Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (873)
  • Open Access

    ARTICLE

    Speech Enhancement via Residual Dense Generative Adversarial Network

    Lin Zhou1,*, Qiuyue Zhong1, Tianyi Wang1, Siyuan Lu1, Hongmei Hu2

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 279-289, 2021, DOI:10.32604/csse.2021.016524 - 19 May 2021

    Abstract Generative adversarial networks (GANs) are paid more attention to dealing with the end-to-end speech enhancement in recent years. Various GAN-based enhancement methods are presented to improve the quality of reconstructed speech. However, the performance of these GAN-based methods is worse than those of masking-based methods. To tackle this problem, we propose speech enhancement method with a residual dense generative adversarial network (RDGAN) contributing to map the log-power spectrum (LPS) of degraded speech to the clean one. In detail, a residual dense block (RDB) architecture is designed to better estimate the LPS of clean speech, which… More >

  • Open Access

    ARTICLE

    Effect of the Proportion of Bamboo Scraps on the Properties of Bamboo Scraps/Magnesium Oxychloride Composites

    Long Zheng, Yiqiang Wu, Shu Wang, Guoan Sheng, Baorong Sun, Yingfeng Zuo*

    Journal of Renewable Materials, Vol.9, No.10, pp. 1729-1739, 2021, DOI:10.32604/jrm.2021.015143 - 12 May 2021

    Abstract This study was designed to solve the problem of large waste volume from bamboo processing residues in recent years. Using magnesium oxychloride (MO) cementitious material as the main material and bamboo residue (BR) as the reinforcing material, a BR/MO composite material was prepared. The effects of BR amount on the molding properties, mechanical strength, and water resistance of BR/MO composites were examined and discussed. Scanning electron microscopy (SEM), X-ray diffractometry (XRD), and thermogravimetric analysis were used to characterize composite microscopic morphology, crystalline structure, and heat resistance. The results showed that, when the BR content was… More >

  • Open Access

    ARTICLE

    Q-Learning Based Routing Protocol for Congestion Avoidance

    Daniel Godfrey1, Beom-Su Kim1, Haoran Miao1, Babar Shah2, Bashir Hayat3, Imran Khan4, Tae-Eung Sung5, Ki-Il Kim1,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3671-3692, 2021, DOI:10.32604/cmc.2021.017475 - 06 May 2021

    Abstract The end-to-end delay in a wired network is strongly dependent on congestion on intermediate nodes. Among lots of feasible approaches to avoid congestion efficiently, congestion-aware routing protocols tend to search for an uncongested path toward the destination through rule-based approaches in reactive/incident-driven and distributed methods. However, these previous approaches have a problem accommodating the changing network environments in autonomous and self-adaptive operations dynamically. To overcome this drawback, we present a new congestion-aware routing protocol based on a Q-learning algorithm in software-defined networks where logically centralized network operation enables intelligent control and management of network resources.… More >

  • Open Access

    ARTICLE

    Visibility Enhancement of Scene Images Degraded by Foggy Weather Condition: An Application to Video Surveillance

    Ghulfam Zahra1, Muhammad Imran1, Abdulrahman M. Qahtani2,*, Abdulmajeed Alsufyani2, Omar Almutiry3, Awais Mahmood3, Fayez Eid Alazemi4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3465-3481, 2021, DOI:10.32604/cmc.2021.017454 - 06 May 2021

    Abstract In recent years, video surveillance application played a significant role in our daily lives. Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence reduces the visibility. The reason behind visibility enhancement of foggy and haze images is to help numerous computer and machine vision applications such as satellite imagery, object detection, target killing, and surveillance. To remove fog and enhance visibility, a number of visibility enhancement algorithms and methods have been proposed in the past. However, these techniques suffer from several limitations that place strong obstacles to… More >

  • Open Access

    ARTICLE

    Enhancements of SDR-Based FPGA System for V2X-VLC Communications

    Lukas Danys1, Radek Martinek1, Rene Jaros1,*, Jan Baros1, Petr Simonik2, Vaclav Snasel3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3629-3652, 2021, DOI:10.32604/cmc.2021.017333 - 06 May 2021

    Abstract This pilot study focuses on a real measurements and enhancements of a software defined radio-based system for vehicle-to everything visible light communication (SDR-V2X-VLC). The presented system is based on a novel adaptive optimization of the feed-forward software defined equalization (FFSDE) methods of the least mean squares (LMS), normalized LMS (NLMS) and QR decomposition-based recursive least squares (QR-RLS) algorithms. Individual parameters of adaptive equalizations are adjusted in real-time to reach the best possible results. Experiments were carried out on a conventional LED Octavia III taillight drafted directly from production line and universal software radio peripherals (USRP)… More >

