Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    MI-STEG: A Medical Image Steganalysis Framework Based on Ensemble Deep Learning

    Rukiye Karakis1,2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4649-4666, 2023, DOI:10.32604/cmc.2023.035881 - 28 December 2022

    Abstract Medical image steganography aims to increase data security by concealing patient-personal information as well as diagnostic and therapeutic data in the spatial or frequency domain of radiological images. On the other hand, the discipline of image steganalysis generally provides a classification based on whether an image has hidden data or not. Inspired by previous studies on image steganalysis, this study proposes a deep ensemble learning model for medical image steganalysis to detect malicious hidden data in medical images and develop medical image steganography methods aimed at securing personal information. With this purpose in mind, a… More >

  • Open Access

    ARTICLE

    A Defect Detection Method for the Primary Stage of Software Development

    Qiang Zhi1, Wanxu Pu1, Jianguo Ren1, Zhengshu Zhou2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5141-5155, 2023, DOI:10.32604/cmc.2023.035846 - 28 December 2022

    Abstract In the early stage of software development, a software requirements specification (SRS) is essential, and whether the requirements are clear and explicit is the key. However, due to various reasons, there may be a large number of misunderstandings. To generate high-quality software requirements specifications, numerous researchers have developed a variety of ways to improve the quality of SRS. In this paper, we propose a questions extraction method based on SRS elements decomposition, which evaluates the quality of SRS in the form of numerical indicators. The proposed method not only evaluates the quality of SRSs but… More >

  • Open Access

    ARTICLE

    Integrating WSN and Laser SLAM for Mobile Robot Indoor Localization

    Gengyu Ge1,2,*, Zhong Qin1, Xin Chen1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6351-6369, 2023, DOI:10.32604/cmc.2023.035832 - 28 December 2022

    Abstract Localization plays a vital role in the mobile robot navigation system and is a fundamental capability for the following path planning task. In an indoor environment where the global positioning system signal fails or becomes weak, the wireless sensor network (WSN) or simultaneous localization and mapping (SLAM) scheme gradually becomes a research hot spot. WSN method uses received signal strength indicator (RSSI) values to determine the position of the target signal node, however, the orientation of the target node is not clear. Besides, the distance error is large when the indoor signal receives interference. The… More >

  • Open Access

    ARTICLE

    A Processor Performance Prediction Method Based on Interpretable Hierarchical Belief Rule Base and Sensitivity Analysis

    Chen Wei-wei1, He Wei1,2,*, Zhu Hai-long1, Zhou Guo-hui1, Mu Quan-qi1, Han Peng1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6119-6143, 2023, DOI:10.32604/cmc.2023.035743 - 28 December 2022

    Abstract The prediction of processor performance has important reference significance for future processors. Both the accuracy and rationality of the prediction results are required. The hierarchical belief rule base (HBRB) can initially provide a solution to low prediction accuracy. However, the interpretability of the model and the traceability of the results still warrant further investigation. Therefore, a processor performance prediction method based on interpretable hierarchical belief rule base (HBRB-I) and global sensitivity analysis (GSA) is proposed. The method can yield more reliable prediction results. Evidence reasoning (ER) is firstly used to evaluate the historical data of More >

  • Open Access

    ARTICLE

    Compact 5G Vivaldi Tapered Slot Filtering Antenna with Enhanced Bandwidth

    Sahar Saleh1,2, Mohd Haizal Jamaluddin1,*, Bader Alali3,4, Ayman A. Althuwayb4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5983-5999, 2023, DOI:10.32604/cmc.2023.035585 - 28 December 2022

    Abstract Compact fifth-generation (5G) low-frequency band filtering antennas (filtennas) with stable directive radiation patterns, improved bandwidth (BW), and gain are designed, fabricated, and tested in this research. The proposed filtennas are achieved by combining the predesigned compact 5G (5.975 – 7.125 GHz) third-order uniform and non-uniform transmission line hairpin bandpass filters (UTL and NTL HPBFs) with the compact ultrawide band Vivaldi tapered slot antenna (UWB VTSA) in one module. The objective of this integration is to enhance the performance of 5.975 – 7.125 GHz filtennas which will be suitable for modern mobile communication applications by exploiting the benefits… More >

