Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    Automated Video Generation of Moving Digits from Text Using Deep Deconvolutional Generative Adversarial Network

    Anwar Ullah1, Xinguo Yu1,*, Muhammad Numan2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2359-2383, 2023, DOI:10.32604/cmc.2023.041219 - 29 November 2023

    Abstract Generating realistic and synthetic video from text is a highly challenging task due to the multitude of issues involved, including digit deformation, noise interference between frames, blurred output, and the need for temporal coherence across frames. In this paper, we propose a novel approach for generating coherent videos of moving digits from textual input using a Deep Deconvolutional Generative Adversarial Network (DD-GAN). The DD-GAN comprises a Deep Deconvolutional Neural Network (DDNN) as a Generator (G) and a modified Deep Convolutional Neural Network (DCNN) as a Discriminator (D) to ensure temporal coherence between adjacent frames. The… More >

  • Open Access

    ARTICLE

    PoIR: A Node Selection Mechanism in Reputation-Based Blockchain Consensus Using Bidirectional LSTM Regression Model

    Jauzak Hussaini Windiatmaja, Delphi Hanggoro, Muhammad Salman, Riri Fitri Sari*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2309-2339, 2023, DOI:10.32604/cmc.2023.041152 - 29 November 2023

    Abstract This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation (PoIR) as an alternative to traditional Proof of Work (PoW). PoIR addresses the limitations of existing reputation-based consensus mechanisms by proposing a more decentralized and fair node selection process. The proposed PoIR consensus combines Bidirectional Long Short-Term Memory (BiLSTM) with the Network Entity Reputation Database (NERD) to generate reputation scores for network entities and select authoritative nodes. NERD records network entity profiles based on various sources, i.e., Warden, Blacklists, DShield, AlienVault Open Threat Exchange (OTX), and MISP (Malware Information Sharing Platform). It… More >

  • Open Access

    ARTICLE

    Fine-Grained Classification of Remote Sensing Ship Images Based on Improved VAN

    Guoqing Zhou, Liang Huang, Qiao Sun*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1985-2007, 2023, DOI:10.32604/cmc.2023.040902 - 29 November 2023

    Abstract The remote sensing ships’ fine-grained classification technology makes it possible to identify certain ship types in remote sensing images, and it has broad application prospects in civil and military fields. However, the current model does not examine the properties of ship targets in remote sensing images with mixed multi-granularity features and a complicated backdrop. There is still an opportunity for future enhancement of the classification impact. To solve the challenges brought by the above characteristics, this paper proposes a Metaformer and Residual fusion network based on Visual Attention Network (VAN-MR) for fine-grained classification tasks. For… More >

  • Open Access

    ARTICLE

    Diagnosis of Autism Spectrum Disorder by Imperialistic Competitive Algorithm and Logistic Regression Classifier

    Shabana R. Ziyad1,*, Liyakathunisa2, Eman Aljohani2, I. A. Saeed3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1515-1534, 2023, DOI:10.32604/cmc.2023.040874 - 29 November 2023

    Abstract Autism spectrum disorder (ASD), classified as a developmental disability, is now more common in children than ever. A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection of autism in children. Parents can seek professional help for a better prognosis of the child’s therapy when ASD is diagnosed under five years. This research study aims to develop an automated tool for diagnosing autism in children. The computer-aided diagnosis tool for ASD detection is designed and developed by a novel methodology that includes data acquisition, feature selection, and classification phases.… More >

  • Open Access

    ARTICLE

    Assessing the Efficacy of Improved Learning in Hourly Global Irradiance Prediction

    Abdennasser Dahmani1, Yamina Ammi2, Nadjem Bailek3,4,*, Alban Kuriqi5,6, Nadhir Al-Ansari7,*, Salah Hanini2, Ilhami Colak8, Laith Abualigah9,10,11,12,13,14, El-Sayed M. El-kenawy15

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2579-2594, 2023, DOI:10.32604/cmc.2023.040625 - 29 November 2023

    Abstract Increasing global energy consumption has become an urgent problem as natural energy sources such as oil, gas, and uranium are rapidly running out. Research into renewable energy sources such as solar energy is being pursued to counter this. Solar energy is one of the most promising renewable energy sources, as it has the potential to meet the world’s energy needs indefinitely. This study aims to develop and evaluate artificial intelligence (AI) models for predicting hourly global irradiation. The hyperparameters were optimized using the Broyden-Fletcher-Goldfarb-Shanno (BFGS) quasi-Newton training algorithm and STATISTICA software. Data from two stations… More >

