Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (27)
  • Open Access

    ARTICLE

    Landscape of Sequence Variations in Homologous Copies of FAD2 and FAD3 in Rapeseed (Brassica napus L.) Germplasm with High/Low Linolenic Acid Trait

    Haoxue Wu#, Xiaohan Zhang§,#, Xiaoyu Chen, Kang Li, Aixia Xu, Zhen Huang, Jungang Dong, Chengyu Yu*

    Phyton-International Journal of Experimental Botany, Vol.93, No.3, pp. 627-640, 2024, DOI:10.32604/phyton.2024.050321

    Abstract Genetic manipulation (either restraint or enhancement) of the biosynthesis pathway of α-linolenic acid (ALA) in seed oil is an important goal in Brassica napus breeding. B. napus is a tetraploid plant whose genome often harbors four and six homologous copies, respectively, of the two fatty acid desaturases FAD2 and FAD3, which control the last two steps of ALA biosynthesis during seed oil accumulation. In this study, we compared their promoters, coding sequences, and expression levels in three high-ALA inbred lines 2006L, R8Q10, and YH25005, a low-ALA line A28, a low-ALA/high-oleic-acid accession SW, and the wildtype ZS11. The expression levels of… More >

  • Open Access

    ARTICLE

    Secure Transmission of Compressed Medical Image Sequences on Communication Networks Using Motion Vector Watermarking

    Rafi Ullah1,*, Mohd Hilmi bin Hasan1, Sultan Daud Khan2, Mussadiq Abdul Rahim3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3283-3301, 2024, DOI:10.32604/cmc.2024.046305

    Abstract Medical imaging plays a key role within modern hospital management systems for diagnostic purposes. Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed, all while upholding image quality. Moreover, an increasing number of hospitals are embracing cloud computing for patient data storage, necessitating meticulous scrutiny of server security and privacy protocols. Nevertheless, considering the widespread availability of multimedia tools, the preservation of digital data integrity surpasses the significance of compression alone. In response to this concern, we propose a secure storage and transmission solution for compressed medical image sequences, such as ultrasound images, utilizing a motion… More >

  • Open Access

    ARTICLE

    Social Robot Detection Method with Improved Graph Neural Networks

    Zhenhua Yu, Liangxue Bai, Ou Ye*, Xuya Cong

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1773-1795, 2024, DOI:10.32604/cmc.2023.047130

    Abstract Social robot accounts controlled by artificial intelligence or humans are active in social networks, bringing negative impacts to network security and social life. Existing social robot detection methods based on graph neural networks suffer from the problem of many social network nodes and complex relationships, which makes it difficult to accurately describe the difference between the topological relations of nodes, resulting in low detection accuracy of social robots. This paper proposes a social robot detection method with the use of an improved neural network. First, social relationship subgraphs are constructed by leveraging the user’s social network to disentangle intricate social… More >

  • Open Access

    ARTICLE

    HybridHR-Net: Action Recognition in Video Sequences Using Optimal Deep Learning Fusion Assisted Framework

    Muhammad Naeem Akbar1,*, Seemab Khan2, Muhammad Umar Farooq1, Majed Alhaisoni3, Usman Tariq4, Muhammad Usman Akram1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3275-3295, 2023, DOI:10.32604/cmc.2023.039289

    Abstract The combination of spatiotemporal videos and essential features can improve the performance of human action recognition (HAR); however, the individual type of features usually degrades the performance due to similar actions and complex backgrounds. The deep convolutional neural network has improved performance in recent years for several computer vision applications due to its spatial information. This article proposes a new framework called for video surveillance human action recognition dubbed HybridHR-Net. On a few selected datasets, deep transfer learning is used to pre-trained the EfficientNet-b0 deep learning model. Bayesian optimization is employed for the tuning of hyperparameters of the fine-tuned deep… More >

  • Open Access

    RETRACTION

    Retraction: A Hybrid Modified Sine CosineAlgorithm Using Inverse Filtering andClipping Methods forLow AutocorrelationBinary Sequences

    Siti Julia Rosli1,2, Hasliza A Rahim1,2,*, Khairul Najmy Abdul Rani1,2, Ruzelita Ngadiran2,3, Wan Azani Mustafa3,4, Muzammil Jusoh1,2, Mohd Najib Mohd Yasin1,2, Thennarasan Sabapathy1,2, Mohamedfareq Abdulmalek5, Wan Suryani Firuz Wan Ariffin2, Ahmed Alkhayyat6

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2571-2571, 2023, DOI:10.32604/cmc.2023.045533

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Suspicious Activities Recognition in Video Sequences Using DarkNet-NasNet Optimal Deep Features

