Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    A Novel Anti-Collision Algorithm for Large Scale of UHF RFID Tags Access Systems

    Xu Zhang1, Yi He1, Haiwen Yi1, Yulu Zhang2, Yuan Li2, Shuai Ma2, Gui Li3, Zhiyuan Zhao4, Yue Liu1, Junyang Liu1, Guangjun Wen1, Jian Li1,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 897-912, 2024, DOI:10.32604/cmc.2024.050000 - 18 July 2024

    Abstract When the radio frequency identification (RFID) system inventories multiple tags, the recognition rate will be seriously affected due to collisions. Based on the existing dynamic frame slotted Aloha (DFSA) algorithm, a sub-frame observation and cyclic redundancy check (CRC) grouping combined dynamic framed slotted Aloha (SUBF-CGDFSA) algorithm is proposed. The algorithm combines the precise estimation method of the quantity of large-scale tags, the large-scale tags grouping mechanism based on CRC pseudo-random characteristics, and the Aloha anti-collision optimization mechanism based on sub-frame observation. By grouping tags and sequentially identifying them within subframes, it accurately estimates the number More >

  • Open Access

    ARTICLE

    Topology Optimization of Two Fluid Heat Transfer Problems for Heat Exchanger Design

    Kun Yan1, Yunyu Wang2, Jun Yan3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1949-1974, 2024, DOI:10.32604/cmes.2024.048877 - 20 May 2024

    Abstract Topology optimization of thermal-fluid coupling problems has received widespread attention. This article proposes a novel topology optimization method for laminar two-fluid heat exchanger design. The proposed method utilizes an artificial density field to create two permeability interpolation functions that exhibit opposing trends, ensuring separation between the two fluid domains. Additionally, a Gaussian function is employed to construct an interpolation function for the thermal conductivity coefficient. Furthermore, a computational program has been developed on the OpenFOAM platform for the topology optimization of two-fluid heat exchangers. This program leverages parallel computing, significantly reducing the time required for More >

  • Open Access

    ARTICLE

    Improved HardNet and Stricter Outlier Filtering to Guide Reliable Matching

    Meng Xu1, Chen Shen2, Jun Zhang2, Zhipeng Wang3, Zhiwei Ruan2, Stefan Poslad1, Pengfei Xu2,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4785-4803, 2023, DOI:10.32604/cmc.2023.034053 - 29 April 2023

    Abstract As the fundamental problem in the computer vision area, image matching has wide applications in pose estimation, 3D reconstruction, image retrieval, etc. Suffering from the influence of external factors, the process of image matching using classical local detectors, e.g., scale-invariant feature transform (SIFT), and the outlier filtering approaches, e.g., Random sample consensus (RANSAC), show high computation speed and pool robustness under changing illumination and viewpoints conditions, while image matching approaches with deep learning strategy (such as HardNet, OANet) display reliable achievements in large-scale datasets with challenging scenes. However, the past learning-based approaches are limited to… More >

  • Open Access

    ARTICLE

    Large Scale Fish Images Classification and Localization using Transfer Learning and Localization Aware CNN Architecture

    Usman Ahmad1, Muhammad Junaid Ali2, Faizan Ahmed Khan3, Arfat Ahmad Khan4, Arif Ur Rehman1, Malik Muhammad Ali Shahid5, Mohd Anul Haq6,*, Ilyas Khan7, Zamil S. Alzamil6, Ahmed Alhussen8

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2125-2140, 2023, DOI:10.32604/csse.2023.031008 - 03 November 2022

    Abstract Building an automatic fish recognition and detection system for large-scale fish classes is helpful for marine researchers and marine scientists because there are large numbers of fish species. However, it is quite difficult to build such systems owing to the lack of data imbalance problems and large number of classes. To solve these issues, we propose a transfer learning-based technique in which we use Efficient-Net, which is pre-trained on ImageNet dataset and fine-tuned on QuT Fish Database, which is a large scale dataset. Furthermore, prior to the activation layer, we use Global Average Pooling (GAP)… More >

  • Open Access

    ARTICLE

    Managing Software Testing Technical Debt Using Evolutionary Algorithms

    Muhammad Abid Jamil*, Mohamed K. Nour

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 735-747, 2022, DOI:10.32604/cmc.2022.028386 - 18 May 2022

