Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (199)
  • Open Access

    ARTICLE

    A Lightweight Model of VGG-U-Net for Remote Sensing Image Classification

    Mu Ye1,2,3,4, Li Ji1, Luo Tianye1, Li Sihan5, Zhang Tong1, Feng Ruilong1, Hu Tianli1,2,3,4, Gong He1,2,3,4, Guo Ying1,2,3,4, Sun Yu1,2,3,4, Thobela Louis Tyasi6, Li Shijun7,8,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6195-6205, 2022, DOI:10.32604/cmc.2022.026880 - 28 July 2022

    Abstract Remote sensing image analysis is a basic and practical research hotspot in remote sensing science. Remote sensing images contain abundant ground object information and it can be used in urban planning, agricultural monitoring, ecological services, geological exploration and other aspects. In this paper, we propose a lightweight model combining vgg-16 and u-net network. By combining two convolutional neural networks, we classify scenes of remote sensing images. While ensuring the accuracy of the model, try to reduce the memory of the model. According to the experimental results of this paper, we have improved the accuracy of… More >

  • Open Access

    ARTICLE

    Investigation on Thermal Insulation and Mechanical Strength of Lightweight Aggregate Concrete and Porous Mortar in Cold Regions

    Jianan Wu1, Ke Xue2, Zhaowei Ding3, Lei Lang3, Kang Gu3, Xiaolin Li4, Mingli Zhang5, Desheng Li3,6,*

    Journal of Renewable Materials, Vol.10, No.12, pp. 3167-3183, 2022, DOI:10.32604/jrm.2022.020265 - 14 July 2022

    Abstract Thermal insulation is an important indicator to evaluate the construction material in cold region engineering. As we know, adding the industrial waste as lightweight aggregate or creating the pore inside the cement-based composite could make the texture loose, and the thermal insulating capacity of the material would be improved with this texture. Using these methods, the industrial by-product and engineering waste could be cycled in an efficient way. Moreover, after service the fragmented cement composites paste could be used as aggregate in the thermal insulating concrete again. While the porous texture is not favorable for… More > Graphic Abstract

    Investigation on Thermal Insulation and Mechanical Strength of Lightweight Aggregate Concrete and Porous Mortar in Cold Regions

  • Open Access

    ARTICLE

    Disease Recognition of Apple Leaf Using Lightweight Multi-Scale Network with ECANet

    Helong Yu, Xianhe Cheng, Ziqing Li, Qi Cai, Chunguang Bi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 711-738, 2022, DOI:10.32604/cmes.2022.020263 - 27 June 2022

    Abstract To solve the problem of difficulty in identifying apple diseases in the natural environment and the low application rate of deep learning recognition networks, a lightweight ResNet (LW-ResNet) model for apple disease recognition is proposed. Based on the deep residual network (ResNet18), the multi-scale feature extraction layer is constructed by group convolution to realize the compression model and improve the extraction ability of different sizes of lesion features. By improving the identity mapping structure to reduce information loss. By introducing the efficient channel attention module (ECANet) to suppress noise from a complex background. The experimental… More >

  • Open Access

    ARTICLE

    Skeleton Keypoints Extraction Method Combined with Object Detection

    Jiabao Shi1, Zhao Qiu1,*, Tao Chen1, Jiale Lin1, Hancheng Huang2, Yunlong He3, Yu Yang3

    Journal of New Media, Vol.4, No.2, pp. 97-106, 2022, DOI:10.32604/jnm.2022.027176 - 13 June 2022

    Abstract Big data is a comprehensive result of the development of the Internet of Things and information systems. Computer vision requires a lot of data as the basis for research. Because skeleton data can adapt well to dynamic environment and complex background, it is used in action recognition tasks. In recent years, skeleton-based action recognition has received more and more attention in the field of computer vision. Therefore, the keypoints of human skeletons are essential for describing the pose estimation of human and predicting the action recognition of the human. This paper proposes a skeleton point More >

  • Open Access

    ARTICLE

    A Secure and Lightweight Chaos Based Image Encryption Scheme

    Fadia Ali Khan1, Jameel Ahmed1, Fehaid Alqahtani2, Suliman A. Alsuhibany3, Fawad Ahmed4, Jawad Ahmad5,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 279-294, 2022, DOI:10.32604/cmc.2022.028789 - 18 May 2022

    Abstract In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffusion. The proposed scheme containing both confusion and diffusion modules are highly secure and effective as compared to the existing schemes. Initially, an image (red, green, and blue components) is partitioned into blocks with an equal number of pixels. Each block is then processed with Tinkerbell Chaotic Map (TBCM) to get shuffled pixels and shuffled blocks. Composite Fractal Function (CFF) change the value of pixels of each color component More >

