Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (341)
  • Open Access


    Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices

    So-Eun Jeon1, Ye-Sol Oh1, Yeon-Ji Lee1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1669-1687, 2024, DOI:10.32604/cmes.2024.047239

    Abstract With the advancement of wireless network technology, vast amounts of traffic have been generated, and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated. While signature-based detection methods, static analysis, and dynamic analysis techniques have been previously explored for malicious traffic detection, they have limitations in identifying diversified malware traffic patterns. Recent research has been focused on the application of machine learning to detect these patterns. However, applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process. In this study, we examined methods… More >

  • Open Access


    A New Malicious Code Classification Method for the Security of Financial Software

    Xiaonan Li1,2, Qiang Wang1, Conglai Fan2,3, Wei Zhan1, Mingliang Zhang4,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 773-792, 2024, DOI:10.32604/csse.2024.039849

    Abstract The field of finance heavily relies on cybersecurity to safeguard its systems and clients from harmful software. The identification of malevolent code within financial software is vital for protecting both the financial system and individual clients. Nevertheless, present detection models encounter limitations in their ability to identify malevolent code and its variations, all while encompassing a multitude of parameters. To overcome these obstacles, we introduce a lean model for classifying families of malevolent code, formulated on Ghost-DenseNet-SE. This model integrates the Ghost module, DenseNet, and the squeeze-and-excitation (SE) channel domain attention mechanism. It substitutes the standard convolutional layer in DenseNet… More >

  • Open Access


    Transformation of MRI Images to Three-Level Color Spaces for Brain Tumor Classification Using Deep-Net

    Fadl Dahan*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 381-395, 2024, DOI:10.32604/iasc.2024.047921

    Abstract In the domain of medical imaging, the accurate detection and classification of brain tumors is very important. This study introduces an advanced method for identifying camouflaged brain tumors within images. Our proposed model consists of three steps: Feature extraction, feature fusion, and then classification. The core of this model revolves around a feature extraction framework that combines color-transformed images with deep learning techniques, using the ResNet50 Convolutional Neural Network (CNN) architecture. So the focus is to extract robust feature from MRI images, particularly emphasizing weighted average features extracted from the first convolutional layer renowned for their discriminative power. To enhance… More >

  • Open Access


    Curve Classification Based on Mean-Variance Feature Weighting and Its Application

    Zewen Zhang1, Sheng Zhou1, Chunzheng Cao1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2465-2480, 2024, DOI:10.32604/cmc.2024.049605

    Abstract The classification of functional data has drawn much attention in recent years. The main challenge is representing infinite-dimensional functional data by finite-dimensional features while utilizing those features to achieve better classification accuracy. In this paper, we propose a mean-variance-based (MV) feature weighting method for classifying functional data or functional curves. In the feature extraction stage, each sample curve is approximated by B-splines to transfer features to the coefficients of the spline basis. After that, a feature weighting approach based on statistical principles is introduced by comprehensively considering the between-class differences and within-class variations of the coefficients. We also introduce a… More >

  • Open Access


    Lightweight Res-Connection Multi-Branch Network for Highly Accurate Crowd Counting and Localization

    Mingze Li, Diwen Zheng, Shuhua Lu*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2105-2122, 2024, DOI:10.32604/cmc.2024.048928

    Abstract Crowd counting is a promising hotspot of computer vision involving crowd intelligence analysis, achieving tremendous success recently with the development of deep learning. However, there have been still many challenges including crowd multi-scale variations and high network complexity, etc. To tackle these issues, a lightweight Res-connection multi-branch network (LRMBNet) for highly accurate crowd counting and localization is proposed. Specifically, using improved ShuffleNet V2 as the backbone, a lightweight shallow extractor has been designed by employing the channel compression mechanism to reduce enormously the number of network parameters. A light multi-branch structure with different expansion rate convolutions is demonstrated to extract… More >

  • Open Access


    A Study on Enhancing Chip Detection Efficiency Using the Lightweight Van-YOLOv8 Network

