Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,721)
  • Open Access

    EDITORIAL

    Health Systems Strengthening to Tackle the Global Burden of Pediatric and Congenital Heart Disease: A Diagonal Approach

    Dominique Vervoort1,2,3,*, Amy Verstappen3, Sreehari Madhavankutty Nair4, Chong Chin Eu5, Bistra Zheleva3,6

    Congenital Heart Disease, Vol., , DOI:10.32604/chd.2024.049814

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Numerical Simulation of Wet Particles Motion in a Vertical Powder Dryer

    Long Yu, Dongdong Pang*, Minmin She, Hongwei Qiu, Ping Cao, Xiongwei You

    FDMP-Fluid Dynamics & Materials Processing, Vol., , DOI:10.32604/fdmp.2024.048093

    Abstract In this study, the motion of wet particles in the drying unit of a vertical powder dryer is investigated by using a Discrete element method (DEM) coupled with a liquid bridge force. In particular, by varying parameters such as the particle mass flow rates, the superficial gas velocities, and superficial gas temperatures, the influence of the moisture content on the flow behavior is examined. The results show that when the moisture content increases, the mean particle velocity decreases while the bed mean solid “holdup” and the mean residence time (MRT) of particles grow. It is also found that the local… More >

  • Open Access

    ARTICLE

    Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure

    Aodi Liu, Na Wang*, Xuehui Du, Dibin Shan, Xiangyu Wu, Wenjuan Wang

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.049011

    Abstract Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access control mechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy management efficiency and difficulty in accurately describing the access control policy. To overcome these problems, this paper proposes a big data access control mechanism based on a two-layer permission decision structure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes are introduced in the ABAC model as business constraints between entities. The proposed mechanism implements a two-layer permission decision structure composed of the inherent attributes of… More >

  • Open Access

    ARTICLE

    Automatic Road Tunnel Crack Inspection Based on Crack Area Sensing and Multiscale Semantic Segmentation

    Dingping Chen1, Zhiheng Zhu2, Jinyang Fu1,3, Jilin He1,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.049048

    Abstract The detection of crack defects on the walls of road tunnels is a crucial step in the process of ensuring travel safety and performing routine tunnel maintenance. The automatic and accurate detection of cracks on the surface of road tunnels is the key to improving the maintenance efficiency of road tunnels. Machine vision technology combined with a deep neural network model is an effective means to realize the localization and identification of crack defects on the surface of road tunnels. We propose a complete set of automatic inspection methods for identifying cracks on the walls of road tunnels as a… More >

  • Open Access

    ARTICLE

    A Novel Foreign Object Detection Method in Transmission Lines Based on Improved YOLOv8n

    Yakui Liu1,2,3,*, Xing Jiang1, Ruikang Xu1, Yihao Cui1, Chenhui Yu1, Jingqi Yang1, Jishuai Zhou1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048864

    Abstract The rapid pace of urban development has resulted in the widespread presence of construction equipment and increasingly complex conditions in transmission corridors. These conditions pose a serious threat to the safe operation of the power grid. Machine vision technology, particularly object recognition technology, has been widely employed to identify foreign objects in transmission line images. Despite its wide application, the technique faces limitations due to the complex environmental background and other auxiliary factors. To address these challenges, this study introduces an improved YOLOv8n. The traditional stepwise convolution and pooling layers are replaced with a spatial-depth convolution (SPD-Conv) module, aiming to… More >

  • Open Access

    ARTICLE

    Expression Recognition Method Based on Convolutional Neural Network and Capsule Neural Network

    Zhanfeng Wang1, Lisha Yao2,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048304

    Abstract Convolutional neural networks struggle to accurately handle changes in angles and twists in the direction of images, which affects their ability to recognize patterns based on internal feature levels. In contrast, CapsNet overcomes these limitations by vectorizing information through increased directionality and magnitude, ensuring that spatial information is not overlooked. Therefore, this study proposes a novel expression recognition technique called CAPSULE-VGG, which combines the strengths of CapsNet and convolutional neural networks. By refining and integrating features extracted by a convolutional neural network before introducing them into CapsNet, our model enhances facial recognition capabilities. Compared to traditional neural network models, our… More >

  • Open Access

    ARTICLE

    A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies

    Maria Gul1, Imran Ali Khan1, Gohar Zaman2, Atta Rahman3,*, Jamaluddin Mir2, Sardar Asad Ali Biabani4,5, May Issa Aldossary6, Mustafa Youldash7, Ashraf Saadeldeen8, Maqsood Mahmud9, Asiya Abdus Salam6, Dania Alkhulaifi3, Abdullah AlTurkey3

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048289

    Abstract Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, many researchers proposed game theoretic models to avoid and remove obstacles for crowd evacuation. Game theoretical models aim to study and analyze the strategic behaviors of individuals within a crowd and their interactions during the evacuation. Game theoretical models have some limitations in the context of crowd evacuation. These models consider a group of individuals as homogeneous objects with the same goals, involve complex mathematical formulation, and cannot model real-world scenarios such as panic, environmental information, crowds that move dynamically, etc. The proposed work presents… More >

  • Open Access

    ARTICLE

    Leveraging User-Generated Comments and Fused BiLSTM Models to Detect and Predict Issues with Mobile Apps

    Wael M. S. Yafooz*, Abdullah Alsaeedi

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048270

    Abstract In the last decade, technical advancements and faster Internet speeds have also led to an increasing number of mobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobile apps. The use of these apps eases our daily lives, and all customers who need any type of service can access it easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digital services to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services, particularly during two large occasions, Umrah and Hajj. However, pilgrims… More >

  • Open Access

    ARTICLE

    Braille Character Segmentation Algorithm Based on Gaussian Diffusion

    Zezheng Meng, Zefeng Cai, Jie Feng*, Hanjie Ma, Haixiang Zhang, Shaohua Li

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048002

    Abstract Optical braille recognition methods typically employ existing target detection models or segmentation models for the direct detection and recognition of braille characters in original braille images. However, these methods need improvement in accuracy and generalizability, especially in densely dotted braille image environments. This paper presents a two-stage braille recognition framework. The first stage is a braille dot detection algorithm based on Gaussian diffusion, targeting Gaussian heatmaps generated by the convex dots in braille images. This is applied to the detection of convex dots in double-sided braille, achieving high accuracy in determining the central coordinates of the braille convex dots. The… More >

  • Open Access

    ARTICLE

    Automated Algorithms for Detecting and Classifying X-Ray Images of Spine Fractures

    Fayez Alfayez*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.046443

    Abstract This paper emphasizes a faster digital processing time while presenting an accurate method for identifying spine fractures in X-ray pictures. The study focuses on efficiency by utilizing many methods that include picture segmentation, feature reduction, and image classification. Two important elements are investigated to reduce the classification time: Using feature reduction software and leveraging the capabilities of sophisticated digital processing hardware. The researchers use different algorithms for picture enhancement, including the Wiener and Kalman filters, and they look into two background correction techniques. The article presents a technique for extracting textural features and evaluates three picture segmentation algorithms and three… More >

Displaying 41-50 on page 5 of 2721. Per Page