Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,887)
  • Open Access

    ARTICLE

    Scaled Dilation of DropBlock Optimization in Convolutional Neural Network for Fungus Classification

    Anuruk Prommakhot, Jakkree Srinonchat*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3313-3329, 2022, DOI:10.32604/cmc.2022.024417

    Abstract Image classification always has open challenges for computer vision research. Nowadays, deep learning has promoted the development of this field, especially in Convolutional Neural Networks (CNNs). This article proposes the development of efficiently scaled dilation of DropBlock optimization in CNNs for the fungus classification, which there are five species in this experiment. The proposed technique adjusts the convolution size at 35, 45, and 60 with the max-polling size 2 × 2. The CNNs models are also designed in 12 models with the different BlockSizes and KeepProp. The proposed techniques provide maximum accuracy of 98.30% for the training set. Moreover, three accurate models,… More >

  • Open Access

    ARTICLE

    Feedline Separation for Independent Control of Simultaneously Different Tx/Rx Radiation Patterns

    Akarachai Inthanil, Monthippa Uthansakul*, Peerapong Uthansakul

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2221-2241, 2022, DOI:10.32604/cmc.2022.024390

    Abstract The shortcoming of Wi-Fi networks is that one user can access the router at a time. This drawback limits the system throughput and delay. This paper proposes a concept of Simultaneously Different Tx/Rx (SDTR) radiation patterns with only one antenna set at the router. Furthermore, these two patterns have to be simultaneously operated at the same time so that the system delay can be eased. An omni-directional pattern is employed at router for receiving mode so that the router can sense carrier signal from all directions. At the same time, the router launches a directional beam pointed to another user.… More >

  • Open Access

    ARTICLE

    Analysis and Assessment of Wind Energy Potential of Almukalla in Yemen

    Murad A. A. Almekhlafi1, Fahd N. Al-Wesabi2,3, Majdy M. Eltahir4, Anwer Mustafa Hilal5, Amin M. El-Kustaban6, Abdelwahed Motwakel5, Ishfaq Yaseen5, Manar Ahmed Hamza5,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3113-3129, 2022, DOI:10.32604/cmc.2022.024355

    Abstract Energy is an essential element for any civilized country's social and economic development, but the use of fossil fuels and nonrenewable energy forms has many negative impacts on the environment and the ecosystem. The Republic of Yemen has very good potential to use renewable energy. Unfortunately, we find few studies on renewable wind energy in Yemen. Given the lack of a similar analysis for the coastal city, this research newly investigates wind energy's potential near the Almukalla area by analyzing wind characteristics. Thus, evaluation, model identification, determination of available energy density, computing the capacity factors for several wind turbines and… More >

  • Open Access

    ARTICLE

    Your CAPTCHA Recognition Method Based on DEEP Learning Using MSER Descriptor

    Deepak Kumar1, Ramandeep Singh2, Sukhvinder Singh Bamber3,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2981-2996, 2022, DOI:10.32604/cmc.2022.024221

    Abstract Individuals and PCs (personal computers) can be recognized using CAPTCHAs (Completely Automated Public Turing test to distinguish Computers and Humans) which are mechanized for distinguishing them. Further, CAPTCHAs are intended to be solved by the people, but are unsolvable by the machines. As a result, using Convolutional Neural Networks (CNNs) these tests can similarly be unraveled. Moreover, the CNNs quality depends majorly on: the size of preparation set and the information that the classifier is found out on. Next, it is almost unmanageable to handle issue with CNNs. A new method of detecting CAPTCHA has been proposed, which simultaneously solves… More >

  • Open Access

    ARTICLE

    Vehicle Positioning Based on Optical Camera Communication in V2I Environments

    Pankaj Singh1, Huijin Jeon2, Sookeun Yun2, Byung Wook Kim3, Sung-Yoon Jung1,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2927-2945, 2022, DOI:10.32604/cmc.2022.024180

