Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,887)
  • Open Access

    ARTICLE

    A Novel Hybrid Tag Identification Protocol for Large-Scale RFID Systems

    Ye Mu1,2,3,4, Ruiwen Ni1, Yuheng Sun1, Tong Zhang1, Ji Li1, Tianli Hu1,2,3,4, He Gong1,2,3,4, Shijun Li1,2,3,4,*, Thobela Louis Tyasi5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2515-2527, 2021, DOI:10.32604/cmc.2021.016570

    Abstract

    Radio frequency identification technology is one of the main technologies of Internet of Things (IoT). Through the transmission and reflection of wireless radio frequency signals, non-contact identification is realized, and multiple objects identification can be realized. However, when multiple tags communicate with a singleton reader simultaneously, collision will occur between the signals, which hinders the successful transmissions. To effectively avoid the tag collision problem and improve the reading performance of RFID systems, two advanced tag identification algorithms namely Adaptive M-ary tree slotted Aloha (AMTS) based on the characteristics of Aloha-based and Query tree-based algorithms are proposed. In AMTS, the reader… More >

  • Open Access

    ARTICLE

    Power Allocation Strategy for Secret Key Generation Method in Wireless Communications

    Bin Zhang1, Muhammad Waqas2,3, Shanshan Tu2,*, Syed Mudassir Hussain4, Sadaqat Ur Rehman5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2179-2188, 2021, DOI:10.32604/cmc.2021.016553

    Abstract Secret key generation (SKG) is an emerging technology to secure wireless communication from attackers. Therefore, the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’ uncertainty. However, the physical layer secret key generation (PHY-SKG) depends on two fundamental parameters, i.e., coherence time and power allocation. The coherence time for PHY-SKG is not applicable to secure wireless channels. This is because coherence time is for a certain period of time. Thus, legitimate users generate the secret keys (SKs) with a shorter key length in size. Hence, an attacker can quickly get information about… More >

  • Open Access

    ARTICLE

    HLR-Net: A Hybrid Lip-Reading Model Based on Deep Convolutional Neural Networks

    Amany M. Sarhan1, Nada M. Elshennawy1, Dina M. Ibrahim1,2,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1531-1549, 2021, DOI:10.32604/cmc.2021.016509

    Abstract

    Lip reading is typically regarded as visually interpreting the speaker’s lip movements during the speaking. This is a task of decoding the text from the speaker’s mouth movement. This paper proposes a lip-reading model that helps deaf people and persons with hearing problems to understand a speaker by capturing a video of the speaker and inputting it into the proposed model to obtain the corresponding subtitles. Using deep learning technologies makes it easier for users to extract a large number of different features, which can then be converted to probabilities of letters to obtain accurate results. Recently proposed methods for… More >

  • Open Access

    ARTICLE

    Face Recognition Based on Gabor Feature Extraction Followed by FastICA and LDA

    Masoud Muhammed Hassan1,*, Haval Ismael Hussein1, Adel Sabry Eesa1, Ramadhan J. Mstafa1,2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1637-1659, 2021, DOI:10.32604/cmc.2021.016467

    Abstract Over the past few decades, face recognition has become the most effective biometric technique in recognizing people’s identity, as it is widely used in many areas of our daily lives. However, it is a challenging technique since facial images vary in rotations, expressions, and illuminations. To minimize the impact of these challenges, exploiting information from various feature extraction methods is recommended since one of the most critical tasks in face recognition system is the extraction of facial features. Therefore, this paper presents a new approach to face recognition based on the fusion of Gabor-based feature extraction, Fast Independent Component Analysis… More >

  • Open Access

    ARTICLE

    A New Segmentation Framework for Arabic Handwritten Text Using Machine Learning Techniques

    Saleem Ibraheem Saleem1,*, Adnan Mohsin Abdulazeez1, Zeynep Orman2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2727-2754, 2021, DOI:10.32604/cmc.2021.016447

    Abstract The writer identification (WI) of handwritten Arabic text is now of great concern to intelligence agencies following the recent attacks perpetrated by known Middle East terrorist organizations. It is also a useful instrument for the digitalization and attribution of old text to other authors of historic studies, including old national and religious archives. In this study, we proposed a new affective segmentation model by modifying an artificial neural network model and making it suitable for the binarization stage based on blocks. This modified method is combined with a new effective rotation model to achieve an accurate segmentation through the analysis… More >

