Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,665)
  • Open Access

    ARTICLE

    Surface Defect Detection and Evaluation Method of Large Wind Turbine Blades Based on an Improved Deeplabv3+ Deep Learning Model

    Wanrun Li1,2,3,*, Wenhai Zhao1, Tongtong Wang1, Yongfeng Du1,2,3

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 553-575, 2024, DOI:10.32604/sdhm.2024.050751

    Abstract The accumulation of defects on wind turbine blade surfaces can lead to irreversible damage, impacting the aerodynamic performance of the blades. To address the challenge of detecting and quantifying surface defects on wind turbine blades, a blade surface defect detection and quantification method based on an improved Deeplabv3+ deep learning model is proposed. Firstly, an improved method for wind turbine blade surface defect detection, utilizing Mobilenetv2 as the backbone feature extraction network, is proposed based on an original Deeplabv3+ deep learning model to address the issue of limited robustness. Secondly, through integrating the concept of… More > Graphic Abstract

    Surface Defect Detection and Evaluation Method of Large Wind Turbine Blades Based on an Improved Deeplabv3+ Deep Learning Model

  • Open Access

    ARTICLE

    Track Defects Recognition Based on Axle-Box Vibration Acceleration and Deep-Learning Techniques

    Xianxian Yin1, Shimin Yin1, Yiming Bu2, Xiukun Wei3,*

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 623-640, 2024, DOI:10.32604/sdhm.2024.050195

    Abstract As an important component of load transfer, various fatigue damages occur in the track as the rail service life and train traffic increase gradually, such as rail corrugation, rail joint damage, uneven thermite welds, rail squats fastener defects, etc. Real-time recognition of track defects plays a vital role in ensuring the safe and stable operation of rail transit. In this paper, an intelligent and innovative method is proposed to detect the track defects by using axle-box vibration acceleration and deep learning network, and the coexistence of the above-mentioned typical track defects in the track system… More >

  • Open Access

    ARTICLE

    Fake News Detection Based on Cross-Modal Message Aggregation and Gated Fusion Network

    Fangfang Shan1,2,*, Mengyao Liu1,2, Menghan Zhang1,2, Zhenyu Wang1,2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1521-1542, 2024, DOI:10.32604/cmc.2024.053937

    Abstract Social media has become increasingly significant in modern society, but it has also turned into a breeding ground for the propagation of misleading information, potentially causing a detrimental impact on public opinion and daily life. Compared to pure text content, multmodal content significantly increases the visibility and share ability of posts. This has made the search for efficient modality representations and cross-modal information interaction methods a key focus in the field of multimodal fake news detection. To effectively address the critical challenge of accurately detecting fake news on social media, this paper proposes a fake… More >

  • Open Access

    REVIEW

    A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection

    Yaqiong He, Jinlin Fan*, Huaiguang Wu

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 995-1032, 2024, DOI:10.32604/cmc.2024.052887

    Abstract With the rise of blockchain technology, the security issues of smart contracts have become increasingly critical. Despite the availability of numerous smart contract vulnerability detection tools, many face challenges such as slow updates, usability issues, and limited installation methods. These challenges hinder the adoption and practicality of these tools. This paper examines smart contract vulnerability detection tools from 2016 to 2023, sourced from the Web of Science (WOS) and Google Scholar. By systematically collecting, screening, and synthesizing relevant research, 38 open-source tools that provide installation methods were selected for further investigation. From a developer’s perspective,… More >

  • Open Access

    ARTICLE

    A Hybrid Feature Fusion Traffic Sign Detection Algorithm Based on YOLOv7

    Bingyi Ren1,4, Juwei Zhang2,3,4,*, Tong Wang2,4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1425-1440, 2024, DOI:10.32604/cmc.2024.052667

