Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Infrared and Visible Image Fusion Based on Res2Net-Transformer Automatic Encoding and Decoding

    Chunming Wu1, Wukai Liu2,*, Xin Ma3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1441-1461, 2024, DOI:10.32604/cmc.2024.048136

    Abstract A novel image fusion network framework with an autonomous encoder and decoder is suggested to increase the visual impression of fused images by improving the quality of infrared and visible light picture fusion. The network comprises an encoder module, fusion layer, decoder module, and edge improvement module. The encoder module utilizes an enhanced Inception module for shallow feature extraction, then combines Res2Net and Transformer to achieve deep-level co-extraction of local and global features from the original picture. An edge enhancement module (EEM) is created to extract significant edge features. A modal maximum difference fusion strategy is introduced to enhance the… More >

  • Open Access

    ARTICLE

    Time and Space Efficient Multi-Model Convolution Vision Transformer for Tomato Disease Detection from Leaf Images with Varied Backgrounds

    Ankita Gangwar1, Vijaypal Singh Dhaka1, Geeta Rani2,*, Shrey Khandelwal1, Ester Zumpano3,4, Eugenio Vocaturo3,4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 117-142, 2024, DOI:10.32604/cmc.2024.048119

    Abstract A consumption of 46.9 million tons of processed tomatoes was reported in 2022 which is merely 20% of the total consumption. An increase of 3.3% in consumption is predicted from 2024 to 2032. Tomatoes are also rich in iron, potassium, antioxidant lycopene, vitamins A, C and K which are important for preventing cancer, and maintaining blood pressure and glucose levels. Thus, tomatoes are globally important due to their widespread usage and nutritional value. To face the high demand for tomatoes, it is mandatory to investigate the causes of crop loss and minimize them. Diseases are one of the major causes… More >

  • Open Access

    ARTICLE

    The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network

    Qiang Fu1, Jun Wang1,*, Changfu Si1, Jiawei Liu2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 329-349, 2024, DOI:10.32604/cmc.2024.048117

    Abstract As industrialization and informatization become more deeply intertwined, industrial control networks have entered an era of intelligence. The connection between industrial control networks and the external internet is becoming increasingly close, which leads to frequent security accidents. This paper proposes a model for the industrial control network. It includes a malware containment strategy that integrates intrusion detection, quarantine, and monitoring. Based on this model, the role of key nodes in the spread of malware is studied, a comparison experiment is conducted to validate the impact of the containment strategy. In addition, the dynamic behavior of the model is analyzed, the… More >

  • Open Access

    ARTICLE

    A Dual Discriminator Method for Generalized Zero-Shot Learning

    Tianshu Wei1, Jinjie Huang1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1599-1612, 2024, DOI:10.32604/cmc.2024.048098

    Abstract Zero-shot learning enables the recognition of new class samples by migrating models learned from semantic features and existing sample features to things that have never been seen before. The problems of consistency of different types of features and domain shift problems are two of the critical issues in zero-shot learning. To address both of these issues, this paper proposes a new modeling structure. The traditional approach mapped semantic features and visual features into the same feature space; based on this, a dual discriminator approach is used in the proposed model. This dual discriminator approach can further enhance the consistency between… More >

  • Open Access

    ARTICLE

    Combined CNN-LSTM Deep Learning Algorithms for Recognizing Human Physical Activities in Large and Distributed Manners: A Recommendation System

    Ameni Ellouze1, Nesrine Kadri2, Alaa Alaerjan3,*, Mohamed Ksantini1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 351-372, 2024, DOI:10.32604/cmc.2024.048061

    Abstract Recognizing human activity (HAR) from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases. Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not. Typically, smartphones and their associated sensing devices operate in distributed and unstable environments. Therefore, collecting their data and extracting useful information is a significant challenge. In this context, the aim of this paper is twofold: The first is to analyze human behavior based on the recognition of physical activities. Using the results of physical activity detection… More >

