Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Upper and Lower Bounds of the α-Universal Triple I Method for Unified Interval Implications

    Yiming Tang1,2, Jianwei Gao1,*, Yifan Huang1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1063-1088, 2024, DOI:10.32604/cmc.2024.049341

    Abstract The α-universal triple I (α-UTI) method is a recognized scheme in the field of fuzzy reasoning, which was proposed by our research group previously. The robustness of fuzzy reasoning determines the quality of reasoning algorithms to a large extent, which is quantified by calculating the disparity between the output of fuzzy reasoning with interference and the output without interference. Therefore, in this study, the interval robustness (embodied as the interval stability) of the α-UTI method is explored in the interval-valued fuzzy environment. To begin with, the stability of the α-UTI method is explored for the case of an individual rule,… More >

  • Open Access

    ARTICLE

    A Robust Conformer-Based Speech Recognition Model for Mandarin Air Traffic Control

    Peiyuan Jiang1, Weijun Pan1,*, Jian Zhang1, Teng Wang1, Junxiang Huang2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 911-940, 2023, DOI:10.32604/cmc.2023.041772

    Abstract

    This study aims to address the deviation in downstream tasks caused by inaccurate recognition results when applying Automatic Speech Recognition (ASR) technology in the Air Traffic Control (ATC) field. This paper presents a novel cascaded model architecture, namely Conformer-CTC/Attention-T5 (CCAT), to build a highly accurate and robust ATC speech recognition model. To tackle the challenges posed by noise and fast speech rate in ATC, the Conformer model is employed to extract robust and discriminative speech representations from raw waveforms. On the decoding side, the Attention mechanism is integrated to facilitate precise alignment between input features and output characters. The Text-To-Text… More >

  • Open Access

    ARTICLE

    Deep Facial Emotion Recognition Using Local Features Based on Facial Landmarks for Security System

    Youngeun An, Jimin Lee, EunSang Bak*, Sungbum Pan*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1817-1832, 2023, DOI:10.32604/cmc.2023.039460

    Abstract Emotion recognition based on facial expressions is one of the most critical elements of human-machine interfaces. Most conventional methods for emotion recognition using facial expressions use the entire facial image to extract features and then recognize specific emotions through a pre-trained model. In contrast, this paper proposes a novel feature vector extraction method using the Euclidean distance between the landmarks changing their positions according to facial expressions, especially around the eyes, eyebrows, nose, and mouth. Then, we apply a new classifier using an ensemble network to increase emotion recognition accuracy. The emotion recognition performance was compared with the conventional algorithms… More >

  • Open Access

    ARTICLE

    Adversarial Attack-Based Robustness Evaluation for Trustworthy AI

    Eungyu Lee, Yongsoo Lee, Taejin Lee*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1919-1935, 2023, DOI:10.32604/csse.2023.039599

    Abstract Artificial Intelligence (AI) technology has been extensively researched in various fields, including the field of malware detection. AI models must be trustworthy to introduce AI systems into critical decision-making and resource protection roles. The problem of robustness to adversarial attacks is a significant barrier to trustworthy AI. Although various adversarial attack and defense methods are actively being studied, there is a lack of research on robustness evaluation metrics that serve as standards for determining whether AI models are safe and reliable against adversarial attacks. An AI model’s robustness level cannot be evaluated by traditional evaluation indicators such as accuracy and… More >

  • Open Access

    ARTICLE

    Influence of High-Robustness Polycarboxylate Superplasticizer on the Performances of Concrete Incorporating Fly Ash and Manufactured Sand

    Panpan Cao1,2, Xiulin Huang1,3,*, Shenxu Bao4, Jin Yang5,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2041-2051, 2023, DOI:10.32604/fdmp.2023.027399

    Abstract Using ethylene glycol monovinyl polyoxyethylene ether, 2-acrylamido-2-methylpropane sulfonic acid (AMPS) and acrylic acid as the main synthetic monomers, a high robustness polycarboxylate superplasticizer was prepared. The effects of initial temperature, ratio of acid to ether, amount of chain transfer agent, and synthesis process on the properties of the superplasticizer were studied. The molecular structure was characterized by GPC (Gel Permeation Chromatography) and IR (Infrared Spectrometer). As shown by the results, when the initial reaction temperature is 15°C, the ratio of acid to ether is 3.4:1 and the acrylic acid pre-neutralization is 15%, The AMPS substitution is 10%, the amount of… More > Graphic Abstract

