Home / Journals / CMC / Vol.80, No.2, 2024
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Microstructure and Hot Tearing Sensitivity Simulation and Parameters Optimization for the Centrifugal Casting of Al-Cu Alloy

    Xueli He1,, Shengkun Lv1,, Ruifeng Dou1,*, Yanying Zhang1, Junsheng Wang2, Xunliang Liu1, Zhi Wen1
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2873-2895, 2024, DOI:10.32604/cmc.2024.052571 - 15 August 2024
    (This article belongs to the Special Issue: Advanced Computer Technology for Materials Characterization, Properties Prediction, Design and Discovery)
    Abstract Four typical theories on the formation of thermal tears: strength, liquid film, intergranular bridging, and solidification shrinkage compensation theories. From these theories, a number of criteria have been derived for predicting the formation of thermal cracks, such as the stress-based Niyama, Clyne, and RDG (Rapaz-Dreiser-Grimaud) criteria. In this paper, a mathematical model of horizontal centrifugal casting was established, and numerical simulation analysis was conducted for the centrifugal casting process of cylindrical Al-Cu alloy castings to investigate the effect of the centrifugal casting process conditions on the microstructure and hot tearing sensitivity of alloy castings by… More >

  • Open AccessOpen Access

    ARTICLE

    Privacy-Preserving Healthcare and Medical Data Collaboration Service System Based on Blockchain and Federated Learning

    Fang Hu1, Siyi Qiu2, Xiaolian Yang1, Chaolei Wu1, Miguel Baptista Nunes3, Hui Chen4,*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2897-2915, 2024, DOI:10.32604/cmc.2024.052570 - 15 August 2024
    (This article belongs to the Special Issue: Trustworthy Wireless Computing Power Networks Assisted by Blockchain)
    Abstract As the volume of healthcare and medical data increases from diverse sources, real-world scenarios involving data sharing and collaboration have certain challenges, including the risk of privacy leakage, difficulty in data fusion, low reliability of data storage, low effectiveness of data sharing, etc. To guarantee the service quality of data collaboration, this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning, termed FL-HMChain. This system is composed of three layers: Data extraction and storage, data management, and data application. Focusing on healthcare and medical data, a healthcare and… More >

  • Open AccessOpen Access

    ARTICLE

    Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection

    Islam Zada1,*, Mohammed Naif Alatawi2, Syed Muhammad Saqlain1, Abdullah Alshahrani3, Adel Alshamran4, Kanwal Imran5, Hessa Alfraihi6
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2917-2939, 2024, DOI:10.32604/cmc.2024.052835 - 15 August 2024
    (This article belongs to the Special Issue: Requirements Engineering: Bridging Theory, Research and Practice)
    Abstract Malware attacks on Windows machines pose significant cybersecurity threats, necessitating effective detection and prevention mechanisms. Supervised machine learning classifiers have emerged as promising tools for malware detection. However, there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection. Addressing this gap can provide valuable insights for enhancing cybersecurity strategies. While numerous studies have explored malware detection using machine learning techniques, there is a lack of systematic comparison of supervised classifiers for Windows malware detection. Understanding the relative effectiveness of these classifiers can inform the selection of… More >

  • Open AccessOpen Access

    ARTICLE

    Resilience Augmentation in Unmanned Weapon Systems via Multi-Layer Attention Graph Convolutional Neural Networks

    Kexin Wang*, Yingdong Gou, Dingrui Xue*, Jiancheng Liu, Wanlong Qi, Gang Hou, Bo Li
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2941-2962, 2024, DOI:10.32604/cmc.2024.052893 - 15 August 2024
    (This article belongs to the Special Issue: Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems)
    Abstract The collective Unmanned Weapon System-of-Systems (UWSOS) network represents a fundamental element in modern warfare, characterized by a diverse array of unmanned combat platforms interconnected through heterogeneous network architectures. Despite its strategic importance, the UWSOS network is highly susceptible to hostile infiltrations, which significantly impede its battlefield recovery capabilities. Existing methods to enhance network resilience predominantly focus on basic graph relationships, neglecting the crucial higher-order dependencies among nodes necessary for capturing multi-hop meta-paths within the UWSOS. To address these limitations, we propose the Enhanced-Resilience Multi-Layer Attention Graph Convolutional Network (E-MAGCN), designed to augment the adaptability of More >