    Abstract Technical debt (TD) happens when project teams carry out technical decisions in favor of a short-term goal(s) in their projects, whether deliberately or unknowingly. TD must be properly managed to guarantee that its negative implications do not outweigh its advantages. A lot of research has been conducted to show that TD has evolved into a common problem with considerable financial burden. Test technical debt is the technical debt aspect of testing (or test debt). Test debt is a relatively new concept that has piqued the curiosity of the software industry in recent years. In this… More >

  • Open Access

    ARTICLE

    Anomaly Based Camera Prioritization in Large Scale Surveillance Networks

    Altaf Hussain1,2, Khan Muhammad1, Hayat Ullah1, Amin Ullah1,4, Ali Shariq Imran3, Mi Young Lee1, Seungmin Rho1, Muhammad Sajjad2,3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2171-2190, 2022, DOI:10.32604/cmc.2022.018181 - 27 September 2021

    Abstract Digital surveillance systems are ubiquitous and continuously generate massive amounts of data, and manual monitoring is required in order to recognise human activities in public areas. Intelligent surveillance systems that can automatically ide.pngy normal and abnormal activities are highly desirable, as these would allow for efficient monitoring by selecting only those camera feeds in which abnormal activities are occurring. This paper proposes an energy-efficient camera prioritisation framework that intelligently adjusts the priority of cameras in a vast surveillance network using feedback from the activity recognition system. The proposed system addresses the limitations of existing manual… More >

  • Open Access

    ARTICLE

    Leaf Blights Detection and Classification in Large Scale Applications

    Abdul Muiz Fayyaz1, Kawther A. Al-Dhlan2, Saeed Ur Rehman1, Mudassar Raza1, Waqar Mehmood3, Muhammad Shafiq4, Jin-Ghoo Choi4,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 507-522, 2022, DOI:10.32604/iasc.2022.016392 - 03 September 2021

    Abstract Crops are very important to the financial needs of a country. Due to various diseases caused by different pathogens, a large number of crops have been destroyed. As humanoids, our basic need is food for survival, and the most basic foundation of our food is agriculture. For many developing countries, it is mainly an important source of income. Bacterial diseases are one of the main diseases that cause improper production and a major economic crisis for the country. Therefore, it is necessary to detect the disease early. However, it is not easy for humans to… More >

  • Open Access

    ARTICLE

    The Optimization Reachability Query of Large Scale Multi-Attribute Constraints Directed Graph

    Kehong Zhang, Keqiu Li

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 71-85, 2018, DOI:10.32604/csse.2018.33.071

    Abstract Today, many applications such as social network and biological network develop rapidly,the graph data will be expanded constantly on a large scale. Some classic methods can not effectively solve this scale of the graph data. In the reachability query, many technologies such as N-Hop, tree, interval labels, uncertain graph processing are emerging, they also solve a lot of questions about reachability query of graph. But, these methods have not put forward the effective solution for the new issues of the multiattribute constraints reachability on directed graph. In this paper, TCRQDG algorithm effectively solves this new More >

  • Open Access

    ARTICLE

    An Advanced ACA/BEM for Solving 2D Large-Scale Elastic Problems with Multi-Connected Domains

    T. Gortsas1, S.V. Tsinopoulos2, D. Polyzos1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.107, No.4, pp. 321-343, 2015, DOI:10.3970/cmes.2015.107.321

    Abstract An advanced Boundary Element method (BEM) accelerated via Adaptive Cross Approximation (ACA) and Hierarchical Matrices (HM) techniques is presented for the solution of large-scale elastostatic problems with multi-connected domains like in fiber reinforced composite materials. Although the proposed ACA/ BEM is demonstrated for two-dimensional (2D) problems, it is quite general and it can be used for 3D problems. Different forms of ACA technique are employed for exploring their efficiency when they combined with a BEM code. More precisely, the fully and partially pivoted ACA with and without recompression are utilized, while the solution of the More >

  • Open Access

    ARTICLE

    Crack Tip Parameters Under Large Scale Yielding Condition

    F. Caputo1, G. Lamanna1, A. Soprano1

    Structural Durability & Health Monitoring, Vol.9, No.3, pp. 217-232, 2013, DOI:10.32604/sdhm.2013.009.217

    Abstract In recent years, the study of the behaviour of damaged structures has been focusing on cracked components in presence of an extensive material yielding at the crack tip; under this condition, linear elastic fracture mechanics theory is not able to describe the real stress-strain state at the crack tip and consequently either the static or the fatigue behaviour of the component. In this work, an extensive parametric numerical analysis of the plastic zone size and shape at the crack tip for a through cracked plate under Mode I loading condition is presented. The obtained results More >

Displaying 1-10 on page 1 of 19. Per Page