    Influence of High-Robustness Polycarboxylate Superplasticizer on the Performances of Concrete Incorporating Fly Ash and Manufactured Sand

  • Open Access

    ARTICLE

    AC-DC Fuzzy Linear Active Disturbance Rejection Control Strategy of Front Stage of Bidirectional Converter Based on V2G

    Guosheng Li1, Qingquan Lv2, Zhenzhen Zhang2, Haiying Dong1,*

    Energy Engineering, Vol.120, No.4, pp. 1045-1065, 2023, DOI:10.32604/ee.2023.023770

    Abstract Aiming at the problems of output voltage fluctuation and current total harmonic distortion (THD) in the front stage totem-pole bridgeless PFC of two-stage V2G (Vehicle to Grid) vehicle-mounted bi-directional converter, a fuzzy linear active disturbance rejection control strategy for V2G front-stage AC-DC power conversion system is proposed. Firstly, the topological working mode of the totem-pole bridgeless PFC is analyzed, and the mathematical model is established. Combined with the system model and the linear active disturbance rejection theory, a double closed-loop controller is designed with the second-order linear active disturbance rejection control as the voltage outer loop and PI control as… More > Graphic Abstract

    AC-DC Fuzzy Linear Active Disturbance Rejection Control Strategy of Front Stage of Bidirectional Converter Based on V2G

  • Open Access

    ARTICLE

    SRC: Superior Robustness of COVID-19 Detection from Noisy Cough Data Using GFCC

    Basanta Kumar Swain1, Mohammad Zubair Khan2,*, Chiranji Lal Chowdhary3, Abdullah Alsaeedi4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2337-2349, 2023, DOI:10.32604/csse.2023.036192

    Abstract This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients (GFCC) for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hunting optimization and artificial neural network (DHO-ANN). The noisy crowdsourced cough datasets were collected from the public domain. This research work claimed that the GFCC yielded better results in terms of COVID-19 detection as compared to the widely used Mel-frequency cepstral coefficient in noisy crowdsourced speech corpora. The proposed algorithm's performance for detecting COVID-19 disease is rigorously validated using statistical measures, F1 score, confusion matrix, specificity, and sensitivity parameters. Besides,… More >

  • Open Access

    ARTICLE

    Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT

    Mingshuai Sheng1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2,3, Jing Liu4, Mengxing Huang1,5, Yen-Wei Chen6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 293-309, 2023, DOI:10.32604/cmc.2023.036438

    Abstract Medical images are used as a diagnostic tool, so protecting their confidentiality has long been a topic of study. From this, we propose a Resnet50-DCT-based zero watermarking algorithm for use with medical images. To begin, we use Resnet50, a pre-training network, to draw out the deep features of medical images. Then the deep features are transformed by DCT transform and the perceptual hash function is used to generate the feature vector. The original watermark is chaotic scrambled to get the encrypted watermark, and the watermark information is embedded into the original medical image by XOR operation, and the logical key… More >

  • Open Access

    ARTICLE

    Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with Errors Problem

    Joo Woo1, Jonghyun Kim1, Jong Hwan Park2,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1985-2003, 2023, DOI:10.32604/cmc.2023.033102

    Abstract A fuzzy extractor can extract an almost uniform random string from a noisy source with enough entropy such as biometric data. To reproduce an identical key from repeated readings of biometric data, the fuzzy extractor generates a helper data and a random string from biometric data and uses the helper data to reproduce the random string from the second reading. In 2013, Fuller et al. proposed a computational fuzzy extractor based on the learning with errors problem. Their construction, however, can tolerate a sub-linear fraction of errors and has an inefficient decoding algorithm, which causes the reproducing time to increase significantly. In 2016,… More >

  • Open Access

    ARTICLE

    A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT

    Yu Fan1,6, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Cheng Gong1, Jieren Cheng3,5, Yenwei Chen4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1279-1302, 2023, DOI:10.32604/cmc.2023.031445

    Abstract Medical images are a critical component of the diagnostic process for clinicians. Although the quality of medical photographs is essential to the accuracy of a physician’s diagnosis, they must be encrypted due to the characteristics of digital storage and information leakage associated with medical images. Traditional watermark embedding algorithm embeds the watermark information into the medical image, which reduces the quality of the medical image and affects the physicians’ judgment of patient diagnosis. In addition, watermarks in this method have weak robustness under high-intensity geometric attacks when the medical image is attacked and the watermarks are destroyed. This paper proposes… More >

Displaying 1-10 on page 1 of 26. Per Page