Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Monocular Distance Estimated Based on PTZ Camera

    Qirui Zhong1, Xiaogang Cheng2,*, Yuxin Song3, Han Wang2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3417-3433, 2024, DOI:10.32604/cmc.2024.049992 - 15 May 2024

    Abstract This paper introduces an intelligent computational approach for extracting salient objects from images and estimating their distance information with PTZ (Pan-Tilt-Zoom) cameras. PTZ cameras have found wide applications in numerous public places, serving various purposes such as public security management, natural disaster monitoring, and crisis alarms, particularly with the rapid development of Artificial Intelligence and global infrastructural projects. In this paper, we combine Gauss optical principles with the PTZ camera’s capabilities of horizontal and pitch rotation, as well as optical zoom, to estimate the distance of the object. We present a novel monocular object distance… More >

  • Open Access

    ARTICLE

    Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3801-3813, 2023, DOI:10.32604/iasc.2023.032267 - 17 August 2022

    Abstract Due to the mobility of users in an organization, inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption (CP-ABE). By considering this challenge; we focus to present dynamic time and location information in CP-ABE with multi-authorization. At first, along with the set of attributes of the users, their corresponding location is also embedded. Geohash is used to encode the latitude and longitude of the user’s position. Then, decrypt time period and access time period of users are defined using the new time tree (NTT) structure. The NTT More >

  • Open Access

    REVIEW

    A Review on Privacy Preservation of Location-Based Services in Internet of Things

    Raniyah Wazirali*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 767-779, 2022, DOI:10.32604/iasc.2022.019243 - 22 September 2021

    Abstract Internet of Things (IoT) has become popular with the rapid development of sensing devices, and it offers a large number of services. Location data is one of the most important information required for IoT systems. With the widespread of Location Based Services (LBS) applications, the privacy and security threats are also emerging. Recently, a large number of studies focused on localization and positioning functionalities, however, the risk associated with user privacy has not been sufficiently addressed so far. Therefore, privacy and security of device location in IoT systems is an active area of research. Since… More >

  • Open Access

    ARTICLE

    Genetic Algorithm Routing Protocol for Mobile Ad Hoc Network

    Raed Alsaqour1, Saif Kamal2, Maha Abdelhaq3,*, Yazan Al Jeroudi4

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 941-960, 2021, DOI:10.32604/cmc.2021.015921 - 22 March 2021

    Abstract Mobile ad hoc network (MANET) is a dynamically reconfigurable wireless network with time-variable infrastructure. Given that nodes are highly mobile, MANET’s topology often changes. These changes increase the difficulty in finding the routes that the packets use when they are routed. This study proposes an algorithm called genetic algorithm-based location-aided routing (GALAR) to enhance the MANET routing protocol efficiency. The GALAR algorithm maintains an adaptive update of the node location information by adding the transmitting node location information to the routing packet and selecting the transmitting node to carry the packets to their destination. The More >

Displaying 1-10 on page 1 of 4. Per Page