Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,945)
  • Open Access

    ARTICLE

    Locating Steganalysis of LSB Matching Based on Spatial and Wavelet Filter Fusion

    Chunfang Yang1,*, Jie Wang1, Chengliang Lin1, Huiqin Chen2, Wenjuan Wang1

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 633-644, 2019, DOI:10.32604/cmc.2019.06154

    Abstract For the case of that only a single stego image of LSB (Least Significant Bit) matching steganography is available, the existing steganalysis algorithms cannot effectively locate the modified pixels. Therefore, an algorithm is proposed to locate the modified pixels of LSB matching based on spatial and wavelet filter fusion. Firstly, the validity of using the residuals obtained by spatial and wavelet filtering to locate the modified pixels of LSB matching is analyzed. It is pointed out that both of these two kinds of residuals can be used to identify the modified pixels of LSB matching with success rate higher than… More >

  • Open Access

    ARTICLE

    Investigation on the Chinese Text Sentiment Analysis Based on Convolutional Neural Networks in Deep Learning

    Feng Xu1, Xuefen Zhang2,*, Zhanhong Xin1, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 697-709, 2019, DOI:10.32604/cmc.2019.05375

    Abstract Nowadays, the amount of wed data is increasing at a rapid speed, which presents a serious challenge to the web monitoring. Text sentiment analysis, an important research topic in the area of natural language processing, is a crucial task in the web monitoring area. The accuracy of traditional text sentiment analysis methods might be degraded in dealing with mass data. Deep learning is a hot research topic of the artificial intelligence in the recent years. By now, several research groups have studied the sentiment analysis of English texts using deep learning methods. In contrary, relatively few works have so far… More >

  • Open Access

    ARTICLE

    An Automated Player Detection and Tracking in Basketball Game

    P. K. Santhosh1,*, B. Kaarthick2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 625-639, 2019, DOI:10.32604/cmc.2019.05161

    Abstract Vision-based player recognition is critical in sports applications. Accuracy, efficiency, and Low memory utilization is alluring for ongoing errands, for example, astute communicates and occasion classification. We developed an algorithm that tracks the movements of different players from a video of a basketball game. With their position tracked, we then proceed to map the position of these players onto an image of a basketball court. The purpose of tracking player is to provide the maximum amount of information to basketball coaches and organizations, so that they can better design mechanisms of defence and attack. Overall, our model has a high… More >

  • Open Access

    RETRACTION

    RETRACTED: Implementation System of Human Eye Tracking Algorithm Based on FPGA

    Zhong Liu1,2, Xin’an Wang1, Chengjun Sun1, Ken Lu3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 653-664, 2019, DOI:10.32604/cmc.2019.04597

    Abstract With the high-speed development of transportation industry, highway traffic safety has become a considerable problem. Meanwhile, with the development of embedded system and hardware chip, in recent years, human eye detection eye tracking and positioning technology have been more and more widely used in man-machine interaction, security access control and visual detection.
    In this paper, the high parallelism of FPGA was utilized to realize an elliptical approximate real-time human eye tracking system, which was achieved by the series register structure and random sample consensus (RANSAC), thus improving the speed of image processing without using external memory. Because eye images acquired by… More >

  • Open Access

    ARTICLE

    An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks

    Jin Wang1,2,3, Yu Gao3, Wei Liu3, Wenbing Wu1, Se-Jung Lim4,*

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 711-725, 2019, DOI:10.32604/cmc.2019.05450

    Abstract Recently, Wireless sensor networks (WSNs) have become very popular research topics which are applied to many applications. They provide pervasive computing services and techniques in various potential applications for the Internet of Things (IoT). An Asynchronous Clustering and Mobile Data Gathering based on Timer Mechanism (ACMDGTM) algorithm is proposed which would mitigate the problem of “hot spots” among sensors to enhance the lifetime of networks. The clustering process takes sensors’ location and residual energy into consideration to elect suitable cluster heads. Furthermore, one mobile sink node is employed to access cluster heads in accordance with the data overflow time and… More >