  • Open Access

    ARTICLE

    Transmission Control under Multi-Service Disciplines in Wireless Sensor Networks

    Cheng Gong1, Dingbang Xie2, Chao Guo2,*, Sonia Kherbachi3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2127-2143, 2021, DOI:10.32604/cmc.2021.016436

    Abstract The wireless sensor network (WSN), as the terminal data acquisition system of the 5G network, has attracted attention due to advantages such as low cost and easy deployment. Its development is mainly restricted by energy. The traditional transmission control scheme is not suitable for WSNs due to the significant information interaction. A switchable transmission control scheme for WSNs based on a queuing game (SQGTC) is proposed to improve network performance. Considering that sensor nodes compete for the resources of sink nodes to realize data transmission, the competitive relationship between nodes is described from the perspective of a game. Different types… More >

  • Open Access

    ARTICLE

    Game-Oriented Security Strategy Against Hotspot Attacks for Internet of Vehicles

    Juan Guo1, Yanzhu Liu2,*, Shan Li3, Zhi Li4, Sonia Kherbachi5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2145-2157, 2021, DOI:10.32604/cmc.2021.016411

    Abstract With the rapid development of mobile communication technology, the application of internet of vehicles (IoV) services, such as for information services, driving safety, and traffic efficiency, is growing constantly. For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing, encryption and decision-making can be completed at the local end, thus providing real-time and highly reliable communication capability. The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication channel for vehicles and server… More >

  • Open Access

    ARTICLE

    Energy-Efficient Routing Algorithm Based on Multipath Routing in Large-Scale Networks

    Haijun Geng1, Qidong Zhang1, Jiangyuan Yao2,*, Wei Wang1, Zikun Jin1, Han Zhang3, Yangyang Zhang4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2029-2039, 2021, DOI:10.32604/cmc.2021.016368

    Abstract A reduction in network energy consumption and the establishment of green networks have become key scientific problems in academic and industrial research. Existing energy efficiency schemes are based on a known traffic matrix, and acquiring a real-time traffic matrix in current complex networks is difficult. Therefore, this research investigates how to reduce network energy consumption without a real-time traffic matrix. In particular, this paper proposes an intra-domain energy-efficient routing scheme based on multipath routing. It analyzes the relationship between routing availability and energy-efficient routing and integrates the two mechanisms to satisfy the requirements of availability and energy efficiency. The main… More >

  • Open Access

    ARTICLE

    Multi Sensor-Based Implicit User Identification

    Muhammad Ahmad1,*, Rana Aamir Raza2, Manuel Mazzara3, Salvatore Distefano4, Ali Kashif Bashir5, Adil Khan3, Muhammad Shahzad Sarfraz1, Muhammad Umar Aftab1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1673-1692, 2021, DOI:10.32604/cmc.2021.016232

    Abstract Smartphones have ubiquitously integrated into our home and work environments, however, users normally rely on explicit but inefficient identification processes in a controlled environment. Therefore, when a device is stolen, a thief can have access to the owner’s personal information and services against the stored passwords. As a result of this potential scenario, this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors. A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features, then further optimized… More >

  • Open Access

    ARTICLE

    Ensembling Neural Networks for User’s Indoor Localization Using Magnetic Field Data from Smartphones

    Imran Ashraf, Soojung Hur, Yousaf Bin Zikria, Yongwan Park*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2597-2620, 2021, DOI:10.32604/cmc.2021.016214

    Abstract Predominantly the localization accuracy of the magnetic field-based localization approaches is severed by two limiting factors: Smartphone heterogeneity and smaller data lengths. The use of multifarious smartphones cripples the performance of such approaches owing to the variability of the magnetic field data. In the same vein, smaller lengths of magnetic field data decrease the localization accuracy substantially. The current study proposes the use of multiple neural networks like deep neural network (DNN), long short term memory network (LSTM), and gated recurrent unit network (GRN) to perform indoor localization based on the embedded magnetic sensor of the smartphone. A voting scheme… More >

Displaying 11881-11890 on page 1189 of 21887. Per Page