Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (630)
  • Open Access

    ARTICLE

    Human Interaction Recognition in Surveillance Videos Using Hybrid Deep Learning and Machine Learning Models

    Vesal Khean1, Chomyong Kim2, Sunjoo Ryu2, Awais Khan1, Min Kyung Hong3, Eun Young Kim4, Joungmin Kim5, Yunyoung Nam3,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 773-787, 2024, DOI:10.32604/cmc.2024.056767 - 15 October 2024

    Abstract Human Interaction Recognition (HIR) was one of the challenging issues in computer vision research due to the involvement of multiple individuals and their mutual interactions within video frames generated from their movements. HIR requires more sophisticated analysis than Human Action Recognition (HAR) since HAR focuses solely on individual activities like walking or running, while HIR involves the interactions between people. This research aims to develop a robust system for recognizing five common human interactions, such as hugging, kicking, pushing, pointing, and no interaction, from video sequences using multiple cameras. In this study, a hybrid Deep… More >

  • Open Access

    REVIEW

    Digital Image Steganographer Identification: A Comprehensive Survey

    Qianqian Zhang1,2,3, Yi Zhang1,2, Yuanyuan Ma3, Yanmei Liu1,2, Xiangyang Luo1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 105-131, 2024, DOI:10.32604/cmc.2024.055735 - 15 October 2024

    Abstract The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse. Identifying steganographer is essential in tracing secret information origins and preventing illicit covert communication online. Accurately discerning a steganographer from many normal users is challenging due to various factors, such as the complexity in obtaining the steganography algorithm, extracting highly separability features, and modeling the cover data. After extensive exploration, several methods have been proposed for steganographer identification. This paper presents a survey of existing studies. Firstly, we provide a concise introduction to the More >

  • Open Access

    REVIEW

    Robust Deep Image Watermarking: A Survey

    Yuanjing Luo, Xichen Tan, Zhiping Cai*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 133-160, 2024, DOI:10.32604/cmc.2024.055150 - 15 October 2024

    Abstract In the era of internet proliferation, safeguarding digital media copyright and integrity, especially for images, is imperative. Digital watermarking stands out as a pivotal solution for image security. With the advent of deep learning, watermarking has seen significant advancements. Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces, resilient to various attacks. These methods, characterized by a streamlined encoder-decoder architecture, have shown enhanced performance through the incorporation of novel training modules. This article offers an in-depth analysis of deep watermarking’s core technologies, current status, and prospective More >

  • Open Access

    ARTICLE

    Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems

    Naeem Raza1, Muhammad Asif Habib1, Mudassar Ahmad1, Qaisar Abbas2,*, Mutlaq B. Aldajani2, Muhammad Ahsan Latif3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 911-931, 2024, DOI:10.32604/cmc.2024.055049 - 15 October 2024

    Abstract Vision-based vehicle detection in adverse weather conditions such as fog, haze, and mist is a challenging research area in the fields of autonomous vehicles, collision avoidance, and Internet of Things (IoT)-enabled edge/fog computing traffic surveillance and monitoring systems. Efficient and cost-effective vehicle detection at high accuracy and speed in foggy weather is essential to avoiding road traffic collisions in real-time. To evaluate vision-based vehicle detection performance in foggy weather conditions, state-of-the-art Vehicle Detection in Adverse Weather Nature (DAWN) and Foggy Driving (FD) datasets are self-annotated using the YOLO LABEL tool and customized to four vehicle… More >

  • Open Access

    REVIEW

    Exploring Frontier Technologies in Video-Based Person Re-Identification: A Survey on Deep Learning Approach

    Jiahe Wang1, Xizhan Gao1,*, Fa Zhu2, Xingchi Chen3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 25-51, 2024, DOI:10.32604/cmc.2024.054895 - 15 October 2024

    Abstract Video-based person re-identification (Re-ID), a subset of retrieval tasks, faces challenges like uncoordinated sample capturing, viewpoint variations, occlusions, cluttered backgrounds, and sequence uncertainties. Recent advancements in deep learning have significantly improved video-based person Re-ID, laying a solid foundation for further progress in the field. In order to enrich researchers’ insights into the latest research findings and prospective developments, we offer an extensive overview and meticulous analysis of contemporary video-based person Re-ID methodologies, with a specific emphasis on network architecture design and loss function design. Firstly, we introduce methods based on network architecture design and loss… More >

