Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,555)
  • Open Access

    ARTICLE

    Extended Deep Learning Algorithm for Improved Brain Tumor Diagnosis System

    M. Adimoolam1, K. Maithili2, N. M. Balamurugan3, R. Rajkumar4, S. Leelavathy5, Raju Kannadasan6, Mohd Anul Haq7,*, Ilyas Khan8, ElSayed M. Tag El Din9, Arfat Ahmad Khan10

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 33-55, 2024, DOI:10.32604/iasc.2024.039009

    Abstract At present, the prediction of brain tumors is performed using Machine Learning (ML) and Deep Learning (DL) algorithms. Although various ML and DL algorithms are adapted to predict brain tumors to some range, some concerns still need enhancement, particularly accuracy, sensitivity, false positive and false negative, to improve the brain tumor prediction system symmetrically. Therefore, this work proposed an Extended Deep Learning Algorithm (EDLA) to measure performance parameters such as accuracy, sensitivity, and false positive and false negative rates. In addition, these iterated measures were analyzed by comparing the EDLA method with the Convolutional Neural Network (CNN) way further using… More >

  • Open Access

    ARTICLE

    Study on Image Recognition Algorithm for Residual Snow and Ice on Photovoltaic Modules

    Yongcan Zhu1,2, Jiawen Wang1, Ye Zhang1,2, Long Zhao1, Botao Jiang1, Xinbo Huang1,*

    Energy Engineering, Vol.121, No.4, pp. 895-911, 2024, DOI:10.32604/ee.2023.041002

    Abstract The accumulation of snow and ice on PV modules can have a detrimental impact on power generation, leading to reduced efficiency for prolonged periods. Thus, it becomes imperative to develop an intelligent system capable of accurately assessing the extent of snow and ice coverage on PV modules. To address this issue, the article proposes an innovative ice and snow recognition algorithm that effectively segments the ice and snow areas within the collected images. Furthermore, the algorithm incorporates an analysis of the morphological characteristics of ice and snow coverage on PV modules, allowing for the establishment of a residual ice and… More >

  • Open Access

    ARTICLE

    Research on Sleeve Grouting Density Detection Based on the Impact Echo Method

    Pu Zhang1, Yingjun Li1, Xinyu Zhu1, Shizhan Xu1, Pinwu Guan1,*, Wei Liu2, Yanwei Guo2, Haibo Wang2

    Structural Durability & Health Monitoring, Vol.18, No.2, pp. 143-159, 2024, DOI:10.32604/sdhm.2024.046986

    Abstract Grouting defects are an inherent challenge in construction practices, exerting a considerable impact on the operational structural integrity of connections. This investigation employed the impact-echo technique for the detection of grouting anomalies within connections, enhancing its precision through the integration of wavelet packet energy principles for damage identification purposes. A series of grouting completeness assessments were meticulously conducted, taking into account variables such as the divergent material properties of the sleeves and the configuration of adjacent reinforcement. The findings revealed that: (i) the energy distribution for the high-strength concrete cohort predominantly occupied the frequency bands 42, 44, 45, and 47,… More >

  • Open Access

    ARTICLE

    Spatio-temporal pattern detection in spatio-temporal graphs

    Use case of invasive team sports and urban road traffic

    Kamaldeep Singh Oberoi1, Géraldine Del Mondo2

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 377-399, 2022, DOI:10.3166/RIG.31.377-399 c 2022

    Abstract Spatio-temporal (ST) graphs have been used in many application domains to model evolving ST phenomenon. Such models represent the underlying structure of the phenomenon in terms of its entities and different types of spatial interactions between them. The reason behind using graph-based models to represent ST phenomenon is due to the existing well-established graph analysis tools and algorithms which can be directly applied to analyze the phenomenon under consideration. In this paper, considering the use case of two distinct, highly dynamic phenomena - invasive team sports, with a focus on handball and urban road traffic, we propose a spatio-temporal graph… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks

    Abdullah Alsaleh1,2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 431-449, 2024, DOI:10.32604/csse.2023.043107

    Abstract With the increasing number of connected devices in the Internet of Things (IoT) era, the number of intrusions is also increasing. An intrusion detection system (IDS) is a secondary intelligent system for monitoring, detecting and alerting against malicious activity. IDS is important in developing advanced security models. This study reviews the importance of various techniques, tools, and methods used in IoT detection and/or prevention systems. Specifically, it focuses on machine learning (ML) and deep learning (DL) techniques for IDS. This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles. To speed… More >

