Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (599)
  • Open Access

    ARTICLE

    Performance-Oriented Layout Synthesis for Quantum Computing

    Chi-Chou Kao1,*, Hung-Yi Lin2

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1581-1594, 2024, DOI:10.32604/csse.2024.055073 - 22 November 2024

    Abstract Layout synthesis in quantum computing is crucial due to the physical constraints of quantum devices where quantum bits (qubits) can only interact effectively with their nearest neighbors. This constraint severely impacts the design and efficiency of quantum algorithms, as arranging qubits optimally can significantly reduce circuit depth and improve computational performance. To tackle the layout synthesis challenge, we propose an algorithm based on integer linear programming (ILP). ILP is well-suited for this problem as it can formulate the optimization objective of minimizing circuit depth while adhering to the nearest neighbor interaction constraint. The algorithm aims… More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Joint Resource Allocation Strategies in Federated Edge Learning

    Jingbo Zhang1, Qiong Wu1,*, Pingyi Fan2, Qiang Fan3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1953-1998, 2024, DOI:10.32604/cmc.2024.057006 - 18 November 2024

    Abstract Federated Edge Learning (FEL), an emerging distributed Machine Learning (ML) paradigm, enables model training in a distributed environment while ensuring user privacy by using physical separation for each user’s data. However, with the development of complex application scenarios such as the Internet of Things (IoT) and Smart Earth, the conventional resource allocation schemes can no longer effectively support these growing computational and communication demands. Therefore, joint resource optimization may be the key solution to the scaling problem. This paper simultaneously addresses the multifaceted challenges of computation and communication, with the growing multiple resource demands. We… More >

  • Open Access

    REVIEW

    Computing Challenges of UAV Networks: A Comprehensive Survey

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Xianxuan Lin4,*, Farman Ali5,*, Ahmad Ali AlZubi6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1999-2051, 2024, DOI:10.32604/cmc.2024.056183 - 18 November 2024

    Abstract Devices and networks constantly upgrade, leading to rapid technological evolution. Three-dimensional (3D) point cloud transmission plays a crucial role in aerial computing terminology, facilitating information exchange. Various network types, including sensor networks and 5G mobile networks, support this transmission. Notably, Flying Ad hoc Networks (FANETs) utilize Unmanned Aerial Vehicles (UAVs) as nodes, operating in a 3D environment with Six Degrees of Freedom (6DoF). This study comprehensively surveys UAV networks, focusing on models for Light Detection and Ranging (LiDAR) 3D point cloud compression/transmission. Key topics covered include autonomous navigation, challenges in video streaming infrastructure, motivations for More >

  • Open Access

    ARTICLE

    A Shuffling-Steganography Algorithm to Protect Data of Drone Applications

    Ahamad B. Alkodre1, Nour Mahmoud Bahbouh2, Sandra Sendra3, Adnan Ahmed Abi Sen4,*, Yazed Alsaawy1, Saad Said Alqahtany1, Abdallah Namoun1, Hani Almoamari1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2727-2751, 2024, DOI:10.32604/cmc.2024.053706 - 18 November 2024

    Abstract In Saudi Arabia, drones are increasingly used in different sensitive domains like military, health, and agriculture to name a few. Typically, drone cameras capture aerial images of objects and convert them into crucial data, alongside collecting data from distributed sensors supplemented by location data. The interception of the data sent from the drone to the station can lead to substantial threats. To address this issue, highly confidential protection methods must be employed. This paper introduces a novel steganography approach called the Shuffling Steganography Approach (SSA). SSA encompasses five fundamental stages and three proposed algorithms, designed… More >

  • Open Access

    ARTICLE

    Advancing Quantum Technology: Insights Form Mach-Zehnder Interferometer in Quantum State Behaviour and Error Correction

    Priyanka1, Damodarakurup Sajeev2, Shaik Ahmed3, Shankar Pidishety3, Ram Soorat3,*

    Journal of Quantum Computing, Vol.6, pp. 53-66, 2024, DOI:10.32604/jqc.2024.054000 - 14 November 2024

    Abstract The present study delves into the application of investigating quantum state behaviour, particularly focusing on coherent and superposition states. These states, characterized by their remarkable stability and precision, have found extensive utility in various domains of quantum mechanics and quantum information processing. Coherent states are valuable for manipulating quantum systems with accuracy. Superposition states allow quantum systems to exist in numerous configurations at the same time, which paves the way for quantum computing’s capacity for parallel processing. The research accentuates the crucial role of quantum error correction (QEC) in ensuring the stability and reliability of… More >

