Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,379)
  • Open Access

    ARTICLE

    Steel Surface Defect Detection Using Learnable Memory Vision Transformer

    Syed Tasnimul Karim Ayon1,#, Farhan Md. Siraj1,#, Jia Uddin2,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 499-520, 2025, DOI:10.32604/cmc.2025.058361 - 03 January 2025

    Abstract This study investigates the application of Learnable Memory Vision Transformers (LMViT) for detecting metal surface flaws, comparing their performance with traditional CNNs, specifically ResNet18 and ResNet50, as well as other transformer-based models including Token to Token ViT, ViT without memory, and Parallel ViT. Leveraging a widely-used steel surface defect dataset, the research applies data augmentation and t-distributed stochastic neighbor embedding (t-SNE) to enhance feature extraction and understanding. These techniques mitigated overfitting, stabilized training, and improved generalization capabilities. The LMViT model achieved a test accuracy of 97.22%, significantly outperforming ResNet18 (88.89%) and ResNet50 (88.90%), as well… More >

  • Open Access

    ARTICLE

    DIGNN-A: Real-Time Network Intrusion Detection with Integrated Neural Networks Based on Dynamic Graph

    Jizhao Liu, Minghao Guo*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 817-842, 2025, DOI:10.32604/cmc.2024.057660 - 03 January 2025

    Abstract The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats. Intrusion detection systems are crucial to network security, playing a pivotal role in safeguarding networks from potential threats. However, in the context of an evolving landscape of sophisticated and elusive attacks, existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts. To address these issues, this paper proposes a real-time network intrusion detection method based on… More >

  • Open Access

    ARTICLE

    A Generative Model-Based Network Framework for Ecological Data Reconstruction

    Shuqiao Liu1, Zhao Zhang2,*, Hongyan Zhou1, Xuebo Chen1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 929-948, 2025, DOI:10.32604/cmc.2024.057319 - 03 January 2025

    Abstract This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection systems. Combining Strengths, Weaknesses, Opportunities, Threats (SWOT) analysis data with Variation Autoencoder (VAE) and Generative Adversarial Network (GAN) the network framework model (SAE-GAN), is proposed for environmental data reconstruction. The model combines two popular generative models, GAN and VAE, to generate features conditional on categorical data embedding after SWOT Analysis. The model is capable of generating features that resemble real feature distributions and adding sample factors to more accurately track individual sample data. Reconstructed data is… More >

  • Open Access

    ARTICLE

    Unmasking Social Robots’ Camouflage: A GNN-Random Forest Framework for Enhanced Detection

    Weijian Fan1,*, Chunhua Wang2, Xiao Han3, Chichen Lin4

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 467-483, 2025, DOI:10.32604/cmc.2024.056930 - 03 January 2025

    Abstract The proliferation of robot accounts on social media platforms has posed a significant negative impact, necessitating robust measures to counter network anomalies and safeguard content integrity. Social robot detection has emerged as a pivotal yet intricate task, aimed at mitigating the dissemination of misleading information. While graph-based approaches have attained remarkable performance in this realm, they grapple with a fundamental limitation: the homogeneity assumption in graph convolution allows social robots to stealthily evade detection by mingling with genuine human profiles. To unravel this challenge and thwart the camouflage tactics, this work proposed an innovative social… More >

  • Open Access

    ARTICLE

    IDSSCNN-XgBoost: Improved Dual-Stream Shallow Convolutional Neural Network Based on Extreme Gradient Boosting Algorithm for Micro Expression Recognition

    Adnan Ahmad, Zhao Li*, Irfan Tariq, Zhengran He

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 729-749, 2025, DOI:10.32604/cmc.2024.055768 - 03 January 2025

    Abstract Micro-expressions (ME) recognition is a complex task that requires advanced techniques to extract informative features from facial expressions. Numerous deep neural networks (DNNs) with convolutional structures have been proposed. However, unlike DNNs, shallow convolutional neural networks often outperform deeper models in mitigating overfitting, particularly with small datasets. Still, many of these methods rely on a single feature for recognition, resulting in an insufficient ability to extract highly effective features. To address this limitation, in this paper, an Improved Dual-stream Shallow Convolutional Neural Network based on an Extreme Gradient Boosting Algorithm (IDSSCNN-XgBoost) is introduced for ME… More >

  • Open Access

    ARTICLE

    Prairie Araneida Optimization Based Fused CNN Model for Intrusion Detection

    Nishit Patil, Shubhalaxmi Joshi*

    Computer Systems Science and Engineering, Vol.49, pp. 49-77, 2025, DOI:10.32604/csse.2024.057702 - 03 January 2025

