Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    Two-Stream Deep Learning Architecture-Based Human Action Recognition

    Faheem Shehzad1, Muhammad Attique Khan2, Muhammad Asfand E. Yar3, Muhammad Sharif1, Majed Alhaisoni4, Usman Tariq5, Arnab Majumdar6, Orawit Thinnukool7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5931-5949, 2023, DOI:10.32604/cmc.2023.028743 - 28 December 2022

    Abstract Human action recognition (HAR) based on Artificial intelligence reasoning is the most important research area in computer vision. Big breakthroughs in this field have been observed in the last few years; additionally, the interest in research in this field is evolving, such as understanding of actions and scenes, studying human joints, and human posture recognition. Many HAR techniques are introduced in the literature. Nonetheless, the challenge of redundant and irrelevant features reduces recognition accuracy. They also faced a few other challenges, such as differing perspectives, environmental conditions, and temporal variations, among others. In this work,… More >

  • Open Access

    ARTICLE

    An Optimized Test Case Minimization Technique Using Genetic Algorithm for Regression Testing

    Rubab Sheikh1, Muhammad Imran Babar2,*, Rawish Butt3, Abdelzahir Abdelmaboud4, Taiseer Abdalla Elfadil Eisa4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6789-6806, 2023, DOI:10.32604/cmc.2023.028625 - 28 December 2022

    Abstract Regression testing is a widely used approach to confirm the correct functionality of the software in incremental development. The use of test cases makes it easier to test the ripple effect of changed requirements. Rigorous testing may help in meeting the quality criteria that is based on the conformance to the requirements as given by the intended stakeholders. However, a minimized and prioritized set of test cases may reduce the efforts and time required for testing while focusing on the timely delivery of the software application. In this research, a technique named TestReduce has been presented More >

  • Open Access

    ARTICLE

    A Novel Design of Antenna Array with Two K-Band Circularly Polarized Antenna

    Xiao Liu1,2, Anqi Li1,*, Zhongjun Yu1,2, Ting Lv3, Meng Li4, Zhen Zhang5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6411-6427, 2023, DOI:10.32604/cmc.2023.027124 - 28 December 2022

    Abstract As an important part of phased array system, the research on phased array antenna is very necessary. The phased array antenna achieves the scanning beam adaptively by regulating the phase difference between each array element. In this paper, a dual K-band circularly polarized antenna with high broadband, broadband beam, wide axial ratio bandwidth and high radiation efficiency is designed. We combine with the advantages of slot antenna and aperture antenna, use multimode waveguide cavity structure to design an aperture antenna, which is fed to waveguide circular polarizer by slot coupling in order to realize circular… More >

  • Open Access

    ARTICLE

    Design of Ka-Band Phased Array Antenna with Calibration Function

    Xiao Liu1,2, Xingyao Zeng1,*, Chengxiang Hao1, Haibo Zhang1, Zhongjun Yu1,2, Ting Lv3, Meng Li4, Zhen Zhang5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6251-6261, 2023, DOI:10.32604/cmc.2023.027114 - 28 December 2022

    Abstract In this paper, we have proposed a novel structure of Ka-band based phased array antenna with calibration function. In the design of Ka-band antenna, the active phased array system is adopted and the antenna would work in the dual polarization separation mode. We have given out the schematic diagram for the proposed Ka-band antenna, where the Ka-band antenna is in the form of waveguide slot array antenna, with 96 units in azimuth and 1 unit in distance. Each group of units is driven by a single-channel Transmitter/Receiver (T/R) component, and the whole array contains 192… More >

  • Open Access

    ARTICLE

    Reconfigurable Sensing Time in Cooperative Cognitive Network Using Machine Learning

    Noor Gul1,2, Saeed Ahmed1,3, Su Min Kim1, Muhammad Sajjad Khan4, Junsu Kim1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5209-5227, 2023, DOI:10.32604/cmc.2023.026945 - 28 December 2022

    Abstract A cognitive radio network (CRN) intelligently utilizes the available spectral resources by sensing and learning from the radio environment to maximize spectrum utilization. In CRNs, the secondary users (SUs) opportunistically access the primary users (PUs) spectrum. Therefore, unambiguous detection of the PU channel occupancy is the most critical aspect of the operations of CRNs. Cooperative spectrum sensing (CSS) is rated as the best choice for making reliable sensing decisions. This paper employs machine-learning tools to sense the PU channels reliably in CSS. The sensing parameters are reconfigured to maximize the spectrum utilization while reducing sensing More >