  • Open AccessOpen Access

    ARTICLE

    GDMNet: A Unified Multi-Task Network for Panoptic Driving Perception

    Yunxiang Liu, Haili Ma, Jianlin Zhu*, Qiangbo Zhang
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2963-2978, 2024, DOI:10.32604/cmc.2024.053710 - 15 August 2024
    (This article belongs to the Special Issue: Metaheuristics, Soft Computing, and Machine Learning in Image Processing and Computer Vision)
    Abstract To enhance the efficiency and accuracy of environmental perception for autonomous vehicles, we propose GDMNet, a unified multi-task perception network for autonomous driving, capable of performing drivable area segmentation, lane detection, and traffic object detection. Firstly, in the encoding stage, features are extracted, and Generalized Efficient Layer Aggregation Network (GELAN) is utilized to enhance feature extraction and gradient flow. Secondly, in the decoding stage, specialized detection heads are designed; the drivable area segmentation head employs DySample to expand feature maps, the lane detection head merges early-stage features and processes the output through the Focal Modulation More >

  • Open AccessOpen Access

    ARTICLE

    A Feature Selection Method Based on Hybrid Dung Beetle Optimization Algorithm and Slap Swarm Algorithm

    Wei Liu*, Tengteng Ren
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2979-3000, 2024, DOI:10.32604/cmc.2024.053627 - 15 August 2024
    Abstract Feature Selection (FS) is a key pre-processing step in pattern recognition and data mining tasks, which can effectively avoid the impact of irrelevant and redundant features on the performance of classification models. In recent years, meta-heuristic algorithms have been widely used in FS problems, so a Hybrid Binary Chaotic Salp Swarm Dung Beetle Optimization (HBCSSDBO) algorithm is proposed in this paper to improve the effect of FS. In this hybrid algorithm, the original continuous optimization algorithm is converted into binary form by the S-type transfer function and applied to the FS problem. By combining the… More >

  • Open AccessOpen Access

    ARTICLE

    Physics-Constrained Robustness Enhancement for Tree Ensembles Applied in Smart Grid

    Zhibo Yang, Xiaohan Huang, Bingdong Wang, Bin Hu, Zhenyong Zhang*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3001-3019, 2024, DOI:10.32604/cmc.2024.053369 - 15 August 2024
    Abstract With the widespread use of machine learning (ML) technology, the operational efficiency and responsiveness of power grids have been significantly enhanced, allowing smart grids to achieve high levels of automation and intelligence. However, tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks, making it urgent to enhance their robustness. To address this, we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles. Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws, ensuring training data accurately reflects possible More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Quantization and Model Compression Approach for Hardware Accelerators in Edge Computing

    Fangzhou He1,3, Ke Ding1,2, Dingjiang Yan3, Jie Li3,*, Jiajun Wang1,2, Mingzhe Chen1,2
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3021-3045, 2024, DOI:10.32604/cmc.2024.053632 - 15 August 2024
    Abstract Massive computational complexity and memory requirement of artificial intelligence models impede their deployability on edge computing devices of the Internet of Things (IoT). While Power-of-Two (PoT) quantization is proposed to improve the efficiency for edge inference of Deep Neural Networks (DNNs), existing PoT schemes require a huge amount of bit-wise manipulation and have large memory overhead, and their efficiency is bounded by the bottleneck of computation latency and memory footprint. To tackle this challenge, we present an efficient inference approach on the basis of PoT quantization and model compression. An integer-only scalar PoT quantization (IOS-PoT)… More >

  • Open AccessOpen Access

    ARTICLE

    Source Camera Identification Algorithm Based on Multi-Scale Feature Fusion

    Jianfeng Lu1,2, Caijin Li1, Xiangye Huang1, Chen Cui3, Mahmoud Emam1,2,4,*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3047-3065, 2024, DOI:10.32604/cmc.2024.053680 - 15 August 2024
    Abstract The widespread availability of digital multimedia data has led to a new challenge in digital forensics. Traditional source camera identification algorithms usually rely on various traces in the capturing process. However, these traces have become increasingly difficult to extract due to wide availability of various image processing algorithms. Convolutional Neural Networks (CNN)-based algorithms have demonstrated good discriminative capabilities for different brands and even different models of camera devices. However, their performances is not ideal in case of distinguishing between individual devices of the same model, because cameras of the same model typically use the same… More >

  • Open AccessOpen Access

    ARTICLE

    PARE: Privacy-Preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things

    Peicong He, Yang Xin*, Yixian Yang
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3067-3084, 2024, DOI:10.32604/cmc.2024.054777 - 15 August 2024
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The proliferation of intelligent, connected Internet of Things (IoT) devices facilitates data collection. However, task workers may be reluctant to participate in data collection due to privacy concerns, and task requesters may be concerned about the validity of the collected data. Hence, it is vital to evaluate the quality of the data collected by the task workers while protecting privacy in spatial crowdsourcing (SC) data collection tasks with IoT. To this end, this paper proposes a privacy-preserving data reliability evaluation for SC in IoT, named PARE. First, we design a data uploading format using blockchain More >

