Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,580)
  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2245-2267, 2024, DOI:10.32604/cmc.2023.047323

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership functions. This study presents a… More >

  • Open Access

    ARTICLE

    CVTD: A Robust Car-Mounted Video Text Detector

    Di Zhou1, Jianxun Zhang1,*, Chao Li2, Yifan Guo1, Bowen Li1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1821-1842, 2024, DOI:10.32604/cmc.2023.047236

    Abstract Text perception is crucial for understanding the semantics of outdoor scenes, making it a key requirement for building intelligent systems for driver assistance or autonomous driving. Text information in car-mounted videos can assist drivers in making decisions. However, Car-mounted video text images pose challenges such as complex backgrounds, small fonts, and the need for real-time detection. We proposed a robust Car-mounted Video Text Detector (CVTD). It is a lightweight text detection model based on ResNet18 for feature extraction, capable of detecting text in arbitrary shapes. Our model efficiently extracted global text positions through the Coordinate Attention Threshold Activation (CATA) and… More >

  • Open Access

    ARTICLE

    RRT Autonomous Detection Algorithm Based on Multiple Pilot Point Bias Strategy and Karto SLAM Algorithm

    Lieping Zhang1,2, Xiaoxu Shi1,2, Liu Tang1,2, Yilin Wang3, Jiansheng Peng4, Jianchu Zou4,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2111-2136, 2024, DOI:10.32604/cmc.2024.047235

    Abstract A Rapid-exploration Random Tree (RRT) autonomous detection algorithm based on the multi-guide-node deflection strategy and Karto Simultaneous Localization and Mapping (SLAM) algorithm was proposed to solve the problems of low efficiency of detecting frontier boundary points and drift distortion in the process of map building in the traditional RRT algorithm in the autonomous detection strategy of mobile robot. Firstly, an RRT global frontier boundary point detection algorithm based on the multi-guide-node deflection strategy was put forward, which introduces the reference value of guide nodes’ deflection probability into the random sampling function so that the global search tree can detect frontier… More >

  • Open Access

    ARTICLE

    Social Robot Detection Method with Improved Graph Neural Networks

    Zhenhua Yu, Liangxue Bai, Ou Ye*, Xuya Cong

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1773-1795, 2024, DOI:10.32604/cmc.2023.047130

    Abstract Social robot accounts controlled by artificial intelligence or humans are active in social networks, bringing negative impacts to network security and social life. Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships, which makes it difficult to accurately describe the difference between the topological relations of nodes, resulting in low detection accuracy of social robots. This paper proposes a social robot detection method with the use of an improved neural network. First, social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social… More >

  • Open Access

    ARTICLE

    DGConv: A Novel Convolutional Neural Network Approach for Weld Seam Depth Image Detection

    Pengchao Li1,2,3,*, Fang Xu1,2,3,4, Jintao Wang1,2, Haibing Guo4, Mingmin Liu4, Zhenjun Du4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1755-1771, 2024, DOI:10.32604/cmc.2023.047057

    Abstract We propose a novel image segmentation algorithm to tackle the challenge of limited recognition and segmentation performance in identifying welding seam images during robotic intelligent operations. Initially, to enhance the capability of deep neural networks in extracting geometric attributes from depth images, we developed a novel deep geometric convolution operator (DGConv). DGConv is utilized to construct a deep local geometric feature extraction module, facilitating a more comprehensive exploration of the intrinsic geometric information within depth images. Secondly, we integrate the newly proposed deep geometric feature module with the Fully Convolutional Network (FCN8) to establish a high-performance deep neural network algorithm… More >

  • Open Access

    ARTICLE

    An Underwater Target Detection Algorithm Based on Attention Mechanism and Improved YOLOv7

    Liqiu Ren, Zhanying Li*, Xueyu He, Lingyan Kong, Yinghao Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2829-2845, 2024, DOI:10.32604/cmc.2024.047028

