Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (519)
  • Open Access

    ARTICLE

    A Lightweight Road Scene Semantic Segmentation Algorithm

    Jiansheng Peng1,2,*, Qing Yang1, Yaru Hou1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1929-1948, 2023, DOI:10.32604/cmc.2023.043524

    Abstract In recent years, with the continuous deepening of smart city construction, there have been significant changes and improvements in the field of intelligent transportation. The semantic segmentation of road scenes has important practical significance in the fields of automatic driving, transportation planning, and intelligent transportation systems. However, the current mainstream lightweight semantic segmentation models in road scene segmentation face problems such as poor segmentation performance of small targets and insufficient refinement of segmentation edges. Therefore, this article proposes a lightweight semantic segmentation model based on the LiteSeg model improvement to address these issues. The model uses the lightweight backbone network… More >

  • Open Access

    ARTICLE

    A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation

    Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Saddique4, Hijaz Ahmad5, Sameh Askar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2565-2578, 2023, DOI:10.32604/cmc.2023.040371

    Abstract Nowadays, one of the most important difficulties is the protection and privacy of confidential data. To address these problems, numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults. Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase. For the designing of a secure substitution box (S-box), non-linearity (NL) which is an algebraic property of the S-box has great importance. Consequently, the main focus of cryptographers is to achieve the S-box with a high value of… More >

  • Open Access

    ARTICLE

    Mathematical Study of MHD Micropolar Fluid Flow with Radiation and Dissipative Impacts over a Permeable Stretching Sheet: Slip Effects Phenomena

    Pudhari Srilatha1, Ahmed M. Hassan2, B. Shankar Goud3,*, E. Ranjit Kumar4

    Frontiers in Heat and Mass Transfer, Vol.21, pp. 539-562, 2023, DOI:10.32604/fhmt.2023.043023

    Abstract The purpose of this research is to investigate the influence that slip boundary conditions have on the rate of heat and mass transfer by examining the behavior of micropolar MHD flow across a porous stretching sheet. In addition to this, the impacts of thermal radiation and viscous dissipation are taken into account. With the use of various computing strategies, numerical results have been produced. Similarity transformation was utilized in order to convert the partial differential equations (PDEs) that regulated energy, rotational momentum, concentration, and momentum into ordinary differential equations (ODEs). As compared to earlier published research, MATLAB inbuilt solver solution… More > Graphic Abstract

    Mathematical Study of MHD Micropolar Fluid Flow with Radiation and Dissipative Impacts over a Permeable Stretching Sheet: Slip Effects Phenomena

  • Open Access

    ARTICLE

    Analysis of Tourism Demand Difference Based on Data Mining and Intelligent Analysis

    Peng Cheng1,2,*

    Journal on Big Data, Vol.5, pp. 69-84, 2023, DOI:10.32604/jbd.2023.046294

    Abstract To serve as a reference for future foreign tourism study, relevant tourist sectors have done in-depth investigations on foreign tourism both domestically and internationally. A study of outbound tourism activities from the viewpoint of tourists can examine its development law and create successful marketing tactics based on the rise in the number of foreign tourists. Based on this, this study suggests a data mining technique to examine the variations in travel needs and marketing tactics among various consumer groups. The combined example analysis demonstrates how logical and useful our data mining analysis is. Our data tests demonstrate that the tourism… More >

  • Open Access

    ARTICLE

    Fractal Fractional Order Operators in Computational Techniques for Mathematical Models in Epidemiology

    Muhammad Farman1,2,4, Ali Akgül3,9,*, Mir Sajjad Hashemi5, Liliana Guran6,7, Amelia Bucur8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1385-1403, 2024, DOI:10.32604/cmes.2023.028803

    Abstract New fractional operators, the COVID-19 model has been studied in this paper. By using different numerical techniques and the time fractional parameters, the mechanical characteristics of the fractional order model are identified. The uniqueness and existence have been established. The model’s Ulam-Hyers stability analysis has been found. In order to justify the theoretical results, numerical simulations are carried out for the presented method in the range of fractional order to show the implications of fractional and fractal orders. We applied very effective numerical techniques to obtain the solutions of the model and simulations. Also, we present conditions of existence for… More >

  • Open Access

    ARTICLE

    Solving Arithmetic Word Problems of Entailing Deep Implicit Relations by Qualia Syntax-Semantic Model

