Home / Journals / CMC / Vol.63, No.1, 2020
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    A Multi-Level Threshold Method for Edge Detection and Segmentation Based on Entropy

    Mohamed A. El-Sayed1, *, Abdelmgeid A. Ali2, Mohamed E. Hussien3, Hameda A. Sennary3
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 1-16, 2020, DOI:10.32604/cmc.2020.08444 - 30 March 2020
    Abstract The essential tool in image processing, computer vision and machine vision is edge detection, especially in the fields of feature extraction and feature detection. Entropy is a basic area in information theory. The entropy, in image processing field has a role associated with image settings. As an initial step in image processing, the entropy is always used the image’s segmentation to determine the regions of image which is used to separate the background and objects in image. Image segmentation known as the process which divides the image into multiple regions or sets of pixels. Many… More >

  • Open AccessOpen Access

    ARTICLE

    Left or Right Hand Classification from Fingerprint Images Using a Deep Neural Network

    Junseob Kim1, Beanbonyka Rim1, Nak-Jun Sung1, Min Hong2, *
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 17-30, 2020, DOI:10.32604/cmc.2020.09044 - 30 March 2020
    Abstract Fingerprint security technology has attracted a great deal of attention in recent years because of its unique biometric information that does not change over an individual’s lifetime and is a highly reliable and secure way to identify a certain individuals. AFIS (Automated Fingerprint Identification System) is a system used by Korean police for identifying a specific person by fingerprint. The AFIS system, however, only selects a list of possible candidates through fingerprints, the exact individual must be found by fingerprint experts. In this paper, we designed a deep learning system using deep convolution network to… More >

  • Open AccessOpen Access

    ARTICLE

    A Mobile Cloud-Based eHealth Scheme

    Yihe Liu1, Aaqif Afzaal Abbasi2, Atefeh Aghaei3, Almas Abbasi4, Amir Mosavi5, 6, 7, Shahaboddin Shamshirband8, 9, *, Mohammed A. A. Al-qaness10
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 31-39, 2020, DOI:10.32604/cmc.2020.07708 - 30 March 2020
    Abstract Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace. Similarly, the field of health informatics is also considered as an extremely important field. This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis. The developed system has two front ends, the first dedicated for the user to perform the photographing of the trace report. Once the photographing is complete, mobile computing is used to extract the signal. Once the signal is extracted, More >

  • Open AccessOpen Access

    ARTICLE

    Agglomeration Effects on Static Stability Analysis of Multi-Scale Hybrid Nanocomposite Plates

    Farzad Ebrahimi1, Ali Dabbagh2, Abbas Rastgoo2, Timon Rabczuk3, *
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 41-64, 2020, DOI:10.32604/cmc.2020.07947 - 30 March 2020
    Abstract We propose a multiscale approach to study the influence of carbon nanotubes’ agglomeration on the stability of hybrid nanocomposite plates. The hybrid nanocomposite consists of both macro- and nano-scale reinforcing fibers dispersed in a polymer matrix. The equivalent material properties are calculated by coupling the Eshelby-Mori-Tanaka model with the rule of mixture accounting for effects of CNTs inside the generated clusters. Furthermore, an energy based approach is implemented to obtain the governing equations of the problem utilizing a refined higher-order plate theorem. Subsequently, the derived equations are solved by Galerkin’s analytical method to predict the More >

  • Open AccessOpen Access

    ARTICLE

    Numerical Analysis of Stochastic Vector Borne Plant Disease Model

    Kamaledin Abodayeh1, Ali Raza2, Muhammad Shoaib Arif2, *, Muhammad Rafiq3, Mairaj Bibi4, Rabia Fayyaz4
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 65-83, 2020, DOI:10.32604/cmc.2020.08838 - 30 March 2020
    Abstract We are associating the solutions of stochastic and deterministic vector borne plant disease model in this manuscript. The dynamics of plant model depends upon threshold number P. If P <1 then condition helpful to eradicate the disease in plants while P >1 explains the persistence of disease. Inappropriately, standard numerical systems do not behave well in certain scenarios. We have been proposed a structure preserving stochastic non-standard finite difference system to analyze the behavior of model. This system is dynamical consistent, positive and bounded as defined by Mickens. More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Portable LUT Multiplier with Gated Power Optimization for Biomedical Therapeutic Devices