    Abstract For underwater robots in the process of performing target detection tasks, the color distortion and the uneven quality of underwater images lead to great difficulties in the feature extraction process of the model, which is prone to issues like error detection, omission detection, and poor accuracy. Therefore, this paper proposed the CER-YOLOv7(CBAM-EIOU-RepVGG-YOLOv7) underwater target detection algorithm. To improve the algorithm’s capability to retain valid features from both spatial and channel perspectives during the feature extraction phase, we have added a Convolutional Block Attention Module (CBAM) to the backbone network. The Reparameterization Visual Geometry Group (RepVGG) module is inserted into the… More >

  • Open Access

    ARTICLE

    A Normalizing Flow-Based Bidirectional Mapping Residual Network for Unsupervised Defect Detection

    Lanyao Zhang1, Shichao Kan2, Yigang Cen3, Xiaoling Chen1, Linna Zhang1,*, Yansen Huang4,5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1631-1648, 2024, DOI:10.32604/cmc.2024.046924

    Abstract Unsupervised methods based on density representation have shown their abilities in anomaly detection, but detection performance still needs to be improved. Specifically, approaches using normalizing flows can accurately evaluate sample distributions, mapping normal features to the normal distribution and anomalous features outside it. Consequently, this paper proposes a Normalizing Flow-based Bidirectional Mapping Residual Network (NF-BMR). It utilizes pre-trained Convolutional Neural Networks (CNN) and normalizing flows to construct discriminative source and target domain feature spaces. Additionally, to better learn feature information in both domain spaces, we propose the Bidirectional Mapping Residual Network (BMR), which maps sample features to these two spaces… More > Graphic Abstract

    A Normalizing Flow-Based Bidirectional Mapping Residual Network for Unsupervised Defect Detection

  • Open Access

    ARTICLE

    An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms

    Asma Hassan Alshehri*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2767-2786, 2024, DOI:10.32604/cmc.2023.046838

    Abstract Online review platforms are becoming increasingly popular, encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services. Using Sybil accounts, bot farms, and real account purchases, immoral actors demonize rivals and advertise their goods. Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years. The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones. This paper adopts a semi-supervised machine learning method to detect fake reviews on any website, among other things. Online reviews… More >

  • Open Access

    ARTICLE

    Detection Algorithm of Laboratory Personnel Irregularities Based on Improved YOLOv7

    Yongliang Yang, Linghua Xu*, Maolin Luo, Xiao Wang, Min Cao

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2741-2765, 2024, DOI:10.32604/cmc.2024.046768

    Abstract Due to the complex environment of the university laboratory, personnel flow intensive, personnel irregular behavior is easy to cause security risks. Monitoring using mainstream detection algorithms suffers from low detection accuracy and slow speed. Therefore, the current management of personnel behavior mainly relies on institutional constraints, education and training, on-site supervision, etc., which is time-consuming and ineffective. Given the above situation, this paper proposes an improved You Only Look Once version 7 (YOLOv7) to achieve the purpose of quickly detecting irregular behaviors of laboratory personnel while ensuring high detection accuracy. First, to better capture the shape features of the target,… More >

  • Open Access

    ARTICLE

    Personality Trait Detection via Transfer Learning

    Bashar Alshouha1, Jesus Serrano-Guerrero1,*, Francisco Chiclana2, Francisco P. Romero1, Jose A. Olivas1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1933-1956, 2024, DOI:10.32604/cmc.2023.046711

    Abstract Personality recognition plays a pivotal role when developing user-centric solutions such as recommender systems or decision support systems across various domains, including education, e-commerce, or human resources. Traditional machine learning techniques have been broadly employed for personality trait identification; nevertheless, the development of new technologies based on deep learning has led to new opportunities to improve their performance. This study focuses on the capabilities of pre-trained language models such as BERT, RoBERTa, ALBERT, ELECTRA, ERNIE, or XLNet, to deal with the task of personality recognition. These models are able to capture structural features from textual content and comprehend a multitude… More >

Displaying 61-70 on page 7 of 1580. Per Page