Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    An Enhanced Integrated Method for Healthcare Data Classification with Incompleteness

    Sonia Goel1,#, Meena Tushir1, Jyoti Arora2, Tripti Sharma2, Deepali Gupta3, Ali Nauman4,#, Ghulam Muhammad5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3125-3145, 2024, DOI:10.32604/cmc.2024.054476 - 18 November 2024

    Abstract In numerous real-world healthcare applications, handling incomplete medical data poses significant challenges for missing value imputation and subsequent clustering or classification tasks. Traditional approaches often rely on statistical methods for imputation, which may yield suboptimal results and be computationally intensive. This paper aims to integrate imputation and clustering techniques to enhance the classification of incomplete medical data with improved accuracy. Conventional classification methods are ill-suited for incomplete medical data. To enhance efficiency without compromising accuracy, this paper introduces a novel approach that combines imputation and clustering for the classification of incomplete data. Initially, the linear More >

  • Open Access

    ARTICLE

    A Shuffling-Steganography Algorithm to Protect Data of Drone Applications

    Ahamad B. Alkodre1, Nour Mahmoud Bahbouh2, Sandra Sendra3, Adnan Ahmed Abi Sen4,*, Yazed Alsaawy1, Saad Said Alqahtany1, Abdallah Namoun1, Hani Almoamari1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2727-2751, 2024, DOI:10.32604/cmc.2024.053706 - 18 November 2024

    Abstract In Saudi Arabia, drones are increasingly used in different sensitive domains like military, health, and agriculture to name a few. Typically, drone cameras capture aerial images of objects and convert them into crucial data, alongside collecting data from distributed sensors supplemented by location data. The interception of the data sent from the drone to the station can lead to substantial threats. To address this issue, highly confidential protection methods must be employed. This paper introduces a novel steganography approach called the Shuffling Steganography Approach (SSA). SSA encompasses five fundamental stages and three proposed algorithms, designed… More >

  • Open Access

    ARTICLE

    A Comprehensive Image Processing Framework for Early Diagnosis of Diabetic Retinopathy

    Kusum Yadav1, Yasser Alharbi1, Eissa Jaber Alreshidi1, Abdulrahman Alreshidi1, Anuj Kumar Jain2, Anurag Jain3, Kamal Kumar4, Sachin Sharma5, Brij B. Gupta6,7,8,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2665-2683, 2024, DOI:10.32604/cmc.2024.053565 - 18 November 2024

    Abstract In today’s world, image processing techniques play a crucial role in the prognosis and diagnosis of various diseases due to the development of several precise and accurate methods for medical images. Automated analysis of medical images is essential for doctors, as manual investigation often leads to inter-observer variability. This research aims to enhance healthcare by enabling the early detection of diabetic retinopathy through an efficient image processing framework. The proposed hybridized method combines Modified Inertia Weight Particle Swarm Optimization (MIWPSO) and Fuzzy C-Means clustering (FCM) algorithms. Traditional FCM does not incorporate spatial neighborhood features, making More >

  • Open Access

    ARTICLE

    Robust Human Interaction Recognition Using Extended Kalman Filter

    Tanvir Fatima Naik Bukht1, Abdulwahab Alazeb2, Naif Al Mudawi2, Bayan Alabdullah3, Khaled Alnowaiser4, Ahmad Jalal1, Hui Liu5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2987-3002, 2024, DOI:10.32604/cmc.2024.053547 - 18 November 2024

    Abstract In the field of computer vision and pattern recognition, knowledge based on images of human activity has gained popularity as a research topic. Activity recognition is the process of determining human behavior based on an image. We implemented an Extended Kalman filter to create an activity recognition system here. The proposed method applies an HSI color transformation in its initial stages to improve the clarity of the frame of the image. To minimize noise, we use Gaussian filters. Extraction of silhouette using the statistical method. We use Binary Robust Invariant Scalable Keypoints (BRISK) and SIFT More >

  • Open Access

    ARTICLE

    MCBAN: A Small Object Detection Multi-Convolutional Block Attention Network

    Hina Bhanbhro1,*, Yew Kwang Hooi1, Mohammad Nordin Bin Zakaria1, Worapan Kusakunniran2, Zaira Hassan Amur1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2243-2259, 2024, DOI:10.32604/cmc.2024.052138 - 18 November 2024

    Abstract Object detection has made a significant leap forward in recent years. However, the detection of small objects continues to be a great difficulty for various reasons, such as they have a very small size and they are susceptible to missed detection due to background noise. Additionally, small object information is affected due to the downsampling operations. Deep learning-based detection methods have been utilized to address the challenge posed by small objects. In this work, we propose a novel method, the Multi-Convolutional Block Attention Network (MCBAN), to increase the detection accuracy of minute objects aiming to… More >

