Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    A Spectral Convolutional Neural Network Model Based on Adaptive Fick’s Law for Hyperspectral Image Classification

    Tsu-Yang Wu1,2, Haonan Li2, Saru Kumari3, Chien-Ming Chen1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 19-46, 2024, DOI:10.32604/cmc.2024.048347

    Abstract Hyperspectral image classification stands as a pivotal task within the field of remote sensing, yet achieving high-precision classification remains a significant challenge. In response to this challenge, a Spectral Convolutional Neural Network model based on Adaptive Fick’s Law Algorithm (AFLA-SCNN) is proposed. The Adaptive Fick’s Law Algorithm (AFLA) constitutes a novel metaheuristic algorithm introduced herein, encompassing three new strategies: Adaptive weight factor, Gaussian mutation, and probability update policy. With adaptive weight factor, the algorithm can adjust the weights according to the change in the number of iterations to improve the performance of the algorithm. Gaussian mutation helps the algorithm avoid… More >

  • Open Access

    ARTICLE

    HCSP-Net: A Novel Model of Age-Related Macular Degeneration Classification Based on Color Fundus Photography

    Cheng Wan1, Jiani Zhao1, Xiangqian Hong2, Weihua Yang2,*, Shaochong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 391-407, 2024, DOI:10.32604/cmc.2024.048307

    Abstract Age-related macular degeneration (AMD) ranks third among the most common causes of blindness. As the most conventional and direct method for identifying AMD, color fundus photography has become prominent owing to its consistency, ease of use, and good quality in extensive clinical practice. In this study, a convolutional neural network (CSPDarknet53) was combined with a transformer to construct a new hybrid model, HCSP-Net. This hybrid model was employed to tri-classify color fundus photography into the normal macula (NM), dry macular degeneration (DMD), and wet macular degeneration (WMD) based on clinical classification manifestations, thus identifying and resolving AMD as early as… More >

  • Open Access

    ARTICLE

    Expression Recognition Method Based on Convolutional Neural Network and Capsule Neural Network

    Zhanfeng Wang1, Lisha Yao2,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1659-1677, 2024, DOI:10.32604/cmc.2024.048304

    Abstract Convolutional neural networks struggle to accurately handle changes in angles and twists in the direction of images, which affects their ability to recognize patterns based on internal feature levels. In contrast, CapsNet overcomes these limitations by vectorizing information through increased directionality and magnitude, ensuring that spatial information is not overlooked. Therefore, this study proposes a novel expression recognition technique called CAPSULE-VGG, which combines the strengths of CapsNet and convolutional neural networks. By refining and integrating features extracted by a convolutional neural network before introducing them into CapsNet, our model enhances facial recognition capabilities. Compared to traditional neural network models, our… More >

  • Open Access

    ARTICLE

    A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies

    Maria Gul1, Imran Ali Khan1, Gohar Zaman2, Atta Rahman3,*, Jamaluddin Mir2, Sardar Asad Ali Biabani4,5, May Issa Aldossary6, Mustafa Youldash7, Ashraf Saadeldeen8, Maqsood Mahmud9, Asiya Abdus Salam6, Dania Alkhulaifi3, Abdullah AlTurkey3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1631-1657, 2024, DOI:10.32604/cmc.2024.048289

    Abstract Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, many researchers proposed game theoretic models to avoid and remove obstacles for crowd evacuation. Game theoretical models aim to study and analyze the strategic behaviors of individuals within a crowd and their interactions during the evacuation. Game theoretical models have some limitations in the context of crowd evacuation. These models consider a group of individuals as homogeneous objects with the same goals, involve complex mathematical formulation, and cannot model real-world scenarios such as panic, environmental information, crowds that move dynamically, etc. The proposed work presents… More >

  • Open Access

    ARTICLE

    Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps

    Wael M. S. Yafooz*, Abdullah Alsaeedi

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 735-759, 2024, DOI:10.32604/cmc.2024.048270

    Abstract In the last decade, technical advancements and faster Internet speeds have also led to an increasing number of mobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobile apps. The use of these apps eases our daily lives, and all customers who need any type of service can access it easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digital services to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services, particularly during two large occasions, Umrah and Hajj. However, pilgrims… More >

