Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    REVIEW

    A Systematic Literature Review of Machine Learning and Deep Learning Approaches for Spectral Image Classification in Agricultural Applications Using Aerial Photography

    Usman Khan1, Muhammad Khalid Khan1, Muhammad Ayub Latif1, Muhammad Naveed1,2,*, Muhammad Mansoor Alam2,3,4, Salman A. Khan1, Mazliham Mohd Su’ud2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2967-3000, 2024, DOI:10.32604/cmc.2024.045101

    Abstract Recently, there has been a notable surge of interest in scientific research regarding spectral images. The potential of these images to revolutionize the digital photography industry, like aerial photography through Unmanned Aerial Vehicles (UAVs), has captured considerable attention. One encouraging aspect is their combination with machine learning and deep learning algorithms, which have demonstrated remarkable outcomes in image classification. As a result of this powerful amalgamation, the adoption of spectral images has experienced exponential growth across various domains, with agriculture being one of the prominent beneficiaries. This paper presents an extensive survey encompassing multispectral and hyperspectral images, focusing on their… More >

  • Open Access

    ARTICLE

    Road Traffic Monitoring from Aerial Images Using Template Matching and Invariant Features

    Asifa Mehmood Qureshi1, Naif Al Mudawi2, Mohammed Alonazi3, Samia Allaoua Chelloug4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3683-3701, 2024, DOI:10.32604/cmc.2024.043611

    Abstract Road traffic monitoring is an imperative topic widely discussed among researchers. Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides. However, aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area. To this end, different models have shown the ability to recognize and track vehicles. However, these methods are not mature enough to produce accurate results in complex road scenes. Therefore, this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image bursts. The extracted frames… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is a challenging task in small… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks (RNN) integrated with… More >

  • Open Access

    ARTICLE

    SciCN: A Scientific Dataset for Chinese Named Entity Recognition

    Jing Yang, Bin Ji, Shasha Li*, Jun Ma, Jie Yu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4303-4315, 2024, DOI:10.32604/cmc.2023.035594

    Abstract Named entity recognition (NER) is a fundamental task of information extraction (IE), and it has attracted considerable research attention in recent years. The abundant annotated English NER datasets have significantly promoted the NER research in the English field. By contrast, much fewer efforts are made to the Chinese NER research, especially in the scientific domain, due to the scarcity of Chinese NER datasets. To alleviate this problem, we present a Chinese scientific NER dataset–SciCN, which contains entity annotations of titles and abstracts derived from 3,500 scientific papers. We manually annotate a total of 62,059 entities, and these entities are classified… More >

  • Open Access

    ARTICLE

    Design of Artificial Intelligence Companion Chatbot

    Xiaoying Chen1,*, Jie Kang1, Cong Hu2

    Journal of New Media, Vol.6, pp. 1-16, 2024, DOI:10.32604/jnm.2024.045833

    Abstract With the development of cities and the prevalence of networks, interpersonal relationships have become increasingly distant. When people crave communication, they hope to find someone to confide in. With the rapid advancement of deep learning and big data technologies, an enabling environment has been established for the development of intelligent chatbot systems. By effectively combining cutting-edge technologies with human-centered design principles, chatbots hold the potential to revolutionize our lives and alleviate feelings of loneliness. A multi-topic chat companion robot based on a state machine has been proposed, which can engage in fluent dialogue with humans and meet different functional requirements.… More >

  • Open Access

    ARTICLE

    A Real-Time Localization Algorithm for Unmanned Aerial Vehicle Based on Continuous Images Processing

    Peng Geng1,*, Annan Yang2, Yan Liu3

    Journal on Artificial Intelligence, Vol.6, pp. 43-52, 2024, DOI:10.32604/jai.2024.047642

    Abstract This article presents a real-time localization method for Unmanned Aerial Vehicles (UAVs) based on continuous image processing. The proposed method employs the Scale Invariant Feature Transform (SIFT) algorithm to identify key points in multi-scale space and generate descriptor vectors to match identical objects across multiple images. These corresponding points in the image provide pixel positions, which can be combined with transformation equations, allow for the calculation of the UAV’s actual ground position. Additionally, the physical coordinates of matching points in the image can be obtained, corresponding to the UAV’s physical coordinates. The method achieves real-time positioning and tracking during UAV… More >

  • Open Access

    REVIEW

    A Review on Finite Element Alternating Methods for Analyzing 2D and 3D Cracks

    Jai Hak Park*

    Digital Engineering and Digital Twin, Vol.2, pp. 79-101, 2024, DOI:10.32604/dedt.2024.047280

    Abstract A finite element alternating method has been known as a very convenient and accurate method to solve two and three-dimensional crack problems. In this method, a general crack problem is solved by a superposition of two solutions. One is a finite element solution for a finite body without a crack, and the other is an analytical solution for a crack in an infinite body. Since a crack is not considered in a finite element model, generating a model is very simple. The method is especially very convenient for a fatigue crack growth simulation. Over the past 40 years, S. N.… More >

  • Open Access

    CORRECTION

    Correction: 3D Model Construction and Ecological Environment Investigation on a Regional Scale Using UAV Remote Sensing

    Chao Chen1,2, Yankun Chen3, Haohai Jin4, Li Chen5,*, Zhisong Liu3, Haozhe Sun4, Junchi Hong4, Haonan Wang4, Shiyu Fang4, Xin Zhang2

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 113-114, 2024, DOI:10.32604/iasc.2024.051760

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Deep Learning Implemented Visualizing City Cleanliness Level by Garbage Detection

    M. S. Vivekanandan1, T. Jesudas2,*

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 109-111, 2024, DOI:10.32604/iasc.2024.051758

    Abstract This article has no abstract. More >

Displaying 561-570 on page 57 of 22360. Per Page