Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Heterogeneous Task Allocation Model and Algorithm for Intelligent Connected Vehicles

    Neng Wan1,2, Guangping Zeng1,*, Xianwei Zhou1

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4281-4302, 2024, DOI:10.32604/cmc.2024.054794 - 12 September 2024

    Abstract With the development of vehicles towards intelligence and connectivity, vehicular data is diversifying and growing dramatically. A task allocation model and algorithm for heterogeneous Intelligent Connected Vehicle (ICV) applications are proposed for the dispersed computing network composed of heterogeneous task vehicles and Network Computing Points (NCPs). Considering the amount of task data and the idle resources of NCPs, a computing resource scheduling model for NCPs is established. Taking the heterogeneous task execution delay threshold as a constraint, the optimization problem is described as the problem of maximizing the utilization of computing resources by NCPs. The… More >

  • Open Access

    ARTICLE

    Secure Transmission of Compressed Medical Image Sequences on Communication Networks Using Motion Vector Watermarking

    Rafi Ullah1,*, Mohd Hilmi bin Hasan1, Sultan Daud Khan2, Mussadiq Abdul Rahim3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3283-3301, 2024, DOI:10.32604/cmc.2024.046305 - 26 March 2024

    Abstract Medical imaging plays a key role within modern hospital management systems for diagnostic purposes. Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed, all while upholding image quality. Moreover, an increasing number of hospitals are embracing cloud computing for patient data storage, necessitating meticulous scrutiny of server security and privacy protocols. Nevertheless, considering the widespread availability of multimedia tools, the preservation of digital data integrity surpasses the significance of compression alone. In response to this concern, we propose a secure storage and transmission solution for compressed medical image sequences, such as… More >

  • Open Access

    ARTICLE

    Energy Cost Minimization Using String Matching Algorithm in Geo-Distributed Data Centers

    Muhammad Imran Khan Khalil1, Syed Adeel Ali Shah1, Izaz Ahmad Khan2, Mohammad Hijji3, Muhammad Shiraz4, Qaisar Shaheen5,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6305-6322, 2023, DOI:10.32604/cmc.2023.038163 - 29 April 2023

    Abstract Data centers are being distributed worldwide by cloud service providers (CSPs) to save energy costs through efficient workload allocation strategies. Many CSPs are challenged by the significant rise in user demands due to their extensive energy consumption during workload processing. Numerous research studies have examined distinct operating cost mitigation techniques for geo-distributed data centers (DCs). However, operating cost savings during workload processing, which also considers string-matching techniques in geo-distributed DCs, remains unexplored. In this research, we propose a novel string matching-based geographical load balancing (SMGLB) technique to mitigate the operating cost of the geo-distributed DC.… More >

  • Open Access

    ARTICLE

    Analysis and Design of Surgical Instrument Localization Algorithm

    Siyu Lu1, Jun Yang1, Bo Yang1, Zhengtong Yin2, Mingzhe Liu3,*, Lirong Yin4, Wenfeng Zheng1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 669-685, 2023, DOI:10.32604/cmes.2023.027417 - 23 April 2023

    Abstract With the help of surgical navigation system, doctors can operate on patients more intuitively and accurately. The positioning accuracy and real-time performance of surgical instruments are very important to the whole system. In this paper, we analyze and design the detection algorithm of surgical instrument location mark, and estimate the posture of surgical instrument. In addition, we optimized the pose by remapping. Finally, the algorithm of location mark detection proposed in this paper and the posture analysis data of surgical instruments are verified and analyzed through experiments. The final result shows a high accuracy. More >

  • Open Access

    ARTICLE

    Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm

    Mustafa Musa Jaber1,2,*, Salman Yussof1, Amer S. Elameer3, Leong Yeng Weng1, Sura Khalil Abd2,6, Anand Nayyar4,5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2175-2190, 2022, DOI:10.32604/cmc.2022.023387 - 29 March 2022

    Abstract Artificial intelligence plays an essential role in the medical and health industries. Deep convolution networks offer valuable services and help create automated systems to perform medical image analysis. However, convolution networks examine medical images effectively; such systems require high computational complexity when recognizing the same disease-affected region. Therefore, an optimized deep convolution network is utilized for analyzing disease-affected regions in this work. Different disease-related medical images are selected and examined pixel by pixel; this analysis uses the gray wolf optimized deep learning network. This method identifies affected pixels by the gray wolf hunting process. The More >

  • Open Access

    ARTICLE

    Skipping Undesired High-Frequency Content to Boost DPI Engine

    Likun Liu1, Jiantao Shi1, *, Xiangzhan Yu1, Hongli Zhang1, Dongyang Zhan2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 649-661, 2020, DOI:10.32604/cmc.2020.07736 - 01 May 2020

    Abstract Deep Packet Inspection (DPI) at the core of many monitoring appliances, such as NIDS, NIPS, plays a major role. DPI is beneficial to content providers and censorship to monitor network traffic. However, the surge of network traffic has put tremendous pressure on the performance of DPI. In fact, the sensitive content being monitored is only a minority of network traffic, that is to say, most is undesired. A close look at the network traffic, we found that it contains many undesired high frequency content (UHC) that are not monitored. As everyone knows, the key to… More >

  • Open Access

    ABSTRACT

    A New Quadtree-based Image Compression Technique using Pattern Matching Algorithm

    F. Keissarian1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.12, No.4, pp. 137-144, 2009, DOI:10.3970/icces.2009.012.137

    Abstract In this paper, a new image compression technique is proposed in which variable block size technique is adopted, using quadtree decomposition, for coding images at low bit rates. The proposed algorithm decomposes the host image into blocks of variable sizes according to histogram analysis of the block residuals. Variable block sizes are then encoded at different rates based on their visual activity levels. To preserve edge integrity, a high-detail block is coded by a set of parameters associated with the pattern appearing inside the block. The use of these parameters at the receiver together with More >

Displaying 1-10 on page 1 of 7. Per Page