    Praveena R1, *
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 85-95, 2020, DOI:10.32604/cmc.2020.08629 - 30 March 2020
    Abstract Digital design of a digital signal processor involves accurate and high-speed mathematical computation units. DSP units are one of the most power consuming and memory occupying devices. Multipliers are the common building blocks in most of the DSP units which demands low power and area constraints in the field of portable biomedical devices. This research works attempts multiple power reduction technique to limit the power dissipation of the proposed LUT multiplier unit. A lookup table-based multiplier has the advantage of almost constant area requirement’s irrespective to the increase in bit size of multiplier. Clock gating More >

  • Open AccessOpen Access

    ARTICLE

    A Cryptographic-Based Approach for Electricity Theft Detection in Smart Grid

    Khelifi Naim1, *, Benahmed Khelifa2, Bounaama Fateh3
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 97-117, 2020, DOI:10.32604/cmc.2020.09391 - 30 March 2020
    Abstract In order to strengthen their security issues, electrical companies devote particular efforts to developing and enhancing their fraud detection techniques that cope with the information and communication technologies integration in smart grid fields. Having been treated earlier by several researchers, various detection schemes adapted from attack models that benefit from the smart grid topologies weaknesses, aiming primarily to the identification of suspicious incoming hazards. Wireless meshes have been extensively used in smart grid communication architectures due to their facility, lightness of conception and low cost installation; however, the communicated packets are still exposed to be… More >

  • Open AccessOpen Access

    ARTICLE

    Cooperative Relay Selection Mechanism in Multi-Hop Networks

    Jian Liu1, Lei Wang1, Changming Zhao2, 3, *, Alan Yang4
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 119-130, 2020, DOI:10.32604/cmc.2020.06074 - 30 March 2020
    Abstract In this paper, we consider a three-hop relay system based on interference cancellation technique in Underlay cognitive radio (CR) network. Although underlay CR has been shown as a promising technique to better utilize the source of primary users (PUs), its secondary performance will be severely degraded. On one hand, by adapting the Underlay spectrum sharing pattern, secondary users (SUs) would observe the strict power constraints and be interfered by primary users. On the other hand, limited transmit power results in limited transmission range, which greatly degrade the secondary transmission capacity. To solve the problems above, More >

  • Open AccessOpen Access

    ARTICLE

    A DDoS Attack Information Fusion Method Based on CNN for Multi-Element Data

    Jieren Cheng1, 2, Canting Cai1, *, Xiangyan Tang1, Victor S. Sheng3, Wei Guo1, Mengyang Li1
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 131-150, 2020, DOI:10.32604/cmc.2020.06175 - 30 March 2020
    Abstract Traditional distributed denial of service (DDoS) detection methods need a lot of computing resource, and many of them which are based on single element have high missing rate and false alarm rate. In order to solve the problems, this paper proposes a DDoS attack information fusion method based on CNN for multi-element data. Firstly, according to the distribution, concentration and high traffic abruptness of DDoS attacks, this paper defines six features which are respectively obtained from the elements of source IP address, destination IP address, source port, destination port, packet size and the number of… More >

  • Open AccessOpen Access

    ARTICLE

    Coal Rock Condition Detection Model Using Acoustic Emission and Light Gradient Boosting Machine

    Jing Li1, Yong Yang2, *, Hongmei Ge1, Li Zhao3, Ruxue Guo3, 4
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 151-162, 2020, DOI:10.32604/cmc.2020.05649 - 30 March 2020
    Abstract Coal rock mass instability fracture may result in serious hazards to underground coal mining. Acoustic emissions (AE) stimulated by internal structure fracture should carry lots of favorable information about health condition of rock mass. AE as a sensitive non-destructive test method is gradually utilized to detect anomaly conditions of coal rock. This paper proposes an improved multi-resolution feature to extract AE waveform at different frequency resolutions using Coilflet Wavelet Transform method (CWT). It is further adopt an efficient Light Gradient Boosting Machine (LightGBM) by several cascaded sub weak classifier models to merge AE features at More >

