Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Complementary-Label Adversarial Domain Adaptation Fault Diagnosis Network under Time-Varying Rotational Speed and Weakly-Supervised Conditions

    Siyuan Liu1,*, Jinying Huang2, Jiancheng Ma1, Licheng Jing2, Yuxuan Wang2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 761-777, 2024, DOI:10.32604/cmc.2024.049484

    Abstract Recent research in cross-domain intelligence fault diagnosis of machinery still has some problems, such as relatively ideal speed conditions and sample conditions. In engineering practice, the rotational speed of the machine is often transient and time-varying, which makes the sample annotation increasingly expensive. Meanwhile, the number of samples collected from different health states is often unbalanced. To deal with the above challenges, a complementary-label (CL) adversarial domain adaptation fault diagnosis network (CLADAN) is proposed under time-varying rotational speed and weakly-supervised conditions. In the weakly supervised learning condition, machine prior information is used for sample annotation via cost-friendly complementary label learning.… More >

  • Open Access

    ARTICLE

    An Elite-Class Teaching-Learning-Based Optimization for Reentrant Hybrid Flow Shop Scheduling with Bottleneck Stage

    Deming Lei, Surui Duan, Mingbo Li*, Jing Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 47-63, 2024, DOI:10.32604/cmc.2024.049481

    Abstract Bottleneck stage and reentrance often exist in real-life manufacturing processes; however, the previous research rarely addresses these two processing conditions in a scheduling problem. In this study, a reentrant hybrid flow shop scheduling problem (RHFSP) with a bottleneck stage is considered, and an elite-class teaching-learning-based optimization (ETLBO) algorithm is proposed to minimize maximum completion time. To produce high-quality solutions, teachers are divided into formal ones and substitute ones, and multiple classes are formed. The teacher phase is composed of teacher competition and teacher teaching. The learner phase is replaced with a reinforcement search of the elite class. Adaptive adjustment on… More >

  • Open Access

    ARTICLE

    Upper and Lower Bounds of the α-Universal Triple I Method for Unified Interval Implications

    Yiming Tang1,2, Jianwei Gao1,*, Yifan Huang1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1063-1088, 2024, DOI:10.32604/cmc.2024.049341

    Abstract The α-universal triple I (α-UTI) method is a recognized scheme in the field of fuzzy reasoning, which was proposed by our research group previously. The robustness of fuzzy reasoning determines the quality of reasoning algorithms to a large extent, which is quantified by calculating the disparity between the output of fuzzy reasoning with interference and the output without interference. Therefore, in this study, the interval robustness (embodied as the interval stability) of the α-UTI method is explored in the interval-valued fuzzy environment. To begin with, the stability of the α-UTI method is explored for the case of an individual rule,… More >

  • Open Access

    ARTICLE

    CrossFormer Embedding DeepLabv3+ for Remote Sensing Images Semantic Segmentation

    Qixiang Tong, Zhipeng Zhu, Min Zhang, Kerui Cao, Haihua Xing*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1353-1375, 2024, DOI:10.32604/cmc.2024.049187

    Abstract High-resolution remote sensing image segmentation is a challenging task. In urban remote sensing, the presence of occlusions and shadows often results in blurred or invisible object boundaries, thereby increasing the difficulty of segmentation. In this paper, an improved network with a cross-region self-attention mechanism for multi-scale features based on DeepLabv3+ is designed to address the difficulties of small object segmentation and blurred target edge segmentation. First, we use CrossFormer as the backbone feature extraction network to achieve the interaction between large- and small-scale features, and establish self-attention associations between features at both large and small scales to capture global contextual… More >

  • Open Access

    ARTICLE

    Automatic Road Tunnel Crack Inspection Based on Crack Area Sensing and Multiscale Semantic Segmentation

    Dingping Chen1, Zhiheng Zhu2, Jinyang Fu1,3, Jilin He1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1679-1703, 2024, DOI:10.32604/cmc.2024.049048