  • Open Access

    ARTICLE

    V2I Physical Layer Security Beamforming with Antenna Hardware Impairments under RIS Assistance

    Zerong Tang, Tiecheng Song*, Jing Hu

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1835-1854, 2024, DOI:10.32604/cmc.2024.056983 - 15 October 2024

    Abstract The Internet of Vehicles (IoV) will carry a large amount of security and privacy-related data, which makes the secure communication between the IoV terminals increasingly critical. This paper studies the joint beamforming for physical-layer security transmission in the coexistence of Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) communication with Reconfigurable Intelligent Surface (RIS) assistance, taking into account hardware impairments. A communication model for physical-layer security transmission is established when the eavesdropping user is present and the base station antenna has hardware impairments assisted by RIS. Based on this model, we propose to maximize the V2I physical-layer security… More >

  • Open Access

    ARTICLE

    LQTTrack: Multi-Object Tracking by Focusing on Low-Quality Targets Association

    Suya Li1, Ying Cao1,*, Hengyi Ren2, Dongsheng Zhu3, Xin Xie1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1449-1470, 2024, DOI:10.32604/cmc.2024.056824 - 15 October 2024

    Abstract Multi-object tracking (MOT) has seen rapid improvements in recent years. However, frequent occlusion remains a significant challenge in MOT, as it can cause targets to become smaller or disappear entirely, resulting in low-quality targets, leading to trajectory interruptions and reduced tracking performance. Different from some existing methods, which discarded the low-quality targets or ignored low-quality target attributes. LQTTrack, with a low-quality association strategy (LQA), is proposed to pay more attention to low-quality targets. In the association scheme of LQTTrack, firstly, multi-scale feature fusion of FPN (MSFF-FPN) is utilized to enrich the feature information and assist… More >

  • Open Access

    ARTICLE

    Human Interaction Recognition in Surveillance Videos Using Hybrid Deep Learning and Machine Learning Models

    Vesal Khean1, Chomyong Kim2, Sunjoo Ryu2, Awais Khan1, Min Kyung Hong3, Eun Young Kim4, Joungmin Kim5, Yunyoung Nam3,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 773-787, 2024, DOI:10.32604/cmc.2024.056767 - 15 October 2024

    Abstract Human Interaction Recognition (HIR) was one of the challenging issues in computer vision research due to the involvement of multiple individuals and their mutual interactions within video frames generated from their movements. HIR requires more sophisticated analysis than Human Action Recognition (HAR) since HAR focuses solely on individual activities like walking or running, while HIR involves the interactions between people. This research aims to develop a robust system for recognizing five common human interactions, such as hugging, kicking, pushing, pointing, and no interaction, from video sequences using multiple cameras. In this study, a hybrid Deep… More >

  • Open Access

    ARTICLE

    Constructive Robust Steganography Algorithm Based on Style Transfer

    Xiong Zhang1,2, Minqing Zhang1,2,3,*, Xu’an Wang1,2,3,*, Siyuan Huang1,2, Fuqiang Di1,2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1433-1448, 2024, DOI:10.32604/cmc.2024.056742 - 15 October 2024

    Abstract Traditional information hiding techniques achieve information hiding by modifying carrier data, which can easily leave detectable traces that may be detected by steganalysis tools. Especially in image transmission, both geometric and non-geometric attacks can cause subtle changes in the pixels of the image during transmission. To overcome these challenges, we propose a constructive robust image steganography technique based on style transformation. Unlike traditional steganography, our algorithm does not involve any direct modifications to the carrier data. In this study, we constructed a mapping dictionary by setting the correspondence between binary codes and image categories and… More >

  • Open Access

    ARTICLE

    Mural Anomaly Region Detection Algorithm Based on Hyperspectral Multiscale Residual Attention Network

    Bolin Guo1,2, Shi Qiu1,*, Pengchang Zhang1, Xingjia Tang3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1809-1833, 2024, DOI:10.32604/cmc.2024.056706 - 15 October 2024

    Abstract Mural paintings hold significant historical information and possess substantial artistic and cultural value. However, murals are inevitably damaged by natural environmental factors such as wind and sunlight, as well as by human activities. For this reason, the study of damaged areas is crucial for mural restoration. These damaged regions differ significantly from undamaged areas and can be considered abnormal targets. Traditional manual visual processing lacks strong characterization capabilities and is prone to omissions and false detections. Hyperspectral imaging can reflect the material properties more effectively than visual characterization methods. Thus, this study employs hyperspectral imaging… More >

Displaying 1411-1420 on page 142 of 7234. Per Page