Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,749)
  • Open Access

    REVIEW

    Progress in Mechanical Modeling of Implantable Flexible Neural Probes

    Xiaoli You1,2,3,#, Ruiyu Bai1,2,3,4,#, Kai Xue1,2,3, Zimo Zhang1,2,3, Minghao Wang5, Xuanqi Wang1,2,3, Jiahao Wang1,2,3, Jinku Guo1,2, Qiang Shen3, Honglong Chang3, Xu Long6,*, Bowen Ji1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.049047

    Abstract Implanted neural probes can detect weak discharges of neurons in the brain by piercing soft brain tissue, thus as important tools for brain science research, as well as diagnosis and treatment of brain diseases. However, the rigid neural probes, such as Utah arrays, Michigan probes, and metal microfilament electrodes, are mechanically unmatched with brain tissue and are prone to rejection and glial scarring after implantation, which leads to a significant degradation in the signal quality with the implantation time. In recent years, flexible neural electrodes are rapidly developed with less damage to biological tissues, excellent biocompatibility, and mechanical compliance to… More >

  • Open Access

    ARTICLE

    Modeling the Interaction between Vacancies and Grain Boundaries during Ductile Fracture

    Mingjian Li, Ping Yang*, Pengyang Zhao

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.048334

    Abstract The experimental results in previous studies have indicated that during the ductile fracture of pure metals, vacancies aggregate and form voids at grain boundaries. However, the physical mechanism underlying this phenomenon remains not fully understood. This study derives the equilibrium distribution of vacancies analytically by following thermodynamics and the micromechanics of crystal defects. This derivation suggests that vacancies cluster in regions under hydrostatic compression to minimize the elastic strain energy. Subsequently, a finite element model is developed for examining more general scenarios of interaction between vacancies and grain boundaries. This model is first verified and validated through comparison with some… More >

  • Open Access

    ARTICLE

    Relational Turkish Text Classification Using Distant Supervised Entities and Relations

    Halil Ibrahim Okur1,2,*, Kadir Tohma1, Ahmet Sertbas2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.050585

    Abstract Text classification, by automatically categorizing texts, is one of the foundational elements of natural language processing applications. This study investigates how text classification performance can be improved through the integration of entity-relation information obtained from the Wikidata (Wikipedia database) database and BERT-based pre-trained Named Entity Recognition (NER) models. Focusing on a significant challenge in the field of natural language processing (NLP), the research evaluates the potential of using entity and relational information to extract deeper meaning from texts. The adopted methodology encompasses a comprehensive approach that includes text preprocessing, entity detection, and the integration of relational information. Experiments conducted on… More >

  • Open Access

    ARTICLE

    FL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption

    Hao Sun*, Xiubo Chen, Kaiguo Yuan

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.049159

    Abstract Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data. However, there is still a potential risk of privacy leakage, for example, attackers can obtain the original data through model inference attacks. Therefore, safeguarding the privacy of model parameters becomes crucial. One proposed solution involves incorporating homomorphic encryption algorithms into the federated learning process. However, the existing federated learning privacy protection scheme based on homomorphic encryption will greatly reduce the efficiency and robustness when there are performance differences between parties or abnormal nodes. To solve the above problems, this paper proposes a… More >

  • Open Access

    ARTICLE

    A Novel Scheduling Framework for Multi-Programming Quantum Computing in Cloud Environment

    Danyang Zheng, Jinchen Xv, Feng Yue, Qiming Du, Zhiheng Wang, Zheng Shan*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048956

    Abstract As cloud quantum computing gains broader acceptance, a growing quantity of researchers are directing their focus towards this domain. Nevertheless, the rapid surge in demand for cloud-based quantum computing resources has led to a scarcity, which in turn hampers users from achieving optimal satisfaction. Therefore, cloud quantum computing service providers require a unified analysis and scheduling framework for their quantum resources and user jobs to meet the ever-growing usage demands. This paper introduces a new multi-programming scheduling framework for quantum computing in a cloud environment. The framework addresses the issue of limited quantum computing resources in cloud environments and ensures… More >