  • Open Access

    ARTICLE

    A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection

    Jie Chen1, Chengsheng Yuan1,2,*, Chen Cui2, Zhihua Xia1, Xingming Sun1,3, Thangarajah Akilan4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 719-733, 2022, DOI:10.32604/cmc.2022.027984 - 18 May 2022

    Abstract Fingerprint identification systems have been widely deployed in many occasions of our daily life. However, together with many advantages, they are still vulnerable to the presentation attack (PA) by some counterfeit fingerprints. To address challenges from PA, fingerprint liveness detection (FLD) technology has been proposed and gradually attracted people's attention. The vast majority of the FLD methods directly employ convolutional neural network (CNN), and rarely pay attention to the problem of over-parameterization and over-fitting of models, resulting in large calculation force of model deployment and poor model generalization. Aiming at filling this gap, this paper… More >

  • Open Access

    ARTICLE

    Modified Anam-Net Based Lightweight Deep Learning Model for Retinal Vessel Segmentation

    Syed Irtaza Haider1, Khursheed Aurangzeb2,*, Musaed Alhussein2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1501-1526, 2022, DOI:10.32604/cmc.2022.025479 - 18 May 2022

    Abstract The accurate segmentation of retinal vessels is a challenging task due to the presence of various pathologies as well as the low-contrast of thin vessels and non-uniform illumination. In recent years, encoder-decoder networks have achieved outstanding performance in retinal vessel segmentation at the cost of high computational complexity. To address the aforementioned challenges and to reduce the computational complexity, we propose a lightweight convolutional neural network (CNN)-based encoder-decoder deep learning model for accurate retinal vessels segmentation. The proposed deep learning model consists of encoder-decoder architecture along with bottleneck layers that consist of depth-wise squeezing, followed… More >

  • Open Access

    ARTICLE

    Lightweight Algorithm for MQTT Protocol to Enhance Power Consumption in Healthcare Environment

    Anwar D. Alhejaili*, Omar H. Alhazmi

    Journal on Internet of Things, Vol.4, No.1, pp. 21-33, 2022, DOI:10.32604/jiot.2022.019893 - 16 May 2022

    Abstract Internet of things (IoT) is used in various fields such as smart cities, smart home, manufacturing industries, and healthcare. Its application in healthcare has many advantages and disadvantages. One of its most common protocols is Message Queue Telemetry Transport (MQTT). MQTT protocol works as a publisher/subscriber which is suitable for IoT devices with limited power. One of the drawbacks of MQTT is that it is easy to manipulate. The default security provided by MQTT during user authentication, through username and password, does not provide any type of data encryption, to ensure confidentiality or integrity. This… More >

  • Open Access

    ARTICLE

    A Framework of Lightweight Deep Cross-Connected Convolution Kernel Mapping Support Vector Machines

    Qi Wang1, Zhaoying Liu1, Ting Zhang1,*, Shanshan Tu1, Yujian Li2, Muhammad Waqas3

    Journal on Artificial Intelligence, Vol.4, No.1, pp. 37-48, 2022, DOI:10.32604/jai.2022.027875 - 16 May 2022

    Abstract Deep kernel mapping support vector machines have achieved good results in numerous tasks by mapping features from a low-dimensional space to a high-dimensional space and then using support vector machines for classification. However, the depth kernel mapping support vector machine does not take into account the connection of different dimensional spaces and increases the model parameters. To further improve the recognition capability of deep kernel mapping support vector machines while reducing the number of model parameters, this paper proposes a framework of Lightweight Deep Convolutional Cross-Connected Kernel Mapping Support Vector Machines (LC-CKMSVM). The framework consists More >

  • Open Access

    ARTICLE

    Lightweight Authentication Protocol Based on Physical Unclonable Function

    Hanguang Luo1, Tao Zou1,*, Chunming Wu2, Dan Li3, Shunbin Li1, Chu Chu4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5031-5040, 2022, DOI:10.32604/cmc.2022.027118 - 21 April 2022

    Abstract In the emerging Industrial Internet of Things (IIoT), authentication problems have become an urgent issue for massive resource-constrained devices because traditional costly security mechanisms are not suitable for them. The security protocol designed for resource-constrained systems should not only be secure but also efficient in terms of usage of energy, storage, and processing. Although recently many lightweight schemes have been proposed, to the best of our knowledge, they are unable to address the problem of privacy preservation with the resistance of Denial of Service (DoS) attacks in a practical way. In this paper, we propose More >

Displaying 151-160 on page 16 of 199. Per Page