  • Open AccessOpen Access

    ARTICLE

    Predicting Simplified Thematic Progression Pattern for Discourse Analysis

    Xuefeng Xi1, Victor S. Sheng1, 2, *, Shuhui Yang3, Baochuan Fu1, Zhiming Cui1
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 163-181, 2020, DOI:10.32604/cmc.2020.06992 - 30 March 2020
    Abstract The pattern of thematic progression, reflecting the semantic relationships between contextual two sentences, is an important subject in discourse analysis. We introduce a new corpus of Chinese news discourses annotated with thematic progression information and explore some computational methods to automatically extracting the discourse structural features of simplified thematic progression pattern (STPP) between contextual sentences in a text. Furthermore, these features are used in a hybrid approach to a major discourse analysis task, Chinese coreference resolution. This novel approach is built up via heuristic sieves and a machine learning method that comprehensively utilizes both the More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Steganography Algorithm Based on Instance Segmentation

    Ruohan Meng1, 2, Qi Cui1, 2, Zhili Zhou1, 2, Chengsheng Yuan1, 2, 3, Xingming Sun1, 2, *
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 183-196, 2020, DOI:10.32604/cmc.2020.05317 - 30 March 2020
    Abstract Information hiding tends to hide secret information in image area where is rich texture or high frequency, so as to transmit secret information to the recipient without affecting the visual quality of the image and arousing suspicion. We take advantage of the complexity of the object texture and consider that under certain circumstances, the object texture is more complex than the background of the image, so the foreground object is more suitable for steganography than the background. On the basis of instance segmentation, such as Mask R-CNN, the proposed method hides secret information into each More >

  • Open AccessOpen Access

    ARTICLE

    Performance Analysis of Relay Based NOMA Cooperative Transmission under Cognitive Radio Network

    Yinghua Zhang1, 2, Jian Liu1, *, Yunfeng Peng1, Yanfang Dong2, Guozhong Sun2, Hao Huang3, Changming Zhao4, 5
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 197-212, 2020, DOI:10.32604/cmc.2020.07059 - 30 March 2020
    Abstract This paper proposes a hybrid spectrum accessing mechanism by using NOMA-based cooperative transmission and beam-forming technology. In this mechanism, the secondary user employs spectrum-sensing technology to detect the existence of the primary user. If the primary user does not exist, the secondary source user directly transmits data to the destination user. If the primary user exists, the secondary source user finds the optimal relay according to certain selection principle before transmitting data to the destination user through the chosen relay node. For the signal receiving stage, the secondary user takes use of beam-forming technology to More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Heavy Hitters Identification over Speed Traffic Streams

    Shuzhuang Zhang1, Hao Luo1, Zhigang Wu1, Yanbin Sun2, *, Yuhang Wang2, Tingting Yuan3
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 213-222, 2020, DOI:10.32604/cmc.2020.07496 - 30 March 2020
    Abstract With the rapid increase of link speed and network throughput in recent years, much more attention has been paid to the work of obtaining statistics over speed traffic streams. It is a challenging problem to identify heavy hitters in high-speed and dynamically changing data streams with less memory and computational overhead with high measurement accuracy. In this paper, we combine Bloom Filter with exponential histogram to query streams in the sliding window so as to identify heavy hitters. This method is called EBF sketches. Our sketch structure allows for effective summarization of streams over time-based More >