  • Open Access

    ARTICLE

    Six Generation Load Cells Solution Based Congestion Management Control Purpose

    Chafaa Hamrouni1,2,*, Aarif Alutaybi1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6445-6460, 2023, DOI:10.32604/cmc.2023.026441 - 28 December 2022

    Abstract Several assessing efforts are approved making both communication and information technologies available. In addition to being a part of universal access and service, we aim at assessing the impact of radio access technologies on universal access indicators. The proposed work demonstrates the possibility of inter-working of all existing Radio Access Technologies (RATs), in a limited area presented in the Six Generation Radio Resources Allocation (6 G-A) network. We propose a solution for the Vertical hand Over (VHO) in 6 G-A heterogeneous system, that adopts Media Independent Handover (MIH) protocol to benefit between different used technologies… More >

  • Open Access

    ARTICLE

    Transparent Access to Heterogeneous IoT Based on Virtual Resources

    Wenquan Jin1, Sunhwan Lim2, Young-Ho Suh2, Chanwon Park2, Dohyeun Kim3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4983-4999, 2023, DOI:10.32604/cmc.2023.020851 - 28 December 2022

    Abstract The Internet of Things (IoT) inspires industries to deploy a massive number of connected devices to provide smart and ubiquitous services to influence our daily life. Edge computing leverages sufficient computation and storage at the edge of the network to enable deploying complex functions closer to the environment using Internet-connected devices. According to the purpose of the environment including privacy level, domain functionality, network scale and service quality, various environment-specific services can be provided through heterogeneous applications with sensors and actuators based on edge computing. However, for providing user-friendly service scenarios based on the transparent… More >

  • Open Access

    ARTICLE

    Throughput Analysis of HARQ Scheme Based on Full-Duplex Two-Way AF SWIPT Relay

    Xiaoye Shi1,*, Fei Ding1,2, Haiting Zhu1, Zhaowei Zhang1, Lei Zhang1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4819-4830, 2023, DOI:10.32604/cmc.2023.018637 - 28 December 2022

    Abstract The simultaneous wireless information and power transfer (SWIPT) relay system is one of the emerging technologies. Xiaomi Corporation and Motorola Inc. recently launched indoor wireless power transfer equipment is one of the most promising applications. To tap the potential of the system, hybrid automatic repeat request (HARQ) is introduced into the SWIPT relay system. Firstly, the time slot structure of HARQ scheme based on full duplex two-way amplify and forward (AF) SWIPT relay is given, and its retransmission status is analyzed. Secondly, the equivalent signal-to-noise ratio and outage probability of various states are calculated by More >

  • Open Access

    ARTICLE

    Partially Deep-Learning Encryption Technique

    Hamdy M. Mousa*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4277-4291, 2023, DOI:10.32604/cmc.2023.034593 - 31 October 2022

    Abstract The biggest problem facing the world is information security in the digital era. Information protection and integrity are hot topics at all times, so many techniques have been introduced to transmit and store data securely. The increase in computing power is increasing the number of security breaches and attacks at a higher rate than before on average. Thus, a number of existing security systems are at risk of hacking. This paper proposes an encryption technique called Partial Deep-Learning Encryption Technique (PD-LET) to achieve data security. PD-LET includes several stages for encoding and decoding digital data.… More >

  • Open Access

    ARTICLE

    Reducing Dataset Specificity for Deepfakes Using Ensemble Learning

    Qaiser Abbas1, Turki Alghamdi1, Yazed Alsaawy1, Tahir Alyas2,*, Ali Alzahrani1, Khawar Iqbal Malik3, Saira Bibi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4261-4276, 2023, DOI:10.32604/cmc.2023.034482 - 31 October 2022

    Abstract The emergence of deep fake videos in recent years has made image falsification a real danger. A person’s face and emotions are deep-faked in a video or speech and are substituted with a different face or voice employing deep learning to analyze speech or emotional content. Because of how clever these videos are frequently, Manipulation is challenging to spot. Social media are the most frequent and dangerous targets since they are weak outlets that are open to extortion or slander a human. In earlier times, it was not so easy to alter the videos, which… More >

Displaying 3041-3050 on page 305 of 7234. Per Page