Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,113)
  • Open Access

    ARTICLE

    An Improved Approach to the Performance of Remote Photoplethysmography

    Yi Sheng1, Wu Zeng1,*, Qiuyu Hu1, Weihua Ou2, Yuxuan Xie3, Jie Li1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2773-2783, 2022, DOI:10.32604/cmc.2022.027985

    Abstract Heart rate is an important metric for determining physical and mental health. In recent years, remote photoplethysmography (rPPG) has been widely used in characterizing physiological signals in human subjects. Currently, research on non-contact detection of heart rate mainly focuses on the capture and separation of spectral signals from video imagery. However, this method is very sensitive to the movement of the test subject and light intensity variation, and this results in motion artifacts which presents challenges in extracting accurate physiological signals such as heart rate. In this paper, an improved method for rPPG signal preprocessing is proposed. Based on the… More >

  • Open Access

    ARTICLE

    Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices

    Yining Qi1,2,*, Zhen Yang3, Yubo Luo4, Yongfeng Huang1,2, Xing Li1,2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2205-2221, 2022, DOI:10.32604/cmc.2022.027939

    Abstract Provable Data Possession (PDP) schemes have long been proposed to solve problem of how to check the integrity of data stored in cloud service without downloading. However, with the emerging of network consisting of low performance devices such as Internet of Things, we find that there are still two obstacles for applying PDP schemes. The first one is the heavy computation overhead in generating tags for data blocks, which is essential for setting up any PDP scheme. The other one is how to resist collusion attacks from third party auditors with any possible entities participating the auditing. In this paper,… More >

  • Open Access

    ARTICLE

    Non-Negative Minimum Volume Factorization (NMVF) for Hyperspectral Images (HSI) Unmixing: A Hybrid Approach

    Kriti Mahajan1, Urvashi Garg1, Nitin Mittal2, Yunyoung Nam3, Byeong-Gwon Kang4,*, Mohamed Abouhawwash5,6

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3705-3720, 2022, DOI:10.32604/cmc.2022.027936

    Abstract Spectral unmixing is essential for exploitation of remotely sensed data of Hyperspectral Images (HSI). It amounts to the identification of a position of spectral signatures that are pure and therefore called end members and their matching fractional, draft rules abundances for every pixel in HSI. This paper aims to unmix hyperspectral data using the minimal volume method of elementary scrutiny. Moreover, the problem of optimization is solved by the implementation of the sequence of small problems that are constrained quadratically. The hard constraint in the final step for the abundance fraction is then replaced with a loss function of hinge… More >

  • Open Access

    ARTICLE

    An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission

    A. Chinnappa*, C. Vijayakumaran

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4017-4031, 2022, DOI:10.32604/cmc.2022.027858

    Abstract Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes and make decisions in the communication network. In the heterogeneous environment for IoT devices, several challenging issues such as energy, storage, efficiency, and security. The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way. The proper selection of optimal keys helps to boost the encryption performance. With this motivation, the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission (SCQCKH-SDT) in IoT environment. The proposed SCQCKH-SDT technique aims to effectively encrypts… More >

  • Open Access

    ARTICLE

    EEG Emotion Recognition Using an Attention Mechanism Based on an Optimized Hybrid Model

    Huiping Jiang1,*, Demeng Wu1, Xingqun Tang1, Zhongjie Li1, Wenbo Wu2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2697-2712, 2022, DOI:10.32604/cmc.2022.027856

    Abstract Emotions serve various functions. The traditional emotion recognition methods are based primarily on readily accessible facial expressions, gestures, and voice signals. However, it is often challenging to ensure that these non-physical signals are valid and reliable in practical applications. Electroencephalogram (EEG) signals are more successful than other signal recognition methods in recognizing these characteristics in real-time since they are difficult to camouflage. Although EEG signals are commonly used in current emotional recognition research, the accuracy is low when using traditional methods. Therefore, this study presented an optimized hybrid pattern with an attention mechanism (FFT_CLA) for EEG emotional recognition. First, the… More >

  • Open Access

    ARTICLE

    An Optimal Method for High-Resolution Population Geo-Spatial Data

    Rami Sameer Ahmad Al Kloub*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2801-2820, 2022, DOI:10.32604/cmc.2022.027847

    Abstract Mainland China has a poor distribution of meteorological stations. Existing models’ estimation accuracy for creating high-resolution surfaces of meteorological data is restricted for air temperature, and low for relative humidity and wind speed (few studies reported). This study compared the typical generalized additive model (GAM) and autoencoder-based residual neural network (hereafter, residual network for short) in terms of predicting three meteorological parameters, namely air temperature, relative humidity, and wind speed, using data from 824 monitoring stations across China’s mainland in 2015. The performance of the two models was assessed using a 10-fold cross-validation procedure. The air temperature models employ basic… More >

  • Open Access

    ARTICLE

    Convergence of Stereo Vision-Based Multimodal YOLOs for Faster Detection of Potholes

    Sungan Yoon, Jeongho Cho*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2821-2834, 2022, DOI:10.32604/cmc.2022.027840

    Abstract Road potholes can cause serious social issues, such as unexpected damages to vehicles and traffic accidents. For efficient road management, technologies that quickly find potholes are required, and thus researches on such technologies have been conducted actively. The three-dimensional (3D) reconstruction method has relatively high accuracy and can be used in practice but it has limited application owing to its long data processing time and high sensor maintenance cost. The two-dimensional (2D) vision method has the advantage of inexpensive and easy application of sensor. Recently, although the 2D vision method using the convolutional neural network (CNN) has shown improved pothole… More >

  • Open Access

    ARTICLE

    Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

    Muhammad Fahad Khan1,2,*, Khalid Saleem1, Mohammed Alotaibi3, Mohammad Mazyad Hazzazi4, Eid Rehman2, Aaqif Afzaal Abbasi2, Muhammad Asif Gondal5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2679-2696, 2022, DOI:10.32604/cmc.2022.027655

    Abstract Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the… More >

  • Open Access

    ARTICLE

    Development of Data Mining Models Based on Features Ranks Voting (FRV)

    Mofreh A. Hogo*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2947-2966, 2022, DOI:10.32604/cmc.2022.027300

    Abstract Data size plays a significant role in the design and the performance of data mining models. A good feature selection algorithm reduces the problems of big data size and noise due to data redundancy. Features selection algorithms aim at selecting the best features and eliminating unnecessary ones, which in turn simplifies the structure of the data mining model as well as increases its performance. This paper introduces a robust features selection algorithm, named Features Ranking Voting Algorithm FRV. It merges the benefits of the different features selection algorithms to specify the features ranks in the dataset correctly and robustly; based… More >

  • Open Access

    ARTICLE

    Automating Transfer Credit Assessment-A Natural Language Processing-Based Approach

    Dhivya Chandrasekaran*, Vijay Mago

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2257-2274, 2022, DOI:10.32604/cmc.2022.027236

    Abstract Student mobility or academic mobility involves students moving between institutions during their post-secondary education, and one of the challenging tasks in this process is to assess the transfer credits to be offered to the incoming student. In general, this process involves domain experts comparing the learning outcomes of the courses, to decide on offering transfer credits to the incoming students. This manual implementation is not only labor-intensive but also influenced by undue bias and administrative complexity. The proposed research article focuses on identifying a model that exploits the advancements in the field of Natural Language Processing (NLP) to effectively automate… More >

Displaying 7411-7420 on page 742 of 22113. Per Page