Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to verify the accuracy and efficiency… More >

  • Open Access

    ARTICLE

    Identifying Game Processes Based on Private Working Sets

    Jinfeng Li1, Li Feng1, *, Longqing Zhang2, Hongning Dai1, Lei Yang1, Liwei Tian1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 639-651, 2020, DOI:10.32604/cmc.2020.010309

    Abstract Fueled by the booming online games, there is an increasing demand for monitoring online games in various settings. One of the application scenarios is the monitor of computer games in school computer labs, for which an intelligent game recognition method is required. In this paper, a method to identify game processes in accordance with private working sets (i.e., the amount of memory occupied by a process but cannot be shared among other processes) is introduced. Results of the W test showed that the memory sizes occupied by the legitimate processes (e.g., the processes of common native windows applications) and game… More >

  • Open Access

    ARTICLE

    Semi-GSGCN: Social Robot Detection Research with Graph Neural Network

    Xiujuan Wang1, Qianqian Zheng1, *, Kangfeng Zheng2, Yi Sui1, Jiayue Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 617-638, 2020, DOI:10.32604/cmc.2020.011165

    Abstract Malicious social robots are the disseminators of malicious information on social networks, which seriously affect information security and network environments. Efficient and reliable classification of social robots is crucial for detecting information manipulation in social networks. Supervised classification based on manual feature extraction has been widely used in social robot detection. However, these methods not only involve the privacy of users but also ignore hidden feature information, especially the graph feature, and the label utilization rate of semi-supervised algorithms is low. Aiming at the problems of shallow feature extraction and low label utilization rate in existing social network robot detection… More >

  • Open Access

    ARTICLE

    A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen

    Lejun Zhang1, 2, Zhijie Zhang1, Weizheng Wang3, Rasheed Waqas1, Chunhui Zhao1, 4, Seokhoon Kim5, Huiling Chen6, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 597-616, 2020, DOI:10.32604/cmc.2020.011554

    Abstract As an extension of the traditional encryption technology, information hiding has been increasingly used in the fields of communication and network media, and the covert communication technology has gradually developed. The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance, which can effectively alleviate the disadvantages and problems of traditional covert communication. However, its combination with covert communication thus far has been mostly at the theoretical level. The BLOCCE method, as an early result of the combination of blockchain and covert communication technology, has the problems of low information embedding efficiency, the use… More >

  • Open Access

    ARTICLE

    Automatic Terrain Debris Recognition Network Based on 3D Remote Sensing Data

    Xu Han1, #, Huijun Yang1, 4, *, Qiufeng Shen1, #, Jiangtao Yang2, Huihui Liang1, Cancan Bao1, Shuang Cang3

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 579-596, 2020, DOI:10.32604/cmc.2020.011262

    Abstract Although predecessors have made great contributions to the semantic segmentation of 3D indoor scenes, there still exist some challenges in the debris recognition of terrain data. Compared with hundreds of thousands of indoor point clouds, the amount of terrain point cloud is up to millions. Apart from that, terrain point cloud data obtained from remote sensing is measured in meters, but the indoor scene is measured in centimeters. In this case, the terrain debris obtained from remote sensing mapping only have dozens of points, which means that sufficient training information cannot be obtained only through the convolution of points. In… More >

  • Open Access

    ARTICLE

    Ore Image Segmentation Method Based on U-Net and Watershed

    Hui Li1, Chengwei Pan2, 3, Ziyi Chen1, Aziguli Wulamu2, 3, *, Alan Yang4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 563-578, 2020, DOI:10.32604/cmc.2020.09806

    Abstract Ore image segmentation is a key step in an ore grain size analysis based on image processing. The traditional segmentation methods do not deal with ore textures and shadows in ore images well Those methods often suffer from under-segmentation and over-segmentation. In this article, in order to solve the problem, an ore image segmentation method based on U-Net is proposed. We adjust the structure of U-Net to speed up the processing, and we modify the loss function to enhance the generalization of the model. After the collection of the ore image, we design the annotation standard and train the network… More >

  • Open Access

    ARTICLE

    Accurate Multi-Scale Feature Fusion CNN for Time Series Classification in Smart Factory

    Xiaorui Shao1, Chang Soo Kim1, *, Dae Geun Kim2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 543-561, 2020, DOI:10.32604/cmc.2020.011108

    Abstract Time series classification (TSC) has attracted various attention in the community of machine learning and data mining and has many successful applications such as fault detection and product identification in the process of building a smart factory. However, it is still challenging for the efficiency and accuracy of classification due to complexity, multi-dimension of time series. This paper presents a new approach for time series classification based on convolutional neural networks (CNN). The proposed method contains three parts: short-time gap feature extraction, multi-scale local feature learning, and global feature learning. In the process of short-time gap feature extraction, large kernel… More >

  • Open Access

    ARTICLE

    Jointly Part-of-Speech Tagging and Semantic Role Labeling Using Auxiliary Deep Neural Network Model

    Yatian Shen1, Yubo Mai2, Xiajiong Shen2, Wenke Ding2, *, Mengjiao Guo3

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 529-541, 2020, DOI:10.32604/cmc.2020.011139

    Abstract Previous studies have shown that there is potential semantic dependency between part-of-speech and semantic roles. At the same time, the predicate-argument structure in a sentence is important information for semantic role labeling task. In this work, we introduce the auxiliary deep neural network model, which models semantic dependency between part-of-speech and semantic roles and incorporates the information of predicate-argument into semantic role labeling. Based on the framework of joint learning, part-of-speech tagging is used as an auxiliary task to improve the result of the semantic role labeling. In addition, we introduce the argument recognition layer in the training process of… More >

  • Open Access

    ARTICLE

    Image Processing of Manganese Nodules Based on Background Gray Value Calculation

    Hade Mao1, 2, Yuliang Liu1, 2, *, Hongzhe Yan1, 2, Cheng Qian3, Jing Xue4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 511-527, 2020, DOI:10.32604/cmc.2020.09841

    Abstract To troubleshoot two problems arising from the segmentation of manganese nodule images-uneven illumination and morphological defects caused by white sand coverage, we propose, with reference to features of manganese nodules, a method called “background gray value calculation”. As the result of the image procession with the aid this method, the two problems above are solved eventually, together with acquisition of a segmentable image of manganese nodules. As a result, its comparison with other segmentation methods justifies its feasibility and stability. Judging from simulation results, it is indicated that this method is applicable to repair the target shape in the image,… More >

  • Open Access

    ARTICLE

    A Novel Method of Heart Failure Prediction Based on DPCNNXGBOOST Model

    Yuwen Chen1, 2, 3, *, Xiaolin Qin1, 3, Lige Zhang1, 3, Bin Yi4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 495-510, 2020, DOI:10.32604/cmc.2020.011278

    Abstract The occurrence of perioperative heart failure will affect the quality of medical services and threaten the safety of patients. Existing methods depend on the judgment of doctors, the results are affected by many factors such as doctors’ knowledge and experience. The accuracy is difficult to guarantee and has a serious lag. In this paper, a mixture prediction model is proposed for perioperative adverse events of heart failure, which combined with the advantages of the Deep Pyramid Convolutional Neural Networks (DPCNN) and Extreme Gradient Boosting (XGBOOST). The DPCNN was used to automatically extract features from patient’s diagnostic texts, and the text… More >

Displaying 4021-4030 on page 403 of 5427. Per Page