  • Open Access

    ARTICLE

    Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment

    Sapiah Sakri1, Shakila Basheer1, Zuhaira Muhammad Zain1, Nurul Halimatul Asmak Ismail2,*, Dua’ Abdellatef Nassar1, Manal Abdullah Alohali1, Mais Ayman Alharaki1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1157-1185, 2024, DOI:10.32604/cmc.2024.048051

    Abstract Background: Sepsis, a potentially fatal inflammatory disease triggered by infection, carries significant health implications worldwide. Timely detection is crucial as sepsis can rapidly escalate if left undetected. Recent advancements in deep learning (DL) offer powerful tools to address this challenge. Aim: Thus, this study proposed a hybrid CNNBDLSTM, a combination of a convolutional neural network (CNN) with a bi-directional long short-term memory (BDLSTM) model to predict sepsis onset. Implementing the proposed model provides a robust framework that capitalizes on the complementary strengths of both architectures, resulting in more accurate and timelier predictions. Method: The sepsis prediction method proposed here utilizes… More >

  • Open Access

    ARTICLE

    Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble

    Amardeep Singh1, Hamad Ali Abosaq2, Saad Arif3, Zohaib Mushtaq4,*, Muhammad Irfan5, Ghulam Abbas6, Arshad Ali7, Alanoud Al Mazroa8

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 857-873, 2024, DOI:10.32604/cmc.2024.048036

    Abstract Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries, especially in light of the growing number of cybersecurity threats. A major and ever-present threat is Ransomware-as-a-Service (RaaS) assaults, which enable even individuals with minimal technical knowledge to conduct ransomware operations. This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models. For this purpose, the network intrusion detection dataset “UNSW-NB15” from the Intelligent Security Group of the University of New South Wales, Australia is analyzed. In the initial phase, the rectified linear… More >

  • Open Access

    ARTICLE

    Braille Character Segmentation Algorithm Based on Gaussian Diffusion

    Zezheng Meng, Zefeng Cai, Jie Feng*, Hanjie Ma, Haixiang Zhang, Shaohua Li

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1481-1496, 2024, DOI:10.32604/cmc.2024.048002

    Abstract Optical braille recognition methods typically employ existing target detection models or segmentation models for the direct detection and recognition of braille characters in original braille images. However, these methods need improvement in accuracy and generalizability, especially in densely dotted braille image environments. This paper presents a two-stage braille recognition framework. The first stage is a braille dot detection algorithm based on Gaussian diffusion, targeting Gaussian heatmaps generated by the convex dots in braille images. This is applied to the detection of convex dots in double-sided braille, achieving high accuracy in determining the central coordinates of the braille convex dots. The… More >

  • Open Access

    ARTICLE

    A Layered Energy-Efficient Multi-Node Scheduling Mechanism for Large-Scale WSN

    Xue Zhao, Shaojun Tao, Hongying Tang, Jiang Wang*, Baoqing Li*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1335-1351, 2024, DOI:10.32604/cmc.2024.047996

    Abstract In recent years, target tracking has been considered one of the most important applications of wireless sensor network (WSN). Optimizing target tracking performance and prolonging network lifetime are two equally critical objectives in this scenario. The existing mechanisms still have weaknesses in balancing the two demands. The proposed heuristic multi-node collaborative scheduling mechanism (HMNCS) comprises cluster head (CH) election, pre-selection, and task set selection mechanisms, where the latter two kinds of selections form a two-layer selection mechanism. The CH election innovatively introduces the movement trend of the target and establishes a scoring mechanism to determine the optimal CH, which can… More >

  • Open Access

    ARTICLE

    Blockchain-Based Key Management Scheme Using Rational Secret Sharing

    Xingfan Zhao1, Changgen Peng1,2,*, Weijie Tan2, Kun Niu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 307-328, 2024, DOI:10.32604/cmc.2024.047975

    Abstract Traditional blockchain key management schemes store private keys in the same location, which can easily lead to security issues such as a single point of failure. Therefore, decentralized threshold key management schemes have become a research focus for blockchain private key protection. The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security. The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress, but these schemes do not consider participants’ self-interested behavior, and require trusted nodes to keep private key fragments, resulting in a narrow… More >

Displaying 41-50 on page 5 of 5350. Per Page