Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Recognition of Offline Handwritten Arabic Words Using a Few Structural Features

    Abderrahmane Saidi*, Abdelmouneim Moulay Lakhdar, Mohammed Beladgham

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2875-2889, 2021, DOI:10.32604/cmc.2021.013744

    Abstract Handwriting recognition is one of the most significant problems in pattern recognition, many studies have been proposed to improve this recognition of handwritten text for different languages. Yet, Fewer studies have been done for the Arabic language and the processing of its texts remains a particularly distinctive problem due to the variability of writing styles and the nature of Arabic scripts compared to other scripts. The present paper suggests a feature extraction technique for offline Arabic handwriting recognition. A handwriting recognition system for Arabic words using a few important structural features and based on a Radial Basis Function (RBF) neural… More >

  • Open Access

    ARTICLE

    Fuzzy Based Adaptive Deblocking Filters at Low-Bitrate HEVC Videos for Communication Networks

    Anudeep Gandam1,*, Jagroop Singh Sidhu2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3045-3063, 2021, DOI:10.32604/cmc.2021.013663

    Abstract In-loop filtering significantly helps detect and remove blocking artifacts across block boundaries in low bitrate coded High Efficiency Video Coding (HEVC) frames and improves its subjective visual quality in multimedia services over communication networks. However, on faster processing of the complex videos at a low bitrate, some visible artifacts considerably degrade the picture quality. In this paper, we proposed a four-step fuzzy based adaptive deblocking filter selection technique. The proposed method removes the quantization noise, blocking artifacts and corner outliers efficiently for HEVC coded videos even at low bit-rate. We have considered Y (luma), U (chroma-blue), and V (chroma-red) components… More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Software Security Tactics: A Design Perspective

    Mamdouh Alenezi1, Abhishek Kumar Pandey2, Richa Verma3, Mohd Faizan2, Shalini Chandra3, Alka Agrawal2, Rajeev Kumar2,4,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2283-2299, 2021, DOI:10.32604/cmc.2021.013579

    Abstract Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP) and fuzzy technique for order… More >

  • Open Access

    ARTICLE

    Statistical Inference of Chen Distribution Based on Two Progressive Type-II Censoring Schemes

    Hassan M. Aljohani*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2797-2814, 2021, DOI:10.32604/cmc.2021.013489

    Abstract An inverse problem in practical scientific investigations is the process of computing unknown parameters from a set of observations where the observations are only recorded indirectly, such as monitoring and controlling quality in industrial process control. Linear regression can be thought of as linear inverse problems. In other words, the procedure of unknown estimation parameters can be expressed as an inverse problem. However, maximum likelihood provides an unstable solution, and the problem becomes more complicated if unknown parameters are estimated from different samples. Hence, researchers search for better estimates. We study two joint censoring schemes for lifetime products in industrial… More >

  • Open Access

    ARTICLE

    An Efficient Viewport-Dependent 360 VR System Based on Adaptive Tiled Streaming

    Tuan Thanh Le1, Jong-Beom Jeong2, SangSoon Lee1, Jaehyoun Kim2, Eun-Seok Ryu2,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2627-2643, 2021, DOI:10.32604/cmc.2021.013399

    Abstract Recent advances in 360 video streaming technologies have enhanced the immersive experience of video streaming services. Particularly, there is immense potential for the application of 360 video encoding formats to achieve highly immersive virtual reality (VR) systems. However, 360 video streaming requires considerable bandwidth, and its performance depends on several factors. Consequently, the optimization of 360 video bitstreams according to viewport texture is crucial. Therefore, we propose an adaptive solution for VR systems using viewport-dependent tiled 360 video streaming. To increase the degrees of freedom of users, the moving picture experts group (MPEG) recently defined three degrees plus of freedom… More >

  • Open Access

    ARTICLE

    Synchronization Phenomena Investigation of a New Nonlinear Dynamical System 4D by Gardano’s and Lyapunov’s Methods

    Abdulsattar Abdullah Hamad1, Ahmed S. Al-Obeidi2, Enas H. Al-Taiy2, Osamah Ibrahim Khalaf3, Dac-Nhuong Le4,5,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3311-3327, 2021, DOI:10.32604/cmc.2021.013395

