Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (42)
  • Open Access

    ARTICLE

    Computer Vision and Deep Learning-enabled Weed Detection Model for Precision Agriculture

    R. Punithavathi1, A. Delphin Carolina Rani2, K. R. Sughashini3, Chinnarao Kurangi4, M. Nirmala5, Hasmath Farhana Thariq Ahmed6, S. P. Balamurugan7,*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2759-2774, 2023, DOI:10.32604/csse.2023.027647

    Abstract Presently, precision agriculture processes like plant disease, crop yield prediction, species recognition, weed detection, and irrigation can be accomplished by the use of computer vision (CV) approaches. Weed plays a vital role in influencing crop productivity. The wastage and pollution of farmland's natural atmosphere instigated by full coverage chemical herbicide spraying are increased. Since the proper identification of weeds from crops helps to reduce the usage of herbicide and improve productivity, this study presents a novel computer vision and deep learning based weed detection and classification (CVDL-WDC) model for precision agriculture. The proposed CVDL-WDC technique intends to properly discriminate the… More >

  • Open Access

    ARTICLE

    Evolutionary Algorithsm with Machine Learning Based Epileptic Seizure Detection Model

    Manar Ahmed Hamza1,*, Noha Negm2, Shaha Al-Otaibi3, Amel A. Alhussan4, Mesfer Al Duhayyim5, Fuad Ali Mohammed Al-Yarimi2, Mohammed Rizwanullah1, Ishfaq Yaseen1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4541-4555, 2022, DOI:10.32604/cmc.2022.027048

    Abstract Machine learning (ML) becomes a familiar topic among decision makers in several domains, particularly healthcare. Effective design of ML models assists to detect and classify the occurrence of diseases using healthcare data. Besides, the parameter tuning of the ML models is also essential to accomplish effective classification results. This article develops a novel red colobuses monkey optimization with kernel extreme learning machine (RCMO-KELM) technique for epileptic seizure detection and classification. The proposed RCMO-KELM technique initially extracts the chaotic, time, and frequency domain features in the actual EEG signals. In addition, the min-max normalization approach is employed for the pre-processing of… More >

  • Open Access

    ARTICLE

    Printed Surface Defect Detection Model Based on Positive Samples

    Xin Zihao1, Wang Hongyuan1,*, Qi Pengyu1, Du Weidong2, Zhang Ji1, Chen Fuhua3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5925-5938, 2022, DOI:10.32604/cmc.2022.026943

    Abstract For a long time, the detection and extraction of printed surface defects has been a hot issue in the print industry. Nowadays, defect detection of a large number of products still relies on traditional image processing algorithms such as scale invariant feature transform (SIFT) and oriented fast and rotated brief (ORB), and researchers need to design algorithms for specific products. At present, a large number of defect detection algorithms based on object detection have been applied but need lots of labeling samples with defects. Besides, there are many kinds of defects in printed surface, so it is difficult to enumerate… More >

  • Open Access

    ARTICLE

    Fruits and Vegetables Freshness Categorization Using Deep Learning

    Labiba Gillani Fahad1, Syed Fahad Tahir2,*, Usama Rasheed1, Hafsa Saqib1, Mehdi Hassan2, Hani Alquhayz3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5083-5098, 2022, DOI:10.32604/cmc.2022.023357

    Abstract The nutritional value of perishable food items, such as fruits and vegetables, depends on their freshness levels. The existing approaches solve a binary class problem by classifying a known fruit\vegetable class into fresh or rotten only. We propose an automated fruits and vegetables categorization approach that first recognizes the class of object in an image and then categorizes that fruit or vegetable into one of the three categories: pure-fresh, medium-fresh, and rotten. We gathered a dataset comprising of 60K images of 11 fruits and vegetables, each is further divided into three categories of freshness, using hand-held cameras. The recognition and… More >

  • Open Access

    ARTICLE

    A Hybrid Intrusion Detection Model Based on Spatiotemporal Features

    Linbei Wang1 , Zaoyu Tao1, Lina Wang2,*, Yongjun Ren3

    Journal of Quantum Computing, Vol.3, No.3, pp. 107-118, 2021, DOI:10.32604/jqc.2021.016857