  • Open Access

    ARTICLE

    Mobile Crowdsourcing Task Allocation Based on Dynamic Self-Attention GANs

    Kai Wei1, Song Yu2, Qingxian Pan1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 607-622, 2024, DOI:10.32604/cmc.2024.048240

    Abstract Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation. While traditional methods for task allocation can help reduce costs and improve efficiency, they may encounter challenges when dealing with abnormal data flow nodes, leading to decreased allocation accuracy and efficiency. To address these issues, this study proposes a novel two-part invalid detection task allocation framework. In the first step, an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data. Compared to the baseline method, the model achieves an approximately 4% increase in the F1 value on the public dataset. In… More >

  • Open Access

    ARTICLE

    Enhancing Cancer Classification through a Hybrid Bio-Inspired Evolutionary Algorithm for Biomarker Gene Selection

    Hala AlShamlan*, Halah AlMazrua*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 675-694, 2024, DOI:10.32604/cmc.2024.048146

    Abstract In this study, our aim is to address the problem of gene selection by proposing a hybrid bio-inspired evolutionary algorithm that combines Grey Wolf Optimization (GWO) with Harris Hawks Optimization (HHO) for feature selection. The motivation for utilizing GWO and HHO stems from their bio-inspired nature and their demonstrated success in optimization problems. We aim to leverage the strengths of these algorithms to enhance the effectiveness of feature selection in microarray-based cancer classification. We selected leave-one-out cross-validation (LOOCV) to evaluate the performance of both two widely used classifiers, k-nearest neighbors (KNN) and support vector machine (SVM), on high-dimensional cancer microarray… More >

  • Open Access

    ARTICLE

    Infrared and Visible Image Fusion Based on Res2Net-Transformer Automatic Encoding and Decoding

    Chunming Wu1, Wukai Liu2,*, Xin Ma3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1441-1461, 2024, DOI:10.32604/cmc.2024.048136

    Abstract A novel image fusion network framework with an autonomous encoder and decoder is suggested to increase the visual impression of fused images by improving the quality of infrared and visible light picture fusion. The network comprises an encoder module, fusion layer, decoder module, and edge improvement module. The encoder module utilizes an enhanced Inception module for shallow feature extraction, then combines Res2Net and Transformer to achieve deep-level co-extraction of local and global features from the original picture. An edge enhancement module (EEM) is created to extract significant edge features. A modal maximum difference fusion strategy is introduced to enhance the… More >

  • Open Access

    ARTICLE

    Time and Space Efficient Multi-Model Convolution Vision Transformer for Tomato Disease Detection from Leaf Images with Varied Backgrounds

    Ankita Gangwar1, Vijaypal Singh Dhaka1, Geeta Rani2,*, Shrey Khandelwal1, Ester Zumpano3,4, Eugenio Vocaturo3,4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 117-142, 2024, DOI:10.32604/cmc.2024.048119

    Abstract A consumption of 46.9 million tons of processed tomatoes was reported in 2022 which is merely 20% of the total consumption. An increase of 3.3% in consumption is predicted from 2024 to 2032. Tomatoes are also rich in iron, potassium, antioxidant lycopene, vitamins A, C and K which are important for preventing cancer, and maintaining blood pressure and glucose levels. Thus, tomatoes are globally important due to their widespread usage and nutritional value. To face the high demand for tomatoes, it is mandatory to investigate the causes of crop loss and minimize them. Diseases are one of the major causes… More >

  • Open Access

    ARTICLE

    The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network

    Qiang Fu1, Jun Wang1,*, Changfu Si1, Jiawei Liu2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 329-349, 2024, DOI:10.32604/cmc.2024.048117

    Abstract As industrialization and informatization become more deeply intertwined, industrial control networks have entered an era of intelligence. The connection between industrial control networks and the external internet is becoming increasingly close, which leads to frequent security accidents. This paper proposes a model for the industrial control network. It includes a malware containment strategy that integrates intrusion detection, quarantine, and monitoring. Based on this model, the role of key nodes in the spread of malware is studied, a comparison experiment is conducted to validate the impact of the containment strategy. In addition, the dynamic behavior of the model is analyzed, the… More >

Displaying 61-70 on page 7 of 22225. Per Page