Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,674)
  • Open Access

    ARTICLE

    CAW-YOLO: Cross-Layer Fusion and Weighted Receptive Field-Based YOLO for Small Object Detection in Remote Sensing

    Weiya Shi1,*, Shaowen Zhang2, Shiqiang Zhang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3209-3231, 2024, DOI:10.32604/cmes.2023.044863

    Abstract In recent years, there has been extensive research on object detection methods applied to optical remote sensing images utilizing convolutional neural networks. Despite these efforts, the detection of small objects in remote sensing remains a formidable challenge. The deep network structure will bring about the loss of object features, resulting in the loss of object features and the near elimination of some subtle features associated with small objects in deep layers. Additionally, the features of small objects are susceptible to interference from background features contained within the image, leading to a decline in detection accuracy. Moreover, the sensitivity of small… More >

  • Open Access

    ARTICLE

    Quick Weighing of Passing Vehicles Using the Transfer-Learning-Enhanced Convolutional Neural Network

    Wangchen Yan1,*, Jinbao Yang1, Xin Luo2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2507-2524, 2024, DOI:10.32604/cmes.2023.044709

    Abstract Transfer learning could reduce the time and resources required by the training of new models and be therefore important for generalized applications of the trained machine learning algorithms. In this study, a transfer learning-enhanced convolutional neural network (CNN) was proposed to identify the gross weight and the axle weight of moving vehicles on the bridge. The proposed transfer learning-enhanced CNN model was expected to weigh different bridges based on a small amount of training datasets and provide high identification accuracy. First of all, a CNN algorithm for bridge weigh-in-motion (B-WIM) technology was proposed to identify the axle weight and the… More >

  • Open Access

    ARTICLE

    Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology

    Nazik Alturki1, Raed Alharthi2, Muhammad Umer3,*, Oumaima Saidani1, Amal Alshardan1, Reemah M. Alhebshi4, Shtwai Alsubai5, Ali Kashif Bashir6,7,8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3387-3415, 2024, DOI:10.32604/cmes.2023.044700

    Abstract The concept of smart houses has grown in prominence in recent years. Major challenges linked to smart homes are identification theft, data safety, automated decision-making for IoT-based devices, and the security of the device itself. Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features. This paper proposes a smart home system based on ensemble learning of random forest (RF) and convolutional neural networks (CNN) for programmed decision-making tasks, such as categorizing gadgets as “OFF” or “ON” based… More >

  • Open Access

    REVIEW

    A Review of the Tuned Mass Damper Inerter (TMDI) in Energy Harvesting and Vibration Control: Designs, Analysis and Applications

    Xiaofang Kang1,2,*, Qiwen Huang1, Zongqin Wu1, Jianjun Tang1, Xueqin Jiang1, Shancheng Lei3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2361-2398, 2024, DOI:10.32604/cmes.2023.043936

    Abstract Tuned mass damper inerter (TMDI) is a device that couples traditional tuned mass dampers (TMD) with an inertial device. The inertial device produces resistance proportional to the relative acceleration at its two ends through its “inertial” constant. Due to its unique mechanical properties, TMDI has received widespread attention and application in the past twenty years. As different configurations are required in different practical situations, TMDI is still active in the research on vibration control and energy harvesting in structures. This paper provides a comprehensive review of the research status of TMDI. This work first examines the generation and important vibration… More >

  • Open Access

    ARTICLE

    NFT Security Matrix: Towards Modeling NFT Ecosystem Threat

    Peng Liao1, Chaoge Liu2, Jie Yin1,3,*, Zhi Wang2, Xiang Cui2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3255-3285, 2024, DOI:10.32604/cmes.2024.043855

    Abstract Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens (NFTs). To be specific, the total trading volume of digital assets reached an astounding $55.5 billion in 2022. Nevertheless, numerous security concerns have been raised by the rapid expansion of the NFT ecosystem. NFT holders are exposed to a plethora of scams and traps, putting their digital assets at risk of being lost. However, academic research on NFT security is scarce, and the security issues have aroused rare attention. In this study, the NFT ecological process is comprehensively explored. This process falls into five different… More >

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System

    Yanzhong Sun1, Xiaoni Du1,*, Shufen Niu2, Xiaodong Yang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3287-3310, 2024, DOI:10.32604/cmes.2023.043589

