Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,765)
  • Open Access

    ARTICLE

    A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts

    Xiaohui Yang, Kun Zhang*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.047660

    Abstract Data is regarded as a valuable asset, and sharing data is a prerequisite for fully exploiting the value of data. However, the current medical data sharing scheme lacks a fair incentive mechanism, and the authenticity of data cannot be guaranteed, resulting in low enthusiasm of participants. A fair and trusted medical data trading scheme based on smart contracts is proposed, which aims to encourage participants to be honest and improve their enthusiasm for participation. The scheme uses zero-knowledge range proof for trusted verification, verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,… More >

  • Open Access

    ARTICLE

    A Normalizing Flow-Based Bidirectional Mapping Residual Network for Unsupervised Defect Detection

    Lanyao Zhang1, Shichao Kan2, Yigang Cen3, Xiaoling Chen1, Linna Zhang1,*, Yansen Huang4,5

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.046924

    Abstract Unsupervised methods based on density representation have shown their abilities in anomaly detection, but detection performance still needs to be improved. Specifically, approaches using normalizing flows can accurately evaluate sample distributions, mapping normal features to the normal distribution and anomalous features outside it. Consequently, this paper proposes a Normalizing Flow-based Bidirectional Mapping Residual Network (NF-BMR). It utilizes pre-trained Convolutional Neural Networks (CNN) and normalizing flows to construct discriminative source and target domain feature spaces. Additionally, to better learn feature information in both domain spaces, we propose the Bidirectional Mapping Residual Network (BMR), which maps sample features to these two spaces… More > Graphic Abstract

    A Normalizing Flow-Based Bidirectional Mapping Residual Network for Unsupervised Defect Detection

  • Open Access

    ARTICLE

    Multilevel Attention Unet Segmentation Algorithm for Lung Cancer Based on CT Images

    Huan Wang1, Shi Qiu1,2,*, Benyue Zhang1, Lixuan Xiao3

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046821

    Abstract Lung cancer is a malady of the lungs that gravely jeopardizes human health. Therefore, early detection and treatment are paramount for the preservation of human life. Lung computed tomography (CT) image sequences can explicitly delineate the pathological condition of the lungs. To meet the imperative for accurate diagnosis by physicians, expeditious segmentation of the region harboring lung cancer is of utmost significance. We utilize computer-aided methods to emulate the diagnostic process in which physicians concentrate on lung cancer in a sequential manner, erect an interpretable model, and attain segmentation of lung cancer. The specific advancements can be encapsulated as follows:… More >

  • Open Access

    ARTICLE

    An Energy Trading Method Based on Alliance Blockchain and Multi-Signature

    Hongliang Tian, Jiaming Wang*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046698

    Abstract Blockchain, known for its secure encrypted ledger, has garnered attention in financial and data transfer realms, including the field of energy trading. However, the decentralized nature and identity anonymity of user nodes raise uncertainties in energy transactions. The broadcast consensus authentication slows transaction speeds, and frequent single-point transactions in multi-node settings pose key exposure risks without protective measures during user signing. To address these, an alliance blockchain scheme is proposed, reducing the resource-intensive identity verification among nodes. It integrates multi-signature functionality to fortify user resources and transaction security. A novel multi-signature process within this framework involves neutral nodes established through… More >

  • Open Access

    ARTICLE

    Defect Detection Model Using Time Series Data Augmentation and Transformation

    Gyu-Il Kim1, Hyun Yoo2, Han-Jin Cho3, Kyungyong Chung4,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046324

    Abstract Time-series data provide important information in many fields, and their processing and analysis have been the focus of much research. However, detecting anomalies is very difficult due to data imbalance, temporal dependence, and noise. Therefore, methodologies for data augmentation and conversion of time series data into images for analysis have been studied. This paper proposes a fault detection model that uses time series data augmentation and transformation to address the problems of data imbalance, temporal dependence, and robustness to noise. The method of data augmentation is set as the addition of noise. It involves adding Gaussian noise, with the noise… More >