  • Open Access

    ARTICLE

    Improved Particle Swarm Optimization for Parameter Identification of Permanent Magnet Synchronous Motor

    Shuai Zhou1, Dazhi Wang1,*, Yongliang Ni2, Keling Song2, Yanming Li2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048859

    Abstract In the process of identifying parameters for a permanent magnet synchronous motor, the particle swarm optimization method is prone to being stuck in local optima in the later stages of iteration, resulting in low parameter accuracy. This work proposes a fuzzy particle swarm optimization approach based on the transformation function and the filled function. This approach addresses the topic of particle swarm optimization in parameter identification from two perspectives. Firstly, the algorithm uses a transformation function to change the form of the fitness function without changing the position of the extreme point of the fitness function, making the extreme point… More >

  • Open Access

    ARTICLE

    Improving the Segmentation of Arabic Handwriting Using Ligature Detection Technique

    Husam Ahmad Al Hamad*, Mohammad Shehab*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048527

    Abstract Recognizing handwritten characters remains a critical and formidable challenge within the realm of computer vision. Although considerable strides have been made in enhancing English handwritten character recognition through various techniques, deciphering Arabic handwritten characters is particularly intricate. This complexity arises from the diverse array of writing styles among individuals, coupled with the various shapes that a single character can take when positioned differently within document images, rendering the task more perplexing. In this study, a novel segmentation method for Arabic handwritten scripts is suggested. This work aims to locate the local minima of the vertical and diagonal word image densities… More >

  • Open Access

    ARTICLE

    Customized Convolutional Neural Network for Accurate Detection of Deep Fake Images in Video Collections

    Dmitry Gura1,2, Bo Dong3,*, Duaa Mehiar4, Nidal Al Said5

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048238

    Abstract The motivation for this study is that the quality of deep fakes is constantly improving, which leads to the need to develop new methods for their detection. The proposed Customized Convolutional Neural Network method involves extracting structured data from video frames using facial landmark detection, which is then used as input to the CNN. The customized Convolutional Neural Network method is the date augmented-based CNN model to generate ‘fake data’ or ‘fake images’. This study was carried out using Python and its libraries. We used 242 films from the dataset gathered by the Deep Fake Detection Challenge, of which 199… More >

  • Open Access

    ARTICLE

    Enhancing Deep Learning Semantics: The Diffusion Sampling and Label-Driven Co-Attention Approach

    Chunhua Wang1,2, Wenqian Shang1,2,*, Tong Yi3,*, Haibin Zhu4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048135

    Abstract The advent of self-attention mechanisms within Transformer models has significantly propelled the advancement of deep learning algorithms, yielding outstanding achievements across diverse domains. Nonetheless, self-attention mechanisms falter when applied to datasets with intricate semantic content and extensive dependency structures. In response, this paper introduces a Diffusion Sampling and Label-Driven Co-attention Neural Network (DSLD), which adopts a diffusion sampling method to capture more comprehensive semantic information of the data. Additionally, the model leverages the joint correlation information of labels and data to introduce the computation of text representation, correcting semantic representation biases in the data, and increasing the accuracy of semantic… More >

  • Open Access

    ARTICLE

    A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction

    Jun Li1,2, Minqing Zhang1,2,*, Ke Niu1, Yingnan Zhang1, Xiaoyuan Yang1,2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048095

    Abstract Among steganalysis techniques, detection against MV (motion vector) domain-based video steganography in the HEVC (High Efficiency Video Coding) standard remains a challenging issue. For the purpose of improving the detection performance, this paper proposes a steganalysis method that can perfectly detect MV-based steganography in HEVC. Firstly, we define the local optimality of MVP (Motion Vector Prediction) based on the technology of AMVP (Advanced Motion Vector Prediction). Secondly, we analyze that in HEVC video, message embedding either using MVP index or MVD (Motion Vector Difference) may destroy the above optimality of MVP. And then, we define the optimal rate of MVP… More >

Displaying 11-20 on page 2 of 2749. Per Page