  • Open AccessOpen Access

    ARTICLE

    Improving the Effectiveness of Image Classification Structural Methods by Compressing the Description According to the Information Content Criterion

    Yousef Ibrahim Daradkeh1,*, Volodymyr Gorokhovatskyi2, Iryna Tvoroshenko2,*, Medien Zeghid1,3
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3085-3106, 2024, DOI:10.32604/cmc.2024.051709 - 15 August 2024
    (This article belongs to the Special Issue: Data and Image Processing in Intelligent Information Systems)
    Abstract The research aims to improve the performance of image recognition methods based on a description in the form of a set of keypoint descriptors. The main focus is on increasing the speed of establishing the relevance of object and etalon descriptions while maintaining the required level of classification efficiency. The class to be recognized is represented by an infinite set of images obtained from the etalon by applying arbitrary geometric transformations. It is proposed to reduce the descriptions for the etalon database by selecting the most significant descriptor components according to the information content criterion.… More >

  • Open AccessOpen Access

    ARTICLE

    Improving Diversity with Multi-Loss Adversarial Training in Personalized News Recommendation

    Ruijin Xue1,2, Shuang Feng1,2,*, Qi Wang1,2
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3107-3122, 2024, DOI:10.32604/cmc.2024.052600 - 15 August 2024
    Abstract Users’ interests are often diverse and multi-grained, with their underlying intents even more so. Effectively capturing users’ interests and uncovering the relationships between diverse interests are key to news recommendation. Meanwhile, diversity is an important metric for evaluating news recommendation algorithms, as users tend to reject excessive homogeneous information in their recommendation lists. However, recommendation models themselves lack diversity awareness, making it challenging to achieve a good balance between the accuracy and diversity of news recommendations. In this paper, we propose a news recommendation algorithm that achieves good performance in both accuracy and diversity. Unlike… More >

  • Open AccessOpen Access

    ARTICLE

    Unleashing the Power of Multi-Agent Reinforcement Learning for Algorithmic Trading in the Digital Financial Frontier and Enterprise Information Systems

    Saket Sarin1, Sunil K. Singh1, Sudhakar Kumar1, Shivam Goyal1, Brij Bhooshan Gupta2,3,4,8,*, Wadee Alhalabi5, Varsha Arya6,7
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3123-3138, 2024, DOI:10.32604/cmc.2024.051599 - 15 August 2024
    Abstract In the rapidly evolving landscape of today’s digital economy, Financial Technology (Fintech) emerges as a transformative force, propelled by the dynamic synergy between Artificial Intelligence (AI) and Algorithmic Trading. Our in-depth investigation delves into the intricacies of merging Multi-Agent Reinforcement Learning (MARL) and Explainable AI (XAI) within Fintech, aiming to refine Algorithmic Trading strategies. Through meticulous examination, we uncover the nuanced interactions of AI-driven agents as they collaborate and compete within the financial realm, employing sophisticated deep learning techniques to enhance the clarity and adaptability of trading decisions. These AI-infused Fintech platforms harness collective intelligence More >

  • Open AccessOpen Access

    REVIEW

    Randomization Strategies in Image Steganography Techniques: A Review

    AFM Zainul Abadin1,2,*, Rossilawati Sulaiman1, Mohammad Kamrul Hasan1
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3139-3171, 2024, DOI:10.32604/cmc.2024.050834 - 15 August 2024
    Abstract Image steganography is one of the prominent technologies in data hiding standards. Steganographic system performance mostly depends on the embedding strategy. Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image. The randomization strategies in data embedding techniques may utilize random domains, pixels, or region-of-interest for concealing secrets into a cover image, preventing information from being discovered by an attacker. The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility, but it is challenging. A systematic approach is More >

  • Open AccessOpen Access

    ARTICLE

    Research on Improved MobileViT Image Tamper Localization Model

    Jingtao Sun1,2, Fengling Zhang1,2,*, Huanqi Liu1,2, Wenyan Hou1,2
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3173-3192, 2024, DOI:10.32604/cmc.2024.051705 - 15 August 2024
    Abstract As image manipulation technology advances rapidly, the malicious use of image tampering has alarmingly escalated, posing a significant threat to social stability. In the realm of image tampering localization, accurately localizing limited samples, multiple types, and various sizes of regions remains a multitude of challenges. These issues impede the model’s universality and generalization capability and detrimentally affect its performance. To tackle these issues, we propose FL-MobileViT-an improved MobileViT model devised for image tampering localization. Our proposed model utilizes a dual-stream architecture that independently processes the RGB and noise domain, and captures richer traces of tampering… More >