    Abstract The detection of crack defects on the walls of road tunnels is a crucial step in the process of ensuring travel safety and performing routine tunnel maintenance. The automatic and accurate detection of cracks on the surface of road tunnels is the key to improving the maintenance efficiency of road tunnels. Machine vision technology combined with a deep neural network model is an effective means to realize the localization and identification of crack defects on the surface of road tunnels. We propose a complete set of automatic inspection methods for identifying cracks on the walls of road tunnels as a… More >

  • Open Access

    ARTICLE

    Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure

    Aodi Liu, Na Wang*, Xuehui Du, Dibin Shan, Xiangyu Wu, Wenjuan Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1705-1726, 2024, DOI:10.32604/cmc.2024.049011

    Abstract Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access control mechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy management efficiency and difficulty in accurately describing the access control policy. To overcome these problems, this paper proposes a big data access control mechanism based on a two-layer permission decision structure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes are introduced in the ABAC model as business constraints between entities. The proposed mechanism implements a two-layer permission decision structure composed of the inherent attributes of… More >

  • Open Access

    ARTICLE

    Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches

    Jiajun Yan, Ying Zhou*, Anchen Dai, Tao Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 563-580, 2024, DOI:10.32604/cmc.2024.048922

    Abstract As an emerging network paradigm, the software-defined network (SDN) finds extensive application in areas such as smart grids, the Internet of Things (IoT), and edge computing. The forwarding layer in software-defined networks is susceptible to eavesdropping attacks. Route hopping is a moving target defense (MTD) technology that is frequently employed to resist eavesdropping attacks. In the traditional route hopping technology, both request and reply packets use the same hopping path. If an eavesdropping attacker monitors the nodes along this path, the risk of 100% data leakage becomes substantial. In this paper, we present an effective route hopping approach, called two-day… More >

  • Open Access

    ARTICLE

    Perpendicular-Cutdepth: Perpendicular Direction Depth Cutting Data Augmentation Method

    Le Zou1, Linsong Hu1, Yifan Wang1, Zhize Wu2, Xiaofeng Wang1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 927-941, 2024, DOI:10.32604/cmc.2024.048889

    Abstract Depth estimation is an important task in computer vision. Collecting data at scale for monocular depth estimation is challenging, as this task requires simultaneously capturing RGB images and depth information. Therefore, data augmentation is crucial for this task. Existing data augmentation methods often employ pixel-wise transformations, which may inadvertently disrupt edge features. In this paper, we propose a data augmentation method for monocular depth estimation, which we refer to as the Perpendicular-Cutdepth method. This method involves cutting real-world depth maps along perpendicular directions and pasting them onto input images, thereby diversifying the data without compromising edge features. To validate the… More >

  • Open Access

    ARTICLE

    Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier

    Khaled Soliman1,*, Mohamed Sobh2, Ayman M. Bahaa-Eldin2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1419-1439, 2024, DOI:10.32604/cmc.2024.048883

    Abstract The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leads to wide losses for various organizations. These dangers have proven that signature-based approaches are insufficient to prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious Executable Detection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE) files in hosts using Windows operating systems through collecting PE headers and applying machine learning mechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031 benign files and 179,071 malware samples from diverse sources to ensure the efficiency… More >

  • Open Access

    ARTICLE

    A Hybrid Level Set Optimization Design Method of Functionally Graded Cellular Structures Considering Connectivity

    Yan Dong1,2, Kang Zhao1, Liang Gao1, Hao Li1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1-18, 2024, DOI:10.32604/cmc.2024.048870

    Abstract With the continuous advancement in topology optimization and additive manufacturing (AM) technology, the capability to fabricate functionally graded materials and intricate cellular structures with spatially varying microstructures has grown significantly. However, a critical challenge is encountered in the design of these structures–the absence of robust interface connections between adjacent microstructures, potentially resulting in diminished efficiency or macroscopic failure. A Hybrid Level Set Method (HLSM) is proposed, specifically designed to enhance connectivity among non-uniform microstructures, contributing to the design of functionally graded cellular structures. The HLSM introduces a pioneering algorithm for effectively blending heterogeneous microstructure interfaces. Initially, an interpolation algorithm is… More >

Displaying 31-40 on page 4 of 22225. Per Page