Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,580)
  • Open Access

    ARTICLE

    A Smart Wearable Ring Device for Sensing Hand Tremor of Parkinson’s Patients

    Haixia Yang1, Yixian Shen2, Wei Zhuang2, Chunming Gao3, Dong Dai4, Weigong Zhang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 1217-1238, 2021, DOI:10.32604/cmes.2021.014558

    Abstract Parkinson’s disease (PD) is a very common neurodegenerative disease that occurs mostly in the elderly. There are many main clinical manifestations of PD, such as tremor, bradykinesia, muscle rigidity, etc. Based on the current research on PD, the accurate and convenient detection of early symptoms is the key to detect PD. With the development of microelectronic and sensor technology, it is much easier to measure the barely noticeable tremor in just one hand for the early detection of Parkinson’s disease. In this paper, we present a smart wearable device for detecting hand tremor, in which MPU6050 (MIDI Processing Unit) consisting… More >

  • Open Access

    ARTICLE

    Traffic Anomaly Detection Method Based on Improved GRU and EFMS-Kmeans Clustering

    Yonghua Huo1, Yi Cao2, Zhihao Wang1, Yu Yan3, Zhongdi Ge3, Yang Yang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 1053-1091, 2021, DOI:10.32604/cmes.2021.013045

    Abstract In recent years, with the continuous development of information technology and the rapid growth of network scale, network monitoring and management become more and more important. Network traffic is an important part of network state. In order to ensure the normal operation of the network, improve the availability of the network, find network faults in time and deal with network attacks; it is necessary to detect the abnormal traffic in the network. Abnormal traffic detection is of great significance in the actual network management. Therefore, in order to improve the accuracy and efficiency of network traffic anomaly detection, this paper… More >

  • Open Access

    ARTICLE

    Detection and Discrimination of Tea Plant Stresses Based on Hyperspectral Imaging Technique at a Canopy Level

    Lihan Cui1, Lijie Yan1, Xiaohu Zhao1, Lin Yuan2, Jing Jin3, Jingcheng Zhang1,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.2, pp. 621-634, 2021, DOI:10.32604/phyton.2021.015511

    Abstract Tea plant stresses threaten the quality of tea seriously. The technology corresponding to the fast detection and differentiation of stresses is of great significance for plant protection in tea plantation. In recent years, hyperspectral imaging technology has shown great potential in detecting and differentiating plant diseases, pests and some other stresses at the leaf level. However, the lack of studies at canopy level hampers the detection of tea plant stresses at a larger scale. In this study, based on the canopy-level hyperspectral imaging data, the methods for identifying and differentiating the three commonly occurred tea stresses (i.e., the tea leafhopper,… More >

  • Open Access

    ARTICLE

    YOLOv3 Attention Face Detector with High Accuracy and Efficiency

    Qiyuan Liu, Shuhua Lu*, Lingqiang Lan

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 283-295, 2021, DOI:10.32604/csse.2021.014086

    Abstract In recent years, face detection has attracted much attention and achieved great progress due to its extensively practical applications in the field of face based computer vision. However, the tradeoff between accuracy and efficiency of the face detectors still needs to be further studied. In this paper, using Darknet-53 as backbone, we propose an improved YOLOv3-attention model by introducing attention mechanism and data augmentation to obtain the robust face detector with high accuracy and efficiency. The attention mechanism is introduced to enhance much higher discrimination of the deep features, and the trick of data augmentation is used in the training… More >

  • Open Access

    ARTICLE

    TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators

    Zhengqiu Weng1,2, Timing Chen1,*, Tiantian Zhu1, Hang Dong1, Dan Zhou1, Osama Alfarraj3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 105-119, 2021, DOI:10.32604/csse.2021.015074

    Abstract Internet traffic encryption is a very common traffic protection method. Most internet traffic is protected by the encryption protocol called transport layer security (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected. At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, such as high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved. In this paper, we present TLSmell,… More >

  • Open Access

    ARTICLE

    RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning

    Zihao Shen1,2, Hui Wang1,*, Kun Liu1, Peiqian Liu1, Menglong Ba1, MengYao Zhao3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 121-133, 2021, DOI:10.32604/csse.2021.014988

