Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (936)
  • Open Access

    ARTICLE

    ASLP-DL —A Novel Approach Employing Lightweight Deep Learning Framework for Optimizing Accident Severity Level Prediction

    Saba Awan1,*, Zahid Mehmood2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2535-2555, 2024, DOI:10.32604/cmc.2024.047337

    Abstract Highway safety researchers focus on crash injury severity, utilizing deep learning—specifically, deep neural networks (DNN), deep convolutional neural networks (D-CNN), and deep recurrent neural networks (D-RNN)—as the preferred method for modeling accident severity. Deep learning’s strength lies in handling intricate relationships within extensive datasets, making it popular for accident severity level (ASL) prediction and classification. Despite prior success, there is a need for an efficient system recognizing ASL in diverse road conditions. To address this, we present an innovative Accident Severity Level Prediction Deep Learning (ASLP-DL) framework, incorporating DNN, D-CNN, and D-RNN models fine-tuned through iterative hyperparameter selection with Stochastic… More >

  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1881-1895, 2024, DOI:10.32604/cmc.2023.047243

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust clustering algorithm. We perform feature… More >

  • Open Access

    ARTICLE

    A Blockchain and CP-ABE Based Access Control Scheme with Fine-Grained Revocation of Attributes in Cloud Health

    Ye Lu1,*, Tao Feng1, Chunyan Liu2, Wenbo Zhang3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2787-2811, 2024, DOI:10.32604/cmc.2023.046106

    Abstract The Access control scheme is an effective method to protect user data privacy. The access control scheme based on blockchain and ciphertext policy attribute encryption (CP–ABE) can solve the problems of single—point of failure and lack of trust in the centralized system. However, it also brings new problems to the health information in the cloud storage environment, such as attribute leakage, low consensus efficiency, complex permission updates, and so on. This paper proposes an access control scheme with fine-grained attribute revocation, keyword search, and traceability of the attribute private key distribution process. Blockchain technology tracks the authorization of attribute private… More >

  • Open Access

    ARTICLE

    Improved Data Stream Clustering Method: Incorporating KD-Tree for Typicality and Eccentricity-Based Approach

    Dayu Xu1,#, Jiaming Lü1,#, Xuyao Zhang2, Hongtao Zhang1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2557-2573, 2024, DOI:10.32604/cmc.2024.045932

    Abstract Data stream clustering is integral to contemporary big data applications. However, addressing the ongoing influx of data streams efficiently and accurately remains a primary challenge in current research. This paper aims to elevate the efficiency and precision of data stream clustering, leveraging the TEDA (Typicality and Eccentricity Data Analysis) algorithm as a foundation, we introduce improvements by integrating a nearest neighbor search algorithm to enhance both the efficiency and accuracy of the algorithm. The original TEDA algorithm, grounded in the concept of “Typicality and Eccentricity Data Analytics”, represents an evolving and recursive method that requires no prior knowledge. While the… More >

  • Open Access

    ARTICLE

    Improving the Accuracy of Vegetation Index Retrieval for Biomass by Combining Ground-UAV Hyperspectral Data–A New Method for Inner Mongolia Typical Grasslands

    Ruochen Wang1,#, Jianjun Dong2,#, Lishan Jin3, Yuyan Sun3, Taogetao Baoyin2, Xiumei Wang*

    Phyton-International Journal of Experimental Botany, Vol.93, No.2, pp. 387-411, 2024, DOI:10.32604/phyton.2024.047573

    Abstract Grassland biomass is an important parameter of grassland ecosystems. The complexity of the grassland canopy vegetation spectrum makes the long-term assessment of grassland growth a challenge. Few studies have explored the original spectral information of typical grasslands in Inner Mongolia and examined the influence of spectral information on aboveground biomass (AGB) estimation. In order to improve the accuracy of vegetation index inversion of grassland AGB, this study combined ground and Unmanned Aerial Vehicle (UAV) remote sensing technology and screened sensitive bands through ground hyperspectral data transformation and correlation analysis. The narrow band vegetation indices were calculated, and ground and airborne… More >