    Meng Huang, Honglei Wei*, Xianyi Zhai

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 531-547, 2024, DOI:10.32604/cmc.2024.048510

    Abstract In pursuit of cost-effective manufacturing, enterprises are increasingly adopting the practice of utilizing recycled semiconductor chips. To ensure consistent chip orientation during packaging, a circular marker on the front side is employed for pin alignment following successful functional testing. However, recycled chips often exhibit substantial surface wear, and the identification of the relatively small marker proves challenging. Moreover, the complexity of generic target detection algorithms hampers seamless deployment. Addressing these issues, this paper introduces a lightweight YOLOv8s-based network tailored for detecting markings on recycled chips, termed Van-YOLOv8. Initially, to alleviate the influence of diminutive, low-resolution markings on the precision of… More >

  • Open Access


    YOLOv5ST: A Lightweight and Fast Scene Text Detector

    Yiwei Liu1, Yingnan Zhao1,*, Yi Chen1, Zheng Hu1, Min Xia2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 909-926, 2024, DOI:10.32604/cmc.2024.047901

    Abstract Scene text detection is an important task in computer vision. In this paper, we present YOLOv5 Scene Text (YOLOv5ST), an optimized architecture based on YOLOv5 v6.0 tailored for fast scene text detection. Our primary goal is to enhance inference speed without sacrificing significant detection accuracy, thereby enabling robust performance on resource-constrained devices like drones, closed-circuit television cameras, and other embedded systems. To achieve this, we propose key modifications to the network architecture to lighten the original backbone and improve feature aggregation, including replacing standard convolution with depth-wise convolution, adopting the C2 sequence module in place of C3, employing Spatial Pyramid… More >

  • Open Access


    A Lightweight, Searchable, and Controllable EMR Sharing Scheme

    Xiaohui Yang, Peiyin Zhao*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1521-1538, 2024, DOI:10.32604/cmc.2024.047666

    Abstract Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer from privacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR sharing scheme, which employs a large attribute domain and a linear secret sharing structure (LSSS), the computational overhead of encryption and decryption reaches a lightweight constant level, and supports keyword search and policy hiding, which improves the high efficiency of medical data sharing. The dynamic accumulator technology is utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the data to achieve controllability of… More >

  • Open Access


    Coal/Gangue Volume Estimation with Convolutional Neural Network and Separation Based on Predicted Volume and Weight

    Zenglun Guan1,2, Murad S. Alfarzaeai1,3,*, Eryi Hu1,3,*, Taqiaden Alshmeri4, Wang Peng3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 279-306, 2024, DOI:10.32604/cmc.2024.047159

    Abstract In the coal mining industry, the gangue separation phase imposes a key challenge due to the high visual similarity between coal and gangue. Recently, separation methods have become more intelligent and efficient, using new technologies and applying different features for recognition. One such method exploits the difference in substance density, leading to excellent coal/gangue recognition. Therefore, this study uses density differences to distinguish coal from gangue by performing volume prediction on the samples. Our training samples maintain a record of 3-side images as input, volume, and weight as the ground truth for the classification. The prediction process relies on a… More >

  • Open Access


    Large-Scale Multi-Objective Optimization Algorithm Based on Weighted Overlapping Grouping of Decision Variables

    Liang Chen1, Jingbo Zhang1, Linjie Wu1, Xingjuan Cai1,2,*, Yubin Xu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 363-383, 2024, DOI:10.32604/cmes.2024.049044

    Abstract The large-scale multi-objective optimization algorithm (LSMOA), based on the grouping of decision variables, is an advanced method for handling high-dimensional decision variables. However, in practical problems, the interaction among decision variables is intricate, leading to large group sizes and suboptimal optimization effects; hence a large-scale multi-objective optimization algorithm based on weighted overlapping grouping of decision variables (MOEAWOD) is proposed in this paper. Initially, the decision variables are perturbed and categorized into convergence and diversity variables; subsequently, the convergence variables are subdivided into groups based on the interactions among different decision variables. If the size of a group surpasses the set… More >

Displaying 1-10 on page 1 of 341. Per Page