    Abstract Intrusion detection (ID) is a cyber security practice that encompasses the process of monitoring network activities to identify unauthorized or malicious actions. This includes problems like the difficulties of existing intrusion detection models to identify emerging attacks, generating many false alarms, and their inability and difficulty to adapt themselves with time when it comes to threats, hence to overcome all those existing challenges in this research develop a Prairie Araneida optimization based fused Convolutional Neural Network model (PAO-CNN) for intrusion detection. The fused CNN (Convolutional Neural Netowrk) is a remarkable development since it combines statistical… More >

  • Open Access

    ARTICLE

    Method for Estimating the State of Health of Lithium-ion Batteries Based on Differential Thermal Voltammetry and Sparrow Search Algorithm-Elman Neural Network

    Yu Zhang, Daoyu Zhang*, Tiezhou Wu

    Energy Engineering, Vol.122, No.1, pp. 203-220, 2025, DOI:10.32604/ee.2024.056244 - 27 December 2024

    Abstract Precisely estimating the state of health (SOH) of lithium-ion batteries is essential for battery management systems (BMS), as it plays a key role in ensuring the safe and reliable operation of battery systems. However, current SOH estimation methods often overlook the valuable temperature information that can effectively characterize battery aging during capacity degradation. Additionally, the Elman neural network, which is commonly employed for SOH estimation, exhibits several drawbacks, including slow training speed, a tendency to become trapped in local minima, and the initialization of weights and thresholds using pseudo-random numbers, leading to unstable model performance.… More >

  • Open Access

    ARTICLE

    Multi-Stage-Based Siamese Neural Network for Seal Image Recognition

    Jianfeng Lu1,2, Xiangye Huang1, Caijin Li1, Renlin Xin1, Shanqing Zhang1,2, Mahmoud Emam1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 405-423, 2025, DOI:10.32604/cmes.2024.058121 - 17 December 2024

    Abstract Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting. Stamped seal inspection is commonly audited manually to ensure document authenticity. However, manual assessment of seal images is tedious and labor-intensive due to human errors, inconsistent placement, and completeness of the seal. Traditional image recognition systems are inadequate enough to identify seal types accurately, necessitating a neural network-based method for seal image recognition. However, neural network-based classification algorithms, such as Residual Networks (ResNet) and Visual Geometry Group with 16 layers… More >

  • Open Access

    ARTICLE

    Dynamic Multi-Graph Spatio-Temporal Graph Traffic Flow Prediction in Bangkok: An Application of a Continuous Convolutional Neural Network

    Pongsakon Promsawat1, Weerapan Sae-dan2,*, Marisa Kaewsuwan3, Weerawat Sudsutad3, Aphirak Aphithana3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 579-607, 2025, DOI:10.32604/cmes.2024.057774 - 17 December 2024

    Abstract The ability to accurately predict urban traffic flows is crucial for optimising city operations. Consequently, various methods for forecasting urban traffic have been developed, focusing on analysing historical data to understand complex mobility patterns. Deep learning techniques, such as graph neural networks (GNNs), are popular for their ability to capture spatio-temporal dependencies. However, these models often become overly complex due to the large number of hyper-parameters involved. In this study, we introduce Dynamic Multi-Graph Spatial-Temporal Graph Neural Ordinary Differential Equation Networks (DMST-GNODE), a framework based on ordinary differential equations (ODEs) that autonomously discovers effective spatial-temporal… More >

  • Open Access

    ARTICLE

    A Novel Self-Supervised Learning Network for Binocular Disparity Estimation

    Jiawei Tian1, Yu Zhou1, Xiaobing Chen2, Salman A. AlQahtani3, Hongrong Chen4, Bo Yang4,*, Siyu Lu4, Wenfeng Zheng3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 209-229, 2025, DOI:10.32604/cmes.2024.057032 - 17 December 2024

    Abstract Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination, hindering accurate three-dimensional lesion reconstruction by surgical robots. This study proposes a novel end-to-end disparity estimation model to address these challenges. Our approach combines a Pseudo-Siamese neural network architecture with pyramid dilated convolutions, integrating multi-scale image information to enhance robustness against lighting interferences. This study introduces a Pseudo-Siamese structure-based disparity regression model that simplifies left-right image comparison, improving accuracy and efficiency. The model was evaluated using a dataset of stereo endoscopic videos captured by the Da Vinci surgical robot, comprising More >

Displaying 1-10 on page 1 of 1379. Per Page