  • Open Access

    ARTICLE

    A Bibliometric Analysis Unveils Valuable Insights into the Past, Present, and Future Dynamics of Plant Acclimation to Temperature

    Yong Cui, Yongju Zhao, Shengnan Ouyang, Changchang Shao, Liangliang Li, Honglang Duan*

    Phyton-International Journal of Experimental Botany, Vol.93, No.2, pp. 291-312, 2024, DOI:10.32604/phyton.2024.047281

    Abstract Plant temperature acclimation is closely related to maintaining a positive carbon gain under future climate change. However, no systematic summary of the field has been conducted. Based on this, we analyzed data on plant temperature acclimation from the Web of Science Core Collection database using bibliometric software R, RStudio and VOSviewer. Our study demonstrated that a stabilized upward trajectory was noted in publications (298 papers) from 1986 to 2011, followed by a swift growth (373 papers) from 2012 to 2022. The most impactful journals were Plant Cell and Environment, boasting the greatest count of worldwide citations and articles, the highest… More >

  • Open Access

    ARTICLE

    Physiological and Transcriptome Analysis Illuminates the Molecular Mechanisms of the Drought Resistance Improved by Alginate Oligosaccharides in Triticum aestivum L.

    Yunhong Zhang1,2,*, Yonghui Yang1,2, Jiawei Mao1,2

    Phyton-International Journal of Experimental Botany, Vol.93, No.2, pp. 185-212, 2024, DOI:10.32604/phyton.2023.046811

    Abstract Alginate oligosaccharides (AOS) enhance drought resistance in wheat (Triticum aestivum L.), but the definite mechanisms remain largely unknown. The physiological and transcriptome responses of wheat seedlings treated with AOS were analyzed under drought stress simulated with polyethylene glycol-6000. The results showed that AOS promoted the growth of wheat seedlings and reduced oxidative damage by improving peroxidase and superoxide dismutase activities under drought stress. A total of 10,064 and 15,208 differentially expressed unigenes (DEGs) obtained from the AOS treatment and control samples at 24 and 72 h after dehydration, respectively, were mainly enriched in the biosynthesis of secondary metabolites (phenylpropanoid biosynthesis,… More >

  • Open Access

    ARTICLE

    Optimizing Deep Neural Networks for Face Recognition to Increase Training Speed and Improve Model Accuracy

    Mostafa Diba*, Hossein Khosravi

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 315-332, 2023, DOI:10.32604/iasc.2023.046590

    Abstract Convolutional neural networks continually evolve to enhance accuracy in addressing various problems, leading to an increase in computational cost and model size. This paper introduces a novel approach for pruning face recognition models based on convolutional neural networks. The proposed method identifies and removes inefficient filters based on the information volume in feature maps. In each layer, some feature maps lack useful information, and there exists a correlation between certain feature maps. Filters associated with these two types of feature maps impose additional computational costs on the model. By eliminating filters related to these categories of feature maps, the reduction… More >

  • Open Access

    ARTICLE

    Associations of Domain and Pattern of Sedentary Behaviors with Symptoms of Mental Disorders in Saudi Adults: ‘The Sedentary Behavior Paradox’

    Abdullah B. Alansare*

    International Journal of Mental Health Promotion, Vol.26, No.1, pp. 11-20, 2024, DOI:10.32604/ijmhp.2023.044656

    Abstract Emerging evidence suggests the existence of ‘paradoxical’ relationships between domain-specific sedentary behavior (SB) and health outcomes. This study assessed the associations of total and domain-specific SB, by pattern, with symptoms of mental disorders in Saudi adults. Participants (n = 554) completed a web-based survey between January 18th, 2023 and February 5th, 2023. Total SB was measured by using the Sedentary Behavior Questionnaire. Total SB was then partitioned into leisure, occupational, and commuting SB during weekdays and on weekend days. Symptoms of mental disorders including symptoms of depression, anxiety, and stress were evaluated by using the DASS-21 questionnaire. Adjusted linear regressions… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058

    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system throughput; Finally, map resource access… More >

Displaying 31-40 on page 4 of 936. Per Page