Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    REVIEW

    Visual SLAM Based on Object Detection Network: A Review

    Jiansheng Peng1,2,*, Dunhua Chen1, Qing Yang1, Chengjun Yang2, Yong Xu2, Yong Qin2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3209-3236, 2023, DOI:10.32604/cmc.2023.041898 - 26 December 2023

    Abstract Visual simultaneous localization and mapping (SLAM) is crucial in robotics and autonomous driving. However, traditional visual SLAM faces challenges in dynamic environments. To address this issue, researchers have proposed semantic SLAM, which combines object detection, semantic segmentation, instance segmentation, and visual SLAM. Despite the growing body of literature on semantic SLAM, there is currently a lack of comprehensive research on the integration of object detection and visual SLAM. Therefore, this study aims to gather information from multiple databases and review relevant literature using specific keywords. It focuses on visual SLAM based on object detection, covering… More >

  • Open Access

    REVIEW

    Multi-Robot Privacy-Preserving Algorithms Based on Federated Learning: A Review

    Jiansheng Peng1,2,*, Jinsong Guo1, Fengbo Bao1, Chengjun Yang2, Yong Xu2, Yong Qin2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2971-2994, 2023, DOI:10.32604/cmc.2023.041897 - 26 December 2023

    Abstract The robotics industry has seen rapid development in recent years due to the Corona Virus Disease 2019. With the development of sensors and smart devices, factories and enterprises have accumulated a large amount of data in their daily production, which creates extremely favorable conditions for robots to perform machine learning. However, in recent years, people’s awareness of data privacy has been increasing, leading to the inability to circulate data between different enterprises, resulting in the emergence of data silos. The emergence of federated learning provides a feasible solution to this problem, and the combination of… More >

  • Open Access

    ARTICLE

    A Lightweight Deep Learning-Based Model for Tomato Leaf Disease Classification

    Naeem Ullah1, Javed Ali Khan2,*, Sultan Almakdi3, Mohammed S. Alshehri3, Mimonah Al Qathrady4, Eman Abdullah Aldakheel5,*, Doaa Sami Khafaga5

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3969-3992, 2023, DOI:10.32604/cmc.2023.041819 - 26 December 2023

    Abstract Tomato leaf diseases significantly impact crop production, necessitating early detection for sustainable farming. Deep Learning (DL) has recently shown excellent results in identifying and classifying tomato leaf diseases. However, current DL methods often require substantial computational resources, hindering their application on resource-constrained devices. We propose the Deep Tomato Detection Network (DTomatoDNet), a lightweight DL-based framework comprising 19 learnable layers for efficient tomato leaf disease classification to overcome this. The Convn kernels used in the proposed (DTomatoDNet) framework is 1 × 1, which reduces the number of parameters and helps in more detailed and descriptive feature extraction for… More >

  • Open Access

    ARTICLE

    Multiclass Classification for Cyber Threats Detection on Twitter

    Adnan Hussein1, Abdulwahab Ali Almazroi2,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3853-3866, 2023, DOI:10.32604/cmc.2023.040856 - 26 December 2023

    Abstract The advances in technology increase the number of internet systems usage. As a result, cybersecurity issues have become more common. Cyber threats are one of the main problems in the area of cybersecurity. However, detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its importance. This study aims to analyze Twitter data to detect cyber threats using a multiclass classification approach. The data is passed through different tasks to prepare it for the analysis. Term Frequency and Inverse Document Frequency (TFIDF) features are extracted… More >

  • Open Access

    ARTICLE

    Research on Human Activity Recognition Algorithm Based on LSTM-1DCNN

    Yuesheng Zhao1, Xiaoling Wang1,*, Yutong Luo2,*, Muhammad Shamrooz Aslam3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3325-3347, 2023, DOI:10.32604/cmc.2023.040528 - 26 December 2023

    Abstract With the rapid advancement of wearable devices, Human Activities Recognition (HAR) based on these devices has emerged as a prominent research field. The objective of this study is to enhance the recognition performance of HAR by proposing an LSTM-1DCNN recognition algorithm that utilizes a single triaxial accelerometer. This algorithm comprises two branches: one branch consists of a Long and Short-Term Memory Network (LSTM), while the other parallel branch incorporates a one-dimensional Convolutional Neural Network (1DCNN). The parallel architecture of LSTM-1DCNN initially extracts spatial and temporal features from the accelerometer data separately, which are then concatenated… More >