  • Open Access

    ARTICLE

    Kernel Search-Framework for Dynamic Controller Placement in Software-Defined Network

    Ali Abdi Seyedkolaei1, Seyed Amin Hosseini Seno1,*, Rahmat Budiarto2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3391-3410, 2021, DOI:10.32604/cmc.2021.017313 - 06 May 2021

    Abstract In software-defined networking (SDN) networks, unlike traditional networks, the control plane is located separately in a device or program. One of the most critical problems in these networks is a controller placement problem, which has a significant impact on the network’s overall performance. This paper attempts to provide a solution to this problem aiming to reduce the operational cost of the network and improve their survivability and load balancing. The researchers have proposed a suitable framework called kernel search introducing integer programming formulations to address the controller placement problem. It demonstrates through careful computational studies More >

  • Open Access

    ARTICLE

    Joint Event Extraction Based on Global Event-Type Guidance and Attention Enhancement

    Daojian Zeng1, Jian Tian2, Ruoyao Peng1, Jianhua Dai1,*, Hui Gao3, Peng Peng4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4161-4173, 2021, DOI:10.32604/cmc.2021.017028 - 06 May 2021

    Abstract Event extraction is one of the most challenging tasks in information extraction. It is a common phenomenon where multiple events exist in the same sentence. However, extracting multiple events is more difficult than extracting a single event. Existing event extraction methods based on sequence models ignore the interrelated information between events because the sequence is too long. In addition, the current argument extraction relies on the results of syntactic dependency analysis, which is complicated and prone to error transmission. In order to solve the above problems, a joint event extraction method based on global event-type… More >

  • Open Access

    ARTICLE

    Automated Controller Placement for Software-Defined Networks to Resist DDoS Attacks

    Muhammad Reazul Haque1, Saw Chin Tan1, Zulfadzli Yusoff2,*, Kashif Nisar3,5,6, Lee Ching Kwang2,7, Rizaludin Kaspin4, Bhawani Shankar Chowdhry5, Rajkumar Buyya8, Satya Prasad Majumder9, Manoj Gupta10, Shuaib Memon11

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3147-3165, 2021, DOI:10.32604/cmc.2021.016591 - 06 May 2021

    Abstract In software-defined networks (SDNs), controller placement is a critical factor in the design and planning for the future Internet of Things (IoT), telecommunication, and satellite communication systems. Existing research has concentrated largely on factors such as reliability, latency, controller capacity, propagation delay, and energy consumption. However, SDNs are vulnerable to distributed denial of service (DDoS) attacks that interfere with legitimate use of the network. The ever-increasing frequency of DDoS attacks has made it necessary to consider them in network design, especially in critical applications such as military, health care, and financial services networks requiring high… More >

  • Open Access

    ARTICLE

    Reinforcement Learning-Based Optimization for Drone Mobility in 5G and Beyond Ultra-Dense Networks

    Jawad Tanveer1, Amir Haider2, Rashid Ali2, Ajung Kim1,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3807-3823, 2021, DOI:10.32604/cmc.2021.016087 - 06 May 2021

    Abstract Drone applications in 5th generation (5G) networks mainly focus on services and use cases such as providing connectivity during crowded events, human-instigated disasters, unmanned aerial vehicle traffic management, internet of things in the sky, and situation awareness. 4G and 5G cellular networks face various challenges to ensure dynamic control and safe mobility of the drone when it is tasked with delivering these services. The drone can fly in three-dimensional space. The drone connectivity can suffer from increased handover cost due to several reasons, including variations in the received signal strength indicator, co-channel interference offered to… More >

  • Open Access

    ARTICLE

    Energy Efficient Clustering Protocol to Enhance Network Lifetime in Wireless Sensor Networks

    S. Nanthini1,*, S. Nithya Kalyani2, Sudhakar Sengan3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3595-3614, 2021, DOI:10.32604/cmc.2021.015038 - 06 May 2021

    Abstract In this paper, the energy conservation in the ununiform clustered network field is proposed. The fundamental reason behind the methodology is that in the process of CH election, nodes Competition Radius (CR) task is based on not just the space between nodes and their Residual Energy (RE), which is utilized in Energy-Aware Distributed Unequal Clustering (EADUC) protocol but also a third-degree factor, i.e., the nearby multi-hop node count. In contrast, a third-factor nearby nodes count is also used. This surrounding data is taken into account in the clustering feature to increase the network’s life span. More >

Displaying 601-610 on page 61 of 873. Per Page