Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,887)
  • Open Access

    ARTICLE

    DTLM-DBP: Deep Transfer Learning Models for DNA Binding Proteins Identification

    Sara Saber1, Uswah Khairuddin2,*, Rubiyah Yusof2, Ahmed Madani1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3563-3576, 2021, DOI:10.32604/cmc.2021.017769

    Abstract The identification of DNA binding proteins (DNABPs) is considered a major challenge in genome annotation because they are linked to several important applied and research applications of cellular functions e.g., in the study of the biological, biophysical, and biochemical effects of antibiotics, drugs, and steroids on DNA. This paper presents an efficient approach for DNABPs identification based on deep transfer learning, named “DTLM-DBP.” Two transfer learning methods are used in the identification process. The first is based on the pre-trained deep learning model as a feature’s extractor and classifier. Two different pre-trained Convolutional Neural Networks (CNN), AlexNet 8 and VGG… More >

  • Open Access

    ARTICLE

    Research on Forecasting Flowering Phase of Pear Tree Based on Neural Network

    Zhenzhou Wang1, Yinuo Ma1, Pingping Yu1,*, Ning Cao2, Heiner Dintera3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3431-3446, 2021, DOI:10.32604/cmc.2021.017729

    Abstract Predicting the blooming season of ornamental plants is significant for guiding adjustments in production decisions and providing viewing periods and routes. The current strategies for observation of ornamental plant booming periods are mainly based on manpower and experience, which have problems such as inaccurate recognition time, time-consuming and energy sapping. Therefore, this paper proposes a neural network-based method for predicting the flowering phase of pear tree. Firstly, based on the meteorological observation data of Shijiazhuang Meteorological Station from 2000 to 2019, three principal components (the temperature factor, weather factor, and humidity factor) with high correlation coefficient with the flowering phase… More >

  • Open Access

    ARTICLE

    Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack

    Fahd N. Al-Wesabi1,2,*, Huda G. Iskandar2,3, Saleh Alzahrani4, Abdelzahir Abdelmaboud4, Mohammed Abdul4, Nadhem Nemri4, Mohammad Medani4, Mohammed Y. Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3789-3806, 2021, DOI:10.32604/cmc.2021.017674

    Abstract In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing. The HFDATAI solution technically integrates and senses the watermark without modifying the original text. The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated, null-watermarking approach to enhance the proposed approach’s efficiency, accuracy, and intensity. The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of… More >

  • Open Access

    ARTICLE

    Enhanced Deep Autoencoder Based Feature Representation Learning for Intelligent Intrusion Detection System

    Thavavel Vaiyapuri*, Adel Binbusayyis

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3271-3288, 2021, DOI:10.32604/cmc.2021.017665

    Abstract In the era of Big data, learning discriminant feature representation from network traffic is identified has as an invariably essential task for improving the detection ability of an intrusion detection system (IDS). Owing to the lack of accurately labeled network traffic data, many unsupervised feature representation learning models have been proposed with state-of-the-art performance. Yet, these models fail to consider the classification error while learning the feature representation. Intuitively, the learnt feature representation may degrade the performance of the classification task. For the first time in the field of intrusion detection, this paper proposes an unsupervised IDS model leveraging the… More >

  • Open Access

    ARTICLE

    Hybrid Nanofluid Flow with Homogeneous-Heterogeneous Reactions

    Iskandar Waini1,2, Anuar Ishak2,*, Ioan Pop3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3255-3269, 2021, DOI:10.32604/cmc.2021.017643

    Abstract This study examines the stagnation point flow over a stretching/shrinking sheet in a hybrid nanofluid with homogeneous-heterogeneous reactions. The hybrid nanofluid consists of copper (Cu) and alumina (Al2O3) nanoparticles which are added into water to form Cu-Al2O3/water hybrid nanofluid. The similarity equations are obtained using a similarity transformation. Then, the function bvp4c in MATLAB is utilised to obtain the numerical results. The dual solutions are found for limited values of the stretching/shrinking parameter. Also, the turning point arises in the shrinking region (λ < 0). Besides, the presence of hybrid nanoparticles enhances the heat transfer rate, skin friction coefficient, and… More >

  • Open Access

    ARTICLE

    UFC-Net with Fully-Connected Layers and Hadamard Identity Skip Connection for Image Inpainting

    Chung-Il Kim1, Jehyeok Rew2, Yongjang Cho2, Eenjun Hwang2,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3447-3463, 2021, DOI:10.32604/cmc.2021.017633

    Abstract Image inpainting is an interesting technique in computer vision and artificial intelligence for plausibly filling in blank areas of an image by referring to their surrounding areas. Although its performance has been improved significantly using diverse convolutional neural network (CNN)-based models, these models have difficulty filling in some erased areas due to the kernel size of the CNN. If the kernel size is too narrow for the blank area, the models cannot consider the entire surrounding area, only partial areas or none at all. This issue leads to typical problems of inpainting, such as pixel reconstruction failure and unintended filling.… More >

  • Open Access

    ARTICLE

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620

    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a vital role in ensuring security,… More >

  • Open Access

    ARTICLE

    An Optimized SW/HW AVMF Design Based on High-Level Synthesis Flow for Color Images

    Turki M. Alanazi1, Ahmed Ben Atitallah1,2,*, Imen Abid2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2925-2943, 2021, DOI:10.32604/cmc.2021.017575

    Abstract In this paper, a software/hardware High-level Synthesis (HLS) design is proposed to compute the Adaptive Vector Median Filter (AVMF) in real-time. In fact, this filter is known by its excellent impulsive noise suppression and chromaticity conservation. The software (SW) study of this filter demonstrates that its implementation is too complex. The purpose of this work is to study the impact of using an HLS tool to design ideal floating-point and optimized fixed-point hardware (HW) architectures for the AVMF filter using square root function (ideal HW) and ROM memory (optimized HW), respectively, to select the best HLS architectures and to design… More >

  • Open Access

    ARTICLE

    Research on Face Anti-Spoofing Algorithm Based on Image Fusion

    Pingping Yu1, Jiayu Wang1, Ning Cao2,*, Heiner Dintera3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3861-3876, 2021, DOI:10.32604/cmc.2021.017527

    Abstract Along with the rapid development of biometric authentication technology, face recognition has been commercially used in many industries in recent years. However, it cannot be ignored that face recognition-based authentication techniques can be easily spoofed using various types of attacks such photographs, videos or forged 3D masks. In order to solve this problem, this work proposed a face anti-fraud algorithm based on the fusion of thermal infrared images and visible light images. The normal temperature distribution of the human face is stable and characteristic, and the important physiological information of the human body can be observed by the infrared thermal… More >

  • Open Access

    ARTICLE

    Assessing the Performance of Some Ranked Set Sampling Designs Using HybridApproach

    Mohamed. A. H. Sabry1,*, Ehab M. Almetwally2, Hisham M. Almongy3, Gamal M. Ibrahim4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3737-3753, 2021, DOI:10.32604/cmc.2021.017510

    Abstract In this paper, a joint analysis consisting of goodness-of-fit tests and Markov chain Monte Carlo simulations are used to assess the performance of some ranked set sampling designs. The Markov chain Monte Carlo simulations are conducted when Bayesian methods with Jeffery’s priors of the unknown parameters of Weibull distribution are used, while the goodness of fit analysis is conducted when the likelihood estimators are used and the corresponding empirical distributions are obtained. The ranked set sampling designs considered in this research are the usual ranked set sampling, extreme ranked set sampling, median ranked set sampling, and neoteric ranked set sampling… More >

Displaying 11611-11620 on page 1162 of 21887. Per Page