    Abstract Demand for precise vehicle positioning (VP) increases as autonomous vehicles have recently been drawing attention. This paper proposes a scheme for positioning vehicles on the move based on optical camera communication (OCC) technology in the vehicle-to-infrastructure (V2I) environment. Light-emitting diode (LED) streetlights and vehicle cameras are used as transmitters and receivers respectively. Regions of streetlights are detected and traced by examining images that are obtained from cameras of vehicles. Then, a scheme for analyzing visible light data extracted from the images is proposed. The proposed vehicle positioning scheme uses information on angles between vectors that are formed under the collinearity… More >

  • Open Access

    ARTICLE

    Internal Validity Index for Fuzzy Clustering Based on Relative Uncertainty

    Refik Tanju Sirmen1,*, Burak Berk Üstündağ2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2909-2926, 2022, DOI:10.32604/cmc.2022.023947

    Abstract Unsupervised clustering and clustering validity are used as essential instruments of data analytics. Despite clustering being realized under uncertainty, validity indices do not deliver any quantitative evaluation of the uncertainties in the suggested partitionings. Also, validity measures may be biased towards the underlying clustering method. Moreover, neglecting a confidence requirement may result in over-partitioning. In the absence of an error estimate or a confidence parameter, probable clustering errors are forwarded to the later stages of the system. Whereas, having an uncertainty margin of the projected labeling can be very fruitful for many applications such as machine learning. Herein, the validity… More >

  • Open Access

    ARTICLE

    Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure

    Mohammad Hafiz Mohd Yusof1,*, Abdullah Mohd Zin2, Nurhizam Safie Mohd Satar2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2445-2466, 2022, DOI:10.32604/cmc.2022.023571

    Abstract Due to polymorphic nature of malware attack, a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature of malware attacks. On the other hand, state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model. This is unlikely to be the case in production network as the dataset is unstructured and has no label. Hence an unsupervised learning is recommended. Behavioral study is one of the techniques to elicit traffic pattern. However, studies have shown that existing behavioral intrusion detection model had a few issues which had been parameterized into its common… More >

  • Open Access

    ARTICLE

    Process Tolerant and Power Efficient SRAM Cell for Internet of Things Applications

    T. G. Sargunam1,2,*, Lim Way Soong1, C. M. R. Prabhu1, Ajay Kumar Singh3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3425-3446, 2022, DOI:10.32604/cmc.2022.023452

    Abstract The use of Internet of Things (IoT) applications become dominant in many systems. Its on-chip data processing and computations are also increasing consistently. The battery enabled and low leakage memory system at subthreshold regime is a critical requirement for these IoT applications. The cache memory designed on Static Random-Access Memory (SRAM) cell with features such as low power, high speed, and process tolerance are highly important for the IoT memory system. Therefore, a process tolerant SRAM cell with low power, improved delay and better stability is presented in this research paper. The proposed cell comprises 11 transistors designed with symmetric… More >

  • Open Access

    ARTICLE

    Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm

    Mustafa Musa Jaber1,2,*, Salman Yussof1, Amer S. Elameer3, Leong Yeng Weng1, Sura Khalil Abd2,6, Anand Nayyar4,5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2175-2190, 2022, DOI:10.32604/cmc.2022.023387

    Abstract Artificial intelligence plays an essential role in the medical and health industries. Deep convolution networks offer valuable services and help create automated systems to perform medical image analysis. However, convolution networks examine medical images effectively; such systems require high computational complexity when recognizing the same disease-affected region. Therefore, an optimized deep convolution network is utilized for analyzing disease-affected regions in this work. Different disease-related medical images are selected and examined pixel by pixel; this analysis uses the gray wolf optimized deep learning network. This method identifies affected pixels by the gray wolf hunting process. The convolution network uses an automatic… More >

  • Open Access

    ARTICLE

    DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

    Jyoti Khandelwal1, Vijay Kumar Sharma1, Dilbag Singh2,*, Atef Zaguia3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3299-3312, 2022, DOI:10.32604/cmc.2022.023116

    Abstract Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel's threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image steganography using discrete wavelet transform… More >

Displaying 8361-8370 on page 837 of 21887. Per Page