Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access


    Damage Evaluation of Building Surface via Novel Deep Learning Framework

    Shan Xu1,*, Huadu Tang1, Ding Wang1, Ruiguang Zhu1, Liwei Wang1, Shengwang Hao1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.4, pp. 1-3, 2023, DOI:10.32604/icces.2023.09930

    Abstract Damage evaluation is an important index for the evaluation of buildings health. To provide a rapid crack evaluation in practical applications, a crack identification and damage evaluation via deep learning framework is proposed in this paper. We built a combined dataset from Kaggle and site photos. A pre-trained U-net model is used to perform the training of model. With updated weights, the identification of cracks could be performed on non-labelled photos. More >

  • Open Access


    PGCA-Net: Progressively Aggregating Hierarchical Features with the Pyramid Guided Channel Attention for Saliency Detection

    Jiajie Mai1, Xuemiao Xu2,*, Guorong Xiao3, Zijun Deng2, Jiaxing Chen2

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 847-855, 2020, DOI:10.32604/iasc.2020.010119

    Abstract The Salient object detection aims to segment out the most visually distinctive objects in an image, which is a challenging task in computer vision. In this paper, we present the PGCA-Net equipped with the pyramid guided channel attention fusion block (PGCAFB) for the saliency detection task. Given an input image, the hierarchical features are extracted using a deep convolutional neural network (DCNN), then starting from the highest-level semantic features, we stage-by-stage restore the spatial saliency details by aggregating the lowerlevel detailed features. Since for the weak discriminative ability of the shallow detailed features, directly introducing them to the semantic features… More >

  • Open Access


    Software Defect Prediction Based on Non-Linear Manifold Learning and Hybrid Deep Learning Techniques

    Kun Zhu1, Nana Zhang1, Qing Zhang2, Shi Ying1, *, Xu Wang3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1467-1486, 2020, DOI:10.32604/cmc.2020.011415

    Abstract Software defect prediction plays a very important role in software quality assurance, which aims to inspect as many potentially defect-prone software modules as possible. However, the performance of the prediction model is susceptible to high dimensionality of the dataset that contains irrelevant and redundant features. In addition, software metrics for software defect prediction are almost entirely traditional features compared to the deep semantic feature representation from deep learning techniques. To address these two issues, we propose the following two solutions in this paper: (1) We leverage a novel non-linear manifold learning method - SOINN Landmark Isomap (SLIsomap) to extract the… More >

  • Open Access


    Outlier Detection for Water Supply Data Based on Joint Auto-Encoder

    Shu Fang1, Lei Huang1, Yi Wan2, Weize Sun1, *, Jingxin Xu3

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 541-555, 2020, DOI:10.32604/cmc.2020.010066

    Abstract With the development of science and technology, the status of the water environment has received more and more attention. In this paper, we propose a deep learning model, named a Joint Auto-Encoder network, to solve the problem of outlier detection in water supply data. The Joint Auto-Encoder network first expands the size of training data and extracts the useful features from the input data, and then reconstructs the input data effectively into an output. The outliers are detected based on the network’s reconstruction errors, with a larger reconstruction error indicating a higher rate to be an outlier. For water supply… More >

  • Open Access


    Feature Fusion Multi-View Hashing Based on Random Kernel Canonical Correlation Analysis

    Junshan Tan1, Rong Duan1, Jiaohua Qin1, *, Xuyu Xiang1, Yun Tan1

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 675-689, 2020, DOI:10.32604/cmc.2020.07730

    Abstract Hashing technology has the advantages of reducing data storage and improving the efficiency of the learning system, making it more and more widely used in image retrieval. Multi-view data describes image information more comprehensively than traditional methods using a single-view. How to use hashing to combine multi-view data for image retrieval is still a challenge. In this paper, a multi-view fusion hashing method based on RKCCA (Random Kernel Canonical Correlation Analysis) is proposed. In order to describe image content more accurately, we use deep learning dense convolutional network feature DenseNet to construct multi-view by combining GIST feature or BoW_SIFT (Bag-of-Words… More >