    Abstract With the accelerating process of social informatization, our personal information security and Internet sites, etc., have been facing a series of threats and challenges. Recently, well-developed neural network has seen great advancement in natural language processing and computer vision, which is also adopted in intrusion detection. In this research, a hybrid model integrating MultiScale Convolutional Neural Network and Long Short-term Memory Network (MSCNN-LSTM) is designed to conduct the intrusion detection. Multi-Scale Convolutional Neural Network (MSCNN) is used to extract the spatial characteristics of data sets. And Long Short-term Memory Network (LSTM) is responsible for processing the temporal characteristics. The data… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Based Automated Fish Detection Model for UWSN

    Mesfer Al Duhayyim1, Haya Mesfer Alshahrani2, Fahd N. Al-Wesabi3, Mohammed Alamgeer4, Anwer Mustafa Hilal5,*, Manar Ahmed Hamza5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5871-5887, 2022, DOI:10.32604/cmc.2022.021093

    Abstract An exponential growth in advanced technologies has resulted in the exploration of Ocean spaces. It has paved the way for new opportunities that can address questions relevant to diversity, uniqueness, and difficulty of marine life. Underwater Wireless Sensor Networks (UWSNs) are widely used to leverage such opportunities while these networks include a set of vehicles and sensors to monitor the environmental conditions. In this scenario, it is fascinating to design an automated fish detection technique with the help of underwater videos and computer vision techniques so as to estimate and monitor fish biomass in water bodies. Several models have been… More >

  • Open Access

    ARTICLE

    Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

    Rafia Afzal, Raja Kumar Murugesan*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1825-1841, 2022, DOI:10.32604/iasc.2022.020598

    Abstract The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile traffic, perform account frauds, track… More >

  • Open Access

    ARTICLE

    Deep Transfer Learning Based Rice Plant Disease Detection Model

    R. P. Narmadha1,*, N. Sengottaiyan2, R. J. Kavitha3

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1257-1271, 2022, DOI:10.32604/iasc.2022.020679

    Abstract In agriculture, plant diseases are mainly accountable for reduction in productivity and leads to huge economic loss. Rice is the essential food crop in Asian countries and it gets easily affected by different kinds of diseases. Because of the advent of computer vision and deep learning (DL) techniques, the rice plant diseases can be detected and reduce the burden of the farmers to save the crops. To achieve this, a new DL based rice plant disease diagnosis is developed using Densely Convolution Neural Network (DenseNet) with multilayer perceptron (MLP), called DenseNet169-MLP. The proposed model aims to classify the rice plant… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment

    K. Kalaivani*, M. Chinnadurai

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 1-15, 2021, DOI:10.32604/iasc.2021.017515

    Abstract Fog computing extends the concept of cloud computing by providing the services of computing, storage, and networking connectivity at the edge between data centers in cloud computing environments and end devices. Having the intelligence at the edge enables faster real-time decision-making and reduces the amount of data forwarded to the cloud. When enhanced by fog computing, the Internet of Things (IoT) brings low latency and improves real time and quality of service (QoS) in IoT applications of augmented reality, smart grids, smart vehicles, and healthcare. However, both cloud and fog computing environments are vulnerable to several kinds of attacks that… More >

  • Open Access

    ARTICLE

    Deep Learning and Entity Embedding-Based Intrusion Detection Model for Wireless Sensor Networks

    Bandar Almaslukh*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1343-1360, 2021, DOI:10.32604/cmc.2021.017914

    Abstract Wireless sensor networks (WSNs) are considered promising for applications such as military surveillance and healthcare. The security of these networks must be ensured in order to have reliable applications. Securing such networks requires more attention, as they typically implement no dedicated security appliance. In addition, the sensors have limited computing resources and power and storage, which makes WSNs vulnerable to various attacks, especially denial of service (DoS). The main types of DoS attacks against WSNs are blackhole, grayhole, flooding, and scheduling. There are two primary techniques to build an intrusion detection system (IDS): signature-based and data-driven-based. This study uses the… More >

Displaying 21-30 on page 3 of 42. Per Page