  • Open Access

    ARTICLE

    SwinVid: Enhancing Video Object Detection Using Swin Transformer

    Abdelrahman Maharek1,2,*, Amr Abozeid2,3, Rasha Orban1, Kamal ElDahshan2

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 305-320, 2024, DOI:10.32604/csse.2024.039436

    Abstract What causes object detection in video to be less accurate than it is in still images? Because some video frames have degraded in appearance from fast movement, out-of-focus camera shots, and changes in posture. These reasons have made video object detection (VID) a growing area of research in recent years. Video object detection can be used for various healthcare applications, such as detecting and tracking tumors in medical imaging, monitoring the movement of patients in hospitals and long-term care facilities, and analyzing videos of surgeries to improve technique and training. Additionally, it can be used in telemedicine to help diagnose… More >

  • Open Access

    ARTICLE

    Cross-Dimension Attentive Feature Fusion Network for Unsupervised Time-Series Anomaly Detection

    Rui Wang1, Yao Zhou3,*, Guangchun Luo1, Peng Chen2, Dezhong Peng3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3011-3027, 2024, DOI:10.32604/cmes.2023.047065

    Abstract Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series data. Due to the challenges associated with annotating anomaly events, time series reconstruction has become a prevalent approach for unsupervised anomaly detection. However, effectively learning representations and achieving accurate detection results remain challenging due to the intricate temporal patterns and dependencies in real-world time series. In this paper, we propose a cross-dimension attentive feature fusion network for time series anomaly detection, referred to as CAFFN. Specifically, a series and feature mixing block is introduced to learn representations in 1D space. Additionally, a… More >

  • Open Access

    ARTICLE

    An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection

    Younghoon Ban, Myeonghyun Kim, Haehyun Cho*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3535-3563, 2024, DOI:10.32604/cmes.2023.046658

    Abstract Antivirus vendors and the research community employ Machine Learning (ML) or Deep Learning (DL)-based static analysis techniques for efficient identification of new threats, given the continual emergence of novel malware variants. On the other hand, numerous researchers have reported that Adversarial Examples (AEs), generated by manipulating previously detected malware, can successfully evade ML/DL-based classifiers. Commercial antivirus systems, in particular, have been identified as vulnerable to such AEs. This paper firstly focuses on conducting black-box attacks to circumvent ML/DL-based malware classifiers. Our attack method utilizes seven different perturbations, including Overlay Append, Section Append, and Break Checksum, capitalizing on the ambiguities present… More >

  • Open Access

    ARTICLE

    Improving Prediction of Chronic Kidney Disease Using KNN Imputed SMOTE Features and TrioNet Model

    Nazik Alturki1, Abdulaziz Altamimi2, Muhammad Umer3,*, Oumaima Saidani1, Amal Alshardan1, Shtwai Alsubai4, Marwan Omar5, Imran Ashraf6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3513-3534, 2024, DOI:10.32604/cmes.2023.045868

    Abstract Chronic kidney disease (CKD) is a major health concern today, requiring early and accurate diagnosis. Machine learning has emerged as a powerful tool for disease detection, and medical professionals are increasingly using ML classifier algorithms to identify CKD early. This study explores the application of advanced machine learning techniques on a CKD dataset obtained from the University of California, UC Irvine Machine Learning repository. The research introduces TrioNet, an ensemble model combining extreme gradient boosting, random forest, and extra tree classifier, which excels in providing highly accurate predictions for CKD. Furthermore, K nearest neighbor (KNN) imputer is utilized to deal… More >

  • Open Access

    ARTICLE

    CAW-YOLO: Cross-Layer Fusion and Weighted Receptive Field-Based YOLO for Small Object Detection in Remote Sensing

    Weiya Shi1,*, Shaowen Zhang2, Shiqiang Zhang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3209-3231, 2024, DOI:10.32604/cmes.2023.044863

    Abstract In recent years, there has been extensive research on object detection methods applied to optical remote sensing images utilizing convolutional neural networks. Despite these efforts, the detection of small objects in remote sensing remains a formidable challenge. The deep network structure will bring about the loss of object features, resulting in the loss of object features and the near elimination of some subtle features associated with small objects in deep layers. Additionally, the features of small objects are susceptible to interference from background features contained within the image, leading to a decline in detection accuracy. Moreover, the sensitivity of small… More >

Displaying 21-30 on page 3 of 1555. Per Page