  • Open Access


    A Convolution-Based System for Malicious URLs Detection

    Chaochao Luo1, Shen Su2, *, Yanbin Sun2, Qingji Tan3, Meng Han4, Zhihong Tian2, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 399-411, 2020, DOI:10.32604/cmc.2020.06507

    Abstract Since the web service is essential in daily lives, cyber security becomes more and more important in this digital world. Malicious Uniform Resource Locator (URL) is a common and serious threat to cybersecurity. It hosts unsolicited content and lure unsuspecting users to become victim of scams, such as theft of private information, monetary loss, and malware installation. Thus, it is imperative to detect such threats. However, traditional approaches for malicious URLs detection that based on the blacklists are easy to be bypassed and lack the ability to detect newly generated malicious URLs. In this paper, we propose a novel malicious… More >

  • Open Access


    SSD Real-Time Illegal Parking Detection Based on Contextual Information Transmission

    Huanrong Tang1, Aoming Peng1, Dongming Zhang2, Tianming Liu3, Jianquan Ouyang1, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 293-307, 2020, DOI:10.32604/cmc.2020.06427

    Abstract With the improvement of the national economic level, the number of vehicles is still increasing year by year. According to the statistics of National Bureau of Statics, the number is approximately up to 327 million in China by the end of 2018, which makes urban traffic pressure continues to rise so that the negative impact of urban traffic order is growing. Illegal parking-the common problem in the field of transportation security is urgent to be solved and traditional methods to address it are mainly based on ground loop and manual supervision, which may miss detection and cost much manpower. Due… More >

  • Open Access


    An Image Classification Method Based on Deep Neural Network with Energy Model

    Yang Yang1,*, Jinbao Duan1, Haitao Yu1, Zhipeng Gao1, Xuesong Qiu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.3, pp. 555-575, 2018, DOI:10.31614/cmes.2018.04249

    Abstract The development of deep learning has revolutionized image recognition technology. How to design faster and more accurate image classification algorithms has become our research interests. In this paper, we propose a new algorithm called stochastic depth networks with deep energy model (SADIE), and the model improves stochastic depth neural network with deep energy model to provide attributes of images and analysis their characteristics. First, the Bernoulli distribution probability is used to select the current layer of the neural network to prevent gradient dispersion during training. Then in the backpropagation process, the energy function is designed to optimize the target loss… More >

  • Open Access


    A Survey on Digital Image Steganography

    Jiaxin Wang1,*, Mengxin Cheng1, Peng Wu1, Beijing Chen1,2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 87-93, 2019, DOI:10.32604/jihpp.2019.07189

    Abstract Internet brings us not only the convenience of communication but also some security risks, such as intercepting information and stealing information. Therefore, some important information needs to be hidden during communication. Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms. Moreover, their advantages and weaknesses are pointed out. Finally, further research directions are discussed. More >

  • Open Access


    Paragraph Vector Representation Based on Word to Vector and CNN Learning

    Zeyu Xiong1,*, Qiangqiang Shen1, Yijie Wang1, Chenyang Zhu2

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 213-227, 2018, DOI:10.3970/cmc.2018.01762

    Abstract Document processing in natural language includes retrieval, sentiment analysis, theme extraction, etc. Classical methods for handling these tasks are based on models of probability, semantics and networks for machine learning. The probability model is loss of semantic information in essential, and it influences the processing accuracy. Machine learning approaches include supervised, unsupervised, and semi-supervised approaches, labeled corpora is necessary for semantics model and supervised learning. The method for achieving a reliably labeled corpus is done manually, it is costly and time-consuming because people have to read each document and annotate the label of each document. Recently, the continuous CBOW model… More >

Displaying 1-10 on page 1 of 10. Per Page