    Abstract The rapid progress of the Internet has exposed networks to an increased number of threats. Intrusion detection technology can effectively protect network security against malicious attacks. In this paper, we propose a ReliefF-P-Naive Bayes and softmax regression (RP-NBSR) model based on machine learning for network attack detection to improve the false detection rate and F1 score of unknown intrusion behavior. In the proposed model, the Pearson correlation coefficient is introduced to compensate for deficiencies in correlation analysis between features by the ReliefF feature selection algorithm, and a ReliefF-Pearson correlation coefficient (ReliefF-P) algorithm is proposed. Then, the Relief-P algorithm is used… More >

  • Open Access

    ARTICLE

    Anomaly Detection in ICS Datasets with Machine Learning Algorithms

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Farah Diyana Abdul Rahman, Mohammad Tahir2

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 33-46, 2021, DOI:10.32604/csse.2021.014384

    Abstract An Intrusion Detection System (IDS) provides a front-line defense mechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a week. A well-known ICS is the Supervisory Control and Data Acquisition (SCADA) system. It supervises the physical process from sensor data and performs remote monitoring control and diagnostic functions in critical infrastructures. The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as… More >

  • Open Access

    ARTICLE

    A Generative Adversarial Networks for Log Anomaly Detection

    Xiaoyu Duan1, Shi Ying1,*, Wanli Yuan1, Hailong Cheng1, Xiang Yin2

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 135-148, 2021, DOI:10.32604/csse.2021.014030

    Abstract Detecting anomaly logs is a great significance step for guarding system faults. Due to the uncertainty of abnormal log types, lack of real anomaly logs and accurately labeled log datasets. Existing technologies cannot be enough for detecting complex and various log point anomalies by using human-defined rules. We propose a log anomaly detection method based on Generative Adversarial Networks (GAN). This method uses the Encoder-Decoder framework based on Long Short-Term Memory (LSTM) network as the generator, takes the log keywords as the input of the encoder, and the decoder outputs the generated log template. The discriminator uses the Convolutional Neural… More >

  • Open Access

    ARTICLE

    Liver-Tumor Detection Using CNN ResUNet

    Muhammad Sohaib Aslam1, Muhammad Younas1, Muhammad Umar Sarwar1, Muhammad Arif Shah2,*, Atif Khan3, M. Irfan Uddin4, Shafiq Ahmad5, Muhammad Firdausi5, Mazen Zaindin6

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1899-1914, 2021, DOI:10.32604/cmc.2021.015151

    Abstract Liver tumor is the fifth most occurring type of tumor in men and the ninth most occurring type of tumor in women according to recent reports of Global cancer statistics 2018. There are several imaging tests like Computed Tomography (CT), Magnetic Resonance Imaging (MRI), and ultrasound that can diagnose the liver tumor after taking the sample from the tissue of the liver. These tests are costly and time-consuming. This paper proposed that image processing through deep learning Convolutional Neural Network (CNNs) ResUNet model that can be helpful for the early diagnose of tumor instead of conventional methods. The existing studies… More >

  • Open Access

    ARTICLE

    Intelligent Ammunition Detection and Classification System Using Convolutional Neural Network

    Gulzar Ahmad1, Saad Alanazi2, Madallah Alruwaili2, Fahad Ahmad3,6, Muhammad Adnan Khan4,*, Sagheer Abbas1, Nadia Tabassum5

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2585-2600, 2021, DOI:10.32604/cmc.2021.015080

    Abstract Security is a significant issue for everyone due to new and creative ways to commit cybercrime. The Closed-Circuit Television (CCTV) systems are being installed in offices, houses, shopping malls, and on streets to protect lives. Operators monitor CCTV; however, it is difficult for a single person to monitor the actions of multiple people at one time. Consequently, there is a dire need for an automated monitoring system that detects a person with ammunition or any other harmful material Based on our research and findings of this study, we have designed a new Intelligent Ammunition Detection and Classification (IADC) system using… More >

Displaying 1271-1280 on page 128 of 1580. Per Page