang, Honglei Wei*, Xianyi Zhai

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 531-547, 2024, DOI:10.32604/cmc.2024.048510

    Abstract In pursuit of cost-effective manufacturing, enterprises are increasingly adopting the practice of utilizing recycled semiconductor chips. To ensure consistent chip orientation during packaging, a circular marker on the front side is employed for pin alignment following successful functional testing. However, recycled chips often exhibit substantial surface wear, and the identification of the relatively small marker proves challenging. Moreover, the complexity of generic target detection algorithms hampers seamless deployment. Addressing these issues, this paper introduces a lightweight YOLOv8s-based network tailored for detecting markings on recycled chips, termed Van-YOLOv8. Initially, to alleviate the influence of diminutive, low-resolution markings on the precision of… More >

  • Open Access

    ARTICLE

    Multi-Objective Optimization Algorithm for Grouping Decision Variables Based on Extreme Point Pareto Frontier

    Jun Wang1,2, Linxi Zhang1,2, Hao Zhang1, Funan Peng1,*, Mohammed A. El-Meligy3, Mohamed Sharaf3, Qiang Fu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1281-1299, 2024, DOI:10.32604/cmc.2024.048495

    Abstract The existing algorithms for solving multi-objective optimization problems fall into three main categories: Decomposition-based, dominance-based, and indicator-based. Traditional multi-objective optimization problems mainly focus on objectives, treating decision variables as a total variable to solve the problem without considering the critical role of decision variables in objective optimization. As seen, a variety of decision variable grouping algorithms have been proposed. However, these algorithms are relatively broad for the changes of most decision variables in the evolution process and are time-consuming in the process of finding the Pareto frontier. To solve these problems, a multi-objective optimization algorithm for grouping decision variables based… More >

  • Open Access

    ARTICLE

    Enhancing Cancer Classification through a Hybrid Bio-Inspired Evolutionary Algorithm for Biomarker Gene Selection

    Hala AlShamlan*, Halah AlMazrua*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 675-694, 2024, DOI:10.32604/cmc.2024.048146

    Abstract In this study, our aim is to address the problem of gene selection by proposing a hybrid bio-inspired evolutionary algorithm that combines Grey Wolf Optimization (GWO) with Harris Hawks Optimization (HHO) for feature selection. The motivation for utilizing GWO and HHO stems from their bio-inspired nature and their demonstrated success in optimization problems. We aim to leverage the strengths of these algorithms to enhance the effectiveness of feature selection in microarray-based cancer classification. We selected leave-one-out cross-validation (LOOCV) to evaluate the performance of both two widely used classifiers, k-nearest neighbors (KNN) and support vector machine (SVM), on high-dimensional cancer microarray… More >

  • Open Access

    ARTICLE

    Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches

    Jungpil Shin1,*, Md. Al Mehedi Hasan2, Md. Maniruzzaman1, Taiki Watanabe1, Issei Jozume1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1205-1222, 2024, DOI:10.32604/cmc.2024.046954

    Abstract Person identification is one of the most vital tasks for network security. People are more concerned about their security due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprints and faces have been widely used for person identification, which has the risk of information leakage as a result of reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiable pattern, which will not be reproducible falsely by capturing psychological and behavioral information of a person using vision and sensor-based techniques. In existing studies, most of the researchers used very… More >

Displaying 1-10 on page 1 of 2016. Per Page