Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (130)
  • Open Access

    ARTICLE

    Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique

    Ali A. R. Alkhafaji*, Nilam Nur Amir Sjarif, M. A. Shahidan, Nurulhuda Firdaus Mohd Azmi, Haslina Md Sarkan, Suriayati Chuprat

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 77-102, 2021, DOI:10.32604/cmc.2021.015770

    Abstract The text of the Quran is principally dependent on the Arabic language. Therefore, improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difficult challenges that researchers face today. Consequently, the diacritical marks in the Holy Quran which represent Arabic vowels () known as the kashida (or “extended letters”) must be protected from changes. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC); thus, the location for tamper… More >

  • Open Access

    ARTICLE

    Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

    V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4005-4018, 2021, DOI:10.32604/cmc.2021.014643

    Abstract Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need of reliability and authentication. By… More >

  • Open Access

    ARTICLE

    Three-Dimensional Distance-Error-Correction-Based Hop Localization Algorithm for IoT Devices

    Deepak Prashar1, Gyanendra Prasad Joshi2, Sudan Jha1, Eunmok Yang3, Kwang Chul Son4,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1529-1549, 2021, DOI:10.32604/cmc.2020.012986

    Abstract The Internet of Things (IoT) is envisioned as a network of various wireless sensor nodes communicating with each other to offer state-of-the-art solutions to real-time problems. These networks of wireless sensors monitor the physical environment and report the collected data to the base station, allowing for smarter decisions. Localization in wireless sensor networks is to localize a sensor node in a two-dimensional plane. However, in some application areas, such as various surveillances, underwater monitoring systems, and various environmental monitoring applications, wireless sensors are deployed in a three-dimensional plane. Recently, localization-based applications have emerged as one of the most promising services… More >

  • Open Access

    ARTICLE

    Thylakoid Transit Peptide Is Related to the Expression and Localization of NdhB Subunits in Soybean

    Siyi Fu1,#, Tao Yun2,#, Dexuan Ma1, Bingsong Zheng1, Dean Jiang3, Yi He1,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.1, pp. 99-110, 2021, DOI:10.32604/phyton.2021.013262

    Abstract The chloroplast NAD(P)H dehydrogenase (NDH) complex, as one of the most important photosynthesis protein complexes in thylakoid membrane, is involved in photosystem I (PSI) cyclic electron transport (CEF). Under abiotic environmental stress, the photosynthetic apparatus is susceptible to the damage caused by the strong light illumination. However, the enhancement of NDHdependent CEF could facilitate the alleviation of the damage to the photosynthetic apparatus. The NdhB subunit encoded by chloroplast genome is one of most important subunits of NDH complex and consists of 510 amino acids. Here, according to cloning ndhB from Melrose (cultivated soybean), ACC547 (wild salt-tolerant soybean), S113-6 and… More >

  • Open Access

    ARTICLE

    Non-Linear Localization Algorithm Based on Newton Iterations

    Jianfeng Lu*, Guirong Fei

    Journal on Internet of Things, Vol.2, No.4, pp. 129-134, 2020, DOI:10.32604/jiot.2020.07196

    Abstract In order to improve the performance of time difference of arrival (TDOA) localization, a nonlinear least squares algorithm is proposed in this paper. Firstly, based on the criterion of the minimized sum of square error of time difference of arrival, the location estimation is expressed as an optimal problem of a non-linear programming. Then, an initial point is obtained using the semi-definite programming. And finally, the location is extracted from the local optimal solution acquired by Newton iterations. Simulation results show that when the number of anchor nodes is large, the performance of the proposed algorithm will be significantly better… More >

  • Open Access

    ARTICLE

    The SLAM Algorithm for Multiple Robots Based on Parameter Estimation

    MengYuan Chen1,2

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 593-602, 2018, DOI:10.31209/2018.100000026