  • Open Access

    ARTICLE

    Research on the Law of Garlic Price Based on Big Data

    Feng Guo1, Pingzeng Liu1,*, Chao Zhang1, Weijie Chen1, Wei Han2, Wanming Ren4, Yong Zheng4, Jianrui Ding3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 795-808, 2019, DOI:10.32604/cmc.2019.03795

    Abstract In view of the frequent fluctuation of garlic price under the market economy and the current situation of garlic price, the fluctuation of garlic price in the circulation link of garlic industry chain is analyzed, and the application mode of multidisciplinary in the agricultural industry is discussed. On the basis of the big data platform of garlic industry chain, this paper constructs a Garch model to analyze the fluctuation law of garlic price in the circulation link and provides the garlic industry service from the angle of price fluctuation combined with the economic analysis. The research shows that the average… More >

  • Open Access

    ARTICLE

    Design of Feedback Shift Register of Against Power Analysis Attack

    Yongbin Zhao1,*, XuYang1, RanranLi1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 517-527, 2019, DOI:10.32604/cmc.2019.03680

    Abstract Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks.… More >

  • Open Access

    ARTICLE

    Forecasting Model Based on Information-Granulated GA-SVR and ARIMA for Producer Price Index

    Xiangyan Tang1,2, Liang Wang3, Jieren Cheng1,2,4,*, Jing Chen2, Victor S. Sheng5

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 463-491, 2019, DOI:10.32604/cmc.2019.03816

    Abstract The accuracy of predicting the Producer Price Index (PPI) plays an indispensable role in government economic work. However, it is difficult to forecast the PPI. In our research, we first propose an unprecedented hybrid model based on fuzzy information granulation that integrates the GA-SVR and ARIMA (Autoregressive Integrated Moving Average Model) models. The fuzzy-information-granulation-based GA-SVR-ARIMA hybrid model is intended to deal with the problem of imprecision in PPI estimation. The proposed model adopts the fuzzy information-granulation algorithm to pre-classification-process monthly training samples of the PPI, and produced three different sequences of fuzzy information granules, whose Support Vector Regression (SVR) machine… More >

  • Open Access

    ARTICLE

    The Application of BP Neural Networks to Analysis the National Vulnerability

    Guodong Zhao1, Yuewei Zhang1, Yiqi Shi2, Haiyan Lan1,*, Qing Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 421-436, 2019, DOI:10.32604/cmc.2019.03782

    Abstract Climate change is the main factor affecting the country’s vulnerability, meanwhile, it is also a complicated and nonlinear dynamic system. In order to solve this complex problem, this paper first uses the analytic hierarchy process (AHP) and natural breakpoint method (NBM) to implement an AHP-NBM comprehensive evaluation model to assess the national vulnerability. By using ArcGIS, national vulnerability scores are classified and the country’s vulnerability is divided into three levels: fragile, vulnerable, and stable. Then, a BP neural network prediction model which is based on multivariate linear regression is used to predict the critical point of vulnerability. The function of… More >

  • Open Access

    ARTICLE

    Research on the Relationship Between Garlic and Young Garlic Shoot Based on Big Data

    Feng Guo1, Pingzeng Liu1,*, Wanming Ren2, Ning Cao3, Chao Zhang1, Fujiang Wen1, Helen Min Zhou4

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 363-378, 2019, DOI:10.32604/cmc.2019.03794

    Abstract In view of the problems such as frequent fluctuation of garlic price, lack of efficient forecasting means and difficulty in realizing the steady development of garlic industry, combined with the current situation of garlic industry and the collected data information. Taking Big Data platform of garlic industry chain as the core, using the methods of correlation analysis, smoothness test, co-integration test, and Granger causality test, this paper analyzes the correlation, dynamic, and causality between garlic price and young garlic shoot price. According to the current situation of garlic industry, the garlic industry service based on Big Data is put forward.… More >

Displaying 2871-2880 on page 288 of 2945. Per Page