  • Open Access

    ARTICLE

    Improving Video Watermarking through Galois Field GF(24) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques

    Yasmin Alaa Hassan1,*, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046149

    Abstract Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity. This study delves into the integration of Galois Field (GF) multiplication tables, especially GF(24), and their interaction with distinct irreducible polynomials. The primary aim is to enhance watermarking techniques for achieving imperceptibility, robustness, and efficient execution time. The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process. Scene selection is used strategically to embed watermarks in the most vital frames of the video, while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria, maintaining the video’s visual quality.… More >

  • Open Access

    ARTICLE

    Deep Learning Approach for Hand Gesture Recognition: Applications in Deaf Communication and Healthcare

    Khursheed Aurangzeb1, Khalid Javeed2, Musaed Alhussein1, Imad Rida3, Syed Irtaza Haider1, Anubha Parashar4,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042886

    Abstract Hand gestures have been used as a significant mode of communication since the advent of human civilization. By facilitating human-computer interaction (HCI), hand gesture recognition (HGRoc) technology is crucial for seamless and error-free HCI. HGRoc technology is pivotal in healthcare and communication for the deaf community. Despite significant advancements in computer vision-based gesture recognition for language understanding, two considerable challenges persist in this field: (a) limited and common gestures are considered, (b) processing multiple channels of information across a network takes huge computational time during discriminative feature extraction. Therefore, a novel hand vision-based convolutional neural network (CNN) model named (HVCNNM)… More >

  • Open Access

    ARTICLE

    Design of a Lightweight Compressed Video Stream-Based Patient Activity Monitoring System

    Sangeeta Yadav1, Preeti Gulia1,*, Nasib Singh Gill1,*, Piyush Kumar Shukla2, Arfat Ahmad Khan3, Sultan Alharby4, Ahmed Alhussen4, Mohd Anul Haq5

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042869

    Abstract Inpatient falls from beds in hospitals are a common problem. Such falls may result in severe injuries. This problem can be addressed by continuous monitoring of patients using cameras. Recent advancements in deep learning-based video analytics have made this task of fall detection more effective and efficient. Along with fall detection, monitoring of different activities of the patients is also of significant concern to assess the improvement in their health. High computation-intensive models are required to monitor every action of the patient precisely. This requirement limits the applicability of such networks. Hence, to keep the model lightweight, the already designed… More >

  • Open Access

    ARTICLE

    Letter Recognition Reinvented: A Dual Approach with MLP Neural Network and Anomaly Detection

    Nesreen M. Alharbi*, Ahmed Hamza Osman, Arwa A. Mashat, Hasan J. Alyamani

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.041044

    Abstract Recent years have witnessed significant advancements in the field of character recognition, thanks to the revolutionary introduction of machine learning techniques. Among various types of character recognition, offline Handwritten Character Recognition (HCR) is comparatively more challenging as it lacks temporal information, such as stroke count and direction, ink pressure, and unexpected handwriting variability. These issues contribute to a poor level of precision, which calls for the adoption of anomaly detection techniques to enhance Optical Character Recognition (OCR) schemes. Previous studies have not researched unsupervised anomaly detection using MLP for handwriting recognition. Therefore, this study proposes a novel approach for enhanced… More >

  • Open Access

    ARTICLE

    Efficient DP-FL: Efficient Differential Privacy Federated Learning Based on Early Stopping Mechanism

    Sanxiu Jiao1, Lecai Cai2,*, Jintao Meng3, Yue Zhao3, Kui Cheng2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.040194

    Abstract Federated learning is a distributed machine learning framework that solves data security and data island problems faced by artificial intelligence. However, federated learning frameworks are not always secure, and attackers can attack customer privacy information by analyzing parameters in the training process of federated learning models. To solve the problems of data security and availability during federated learning training, this paper proposes an Efficient Differential Privacy Federated Learning Algorithm based on early stopping mechanism (Efficient DP-FL). This method inherits the advantages of differential privacy and federated learning and improves the performance of model training while protecting the parameter information uploaded… More >

Displaying 711-720 on page 72 of 2765. Per Page