    Abstract With the increasing number of feature points of a map, the dimension of systematic observation is added gradually, which leads to the deviation of the volume points from the desired trajectory and significant errors on the state estimation. An Iterative Squared-Root Cubature Kalman Filter (ISR-CKF) algorithm proposed is aimed at improving the SR-CKF algorithm on the simultaneous localization and mapping (SLAM). By introducing the method of iterative updating, the sample points are re-determined by the estimated value and the square root factor, which keeps the distortion small in the highly nonlinear environment and improves the precision further. A robust tracking… More >

  • Open Access

    ARTICLE

    Comparison of Local Descriptors for Humanoid Robots Localization Using a Visual Bag of Words Approach

    Noé G. Aldana-Murillo, Jean-Bernard Hayet, Héctor M. Becerra

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 471-481, 2018, DOI:10.1080/10798587.2017.1304508

    Abstract In this paper, we address the problem of the appearance-based localization of a humanoid robot, in the context of robot navigation. We only use information obtained by a single sensor, in this case the camera mounted on the robot. We aim at determining the most similar image within a previously acquired set of key images (also referred to as a visual memory) to the current view of the monocular camera carried by the robot. The robot is initially kidnapped and the current image has to be compared with the visual memory. To solve this problem, we rely on a hierarchical… More >

  • Open Access

    ARTICLE

    An Improved DV-Hop Localization Algorithm Based on Selected Anchors

    Jing Wang1, *, Anqi Hou1, Yuanfei Tu1, Hong Yu2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 977-991, 2020, DOI:10.32604/cmc.2020.011003

    Abstract Wireless Sensor Network (WSN) based applications has been extraordinarily helpful in monitoring interested area. Only information of surrounding environment with meaningful geometric information is useful. How to design the localization algorithm that can effectively extract unknown node position has been a challenge in WSN. Among all localization technologies, the Distance Vector-Hop (DV-Hop) algorithm has been most popular because it simply utilizes the hop counts as connectivity measurements. This paper proposes an improved DV-Hop based algorithm, a centroid DV-hop localization with selected anchors and inverse distance weighting schemes (SIC-DV-Hop). We adopt an inverse distance weighting method for average distance amelioration to… More >

  • Open Access

    ARTICLE

    A Pupil-Positioning Method Based on the Starburst Model

    Pingping Yu1, Wenjie Duan1, Yi Sun2, Ning Cao3, *, Zhenzhou Wang1, Guojun Lu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1199-1217, 2020, DOI:10.32604/cmc.2020.010384

    Abstract Human eye detection has become an area of interest in the field of computer vision with an extensive range of applications in human-computer interaction, disease diagnosis, and psychological and physiological studies. Gaze-tracking systems are an important research topic in the human-computer interaction field. As one of the core modules of the head-mounted gaze-tracking system, pupil positioning affects the accuracy and stability of the system. By tracking eye movements to better locate the center of the pupil, this paper proposes a method for pupil positioning based on the starburst model. The method uses vertical and horizontal coordinate integral projections in the… More >

  • Open Access

    ARTICLE

    Sound Source Localization Based on SRP-PHAT Spatial Spectrum and Deep Neural Network

    Xiaoyan Zhao1, *, Shuwen Chen2, Lin Zhou3, Ying Chen3, 4

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 253-271, 2020, DOI:10.32604/cmc.2020.09848

    Abstract Microphone array-based sound source localization (SSL) is a challenging task in adverse acoustic scenarios. To address this, a novel SSL algorithm based on deep neural network (DNN) using steered response power-phase transform (SRP-PHAT) spatial spectrum as input feature is presented in this paper. Since the SRP-PHAT spatial power spectrum contains spatial location information, it is adopted as the input feature for sound source localization. DNN is exploited to extract the efficient location information from SRP-PHAT spatial power spectrum due to its advantage on extracting high-level features. SRP-PHAT at each steering position within a frame is arranged into a vector, which… More >

Displaying 81-90 on page 9 of 130. Per Page