  • Open AccessOpen Access

    ARTICLE

    A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing

    Shuyu Li1, Guozheng Zhang1, *
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 223-241, 2020, DOI:10.32604/cmc.2020.07499 - 30 March 2020
    Abstract With the popularity of sensor-rich mobile devices, mobile crowdsensing (MCS) has emerged as an effective method for data collection and processing. However, MCS platform usually need workers’ precise locations for optimal task execution and collect sensing data from workers, which raises severe concerns of privacy leakage. Trying to preserve workers’ location and sensing data from the untrusted MCS platform, a differentially private data aggregation method based on worker partition and location obfuscation (DP-DAWL method) is proposed in the paper. DP-DAWL method firstly use an improved K-means algorithm to divide workers into groups and assign different… More >

  • Open AccessOpen Access

    ARTICLE

    Human Action Recognition Based on Supervised Class-Specific Dictionary Learning with Deep Convolutional Neural Network Features

    Binjie Gu1, *, Weili Xiong1, Zhonghu Bai2
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 243-262, 2020, DOI:10.32604/cmc.2020.06898 - 30 March 2020
    Abstract Human action recognition under complex environment is a challenging work. Recently, sparse representation has achieved excellent results of dealing with human action recognition problem under different conditions. The main idea of sparse representation classification is to construct a general classification scheme where the training samples of each class can be considered as the dictionary to express the query class, and the minimal reconstruction error indicates its corresponding class. However, how to learn a discriminative dictionary is still a difficult work. In this work, we make two contributions. First, we build a new and robust human More >

  • Open AccessOpen Access

    ARTICLE

    Reliability Analysis of Slope Stability Considering Temporal Variations of Rock Mass Properties

    Xin Gu2, Lin Wang1, 2, 3, Fuyong Chen2, Hongrui Li2, Wengang Zhang1, 2, 3, ∗
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 263-281, 2020, DOI:10.32604/cmc.2020.07535 - 30 March 2020
    Abstract Temporal variation of rock mass properties, especially the strength degradation due to drying-wetting cycles as well as the acidic wetting fluid (rainfall or reservoir water) is crucial to stability of reservoir rock slopes. Based on a series of drying-wetting cycling and experiments considering the influences of pH values, the degradation degree models of the reduced cohesion c′, friction angle φ′ are developed. 2D stability analysis of the slope is subsequently carried out to calculate the factor of safety (Fs) via limit equilibrium method (LEM) and a predictive model of Fs is built using multivariate adaptive regression… More >

  • Open AccessOpen Access

    ARTICLE

    A Rub-Impact Recognition Method Based on Improved Convolutional Neural Network

    Weibo Yang1, *, Jing Li2, Wei Peng2, Aidong Deng3
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 283-299, 2020, DOI:10.32604/cmc.2020.07511 - 30 March 2020
    Abstract Based on the theory of modal acoustic emission (AE), when the convolutional neural network (CNN) is used to identify rotor rub-impact faults, the training data has a small sample size, and the AE sound segment belongs to a single channel signal with less pixel-level information and strong local correlation. Due to the convolutional pooling operations of CNN, coarse-grained and edge information are lost, and the top-level information dimension in CNN network is low, which can easily lead to overfitting. To solve the above problems, we first propose the use of sound spectrograms and their differential More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient and Practical Quantum Blind Signature Protocol with Relaxed Security Model

    Jun Zhang1, *, Hao Xiao2, Hongqun Zhai1, Xiaoli Meng3
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 301-313, 2020, DOI:10.32604/cmc.2020.07681 - 30 March 2020
    Abstract Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness. Owing to the potential unconditional security, quantum blind signature (QBS) is more advantageous than the classical ones. In this paper, an efficient and practical quantum blind signature scheme relaxed security model is presented, where quantum superposition, decoy qubits and hash function are used for the purpose of blindness. Compared with previous QBS scheme, the presented scheme is more efficient and practical with a relaxed More >

  • Open AccessOpen Access

    ARTICLE

    TdBrnn: An Approach to Learning Users’ Intention to Legal Consultation with Normalized Tensor Decomposition and Bi-LSTM

