Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Learning Dual-Domain Calibration and Distance-Driven Correlation Filter: A Probabilistic Perspective for UAV Tracking

    Taiyu Yan1, Yuxin Cao1, Guoxia Xu1, Xiaoran Zhao2, Hu Zhu1, Lizhen Deng3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3741-3764, 2023, DOI:10.32604/cmc.2023.039828 - 26 December 2023

    Abstract Unmanned Aerial Vehicle (UAV) tracking has been possible because of the growth of intelligent information technology in smart cities, making it simple to gather data at any time by dynamically monitoring events, people, the environment, and other aspects in the city. The traditional filter creates a model to address the boundary effect and time filter degradation issues in UAV tracking operations. But these methods ignore the loss of data integrity terms since they are overly dependent on numerous explicit previous regularization terms. In light of the aforementioned issues, this work suggests a dual-domain Jensen-Shannon divergence… More >

  • Open Access

    ARTICLE

    3D Face Reconstruction from a Single Image Using a Combined PCA-LPP Method

    Jee-Sic Hur1, Hyeong-Geun Lee1, Shinjin Kang2, Yeo Chan Yoon3, Soo Kyun Kim1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6213-6227, 2023, DOI:10.32604/cmc.2023.035344 - 28 December 2022

    Abstract In this paper, we proposed a combined PCA-LPP algorithm to improve 3D face reconstruction performance. Principal component analysis (PCA) is commonly used to compress images and extract features. One disadvantage of PCA is local feature loss. To address this, various studies have proposed combining a PCA-LPP-based algorithm with a locality preserving projection (LPP). However, the existing PCA-LPP method is unsuitable for 3D face reconstruction because it focuses on data classification and clustering. In the existing PCA-LPP, the adjacency graph, which primarily shows the connection relationships between data, is composed of the e-or k-nearest neighbor techniques. More >

  • Open Access

    ARTICLE

    Proxy-Based Hierarchical Distributed Mobility Management for Tactical Networks

    Myoung-hun Han1,2, Bong-Soo Roh1, Kyungwoo Kim1, Dae-Hoon Kwon1, Jae-Hyun Ham1, KyungHyun Yoon2, Sanghyun Seo3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2381-2399, 2022, DOI:10.32604/cmc.2022.020029 - 27 September 2021

    Abstract An important requirement in a military domain is a highly reliable mobility management method, especially when components of the networks are moving in tactical network environments. To increase reliability, the mobility management technology of the tactical network should be able to reflect the characteristics of the tactical network, such as a limited environment, failure, and hierarchical unit structure. In this paper, we propose a proxy-based hierarchical distributed mobility management scheme, which is highly focused on tactical networks. Considering the characteristics of tactical networks, the proposed scheme is composed of the following: 1) a proxy-based method, More >

  • Open Access

    ARTICLE

    A Distributed ADMM Approach for Collaborative Regression Learning in Edge Computing

    Yangyang Li1, Xue Wang2, Weiwei Fang2,*, Feng Xue2, Hao Jin1, Yi Zhang1, Xianwei Li3

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 493-508, 2019, DOI:10.32604/cmc.2019.05178

    Abstract With the recent proliferation of Internet-of-Things (IoT), enormous amount of data are produced by wireless sensors and connected devices at the edge of network. Conventional cloud computing raises serious concerns on communication latency, bandwidth cost, and data privacy. To address these issues, edge computing has been introduced as a new paradigm that allows computation and analysis to be performed in close proximity with data sources. In this paper, we study how to conduct regression analysis when the training samples are kept private at source devices. Specifically, we consider the lasso regression model that has been More >

Displaying 1-10 on page 1 of 4. Per Page