  • Open Access

    ARTICLE

    A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation

    Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Saddique4, Hijaz Ahmad5, Sameh Askar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2565-2578, 2023, DOI:10.32604/cmc.2023.040371 - 29 November 2023

    Abstract Nowadays, one of the most important difficulties is the protection and privacy of confidential data. To address these problems, numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults. Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase. For the designing of a secure substitution box (S-box), non-linearity (NL) which is an algebraic property of the S-box has great importance. Consequently, the main focus of cryptographers is to achieve the S-box… More >

  • Open Access

    ARTICLE

    Leveraging Blockchain with Optimal Deep Learning-Based Drug Supply Chain Management for Pharmaceutical Industries

    Shanthi Perumalsamy, Venkatesh Kaliyamurthy*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2341-2357, 2023, DOI:10.32604/cmc.2023.040269 - 29 November 2023

    Abstract Due to its complexity and involvement of numerous stakeholders, the pharmaceutical supply chain presents many challenges that companies must overcome to deliver necessary medications to patients efficiently. The pharmaceutical supply chain poses different challenging issues, encompasses supply chain visibility, cold-chain shipping, drug counterfeiting, and rising prescription drug prices, which can considerably surge out-of-pocket patient costs. Blockchain (BC) offers the technical base for such a scheme, as it could track legitimate drugs and avoid fake circulation. The designers presented the procedure of BC with fabric for creating a secured drug supply-chain management (DSCM) method. With this… More >

  • Open Access

    ARTICLE

    A Nonstandard Computational Investigation of SEIR Model with Fuzzy Transmission, Recovery and Death Rates

    Ahmed H. Msmali1, Fazal Dayan2,*, Muhammad Rafiq3, Nauman Ahmed4, Abdullah Ali H. Ahmadini1, Hassan A. Hamali5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2251-2269, 2023, DOI:10.32604/cmc.2023.040266 - 29 November 2023

    Abstract In this article, a Susceptible-Exposed-Infectious-Recovered (SEIR) epidemic model is considered. The equilibrium analysis and reproduction number are studied. The conventional models have made assumptions of homogeneity in disease transmission that contradict the actual reality. However, it is crucial to consider the heterogeneity of the transmission rate when modeling disease dynamics. Describing the heterogeneity of disease transmission mathematically can be achieved by incorporating fuzzy theory. A numerical scheme nonstandard, finite difference (NSFD) approach is developed for the studied model and the results of numerical simulations are presented. Simulations of the constructed scheme are presented. The positivity,… More >

  • Open Access

    ARTICLE

    An Enhanced Equilibrium Optimizer for Solving Optimization Tasks

    Yuting Liu1, Hongwei Ding1,*, Zongshan Wang1,*, Gaurav Dhiman2,3,4, Zhijun Yang1, Peng Hu5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2385-2406, 2023, DOI:10.32604/cmc.2023.039883 - 29 November 2023

    Abstract The equilibrium optimizer (EO) represents a new, physics-inspired metaheuristic optimization approach that draws inspiration from the principles governing the control of volume-based mixing to achieve dynamic mass equilibrium. Despite its innovative foundation, the EO exhibits certain limitations, including imbalances between exploration and exploitation, the tendency to local optima, and the susceptibility to loss of population diversity. To alleviate these drawbacks, this paper introduces an improved EO that adopts three strategies: adaptive inertia weight, Cauchy mutation, and adaptive sine cosine mechanism, called SCEO. Firstly, a new update formula is conceived by incorporating an adaptive inertia weight… More >

  • Open Access

    ARTICLE

    Addressing the Issues and Developments Correlated with Envisaged 5G Mobile Technologies: Comprehensive Solutions

    Idrees Sarhan Kocher*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2205-2223, 2023, DOI:10.32604/cmc.2023.039392 - 29 November 2023

    Abstract Fifth Generation (5G) communications are regarded as the cornerstone to household consumer experience improvements and smart manufacturing revolution from the standpoint of industries' objectives. It is anticipated that Envisaged 5G (E5G) mobile technology would be operational in certain developed countries by 2023. The Internet of Things (IoTs) will transform how humans live when combined with smart and integrated sensing devices, such as in-home sensing devices. Recent research is being carried out all over the world to produce a new technique that can be crucial in the success of the anticipated 5G mobile technology. High output,… More >

Displaying 2271-2280 on page 228 of 7234. Per Page