Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,580)
  • Open Access

    ARTICLE

    Road Traffic Monitoring from Aerial Images Using Template Matching and Invariant Features

    Asifa Mehmood Qureshi1, Naif Al Mudawi2, Mohammed Alonazi3, Samia Allaoua Chelloug4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3683-3701, 2024, DOI:10.32604/cmc.2024.043611

    Abstract Road traffic monitoring is an imperative topic widely discussed among researchers. Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides. However, aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area. To this end, different models have shown the ability to recognize and track vehicles. However, these methods are not mature enough to produce accurate results in complex road scenes. Therefore, this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts. The extracted frames… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is a challenging task in small… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks (RNN) integrated with… More >

  • Open Access

    CORRECTION

    Correction: Deep Learning Implemented Visualizing City Cleanliness Level by Garbage Detection

    M. S. Vivekanandan1, T. Jesudas2,*

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 109-111, 2024, DOI:10.32604/iasc.2024.051758

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Robust Method of Bipolar Mental Illness Detection from Facial Micro Expressions Using Machine Learning Methods

    Ghulam Gilanie1,*, Sana Cheema1, Akkasha Latif1, Anum Saher1, Muhammad Ahsan1, Hafeez Ullah2, Diya Oommen3

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 57-71, 2024, DOI:10.32604/iasc.2024.041535

    Abstract Bipolar disorder is a serious mental condition that may be caused by any kind of stress or emotional upset experienced by the patient. It affects a large percentage of people globally, who fluctuate between depression and mania, or vice versa. A pleasant or unpleasant mood is more than a reflection of a state of mind. Normally, it is a difficult task to analyze through physical examination due to a large patient-psychiatrist ratio, so automated procedures are the best options to diagnose and verify the severity of bipolar. In this research work, facial micro-expressions have been used for bipolar detection using… More >

  • Open Access

    ARTICLE

    Extended Deep Learning Algorithm for Improved Brain Tumor Diagnosis System

    M. Adimoolam1, K. Maithili2, N. M. Balamurugan3, R. Rajkumar4, S. Leelavathy5, Raju Kannadasan6, Mohd Anul Haq7,*, Ilyas Khan8, ElSayed M. Tag El Din9, Arfat Ahmad Khan10

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 33-55, 2024, DOI:10.32604/iasc.2024.039009

    Abstract At present, the prediction of brain tumors is performed using Machine Learning (ML) and Deep Learning (DL) algorithms. Although various ML and DL algorithms are adapted to predict brain tumors to some range, some concerns still need enhancement, particularly accuracy, sensitivity, false positive and false negative, to improve the brain tumor prediction system symmetrically. Therefore, this work proposed an Extended Deep Learning Algorithm (EDLA) to measure performance parameters such as accuracy, sensitivity, and false positive and false negative rates. In addition, these iterated measures were analyzed by comparing the EDLA method with the Convolutional Neural Network (CNN) way further using… More >

  • Open Access

    ARTICLE

    Study on Image Recognition Algorithm for Residual Snow and Ice on Photovoltaic Modules

    Yongcan Zhu1,2, Jiawen Wang1, Ye Zhang1,2, Long Zhao1, Botao Jiang1, Xinbo Huang1,*

    Energy Engineering, Vol.121, No.4, pp. 895-911, 2024, DOI:10.32604/ee.2023.041002

    Abstract The accumulation of snow and ice on PV modules can have a detrimental impact on power generation, leading to reduced efficiency for prolonged periods. Thus, it becomes imperative to develop an intelligent system capable of accurately assessing the extent of snow and ice coverage on PV modules. To address this issue, the article proposes an innovative ice and snow recognition algorithm that effectively segments the ice and snow areas within the collected images. Furthermore, the algorithm incorporates an analysis of the morphological characteristics of ice and snow coverage on PV modules, allowing for the establishment of a residual ice and… More >

  • Open Access

    ARTICLE

    Research on Sleeve Grouting Density Detection Based on the Impact Echo Method

    Pu Zhang1, Yingjun Li1, Xinyu Zhu1, Shizhan Xu1, Pinwu Guan1,*, Wei Liu2, Yanwei Guo2, Haibo Wang2

    Structural Durability & Health Monitoring, Vol.18, No.2, pp. 143-159, 2024, DOI:10.32604/sdhm.2024.046986

    Abstract Grouting defects are an inherent challenge in construction practices, exerting a considerable impact on the operational structural integrity of connections. This investigation employed the impact-echo technique for the detection of grouting anomalies within connections, enhancing its precision through the integration of wavelet packet energy principles for damage identification purposes. A series of grouting completeness assessments were meticulously conducted, taking into account variables such as the divergent material properties of the sleeves and the configuration of adjacent reinforcement. The findings revealed that: (i) the energy distribution for the high-strength concrete cohort predominantly occupied the frequency bands 42, 44, 45, and 47,… More >

  • Open Access

    ARTICLE

    Spatio-temporal pattern detection in spatio-temporal graphs

    Use case of invasive team sports and urban road traffic

    Kamaldeep Singh Oberoi1, Géraldine Del Mondo2

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 377-399, 2022, DOI:10.3166/RIG.31.377-399 c 2022

    Abstract Spatio-temporal (ST) graphs have been used in many application domains to model evolving ST phenomenon. Such models represent the underlying structure of the phenomenon in terms of its entities and different types of spatial interactions between them. The reason behind using graph-based models to represent ST phenomenon is due to the existing well-established graph analysis tools and algorithms which can be directly applied to analyze the phenomenon under consideration. In this paper, considering the use case of two distinct, highly dynamic phenomena - invasive team sports, with a focus on handball and urban road traffic, we propose a spatio-temporal graph… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks

    Abdullah Alsaleh1,2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 431-449, 2024, DOI:10.32604/csse.2023.043107

    Abstract With the increasing number of connected devices in the Internet of Things (IoT) era, the number of intrusions is also increasing. An intrusion detection system (IDS) is a secondary intelligent system for monitoring, detecting and alerting against malicious activity. IDS is important in developing advanced security models. This study reviews the importance of various techniques, tools, and methods used in IoT detection and/or prevention systems. Specifically, it focuses on machine learning (ML) and deep learning (DL) techniques for IDS. This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles. To speed… More >

Displaying 41-50 on page 5 of 1580. Per Page