    Xiaoding Guo1, Hongli Zhang1, *, Lin Ye1, Shang Li1
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 315-336, 2020, DOI:10.32604/cmc.2020.07506 - 30 March 2020
    Abstract With the development of Internet technology and the enhancement of people’s concept of the rule of law, online legal consultation has become an important means for the general public to conduct legal consultation. However, different people have different language expressions and legal professional backgrounds. This phenomenon may lead to the phenomenon of different descriptions of the same legal consultation. How to accurately understand the true intentions behind different users’ legal consulting statements is an important issue that needs to be solved urgently in the field of legal consulting services. Traditional intent understanding algorithms rely heavily… More >

  • Open AccessOpen Access

    ARTICLE

    Cold Start Problem of Vehicle Model Recognition under Cross-Scenario Based on Transfer Learning

    Hongbo Wang1, *, Qian Xue1, Tong Cui1, Yangyang Li2, Huacheng Zeng3
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 337-351, 2020, DOI:10.32604/cmc.2020.07290 - 30 March 2020
    Abstract As a major function of smart transportation in smart cities, vehicle model recognition plays an important role in intelligent transportation. Due to the difference among different vehicle models recognition datasets, the accuracy of network model training in one scene will be greatly reduced in another one. However, if you don’t have a lot of vehicle model datasets for the current scene, you cannot properly train a model. To address this problem, we study the problem of cold start of vehicle model recognition under cross-scenario. Under the condition of small amount of datasets, combined with the More >

  • Open AccessOpen Access

    ARTICLE

    An Energy Based Dynamic AODV Routing Protocol in Wireless Ad Hoc Networks

    Wuyungerile Li1, *, Baoyintu1, Bing Jia1, Junxiu Wang1, Takashi Watanabe2
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 353-368, 2020, DOI:10.32604/cmc.2020.06210 - 30 March 2020
    Abstract In recent years, with the rapid development of the Internet and wireless communication technology, wireless Ad hoc networks have received more attention. Due to the limited transmission range and energy of nodes in Ad hoc networks, it is important to establish a reliable and energy-balanced transmission path in Ad hoc networks. This paper proposes an energy-based dynamic routing protocol based on the existing AODV routing protocol, which has the following two aspects of improvement: (1) In the route discovery process, a node selects a suitable route from the minimum energy consumption route and the energy-balanced More >

  • Open AccessOpen Access

    ARTICLE

    Measurement Device Independent Quantum Key Distribution Based on Orbital Angular Momentum under Parametric Light Source

    Meng Wang1, Hong Lai1, *, Lei Pan2
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 369-387, 2020, DOI:10.32604/cmc.2020.07342 - 30 March 2020
    Abstract On the one hand, existing measurement device independent quantum key distribution (MDI-QKD) protocols have usually adopted single photon source (SPS) and weak coherent photon (WCP), however, these protocols have suffered from multi-photon problem brought from photon splitter number attacks. On the other hand, the orbital angular momentum (OAM)-MDI-QKD protocol does not need to compare and adjust the reference frame, solving the dependency of the base in the MDI-QKD protocol. Given that, we propose the OAM-MDI-QKD protocol based on the parametric light sources which mainly include single-photon-added-coherent (SPACS) and heralded single-photon sources (HSPS). Due to the More >

  • Open AccessOpen Access

    ARTICLE

    An Encrypted Image Retrieval Method Based on SimHash in Cloud Computing

    Jiaohua Qin1, Yusi Cao1, Xuyu Xiang1, *, Yun Tan1, Lingyun Xiang2, Jianjun Zhang3
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 389-399, 2020, DOI:10.32604/cmc.2020.07819 - 30 March 2020
    Abstract With the massive growth of images data and the rise of cloud computing that can provide cheap storage space and convenient access, more and more users store data in cloud server. However, how to quickly query the expected data with privacy-preserving is still a challenging in the encryption image data retrieval. Towards this goal, this paper proposes a ciphertext image retrieval method based on SimHash in cloud computing. Firstly, we extract local feature of images, and then cluster the features by K-means. Based on it, the visual word codebook is introduced to represent feature information More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Underlay Cognitive Radio Networks Based on Interference Cancellation Mechanism

