Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    ISHD: Intelligent Standing Human Detection of Video Surveillance for the Smart Examination Environment

    Wu Song1, Yayuan Tang2,3,*, Wenxue Tan1, Sheng Ren1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 509-526, 2023, DOI:10.32604/cmes.2023.026933 - 23 April 2023

    Abstract In the environment of smart examination rooms, it is important to quickly and accurately detect abnormal behavior (human standing) for the construction of a smart campus. Based on deep learning, we propose an intelligent standing human detection (ISHD) method based on an improved single shot multibox detector to detect the target of standing human posture in the scene frame of exam room video surveillance at a specific examination stage. ISHD combines the MobileNet network in a single shot multibox detector network, improves the posture feature extractor of a standing person, merges prior knowledge, and introduces More >

  • Open Access

    ARTICLE

    Ensemble Model for Spindle Thermal Displacement Prediction of Machine Tools

    Ping-Huan Kuo1,2, Ssu-Chi Chen1, Chia-Ho Lee1, Po-Chien Luan2, Her-Terng Yau1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 319-343, 2023, DOI:10.32604/cmes.2023.026860 - 23 April 2023

    Abstract Numerous factors affect the increased temperature of a machine tool, including prolonged and high-intensity usage, tool-workpiece interaction, mechanical friction, and elevated ambient temperatures, among others. Consequently, spindle thermal displacement occurs, and machining precision suffers. To prevent the errors caused by the temperature rise of the Spindle from affecting the accuracy during the machining process, typically, the factory will warm up the machine before the manufacturing process. However, if there is no way to understand the tool spindle's thermal deformation, the machining quality will be greatly affected. In order to solve the above problem, this study More >

  • Open Access

    ARTICLE

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

    Yang Zhao1, Jingmin An1, Hao Li1, Saru Kumari2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 555-575, 2023, DOI:10.32604/cmes.2023.026808 - 23 April 2023

    Abstract The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-time detection and operation control of vehicles and real-time transmission of data and information. In the environment of VSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users, so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, in this paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTAS-ET). The scheme combines fault-tolerant and aggregate signcryption, which… More > Graphic Abstract

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

  • Open Access

    ARTICLE

    Identifying Industrial Control Equipment Based on Rule Matching and Machine Learning

    Yuhao Wang, Yuying Li, Yanbin Sun, Yu Jiang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 577-605, 2023, DOI:10.32604/cmes.2023.026791 - 23 April 2023

    Abstract To identify industrial control equipment is often a key step in network mapping, categorizing network resources, and attack defense. For example, if vulnerable equipment or devices can be discovered in advance and the attack path can be cut off, security threats can be effectively avoided and the stable operation of the Internet can be ensured. The existing rule-matching method for equipment identification has limitations such as relying on experience and low scalability. This paper proposes an industrial control device identification method based on PCA-Adaboost, which integrates rule matching and machine learning. We first build a More >

  • Open Access

    ARTICLE

    Comparison Study and Forensic Analysis between Experiment and Coupled Dynamics Simulation for Submerged Floating Tunnel Segment with Free Ends under Wave Excitations

    Woo Chul Chung1, Chungkuk Jin2,*, MooHyun Kim3, Ju-young Hwang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 155-174, 2023, DOI:10.32604/cmes.2023.026754 - 23 April 2023

    Abstract This paper presents dynamic-behavior comparisons and related forensic analyses of a submerged floating tunnel (SFT) between numerical simulation and physical experiment under regular and irregular waves. The experiments are conducted in the 3D wave tank with 1:33.3 scale, and the corresponding coupled time-domain simulation tool is devised for comparison. The entire SFT system consists of a long concrete tunnel and 12 tubular aluminum mooring lines. Two numerical simulation models, the Cummins equation with 3D potential theory including second-order wave-body interaction effects and the much simpler Morison-equation-based formula with the lumped-mass-based line model, are designed and More >

  • Open Access

    ARTICLE

    Filter Bank Networks for Few-Shot Class-Incremental Learning

    Yanzhao Zhou, Binghao Liu, Yiran Liu, Jianbin Jiao*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 647-668, 2023, DOI:10.32604/cmes.2023.026745 - 23 April 2023

    Abstract Deep Convolution Neural Networks (DCNNs) can capture discriminative features from large datasets. However, how to incrementally learn new samples without forgetting old ones and recognize novel classes that arise in the dynamically changing world, e.g., classifying newly discovered fish species, remains an open problem. We address an even more challenging and realistic setting of this problem where new class samples are insufficient, i.e., Few-Shot Class-Incremental Learning (FSCIL). Current FSCIL methods augment the training data to alleviate the overfitting of novel classes. By contrast, we propose Filter Bank Networks (FBNs) that augment the learnable filters to… More >

  • Open Access

    ARTICLE

    Vulnerability Detection of Ethereum Smart Contract Based on SolBERT-BiGRU-Attention Hybrid Neural Model

    Guangxia Xu1,*, Lei Liu2, Jingnan Dong3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 903-922, 2023, DOI:10.32604/cmes.2023.026627 - 23 April 2023

    Abstract In recent years, with the great success of pre-trained language models, the pre-trained BERT model has been gradually applied to the field of source code understanding. However, the time cost of training a language model from zero is very high, and how to transfer the pre-trained language model to the field of smart contract vulnerability detection is a hot research direction at present. In this paper, we propose a hybrid model to detect common vulnerabilities in smart contracts based on a lightweight pre-trained language model BERT and connected to a bidirectional gate recurrent unit model. More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309 - 23 April 2023

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.… More >

  • Open Access

    ARTICLE

    An Improved Elite Slime Mould Algorithm for Engineering Design

    Li Yuan1, Jianping Ji1, Xuegong Liu1, Tong Liu2, Huiling Chen3, Deng Chen4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 415-454, 2023, DOI:10.32604/cmes.2023.026098 - 23 April 2023

    Abstract The Swarm intelligence algorithm is a very prevalent field in which some scholars have made outstanding achievements. As a representative, Slime mould algorithm (SMA) is widely used because of its superior initial performance. Therefore, this paper focuses on the improvement of the SMA and the mitigation of its stagnation problems. For this aim, the structure of SMA is adjusted to develop the efficiency of the original method. As a stochastic optimizer, SMA mainly stimulates the behavior of slime mold in nature. For the harmony of the exploration and exploitation of SMA, the paper proposed an… More > Graphic Abstract

    An Improved Elite Slime Mould Algorithm for Engineering Design

  • Open Access

    ARTICLE

    Quantum-Inspired Equilibrium Optimizer for Linear Antenna Array

    Binwen Zhu1, Qifang Luo1,3,*, Yongquan Zhou1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 385-413, 2023, DOI:10.32604/cmes.2023.026097 - 23 April 2023

    Abstract With the rapid development of communication technology, the problem of antenna array optimization plays a crucial role. Among many types of antennas, line antenna arrays (LAA) are the most commonly applied, but the side lobe level (SLL) reduction is still a challenging problem. In the radiation process of the linear antenna array, the high side lobe level will interfere with the intensity of the antenna target radiation direction. Many conventional methods are ineffective in obtaining the maximum side lobe level in synthesis, and this paper proposed a quantum equilibrium optimizer (QEO) algorithm for line antenna… More >

Displaying 9661-9670 on page 967 of 31561. Per Page