  • Open AccessOpen Access

    ARTICLE

    Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance

    Linghong Kuang1,2, Wenlong Shi1,2, Jing Zhang1,2,*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3193-3219, 2024, DOI:10.32604/cmc.2024.054377 - 15 August 2024
    (This article belongs to the Special Issue: Security and Privacy in IoT and Smart City: Current Challenges and Future Directions)
    Abstract The Advanced Metering Infrastructure (AMI), as a crucial subsystem in the smart grid, is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers. However, with the advancement of information and communication technology, new security and privacy challenges have emerged for AMI. To address these challenges and enhance the security and privacy of user data in the smart grid, a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance (HPPM-AMICFA) is proposed in this paper. The proposed model integrates cloud and fog computing… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Topic-Aware Summarization Using Statistical Graph Neural Networks

    Ayesha Khaliq1, Salman Afsar Awan1, Fahad Ahmad2,*, Muhammad Azam Zia1, Muhammad Zafar Iqbal3
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3221-3242, 2024, DOI:10.32604/cmc.2024.053488 - 15 August 2024
    Abstract The rapid expansion of online content and big data has precipitated an urgent need for efficient summarization techniques to swiftly comprehend vast textual documents without compromising their original integrity. Current approaches in Extractive Text Summarization (ETS) leverage the modeling of inter-sentence relationships, a task of paramount importance in producing coherent summaries. This study introduces an innovative model that integrates Graph Attention Networks (GATs) with Transformer-based Bidirectional Encoder Representations from Transformers (BERT) and Latent Dirichlet Allocation (LDA), further enhanced by Term Frequency-Inverse Document Frequency (TF-IDF) values, to improve sentence selection by capturing comprehensive topical information. Our… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Site Planning of Mobile Communication Network

    Jiahan He1, Guangjun Liang1,2,3,*, Meng Li4, Kefan Yao1, Bixia Wang1, Lu Li5
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3243-3261, 2024, DOI:10.32604/cmc.2024.051710 - 15 August 2024
    Abstract In this paper, considering the cost of base station, coverage, call quality, and other practical factors, a multi-objective optimal site planning scheme is proposed. Firstly, based on practical needs, mathematical modeling methods were used to establish mathematical expressions for the three sub-objectives of cost objectives, coverage objectives, and quality objectives. Then, a multi-objective optimization model was established by combining threshold and traffic volume constraints. In order to reduce the time complexity of optimization, a non-dominated sorting genetic algorithm (NSGA) is used to solve the multi-objective optimization problem of site planning. Finally, a strategy for clustering… More >

  • Open AccessOpen Access

    ARTICLE

    Software Vulnerability Mining and Analysis Based on Deep Learning

    Shibin Zhao*, Junhu Zhu, Jianshan Peng
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3263-3287, 2024, DOI:10.32604/cmc.2024.041949 - 15 August 2024
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract In recent years, the rapid development of computer software has led to numerous security problems, particularly software vulnerabilities. These flaws can cause significant harm to users’ privacy and property. Current security defect detection technology relies on manual or professional reasoning, leading to missed detection and high false detection rates. Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes, reducing missed alarms and false alarms. So, this project aims to study Java source code defect detection methods for defects like null pointer… More >

  • Open AccessOpen Access

    REVIEW

    AI-Driven Learning Management Systems: Modern Developments, Challenges and Future Trends during the Age of ChatGPT

    Sameer Qazi1,*, Muhammad Bilal Kadri2, Muhammad Naveed1,*, Bilal A. Khawaja3, Sohaib Zia Khan4, Muhammad Mansoor Alam5,6,7, Mazliham Mohd Su’ud6
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3289-3314, 2024, DOI:10.32604/cmc.2024.048893 - 15 August 2024
    Abstract COVID-19 pandemic restrictions limited all social activities to curtail the spread of the virus. The foremost and most prime sector among those affected were schools, colleges, and universities. The education system of entire nations had shifted to online education during this time. Many shortcomings of Learning Management Systems (LMSs) were detected to support education in an online mode that spawned the research in Artificial Intelligence (AI) based tools that are being developed by the research community to improve the effectiveness of LMSs. This paper presents a detailed survey of the different enhancements to LMSs, which… More >