    Lei Wang1, Jian Liu1, Changming Zhao2, 3, *, Alan Yang4
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 401-416, 2020, DOI:10.32604/cmc.2020.06680 - 30 March 2020
    Abstract In this paper, we investigate the performance of secondary transmission scheme based on Markov ON-OFF state of primary users in Underlay cognitive radio networks. We propose flexible secondary cooperative transmission schemewith interference cancellation technique according to the ON-OFF status of primary transmitter. For maximal ratio combining (MRC) at destination, we have derived exact closed-form expressions of the outage probability in different situations. The numerical simulation results also reveal that the proposed scheme improve the secondary transmission performance compared with traditional mechanism in terms of secondary outage probability and energy efficiency. More >

  • Open AccessOpen Access

    ARTICLE

    Intent Inference Based Trajectory Prediction and Smooth for UAS in Low-Altitude Airspace with Geofence

    Qixi Fu1, Xiaolong Liang1, 2, Jiaqiang Zhang1, *, Xiangyu Fan1, 2
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 417-444, 2020, DOI:10.32604/cmc.2020.07044 - 30 March 2020
    Abstract In order to meet the higher accuracy requirement of trajectory prediction for Unmanned Aircraft System (UAS) in Unmanned Aircraft System Traffic Management (UTM), an Intent Based Trajectory Prediction and Smooth Based on Constrained State-dependent-transition Hybrid Estimation (CSDTHE-IBTPS) algorithm is proposed. Firstly, an intent inference method of UAS is constructed based on the information of ADS-B and geofence system. Moreover, a geofence layering algorithm is proposed. Secondly, the Flight Mode Change Points (FMCP) are used to define the relevant mode transition parameters and design the guard conditions, so as to generate the mode transition probability matrix… More >

  • Open AccessOpen Access

    ARTICLE

    Detection of Number of Wideband Signals Based on Support Vector Machine

    Jiaqi Zhen1, *
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 445-455, 2020, DOI:10.32604/cmc.2020.06385 - 30 March 2020
    Abstract In array signal processing, number of signals is often a premise of estimating other parameters. For the sake of determining signal number in the condition of strong additive noise or a little sample data, an algorithm for detecting number of wideband signals is provided. First, technique of focusing is used for transforming signals into a same focusing subspace. Then the support vector machine (SVM) can be deduced by the information of eigenvalues and corresponding eigenvectors. At last, the signal number can be determined with the obtained decision function. Several simulations have been carried on verifying More >

  • Open AccessOpen Access

    ARTICLE

    Method to Appraise Dangerous Class of Building Masonry Component Based on DC-YOLO Model

    Hongrui Zhang1, Wenxue Wei1, *, Xinguang Xiao1, Song Yang1, Wanlu Shao1
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 457-468, 2020, DOI:10.32604/cmc.2020.06988 - 30 March 2020
    Abstract This DC-YOLO Model was designed in order to improve the efficiency for appraising dangerous class of buildings and avoid manual intervention, thereby making the appraisal results more objective. It is an automated method designed based on deep learning and target detection algorithms to appraise the dangerous class of building masonry component. Specifically, it (1) adopted K-means clustering to obtain the quantity and size of the prior boxes; (2) expanded the grid size to improve identification to small targets; (3) introduced in deformable convolution to adapt to the irregular shape of the masonry component cracks. The More >

  • Open AccessOpen Access

    ARTICLE

    Sliding-Mode PID Control of UAV Based on Particle Swarm Parameter Tuning

    Yunping Liu1, 2, *, Xingxing Yan1, Fei Yan1, Ze Xu1, Weiyan Shang3
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 469-487, 2020, DOI:10.32604/cmc.2020.05746 - 30 March 2020
    Abstract Due to the coupled motion between the rotor unmanned aerial vehicle (UAV) and the manipulator, the underactuation characteristics of the system itself, and the influence of external uncertainties, the stability of the rotor UAV’s manipulator control system is difficult to control. Based on the dynamic model of the rotor UAV, the stability of the whole UAV manipulator control system is improved by using the piecewise cost function, the compression factor particle swarm optimization (PSO) algorithm and the sliding mode PID to establish the sliding mode PID control stability method based on the PSO. Compared with More >