    Abstract Autonomous driving technology has entered a period of rapid development, and traffic sign detection is one of the important tasks. Existing target detection networks are difficult to adapt to scenarios where target sizes are seriously imbalanced, and traffic sign targets are small and have unclear features, which makes detection more difficult. Therefore, we propose a Hybrid Feature Fusion Traffic Sign detection algorithm based on YOLOv7 (HFFT-YOLO). First, a self-attention mechanism is incorporated at the end of the backbone network to calculate feature interactions within scales; Secondly, the cross-scale fusion part of the neck introduces a… More >

  • Open Access

    ARTICLE

    YOLO-O2E: A Variant YOLO Model for Anomalous Rail Fastening Detection

    Zhuhong Chu1, Jianxun Zhang1,*, Chengdong Wang2, Changhui Yang3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1143-1161, 2024, DOI:10.32604/cmc.2024.052269

    Abstract Rail fasteners are a crucial component of the railway transportation safety system. These fasteners, distinguished by their high length-to-width ratio, frequently encounter elevated failure rates, necessitating manual inspection and maintenance. Manual inspection not only consumes time but also poses the risk of potential oversights. With the advancement of deep learning technology in rail fasteners, challenges such as the complex background of rail fasteners and the similarity in their states are addressed. We have proposed an efficient and high-precision rail fastener detection algorithm, named YOLO-O2E (you only look once-O2E). Firstly, we propose the EFOV (Enhanced Field… More >

  • Open Access

    ARTICLE

    Transformer-Based Cloud Detection Method for High-Resolution Remote Sensing Imagery

    Haotang Tan1, Song Sun2,*, Tian Cheng3, Xiyuan Shu2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 661-678, 2024, DOI:10.32604/cmc.2024.052208

    Abstract Cloud detection from satellite and drone imagery is crucial for applications such as weather forecasting and environmental monitoring. Addressing the limitations of conventional convolutional neural networks, we propose an innovative transformer-based method. This method leverages transformers, which are adept at processing data sequences, to enhance cloud detection accuracy. Additionally, we introduce a Cyclic Refinement Architecture that improves the resolution and quality of feature extraction, thereby aiding in the retention of critical details often lost during cloud detection. Our extensive experimental validation shows that our approach significantly outperforms established models, excelling in high-resolution feature extraction and More >

  • Open Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 195-215, 2024, DOI:10.32604/cmc.2024.052070

    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

  • Open Access

    ARTICLE

    Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1457-1490, 2024, DOI:10.32604/cmc.2024.051996

    Abstract This study describes improving network security by implementing and assessing an intrusion detection system (IDS) based on deep neural networks (DNNs). The paper investigates contemporary technical ways for enhancing intrusion detection performance, given the vital relevance of safeguarding computer networks against harmful activity. The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset, a popular benchmark for IDS research. The model performs well in both the training and validation stages, with 91.30% training accuracy and 94.38% validation accuracy. Thus, the model shows good learning and generalization capabilities with minor losses of… More >

  • Open Access

    ARTICLE

    Phishing Attacks Detection Using Ensemble Machine Learning Algorithms

    Nisreen Innab1, Ahmed Abdelgader Fadol Osman2, Mohammed Awad Mohammed Ataelfadiel2, Marwan Abu-Zanona3,*, Bassam Mohammad Elzaghmouri4, Farah H. Zawaideh5, Mouiad Fadeil Alawneh6

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1325-1345, 2024, DOI:10.32604/cmc.2024.051778

    Abstract Phishing, an Internet fraud where individuals are deceived into revealing critical personal and account information, poses a significant risk to both consumers and web-based institutions. Data indicates a persistent rise in phishing attacks. Moreover, these fraudulent schemes are progressively becoming more intricate, thereby rendering them more challenging to identify. Hence, it is imperative to utilize sophisticated algorithms to address this issue. Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors. Machine learning (ML) approaches can identify common characteristics in most phishing assaults. In this paper, we propose an ensemble approach… More >

Displaying 1-10 on page 1 of 1665. Per Page