  • Open AccessOpen Access

    ARTICLE

    Semantic Segmentation and YOLO Detector over Aerial Vehicle Images

    Asifa Mehmood Qureshi1, Abdul Haleem Butt1, Abdulwahab Alazeb2, Naif Al Mudawi2, Mohammad Alonazi3, Nouf Abdullah Almujally4, Ahmad Jalal1, Hui Liu5,*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3315-3332, 2024, DOI:10.32604/cmc.2024.052582 - 15 August 2024
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract Intelligent vehicle tracking and detection are crucial tasks in the realm of highway management. However, vehicles come in a range of sizes, which is challenging to detect, affecting the traffic monitoring system’s overall accuracy. Deep learning is considered to be an efficient method for object detection in vision-based systems. In this paper, we proposed a vision-based vehicle detection and tracking system based on a You Look Only Once version 5 (YOLOv5) detector combined with a segmentation technique. The model consists of six steps. In the first step, all the extracted traffic sequence images are subjected… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved YOLOv5s-Based Smoke Detection System for Outdoor Parking Lots

    Ruobing Zuo1, Xiaohan Huang1, Xuguo Jiao2,3, Zhenyong Zhang1,4,5,*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3333-3349, 2024, DOI:10.32604/cmc.2024.050544 - 15 August 2024
    Abstract In the rapidly evolving urban landscape, outdoor parking lots have become an indispensable part of the city’s transportation system. The growth of parking lots has raised the likelihood of spontaneous vehicle combustion, a significant safety hazard, making smoke detection an essential preventative step. However, the complex environment of outdoor parking lots presents additional challenges for smoke detection, which necessitates the development of more advanced and reliable smoke detection technologies. This paper addresses this concern and presents a novel smoke detection technique designed for the demanding environment of outdoor parking lots. First, we develop a novel… More >

  • Open AccessOpen Access

    ARTICLE

    HybridGAD: Identification of AI-Generated Radiology Abstracts Based on a Novel Hybrid Model with Attention Mechanism

    Tuğba Çelikten1, Aytuğ Onan2,*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3351-3377, 2024, DOI:10.32604/cmc.2024.051574 - 15 August 2024
    Abstract The purpose of this study is to develop a reliable method for distinguishing between AI-generated, paraphrased, and human-written texts, which is crucial for maintaining the integrity of research and ensuring accurate information flow in critical fields such as healthcare. To achieve this, we propose HybridGAD, a novel hybrid model that combines Long Short-Term Memory (LSTM), Bidirectional LSTM (Bi-LSTM), and Bidirectional Gated Recurrent Unit (Bi-GRU) architectures with an attention mechanism. Our methodology involves training this hybrid model on a dataset of radiology abstracts, encompassing texts generated by AI, paraphrased by AI, and written by humans. The… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Bucket Elevator Performance through a Blend of Discrete Element Method, Response Surface Methodology, and Firefly Algorithm Approaches

    Pirapat Arunyanart, Nithitorn Kongkaew, Supattarachai Sudsawat*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3379-3403, 2024, DOI:10.32604/cmc.2024.054337 - 15 August 2024
    Abstract This research introduces a novel approach to enhancing bucket elevator design and operation through the integration of discrete element method (DEM) simulation, design of experiments (DOE), and metaheuristic optimization algorithms. Specifically, the study employs the firefly algorithm (FA), a metaheuristic optimization technique, to optimize bucket elevator parameters for maximizing transport mass and mass flow rate discharge of granular materials under specified working conditions. The experimental methodology involves several key steps: screening experiments to identify significant factors affecting bucket elevator operation, central composite design (CCD) experiments to further explore these factors, and response surface methodology (RSM)… More >

  • Open AccessOpen Access

    ARTICLE

    Scene 3-D Reconstruction System in Scattering Medium

    Zhuoyifan Zhang1, Lu Zhang2, Liang Wang3, Haoming Wu2,*
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3405-3420, 2024, DOI:10.32604/cmc.2024.052144 - 15 August 2024
    Abstract Research on neural radiance fields for novel view synthesis has experienced explosive growth with the development of new models and extensions. The NeRF (Neural Radiance Fields) algorithm, suitable for underwater scenes or scattering media, is also evolving. Existing underwater 3D reconstruction systems still face challenges such as long training times and low rendering efficiency. This paper proposes an improved underwater 3D reconstruction system to achieve rapid and high-quality 3D reconstruction. First, we enhance underwater videos captured by a monocular camera to correct the image quality degradation caused by the physical properties of the water medium… More >

Per Page:

Share Link