  • Open AccessOpen Access

    ARTICLE

    Recommender System Combining Popularity and Novelty Based on One-Mode Projection of Weighted Bipartite Network

    Yong Yu1, Yongjun Luo1, Tong Li2, Shudong Li3, *, Xiaobo Wu4, Jinzhuo Liu1, *, Yu Jiang3, *
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 489-507, 2020, DOI:10.32604/cmc.2020.07616 - 30 March 2020
    Abstract Personalized recommendation algorithms, which are effective means to solve information overload, are popular topics in current research. In this paper, a recommender system combining popularity and novelty (RSCPN) based on one-mode projection of weighted bipartite network is proposed. The edge between a user and item is weighted with the item’s rating, and we consider the difference in the ratings of different users for an item to obtain a reasonable method of measuring the similarity between users. RSCPN can be used in the same model for popularity and novelty recommendation by setting different parameter values and More >

  • Open AccessOpen Access

    ARTICLE

    A Fast Filling Algorithm for Image Restoration Based on Contour Parity

    Yan Liu1, *, Wenxin Hu1, *, Longzhe Han2, Maksymyuk Taras3, Zhiyun Chen1
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 509-519, 2020, DOI:10.32604/cmc.2020.07519 - 30 March 2020
    Abstract Filling techniques are often used in the restoration of images. Yet the existing filling technique approaches either have high computational costs or present problems such as filling holes redundantly. This paper proposes a novel algorithm for filling holes and regions of the images. The proposed algorithm combines the advantages of both the parity-check filling approach and the region-growing inpainting technique. Pairing points of the region’s boundary are used to search and to fill the region. The scanning range of the filling method is within the target regions. The proposed method does not require additional working More >

  • Open AccessOpen Access

    ARTICLE

    Self-Certificating Root: A Root Zone Security Enhancement Mechanism for DNS

    Wenfeng Liu1, *, Yu Zhang1, Wenjia Zhang1, Lu Liu1, Hongli Zhang1, Binxing Fang1
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 521-536, 2020, DOI:10.32604/cmc.2020.07982 - 30 March 2020
    Abstract As a critical Internet infrastructure, domain name system (DNS) protects the authenticity and integrity of domain resource records with the introduction of security extensions (DNSSEC). DNSSEC builds a single-center and hierarchical resource authentication architecture, which brings management convenience but places the DNS at risk from a single point of failure. When the root key suffers a leak or misconfiguration, top level domain (TLD) authority cannot independently protect the authenticity of TLD data in the root zone. In this paper, we propose self-certificating root, a lightweight security enhancement mechanism of root zone compatible with DNS/DNSSEC protocol. More >

  • Open AccessOpen Access

    ARTICLE

    Towards an Artificial Intelligence Framework for Data-Driven Prediction of Coronavirus Clinical Severity

    Xiangao Jiang1, Megan Coffee2, 3, *, Anasse Bari4, *, Junzhang Wang4, Xinyue Jiang5, Jianping Huang1, Jichan Shi1, Jianyi Dai1, Jing Cai1, Tianxiao Zhang6, Zhengxing Wu1, Guiqing He1, Yitong Huang7
    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 537-551, 2020, DOI:10.32604/cmc.2020.010691 - 30 March 2020
    Abstract The virus SARS-CoV2, which causes coronavirus disease (COVID-19) has become a pandemic and has spread to every inhabited continent. Given the increasing caseload, there is an urgent need to augment clinical skills in order to identify from among the many mild cases the few that will progress to critical illness. We present a first step towards building an artificial intelligence (AI) framework, with predictive analytics (PA) capabilities applied to real patient data, to provide rapid clinical decision-making support. COVID-19 has presented a pressing need as a) clinicians are still developing clinical acumen to this novel… More >

Per Page:

Share Link