Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,580)
  • Open Access

    ARTICLE

    Wavelet-based Inclusion Detection in Cantilever Beams

    Zheng Li1,2, Wei Zhang1, Kezhuang Gong1

    CMC-Computers, Materials & Continua, Vol.9, No.3, pp. 209-228, 2009, DOI:10.3970/cmc.2009.009.209

    Abstract In this paper, continuous wavelet transform has been applied to inclusion detection in cantilever beams. By means of FEM, a cantilever beam with an inclusion is subjected to an impact on its free end, and its stress wave propagation process is calculated. Here, two kinds of inclusions which are distinct in material behavior have been discussed. And we change the inclusion's sizes in the beam and set it in three different positions to simulate some complicated situations. For soft inclusion, the results show that the arrival times of incident and reflective wave are distinguishable by performing Gabor wavelet transform and… More >

  • Open Access

    ARTICLE

    Fourier Analysis of Mode Shapes of Damaged Beams

    Kanchi Venkatesulu Reddy1, Ranjan Ganguli2

    CMC-Computers, Materials & Continua, Vol.5, No.2, pp. 79-98, 2007, DOI:10.3970/cmc.2007.005.079

    Abstract This paper investigates the effect of damage on beams with fixed boundary conditions using Fourier analysis of the mode shapes in spatial domain. A finite element model is used to obtain the mode shapes of a damaged fixed-fixed beam. Then the damaged beams are studied using a spatial Fourier analysis. This approach contrasts with the typical time domain application of Fourier analysis for vibration problems. It is found that damage causes considerable change in the Fourier coefficients of the mode shapes. The Fourier coefficients, especially the higher harmonics, are found to be sensitive to both damage size and location and… More >

  • Open Access

    ARTICLE

    Text Detection and Recognition for Natural Scene Images Using Deep Convolutional Neural Networks

    Xianyu Wu1, Chao Luo1, Qian Zhang2, Jiliu Zhou1, Hao Yang1, 3, *, Yulian Li1

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 289-300, 2019, DOI:10.32604/cmc.2019.05990

    Abstract Words are the most indispensable information in human life. It is very important to analyze and understand the meaning of words. Compared with the general visual elements, the text conveys rich and high-level moral information, which enables the computer to better understand the semantic content of the text. With the rapid development of computer technology, great achievements have been made in text information detection and recognition. However, when dealing with text characters in natural scene images, there are still some limitations in the detection and recognition of natural scene images. Because natural scene image has more interference and complexity than… More >

  • Open Access

    ARTICLE

    Application of Self-Organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection

    Ling Tan1,*, Chong Li2, Jingming Xia2, Jun Cao3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 275-288, 2019, DOI:10.32604/cmc.2019.03735

    Abstract Due to the widespread use of the Internet, customer information is vulnerable to computer systems attack, which brings urgent need for the intrusion detection technology. Recently, network intrusion detection has been one of the most important technologies in network security detection. The accuracy of network intrusion detection has reached higher accuracy so far. However, these methods have very low efficiency in network intrusion detection, even the most popular SOM neural network method. In this paper, an efficient and fast network intrusion detection method was proposed. Firstly, the fundamental of the two different methods are introduced respectively. Then, the self-organizing feature… More >

  • Open Access

    ARTICLE

    An Intrusion Detection Algorithm Based on Feature Graph

    Xiang Yu1, Zhihong Tian2, Jing Qiu2,*, Shen Su2,*, Xiaoran Yan3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 255-274, 2019, DOI:10.32604/cmc.2019.05821

    Abstract With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches. However, there are very few… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve data imbalance. The assessment of… More >

  • Open Access

    ARTICLE

    Parkinson’s Disease Detection Using Biogeography-Based Optimization

    Somayeh Hessam1, Shaghayegh Vahdat1, Irvan Masoudi Asl2,*, Mahnaz Kazemipoor3, Atefeh Aghaei4, Shahaboddin Shamshirband,5,6,*, Timon Rabczuk7

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 11-26, 2019, DOI:10.32604/cmc.2019.06472

    Abstract In recent years, Parkinson's Disease (PD) as a progressive syndrome of the nervous system has become highly prevalent worldwide. In this study, a novel hybrid technique established by integrating a Multi-layer Perceptron Neural Network (MLP) with the Biogeography-based Optimization (BBO) to classify PD based on a series of biomedical voice measurements. BBO is employed to determine the optimal MLP parameters and boost prediction accuracy. The inputs comprised of 22 biomedical voice measurements. The proposed approach detects two PD statuses: 0-disease status and 1- good control status. The performance of proposed methods compared with PSO, GA, ACO and ES method. The… More >

  • Open Access

    ARTICLE

    YATA: Yet Another Proposal for Traffic Analysis and Anomaly Detection

    Yu Wang1,2,*, Yan Cao2, Liancheng Zhang2, Hongtao Zhang3, Roxana Ohriniuc4, Guodong Wang5, Ruosi Cheng6

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1171-1187, 2019, DOI:10.32604/cmc.2019.05575

    Abstract Network traffic anomaly detection has gained considerable attention over the years in many areas of great importance. Traditional methods used for detecting anomalies produce quantitative results derived from multi-source information. This makes it difficult for administrators to comprehend and deal with the underlying situations. This study proposes another method to yet determine traffic anomaly (YATA), based on the cloud model. YATA adopts forward and backward cloud transformation algorithms to fuse the quantitative value of acquisitions into the qualitative concept of anomaly degree. This method achieves rapid and direct perspective of network traffic. Experimental results with standard dataset indicate that using… More >

  • Open Access

    ARTICLE

    An Efficient Crossing-Line Crowd Counting Algorithm with Two-Stage Detection

    Zhenqiu Xiao1,*, Bin Yang2, Desy Tjahjadi3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1141-1154, 2019, DOI:10.32604/cmc.2019.05638

    Abstract Crowd counting is a challenging task in crowded scenes due to heavy occlusions, appearance variations and perspective distortions. Current crowd counting methods typically operate on an image patch level with overlaps, then sum over the patches to get the final count. In this paper we describe a real-time pedestrian counting framework based on a two-stage human detection algorithm. Existing works with overhead cameras is mainly based on visual tracking, and their robustness is rather limited. On the other hand, some works, which focus on improving the performances, are too complicated to be realistic. By adopting a line sampling process, a… More >

  • Open Access

    ARTICLE

    Non-Contact Real-Time Heart Rate Measurement Algorithm Based on PPG-Standard Deviation

    Jiancheng Zou1,*, Tianshu Chen1, Xin Yang2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1029-1040, 2019, DOI:10.32604/cmc.2019.05793

    Abstract Heart rate is an important physiological parameter for clinical diagnosis, it can infer the health of the human body. Thus, efficient and accurate heart rate measurement is important for disease diagnosis and health monitoring. There are two ways to measure heart rate. One is contact type and the other is non-contact. Contact measurement methods include pulse cutting, electrocardiogram, etc. Because of the inconvenience of this method, a non-contact heart rate method has been proposed. Traditional non-contact measurement method based on image is collecting RGB three-channel signals in continuous video and selecting the average value of the green channel pixels as… More >

Displaying 1551-1560 on page 156 of 1580. Per Page