Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    MarkNeRF: Watermarking for Neural Radiance Field

    Lifeng Chen1,2, Jia Liu1,2,*, Wenquan Sun1,2, Weina Dong1,2, Xiaozhong Pan1,2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1235-1250, 2024, DOI:10.32604/cmc.2024.051608 - 18 July 2024

    Abstract This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field (NeRF) models. We employ an embedding network to integrate the watermark into the images within the training set. Then, the NeRF model is utilized for 3D modeling. For copyright verification, a secret image is generated by inputting a confidential viewpoint into NeRF. On this basis, design an extraction network to extract embedded watermark images from confidential viewpoints. In the event of suspicion regarding the unauthorized usage of NeRF in a black-box scenario, the verifier can extract More >

  • Open Access

    ARTICLE

    Optimized Decision Tree and Black Box Learners for Revealing Genetic Causes of Bladder Cancer

    Sait Can Yucebas*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 49-71, 2023, DOI:10.32604/iasc.2023.036871 - 29 April 2023

    Abstract The number of studies in the literature that diagnose cancer with machine learning using genome data is quite limited. These studies focus on the prediction performance, and the extraction of genomic factors that cause disease is often overlooked. However, finding underlying genetic causes is very important in terms of early diagnosis, development of diagnostic kits, preventive medicine, etc. The motivation of our study was to diagnose bladder cancer (BCa) based on genetic data and to reveal underlying genetic factors by using machine-learning models. In addition, conducting hyper-parameter optimization to get the best performance from different… More >

  • Open Access

    ARTICLE

    The Human Eye Pupil Detection System Using BAT Optimized Deep Learning Architecture

    S. Navaneethan1,*, P. Siva Satya Sreedhar2, S. Padmakala3, C. Senthilkumar4

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 125-135, 2023, DOI:10.32604/csse.2023.034546 - 20 January 2023

    Abstract The pupil recognition method is helpful in many real-time systems, including ophthalmology testing devices, wheelchair assistance, and so on. The pupil detection system is a very difficult process in a wide range of datasets due to problems caused by varying pupil size, occlusion of eyelids, and eyelashes. Deep Convolutional Neural Networks (DCNN) are being used in pupil recognition systems and have shown promising results in terms of accuracy. To improve accuracy and cope with larger datasets, this research work proposes BOC (BAT Optimized CNN)-IrisNet, which consists of optimizing input weights and hidden layers of DCNN… More >

  • Open Access

    ARTICLE

    Prediction of Residential Building’s Solar Installation Energy Demand in Morocco Using Multiple Linear Regression Analysis

    Nada Yamoul1,*, Latifa Dlimi1, Baraka Achraf Chakir2

    Energy Engineering, Vol.119, No.5, pp. 2135-2148, 2022, DOI:10.32604/ee.2022.020005 - 21 July 2022

    Abstract The building sector is one of the main energy-consuming sectors in Morocco. In fact, it accounts for 33% of the final consumption of energy and records a high increase in the annual consumption of energy caused by further planned large-scale projects. Indeed, the energy consumption of the building sector is experiencing a significant acceleration justified by the rapid need for the development of housing stock, wich is estimated at an average increase of 1,5% per year; furthermore, tant is an estimated increase of about 6,4%. In this sense, building constitutes an important potential source for… More >

  • Open Access

    ARTICLE

    Hybrid Security Assessment Methodology for Web Applications

    Roddy A. Correa1, Juan Ramón Bermejo Higuera2, Javier Bermejo Higuera2, Juan Antonio Sicilia Montalvo2, Manuel Sánchez Rubio2, Á. Alberto Magreñán3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 89-124, 2021, DOI:10.32604/cmes.2021.010700 - 22 December 2020

    Abstract This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications. The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box, to carry out the security validation of a web application in an agile and precise way. The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks. Each one of the phases contemplated in the methodology is supported by security analysis tools of different… More >

  • Open Access

    ARTICLE

    An Efficient Response Surface Based Optimisation Method for Non-Deterministic Harmonic and Transient Dynamic Analysis

    M. De Munck1, D. Moens2, W. Desmet3, D.Vandepitte3

    CMES-Computer Modeling in Engineering & Sciences, Vol.47, No.2, pp. 119-166, 2009, DOI:10.3970/cmes.2009.047.119

    Abstract Deterministic simulation tools enable a very precise simulation of physical phenomena using numerical models. In many real life situations however, a deterministic analysis is not sufficient to assess the quality of a design. In a design stage, some physical properties of the model may not be determined yet. But even in a design ready for production, design tolerances and production inaccuracies introduce variability and uncertainty. In these cases, a non-deterministic analysis procedure is required, either using a probabilistic or a non-probabilistic approach. The authors developed an intelligent Kriging response surface based optimisation procedure that can More >

Displaying 1-10 on page 1 of 6. Per Page