  • Open Access

    ARTICLE

    Enhancing Septic Shock Detection through Interpretable Machine Learning

    Md Mahfuzur Rahman1,*, Md Solaiman Chowdhury2, Mohammad Shorfuzzaman3, Lutful Karim4, Md Shafiullah5, Farag Azzedin1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2501-2525, 2024, DOI:10.32604/cmes.2024.055065 - 31 October 2024

    Abstract This article presents an innovative approach that leverages interpretable machine learning models and cloud computing to accelerate the detection of septic shock by analyzing electronic health data. Unlike traditional methods, which often lack transparency in decision-making, our approach focuses on early detection, offering a proactive strategy to mitigate the risks of sepsis. By integrating advanced machine learning algorithms with interpretability techniques, our method not only provides accurate predictions but also offers clear insights into the factors influencing the model’s decisions. Moreover, we introduce a preference-based matching algorithm to evaluate disease severity, enabling timely interventions guided… More >

  • Open Access

    ARTICLE

    Computation Offloading in Edge Computing for Internet of Vehicles via Game Theory

    Jianhua Liu*, Jincheng Wei, Rongxin Luo, Guilin Yuan, Jiajia Liu, Xiaoguang Tu

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1337-1361, 2024, DOI:10.32604/cmc.2024.056286 - 15 October 2024

    Abstract With the rapid advancement of Internet of Vehicles (IoV) technology, the demands for real-time navigation, advanced driver-assistance systems (ADAS), vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, and multimedia entertainment systems have made in-vehicle applications increasingly computing-intensive and delay-sensitive. These applications require significant computing resources, which can overwhelm the limited computing capabilities of vehicle terminals despite advancements in computing hardware due to the complexity of tasks, energy consumption, and cost constraints. To address this issue in IoV-based edge computing, particularly in scenarios where available computing resources in vehicles are scarce, a multi-master and multi-slave double-layer game model More >

  • Open Access

    ARTICLE

    Efficient Real-Time Devices Based on Accelerometer Using Machine Learning for HAR on Low-Performance Microcontrollers

    Manh-Tuyen Vi1, Duc-Nghia Tran2, Vu Thi Thuong3,4, Nguyen Ngoc Linh5,*, Duc-Tan Tran1,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1729-1756, 2024, DOI:10.32604/cmc.2024.055511 - 15 October 2024

    Abstract Analyzing physical activities through wearable devices is a promising research area for improving health assessment. This research focuses on the development of an affordable and real-time Human Activity Recognition (HAR) system designed to operate on low-performance microcontrollers. The system utilizes data from a body-worn accelerometer to recognize and classify human activities, providing a cost-effective, easy-to-use, and highly accurate solution. A key challenge addressed in this study is the execution of efficient motion recognition within a resource-constrained environment. The system employs a Random Forest (RF) classifier, which outperforms Gradient Boosting Decision Trees (GBDT), Support Vector Machines… More >

  • Open Access

    ARTICLE

    Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems

    Naeem Raza1, Muhammad Asif Habib1, Mudassar Ahmad1, Qaisar Abbas2,*, Mutlaq B. Aldajani2, Muhammad Ahsan Latif3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 911-931, 2024, DOI:10.32604/cmc.2024.055049 - 15 October 2024

    Abstract Vision-based vehicle detection in adverse weather conditions such as fog, haze, and mist is a challenging research area in the fields of autonomous vehicles, collision avoidance, and Internet of Things (IoT)-enabled edge/fog computing traffic surveillance and monitoring systems. Efficient and cost-effective vehicle detection at high accuracy and speed in foggy weather is essential to avoiding road traffic collisions in real-time. To evaluate vision-based vehicle detection performance in foggy weather conditions, state-of-the-art Vehicle Detection in Adverse Weather Nature (DAWN) and Foggy Driving (FD) datasets are self-annotated using the YOLO LABEL tool and customized to four vehicle… More >

  • Open Access

    ARTICLE

    HQNN-SFOP: Hybrid Quantum Neural Networks with Signal Feature Overlay Projection for Drone Detection Using Radar Return Signals—A Simulation

    Wenxia Wang, Jinchen Xu, Xiaodong Ding, Zhihui Song, Yizhen Huang, Xin Zhou, Zheng Shan*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1363-1390, 2024, DOI:10.32604/cmc.2024.054055 - 15 October 2024

    Abstract With the wide application of drone technology, there is an increasing demand for the detection of radar return signals from drones. Existing detection methods mainly rely on time-frequency domain feature extraction and classical machine learning algorithms for image recognition. This method suffers from the problem of large dimensionality of image features, which leads to large input data size and noise affecting learning. Therefore, this paper proposes to extract signal time-domain statistical features for radar return signals from drones and reduce the feature dimension from 512 × 4 to 16 dimensions. However, the downscaled feature data… More >

Displaying 1-10 on page 1 of 599. Per Page