  • Open Access

    ARTICLE

    Improving Brain Tumor Classification with Deep Learning Using Synthetic Data

    Muhammed Mutlu Yapici1, Rukiye Karakis2,*, Kali Gurkahraman3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5049-5067, 2023, DOI:10.32604/cmc.2023.035584 - 28 December 2022

    Abstract Deep learning (DL) techniques, which do not need complex pre-processing and feature analysis, are used in many areas of medicine and achieve promising results. On the other hand, in medical studies, a limited dataset decreases the abstraction ability of the DL model. In this context, we aimed to produce synthetic brain images including three tumor types (glioma, meningioma, and pituitary), unlike traditional data augmentation methods, and classify them with DL. This study proposes a tumor classification model consisting of a Dense Convolutional Network (DenseNet121)-based DL model to prevent forgetting problems in deep networks and delay… More >

  • Open Access

    ARTICLE

    A Credit Card Fraud Model Prediction Method Based on Penalty Factor Optimization AWTadaboost

    Wang Ning1,*, Siliang Chen2,*, Fu Qiang2, Haitao Tang2, Shen Jie2

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5951-5965, 2023, DOI:10.32604/cmc.2023.035558 - 28 December 2022

    Abstract With the popularity of online payment, how to perform credit card fraud detection more accurately has also become a hot issue. And with the emergence of the adaptive boosting algorithm (Adaboost), credit card fraud detection has started to use this method in large numbers, but the traditional Adaboost is prone to overfitting in the presence of noisy samples. Therefore, in order to alleviate this phenomenon, this paper proposes a new idea: using the number of consecutive sample misclassifications to determine the noisy samples, while constructing a penalty factor to reconstruct the sample weight assignment. Firstly,… More >

  • Open Access

    ARTICLE

    Leveraging Transfer Learning for Spatio-Temporal Human Activity Recognition from Video Sequences

    Umair Muneer Butt1,2,*, Hadiqa Aman Ullah2, Sukumar Letchmunan1, Iqra Tariq2, Fadratul Hafinaz Hassan1, Tieng Wei Koh3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5017-5033, 2023, DOI:10.32604/cmc.2023.035512 - 28 December 2022

    Abstract Human Activity Recognition (HAR) is an active research area due to its applications in pervasive computing, human-computer interaction, artificial intelligence, health care, and social sciences. Moreover, dynamic environments and anthropometric differences between individuals make it harder to recognize actions. This study focused on human activity in video sequences acquired with an RGB camera because of its vast range of real-world applications. It uses two-stream ConvNet to extract spatial and temporal information and proposes a fine-tuned deep neural network. Moreover, the transfer learning paradigm is adopted to extract varied and fixed frames while reusing object identification… More >

  • Open Access

    ARTICLE

    Adaptive Resource Planning for AI Workloads with Variable Real-Time Tasks

    Sunhwa Annie Nam1, Kyungwoon Cho2, Hyokyung Bahn3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6823-6833, 2023, DOI:10.32604/cmc.2023.035481 - 28 December 2022

    Abstract AI (Artificial Intelligence) workloads are proliferating in modern real-time systems. As the tasks of AI workloads fluctuate over time, resource planning policies used for traditional fixed real-time tasks should be re-examined. In particular, it is difficult to immediately handle changes in real-time tasks without violating the deadline constraints. To cope with this situation, this paper analyzes the task situations of AI workloads and finds the following two observations. First, resource planning for AI workloads is a complicated search problem that requires much time for optimization. Second, although the task set of an AI workload may… More >

  • Open Access

    ARTICLE

    A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation

    Al-Hussien Seddik1, Mohammed Salah2, Gamal Behery2, Ahmed El-harby2, Ahmed Ismail Ebada2, Sokea Teng3, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5087-5103, 2023, DOI:10.32604/cmc.2023.035364 - 28 December 2022

    Abstract The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This system consists of two components. The first component contains two processes, encryption process,… More >

Displaying 10821-10830 on page 1083 of 31561. Per Page