    Abstract Synchronization is one of the most important characteristics of dynamic systems. For this paper, the authors obtained results for the nonlinear systems controller for the custom Synchronization of two 4D systems. The findings have allowed authors to develop two analytical approaches using the second Lyapunov (Lyp) method and the Gardano method. Since the Gardano method does not involve the development of special positive Lyp functions, it is very efficient and convenient to achieve excessive system SYCR phenomena. Error is overcome by using Gardano and overcoming some problems in Lyp. Thus we get a great investigation into the convergence of error… More >

  • Open Access

    ARTICLE

    Trade-Off between Efficiency and Effectiveness: A Late Fusion Multi-View Clustering Algorithm

    Yunping Zhao1, Weixuan Liang1, Jianzhuang Lu1,*, Xiaowen Chen1, Nijiwa Kong2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2709-2722, 2021, DOI:10.32604/cmc.2021.013389

    Abstract Late fusion multi-view clustering (LFMVC) algorithms aim to integrate the base partition of each single view into a consensus partition. Base partitions can be obtained by performing kernel k-means clustering on all views. This type of method is not only computationally efficient, but also more accurate than multiple kernel k-means, and is thus widely used in the multi-view clustering context. LFMVC improves computational efficiency to the extent that the computational complexity of each iteration is reduced from O(n3) to O(n) (where n is the number of samples). However, LFMVC also limits the search space of the optimal solution, meaning that… More >

  • Open Access

    ARTICLE

    Multi-Level Fusion in Ultrasound for Cancer Detection Based on Uniform LBP Features

    Diyar Qader Zeebaree1, Adnan Mohsin Abdulazeez2, Dilovan Asaad Zebari3,*, Habibollah Haron4, Haza Nuzly Abdull Hamed4

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3363-3382, 2021, DOI:10.32604/cmc.2021.013314

    Abstract Collective improvement in the acceptable or desirable accuracy level of breast cancer image-related pattern recognition using various schemes remains challenging. Despite the combination of multiple schemes to achieve superior ultrasound image pattern recognition by reducing the speckle noise, an enhanced technique is not achieved. The purpose of this study is to introduce a features-based fusion scheme based on enhancement uniform-Local Binary Pattern (LBP) and filtered noise reduction. To surmount the above limitations and achieve the aim of the study, a new descriptor that enhances the LBP features based on the new threshold has been proposed. This paper proposes a multi-level… More >

  • Open Access

    ARTICLE

    A Holistic, Proactive and Novel Approach for Pre, During and Post Migration Validation from Subversion to Git

    Vinay Singh1, Mohammed Alshehri2,*, Alok Aggarwal3, Osama Alfarraj4, Purushottam Sharma5, K. R. Pardasani6

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2359-2371, 2021, DOI:10.32604/cmc.2021.013272

    Abstract Software development is getting a transition from centralized version control systems (CVCSs) like Subversion to decentralized version control systems (DVCDs) like Git due to lesser efficiency of former in terms of branching, fusion, time, space, merging, offline commits & builds and repository, etc. Git is having a share of 77% of total VCS, followed by Subversion with a share of 13.5%. The majority of software industries are getting a migration from Subversion to Git. Only a few migration tools are available in the software industry. Still, these too lack in many features like lack of identifying the empty directories as… More >

  • Open Access

    ARTICLE

    Artificial Neural Networks for Prediction of COVID-19 in Saudi Arabia

    Nawaf N. Hamadneh1, Waqar A. Khan2, Waqar Ashraf3, Samer H. Atawneh4, Ilyas Khan5,*, Bandar N. Hamadneh6

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2787-2796, 2021, DOI:10.32604/cmc.2021.013228

    Abstract In this study, we have proposed an artificial neural network (ANN) model to estimate and forecast the number of confirmed and recovered cases of COVID-19 in the upcoming days until September 17, 2020. The proposed model is based on the existing data (training data) published in the Saudi Arabia Coronavirus disease (COVID-19) situation—Demographics. The Prey-Predator algorithm is employed for the training. Multilayer perceptron neural network (MLPNN) is used in this study. To improve the performance of MLPNN, we determined the parameters of MLPNN using the prey-predator algorithm (PPA). The proposed model is called the MLPNN–PPA. The performance of the proposed… More >

Displaying 13091-13100 on page 1310 of 22098. Per Page