  • Open Access

    ARTICLE

    A Novel Energy and Communication Aware Scheduling on Green Cloud Computing

    Laila Almutairi1, Shabnam Mohamed Aslam2,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2791-2811, 2023, DOI:10.32604/cmc.2023.040268 - 26 December 2023

    Abstract The rapid growth of service-oriented and cloud computing has created large-scale data centres worldwide. Modern data centres’ operating costs mostly come from back-end cloud infrastructure and energy consumption. In cloud computing, extensive communication resources are required. Moreover, cloud applications require more bandwidth to transfer large amounts of data to satisfy end-user requirements. It is also essential that no communication source can cause congestion or bag loss owing to unnecessary switching buffers. This paper proposes a novel Energy and Communication (EC) aware scheduling (EC-scheduler) algorithm for green cloud computing, which optimizes data centre energy consumption and… More >

  • Open Access

    ARTICLE

    The Detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement

    Xuanchen Zhou1,2,3, Wenzhong Yang2,3,*, Liejun Wang2,3, Fuyuan Wei2,3, KeZiErBieKe HaiLaTi2,3, Yuanyuan Liao2,3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 4073-4087, 2023, DOI:10.32604/cmc.2023.040253 - 26 December 2023

    Abstract With the increasing popularity of Ethereum, smart contracts have become a prime target for fraudulent activities such as Ponzi, honeypot, gambling, and phishing schemes. While some researchers have studied intelligent fraud detection, most research has focused on identifying Ponzi contracts, with little attention given to detecting and preventing gambling or phishing contracts. There are three main issues with current research. Firstly, there exists a severe data imbalance between fraudulent and non-fraudulent contracts. Secondly, the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts. Lastly,… More >

  • Open Access

    ARTICLE

    YOLO and Blockchain Technology Applied to Intelligent Transportation License Plate Character Recognition for Security

    Fares Alharbi1, Reem Alshahrani2, Mohammed Zakariah3,*, Amjad Aldweesh1, Abdulrahman Abdullah Alghamdi1

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3697-3722, 2023, DOI:10.32604/cmc.2023.040086 - 26 December 2023

    Abstract Privacy and trust are significant issues in intelligent transportation systems (ITS). Data security is critical in ITS systems since sensitive user data is communicated to another user over the internet through wireless devices and routes such as radio channels, optical fiber, and blockchain technology. The Internet of Things (IoT) is a network of connected, interconnected gadgets. Privacy issues occasionally arise due to the amount of data generated. However, they have been primarily addressed by blockchain and smart contract technology. While there are still security issues with smart contracts, primarily due to the complexity of writing… More >

  • Open Access

    ARTICLE

    Optical Neural Networks: Analysis and Prospects for 5G Applications

    Doaa Sami Khafaga1, Zongming Lv2, Imran Khan3,4, Shebnam M. Sefat5, Amel Ali Alhussan1,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3723-3740, 2023, DOI:10.32604/cmc.2023.039956 - 26 December 2023

    Abstract With the capacities of self-learning, acquainted capacities, high-speed looking for ideal arrangements, solid nonlinear fitting, and mapping self-assertively complex nonlinear relations, neural systems have made incredible advances and accomplished broad application over the final half-century. As one of the foremost conspicuous methods for fake insights, neural systems are growing toward high computational speed and moo control utilization. Due to the inborn impediments of electronic gadgets, it may be troublesome for electronic-implemented neural systems to make the strides these two exhibitions encourage. Optical neural systems can combine optoelectronic procedures and neural organization models to provide ways… More >

  • Open Access

    ARTICLE

    Learning Dual-Domain Calibration and Distance-Driven Correlation Filter: A Probabilistic Perspective for UAV Tracking

    Taiyu Yan1, Yuxin Cao1, Guoxia Xu1, Xiaoran Zhao2, Hu Zhu1, Lizhen Deng3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3741-3764, 2023, DOI:10.32604/cmc.2023.039828 - 26 December 2023

    Abstract Unmanned Aerial Vehicle (UAV) tracking has been possible because of the growth of intelligent information technology in smart cities, making it simple to gather data at any time by dynamically monitoring events, people, the environment, and other aspects in the city. The traditional filter creates a model to address the boundary effect and time filter degradation issues in UAV tracking operations. But these methods ignore the loss of data integrity terms since they are overly dependent on numerous explicit previous regularization terms. In light of the aforementioned issues, this work suggests a dual-domain Jensen-Shannon divergence… More >

Displaying 7871-7880 on page 788 of 31589. Per Page