    Hao Meng, Xinguo Yu*, Bin He, Litian Huang, Liang Xue, Zongyou Qiu

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 541-555, 2023, DOI:10.32604/cmc.2023.041508

    Abstract Solving arithmetic word problems that entail deep implicit relations is still a challenging problem. However, significant progress has been made in solving Arithmetic Word Problems (AWP) over the past six decades. This paper proposes to discover deep implicit relations by qualia inference to solve Arithmetic Word Problems entailing Deep Implicit Relations (DIR-AWP), such as entailing commonsense or subject-domain knowledge involved in the problem-solving process. This paper proposes to take three steps to solve DIR-AWPs, in which the first three steps are used to conduct the qualia inference process. The first step uses the prepared set of qualia-quantity models to identify… More >

  • Open Access

    ARTICLE

    Solving Algebraic Problems with Geometry Diagrams Using Syntax-Semantics Diagram Understanding

    Litian Huang, Xinguo Yu, Lei Niu*, Zihan Feng

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 517-539, 2023, DOI:10.32604/cmc.2023.041206

    Abstract Solving Algebraic Problems with Geometry Diagrams (APGDs) poses a significant challenge in artificial intelligence due to the complex and diverse geometric relations among geometric objects. Problems typically involve both textual descriptions and geometry diagrams, requiring a joint understanding of these modalities. Although considerable progress has been made in solving math word problems, research on solving APGDs still cannot discover implicit geometry knowledge for solving APGDs, which limits their ability to effectively solve problems. In this study, a systematic and modular three-phase scheme is proposed to design an algorithm for solving APGDs that involve textual and diagrammatic information. The three-phase scheme… More >

  • Open Access

    REVIEW

    Survey on Deep Learning Approaches for Detection of Email Security Threat

    Mozamel M. Saeed1,*, Zaher Al Aghbari2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 325-348, 2023, DOI:10.32604/cmc.2023.036894

    Abstract Emailing is among the cheapest and most easily accessible platforms, and covers every idea of the present century like banking, personal login database, academic information, invitation, marketing, advertisement, social engineering, model creation on cyber-based technologies, etc. The uncontrolled development and easy access to the internet are the reasons for the increased insecurity in email communication. Therefore, this review paper aims to investigate deep learning approaches for detecting the threats associated with e-mail security. This study compiles the literature related to the deep learning methodologies, which are applicable for providing safety in the field of cyber security of email in different… More >

  • Open Access

    ARTICLE

    Ontology-Based Crime News Semantic Retrieval System

    Fiaz Majeed1, Afzaal Ahmad1, Muhammad Awais Hassan2, Muhammad Shafiq3,*, Jin-Ghoo Choi3, Habib Hamam4,5,6,7

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 601-614, 2023, DOI:10.32604/cmc.2023.036074

    Abstract Every day, the media reports tons of crimes that are considered by a large number of users and accumulate on a regular basis. Crime news exists on the Internet in unstructured formats such as books, websites, documents, and journals. From such homogeneous data, it is very challenging to extract relevant information which is a time-consuming and critical task for the public and law enforcement agencies. Keyword-based Information Retrieval (IR) systems rely on statistics to retrieve results, making it difficult to obtain relevant results. They are unable to understand the user's query and thus face word mismatches due to context changes… More >

  • Open Access

    REVIEW

    The Electrophysiology of Semantic Processing in Individuals with Autism Spectrum Disorder: A Meta-Analysis

    Danfeng Yuan1, Xiangyun Yang1, Lijuan Yang1, Zhanjiang Li1,2,*

    International Journal of Mental Health Promotion, Vol.25, No.10, pp. 1067-1079, 2023, DOI:10.32604/ijmhp.2023.041430

    Abstract Language difficulties vary widely among people with autism spectrum disorder (ASD). However, the semantic processing of autistic person and its underlying electrophysiological mechanism are still unclear. This meta-analysis aimed to explore the disturbance of semantic processing in patients with ASD. PubMed, Web of Science, and Embase were searched for event-related potential (ERP) studies on semantic processing in autistic people published in English before September 01, 2022. Pooled estimates were calculated by fixed-effects or random-effects models according to the heterogeneity using Comprehensive Meta-Analysis 2.0. The potential moderators were explored by meta-regression and subgroup analysis. This meta-analysis has been registered at the… More >

Displaying 1-10 on page 1 of 519. Per Page