    Safdar Khan1, Muhammad Attique Khan2, Jamal Hussain Shah1,*, Faheem Shehzad2, Taerang Kim3, Jae-Hyuk Cha3

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2337-2360, 2023, DOI:10.32604/csse.2023.040410

    Abstract Human Suspicious Activity Recognition (HSAR) is a critical and active research area in computer vision that relies on artificial intelligence reasoning. Significant advances have been made in this field recently due to important applications such as video surveillance. In video surveillance, humans are monitored through video cameras when doing suspicious activities such as kidnapping, fighting, snatching, and a few more. Although numerous techniques have been introduced in the literature for routine human actions (HAR), very few studies are available for HSAR. This study proposes a deep convolutional neural network (CNN) and optimal featuresbased framework for HSAR in video frames. The… More >

  • Open Access

    ARTICLE

    High Utility Periodic Frequent Pattern Mining in Multiple Sequences

    Chien-Ming Chen1, Zhenzhou Zhang1, Jimmy Ming-Tai Wu1, Kuruva Lakshmanna2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 733-759, 2023, DOI:10.32604/cmes.2023.027463

    Abstract Periodic pattern mining has become a popular research subject in recent years; this approach involves the discovery of frequently recurring patterns in a transaction sequence. However, previous algorithms for periodic pattern mining have ignored the utility (profit, value) of patterns. Additionally, these algorithms only identify periodic patterns in a single sequence. However, identifying patterns of high utility that are common to a set of sequences is more valuable. In several fields, identifying high-utility periodic frequent patterns in multiple sequences is important. In this study, an efficient algorithm called MHUPFPS was proposed to identify such patterns. To address existing problems, three… More >

  • Open Access

    ARTICLE

    Video Transmission Secrecy Improvement Based on Fractional Order Hyper Chaotic System

    S. Kayalvizhi*, S. Malarvizhi

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1201-1214, 2023, DOI:10.32604/csse.2023.032381

    Abstract In the Digital World scenario, the confidentiality of information in video transmission plays an important role. Chaotic systems have been shown to be effective for video signal encryption. To improve video transmission secrecy, compressive encryption method is proposed to accomplish compression and encryption based on fractional order hyper chaotic system that incorporates Compressive Sensing (CS), pixel level, bit level scrambling and nucleotide Sequences operations. The measurement matrix generates by the fractional order hyper chaotic system strengthens the efficiency of the encryption process. To avoid plain text attack, the CS measurement is scrambled to its pixel level, bit level scrambling decreases… More >

  • Open Access

    ARTICLE

    Structural characterization of four Rhododendron spp. chloroplast genomes and comparative analyses with other azaleas

    XIAOJUN ZHOU1,*, MENGXUE LIU1, LINLIN SONG2

    BIOCELL, Vol.47, No.3, pp. 657-668, 2023, DOI:10.32604/biocell.2023.026781

    Abstract Azalea is a general designation of Rhododendron in the Ericaceae family. Rhododendron not only has high ornamental value but also has application value in ecological protection, medicine, and scientific research. In this study, we used Illumina and PacBio sequencing to assemble and annotate the entire chloroplast genomes (cp genomes) of four Rhododendron species. The chloroplast genomes of R. concinnum, R. henanense subsp. lingbaoense, R. micranthum, and R. simsii were assembled into 207,236, 208,015, 207,233, and 206,912 bp, respectively. All chloroplast genomes contain eight rRNA genes, with either 88 or 89 protein-coding genes. The four cp genomes were compared and analyzed… More >

  • Open Access

    ARTICLE

    Leveraging Transfer Learning for Spatio-Temporal Human Activity Recognition from Video Sequences

    Umair Muneer Butt1,2,*, Hadiqa Aman Ullah2, Sukumar Letchmunan1, Iqra Tariq2, Fadratul Hafinaz Hassan1, Tieng Wei Koh3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5017-5033, 2023, DOI:10.32604/cmc.2023.035512

    Abstract Human Activity Recognition (HAR) is an active research area due to its applications in pervasive computing, human-computer interaction, artificial intelligence, health care, and social sciences. Moreover, dynamic environments and anthropometric differences between individuals make it harder to recognize actions. This study focused on human activity in video sequences acquired with an RGB camera because of its vast range of real-world applications. It uses two-stream ConvNet to extract spatial and temporal information and proposes a fine-tuned deep neural network. Moreover, the transfer learning paradigm is adopted to extract varied and fixed frames while reusing object identification information. Six state-of-the-art pre-trained models… More >

Displaying 1-10 on page 1 of 27. Per Page