  • Open Access

    ARTICLE

    Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks

    Vincent Omollo Nyangaresi1,2, Arkan A. Ghaib3, Hend Muslim Jasim4, Zaid Ameen Abduljabbar4,5,6,*, Junchao Ma5,*, Mustafa A. Al Sibahee7,8, Abdulla J. Y. Aldarwish4, Ali Hasan Ali9,10, Husam A. Neamah11

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1029-1057, 2024, DOI:10.32604/cmc.2024.053854 - 15 October 2024

    Abstract Vehicular ad hoc networks (VANETs) provide intelligent navigation and efficient route management, resulting in time savings and cost reductions in the transportation sector. However, the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations. To address these challenges, several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently. However, most of these schemes are limited by a long execution time and massive communication costs, which make them inefficient for on-board units (OBUs). Additionally, some… More >

  • Open Access

    PROCEEDINGS

    Design of Honeycomb Sandwich Structures with Curved Edge Cores for Optimal Thermal Buckling Strength

    Zheng Wu1, Pai Liu1, Zhan Kang1, Yiqiang Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.2, pp. 1-2, 2024, DOI:10.32604/icces.2024.011044

    Abstract Honeycomb sandwich structures (HSSs) consist of lightweight cores arranged in periodic polygons [1] between two face sheets. They are widely used in the aerospace industry due to their lightweight but superior strength [2] and energy absorption [3]. As extremely high temperatures might be applied, the sandwich structures may suffer from thermal buckling failure [4] due to thin face walls [5]. This paper designs a new type of HSSs for pursuing optimal thermal buckling strength. The design idea is to replace the vertical straight walls in the honeycomb cores with curved walls. An optimization problem is… More >

  • Open Access

    PROCEEDINGS

    Influence of Stress and Hydraulic History on Water Retention Curveof Natural Loessin the Suction Range of 0-367.5MPa

    Tiangang Lan1, Mengyuan Ma1, Shifeng Lu1, Ling Xu1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.1, pp. 1-1, 2024, DOI:10.32604/icces.2024.010867

    Abstract Natural loess is a kind of kaolin wind-deposited soil.Thedifferent layers of loess experienced different overburden pressures and wetting-drying cycles, resulting in different water retention behaviors.The axis translation technique and the vapor equilibrium technique to determine the water retention behaviorof the three different sediment depth natural loess during drying and wettingprocess. In addition, the microstructure evolution experienced wetting and drying cycles also characterized by mercury intrusion porosimetry. The saturation and air entry value increased with the sediment depth increased because deeper sediment depth means lower initial void ratio. Thewaterretentioncurveshowsthatthereisalmost nohysteresis observed around the naturalsuction,and in relatively… More >

  • Open Access

    ARTICLE

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

    Khawaja Tahir Mehmood1,2,*, Shahid Atiq1, Intisar Ali Sajjad3, Muhammad Majid Hussain4, Malik M. Abdul Basit2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1673-1708, 2024, DOI:10.32604/cmes.2024.053903 - 27 September 2024

    Abstract Software-Defined Networking (SDN), with segregated data and control planes, provides faster data routing, stability, and enhanced quality metrics, such as throughput (Th), maximum available bandwidth (Bd(max)), data transfer (DTransfer), and reduction in end-to-end delay (D(E-E)). This paper explores the critical work of deploying SDN in large­scale Data Center Networks (DCNs) to enhance its Quality of Service (QoS) parameters, using logically distributed control configurations. There is a noticeable increase in Delay(E-E) when adopting SDN with a unified (single) control structure in big DCNs to handle Hypertext Transfer Protocol (HTTP) requests causing a reduction in network quality parameters (Bd(max), Th, DTransfer, D(E-E),… More > Graphic Abstract

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

  • Open Access

    ARTICLE

    Robust adaptive fault tolerant control for nonlinear systems with actuator failure and mismatched disturbance

    X. Tao1, Jian Jiang2

    Revista Internacional de Métodos Numéricos para Cálculo y Diseño en Ingeniería, Vol.40, No.1, pp. 1-9, 2024, DOI:10.23967/j.rimni.2024.03.002 - 19 March 2024

    Abstract In this paper, a class of nonlinear system with mismatched disturbance and actuator failure is investigated. A disturbance observer is proposed to estimate the disturbance first and the error of the estimation converges to zero exponentially. By introducing an integral sliding mode surface, the disturbance observer based integral sliding mode fault tolerant control scheme is proposed to attenuate the disturbance and to guarantee the stability of the system. Specially, the control law is designed for decoupling the partial disturbance and attenuating the disturbance that cannot be decoupled. Finally, two examples are given to illustrate the More >

Displaying 1-10 on page 1 of 630. Per Page