    Abstract Traditional email systems can only achieve one-way communication, which means only the receiver is allowed to search for emails on the email server. In this paper, we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption (CL-BSE) by combining the storage function of cloud server with the communication function of email server. In the new model, not only can the data receiver search for the relevant content by generating its own trapdoor, but the data owner also can retrieve the content in the same way. Meanwhile, there are dual… More >

  • Open Access

    ARTICLE

    Novelty of Different Distance Approach for Multi-Criteria Decision-Making Challenges Using q-Rung Vague Sets

    Murugan Palanikumar1, Nasreen Kausar2,*, Dragan Pamucar3,4, Seifedine Kadry5,6,7,*, Chomyong Kim8, Yunyoung Nam9

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3353-3385, 2024, DOI:10.32604/cmes.2024.031439

    Abstract In this article, multiple attribute decision-making problems are solved using the vague normal set (VNS). It is possible to generalize the vague set (VS) and q-rung fuzzy set (FS) into the q-rung vague set (VS). A log q-rung normal vague weighted averaging (log q-rung NVWA), a log q-rung normal vague weighted geometric (log q-rung NVWG), a log generalized q-rung normal vague weighted averaging (log Gq-rung NVWA), and a log generalized q-rung normal vague weighted geometric (log Gq-rung NVWG) operator are discussed in this article. A description is provided of the scoring function, accuracy function and operational laws of the log… More >

  • Open Access

    ARTICLE

    Digital Twin Modeling and Simulation Optimization of Transmission Front and Middle Case Assembly Line

    Xianfeng Cao1, Meihua Yao2, Yahui Zhang3,*, Xiaofeng Hu4, Chuanxun Wu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3233-3253, 2024, DOI:10.32604/cmes.2023.030773

    Abstract As the take-off of China’s macro economy, as well as the rapid development of infrastructure construction, real estate industry, and highway logistics transportation industry, the demand for heavy vehicles is increasing rapidly, the competition is becoming increasingly fierce, and the digital transformation of the production line is imminent. As one of the most important components of heavy vehicles, the transmission front and middle case assembly lines have a high degree of automation, which can be used as a pilot for the digital transformation of production. To ensure the visualization of digital twins (DT), consistent control logic, and real-time data interaction,… More > Graphic Abstract

    Digital Twin Modeling and Simulation Optimization of Transmission Front and Middle Case Assembly Line

  • Open Access

    ARTICLE

    A Study on the Transmission Dynamics of the Omicron Variant of COVID-19 Using Nonlinear Mathematical Models

    S. Dickson1, S. Padmasekaran1, Pushpendra Kumar2,*, Kottakkaran Sooppy Nisar3, Hamidreza Marasi4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2265-2287, 2024, DOI:10.32604/cmes.2023.030286

    Abstract This research examines the transmission dynamics of the Omicron variant of COVID-19 using SEIQIcRVW and SQIRV models, considering the delay in converting susceptible individuals into infected ones. The significant delays eventually resulted in the pandemic’s containment. To ensure the safety of the host population, this concept integrates quarantine and the COVID-19 vaccine. We investigate the stability of the proposed models. The fundamental reproduction number influences stability conditions. According to our findings, asymptomatic cases considerably impact the prevalence of Omicron infection in the community. The real data of the Omicron variant from Chennai, Tamil Nadu, India, is used to validate the… More >

  • Open Access

    REVIEW

    A Survey on Blockchain-Based Federated Learning: Categorization, Application and Analysis

    Yuming Tang1,#, Yitian Zhang2,#, Tao Niu1, Zhen Li2,3,*, Zijian Zhang1,3, Huaping Chen4, Long Zhang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2451-2477, 2024, DOI:10.32604/cmes.2024.030084

    Abstract Federated Learning (FL), as an emergent paradigm in privacy-preserving machine learning, has garnered significant interest from scholars and engineers across both academic and industrial spheres. Despite its innovative approach to model training across distributed networks, FL has its vulnerabilities; the centralized server-client architecture introduces risks of single-point failures. Moreover, the integrity of the global model—a cornerstone of FL—is susceptible to compromise through poisoning attacks by malicious actors. Such attacks and the potential for privacy leakage via inference starkly undermine FL’s foundational privacy and security goals. For these reasons, some participants unwilling use their private data to train a model, which… More >

Displaying 41-50 on page 5 of 3674. Per Page