Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    Improving the Transmission Security of Vein Images Using a Bezier Curve and Long Short-Term Memory

    Ahmed H. Alhadethi1,*, Ikram Smaoui2, Ahmed Fakhfakh3, Saad M. Darwish4

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4825-4844, 2024, DOI:10.32604/cmc.2024.047852 - 20 June 2024

    Abstract The act of transmitting photos via the Internet has become a routine and significant activity. Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced. This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images. The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression. This paper introduces… More >

  • Open Access

    ARTICLE

    MCIF-Transformer Mask RCNN: Multi-Branch Cross-Scale Interactive Feature Fusion Transformer Model for PET/CT Lung Tumor Instance Segmentation

    Huiling Lu1,*, Tao Zhou2,3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4371-4393, 2024, DOI:10.32604/cmc.2024.047827 - 20 June 2024

    Abstract The precise detection and segmentation of tumor lesions are very important for lung cancer computer-aided diagnosis. However, in PET/CT (Positron Emission Tomography/Computed Tomography) lung images, the lesion shapes are complex, the edges are blurred, and the sample numbers are unbalanced. To solve these problems, this paper proposes a Multi-branch Cross-scale Interactive Feature fusion Transformer model (MCIF-Transformer Mask RCNN) for PET/CT lung tumor instance segmentation, The main innovative works of this paper are as follows: Firstly, the ResNet-Transformer backbone network is used to extract global feature and local feature in lung images. The pixel dependence relationship… More >

  • Open Access

    ARTICLE

    A Combination Prediction Model for Short Term Travel Demand of Urban Taxi

    Mingyuan Li1,*, Yuanli Gu1, Qingqiao Geng2, Hongru Yu1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3877-3896, 2024, DOI:10.32604/cmc.2024.047765 - 20 June 2024

    Abstract This study proposes a prediction model considering external weather and holiday factors to address the issue of accurately predicting urban taxi travel demand caused by complex data and numerous influencing factors. The model integrates the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) and Convolutional Long Short Term Memory Neural Network (ConvLSTM) to predict short-term taxi travel demand. The CEEMDAN decomposition method effectively decomposes time series data into a set of modal components, capturing sequence characteristics at different time scales and frequencies. Based on the sample entropy value of components, secondary processing of more… More >

  • Open Access

    ARTICLE

    Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications

    Ibraheem Al-Hejri1, Farag Azzedin1,*, Sultan Almuhammadi1, Naeem Firdous Syed2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.047117 - 20 June 2024

    Abstract The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices. In critical infrastructure domains like oil and gas supply, intelligent transportation, power grids, and autonomous agriculture, it is essential to guarantee the confidentiality, integrity, and authenticity of data collected and exchanged. However, the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques. Consequently, designing a lightweight secure More >

  • Open Access

    ARTICLE

    Maximizing Resource Efficiency in Cloud Data Centers through Knowledge-Based Flower Pollination Algorithm (KB-FPA)

    Nidhika Chauhan1, Navneet Kaur2, Kamaljit Singh Saini3, Sahil Verma3, Kavita3, Ruba Abu Khurma4,5, Pedro A. Castillo6,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3757-3782, 2024, DOI:10.32604/cmc.2024.046516 - 20 June 2024

    Abstract Cloud computing is a dynamic and rapidly evolving field, where the demand for resources fluctuates continuously. This paper delves into the imperative need for adaptability in the allocation of resources to applications and services within cloud computing environments. The motivation stems from the pressing issue of accommodating fluctuating levels of user demand efficiently. By adhering to the proposed resource allocation method, we aim to achieve a substantial reduction in energy consumption. This reduction hinges on the precise and efficient allocation of resources to the tasks that require those most, aligning with the broader goal of… More >

  • Open Access

    ARTICLE

    Hybrid Gene Selection Methods for High-Dimensional Lung Cancer Data Using Improved Arithmetic Optimization Algorithm

    Mutasem K. Alsmadi*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5175-5200, 2024, DOI:10.32604/cmc.2024.044065 - 20 June 2024

    Abstract Lung cancer is among the most frequent cancers in the world, with over one million deaths per year. Classification is required for lung cancer diagnosis and therapy to be effective, accurate, and reliable. Gene expression microarrays have made it possible to find genetic biomarkers for cancer diagnosis and prediction in a high-throughput manner. Machine Learning (ML) has been widely used to diagnose and classify lung cancer where the performance of ML methods is evaluated to identify the appropriate technique. Identifying and selecting the gene expression patterns can help in lung cancer diagnoses and classification. Normally,… More >

  • Open Access

    ARTICLE

    Arrhythmia Detection by Using Chaos Theory with Machine Learning Algorithms

    Maie Aboghazalah1,*, Passent El-kafrawy2, Abdelmoty M. Ahmed3, Rasha Elnemr5, Belgacem Bouallegue3, Ayman El-sayed4

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3855-3875, 2024, DOI:10.32604/cmc.2023.039936 - 20 June 2024

    Abstract Heart monitoring improves life quality. Electrocardiograms (ECGs or EKGs) detect heart irregularities. Machine learning algorithms can create a few ECG diagnosis processing methods. The first method uses raw ECG and time-series data. The second method classifies the ECG by patient experience. The third technique translates ECG impulses into Q waves, R waves and S waves (QRS) features using richer information. Because ECG signals vary naturally between humans and activities, we will combine the three feature selection methods to improve classification accuracy and diagnosis. Classifications using all three approaches have not been examined till now. Several More >

  • Open Access

    REVIEW

    A Review of NILM Applications with Machine Learning Approaches

    Maheesha Dhashantha Silva*, Qi Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2971-2989, 2024, DOI:10.32604/cmc.2024.051289 - 15 May 2024

    Abstract In recent years, Non-Intrusive Load Monitoring (NILM) has become an emerging approach that provides affordable energy management solutions using aggregated load obtained from a single smart meter in the power grid. Furthermore, by integrating Machine Learning (ML), NILM can efficiently use electrical energy and offer less of a burden for the energy monitoring process. However, conducted research works have limitations for real-time implementation due to the practical issues. This paper aims to identify the contribution of ML approaches to developing a reliable Energy Management (EM) solution with NILM. Firstly, phases of the NILM are discussed,… More >

  • Open Access

    ARTICLE

    QoS Routing Optimization Based on Deep Reinforcement Learning in SDN

    Yu Song1, Xusheng Qian2, Nan Zhang3, Wei Wang2, Ao Xiong1,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3007-3021, 2024, DOI:10.32604/cmc.2024.051217 - 15 May 2024

    Abstract To enhance the efficiency and expediency of issuing e-licenses within the power sector, we must confront the challenge of managing the surging demand for data traffic. Within this realm, the network imposes stringent Quality of Service (QoS) requirements, revealing the inadequacies of traditional routing allocation mechanisms in accommodating such extensive data flows. In response to the imperative of handling a substantial influx of data requests promptly and alleviating the constraints of existing technologies and network congestion, we present an architecture for QoS routing optimization with in Software Defined Network (SDN), leveraging deep reinforcement learning. This… More >

  • Open Access

    ARTICLE

    Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence

    Xiong Zhang1,2, Minqing Zhang1,2,3,*, Xu An Wang1,2,3, Wen Jiang1,2, Chao Jiang1,2, Pan Yang1,4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1925-1938, 2024, DOI:10.32604/cmc.2024.050899 - 15 May 2024

    Abstract This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission. The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission. The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data. This process effectively enhances the concealment and imperceptibility of confidential information, thereby improving the security of such information during transmission and… More >

Displaying 1801-1810 on page 181 of 7234. Per Page