Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,889)
  • Open Access

    ARTICLE

    Non-Contact Real-Time Heart Rate Measurement Algorithm Based on PPG-Standard Deviation

    Jiancheng Zou1,*, Tianshu Chen1, Xin Yang2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1029-1040, 2019, DOI:10.32604/cmc.2019.05793

    Abstract Heart rate is an important physiological parameter for clinical diagnosis, it can infer the health of the human body. Thus, efficient and accurate heart rate measurement is important for disease diagnosis and health monitoring. There are two ways to measure heart rate. One is contact type and the other is non-contact. Contact measurement methods include pulse cutting, electrocardiogram, etc. Because of the inconvenience of this method, a non-contact heart rate method has been proposed. Traditional non-contact measurement method based on image is collecting RGB three-channel signals in continuous video and selecting the average value of the green channel pixels as… More >

  • Open Access

    ARTICLE

    MalDetect: A Structure of Encrypted Malware Traffic Detection

    Jiyuan Liu1, Yingzhi Zeng2, Jiangyong Shi2, Yuexiang Yang2,∗, Rui Wang3, Liangzhong He4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 721-739, 2019, DOI:10.32604/cmc.2019.05610

    Abstract Recently, TLS protocol has been widely used to secure the application data carried in network traffic. It becomes more difficult for attackers to decipher messages through capturing the traffic generated from communications of hosts. On the other hand, malwares adopt TLS protocol when accessing to internet, which makes most malware traffic detection methods, such as DPI (Deep Packet Inspection), ineffective. Some literatures use statistical method with extracting the observable data fields exposed in TLS connections to train machine learning classifiers so as to infer whether a traffic flow is malware or not. However, most of them adopt the features based… More >

  • Open Access

    ARTICLE

    Key Process Protection of High Dimensional Process Data in Complex Production

    He Shi1,2,3,4, Wenli Shang1,2,3,4,*, Chunyu Chen1,2,3,4, Jianming Zhao1,2,3,4, Long Yin1, 2, 3, 4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 645-658, 2019, DOI:10.32604/cmc.2019.05648

    Abstract In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame is designed in this paper. The key process is located by using the random forest model firstly, then the process data feature selection, dimension reduction and noise reduction are processed. Finally, the validity of the model is verified by simulation experiments. It is shown that this method can effectively reduce the prediction accuracy variance and improve the generalization ability of the traditional anomaly detection model from the… More >

  • Open Access

    ARTICLE

    An Automated Player Detection and Tracking in Basketball Game

    P. K. Santhosh1,*, B. Kaarthick2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 625-639, 2019, DOI:10.32604/cmc.2019.05161

    Abstract Vision-based player recognition is critical in sports applications. Accuracy, efficiency, and Low memory utilization is alluring for ongoing errands, for example, astute communicates and occasion classification. We developed an algorithm that tracks the movements of different players from a video of a basketball game. With their position tracked, we then proceed to map the position of these players onto an image of a basketball court. The purpose of tracking player is to provide the maximum amount of information to basketball coaches and organizations, so that they can better design mechanisms of defence and attack. Overall, our model has a high… More >

  • Open Access

    ARTICLE

    A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things

    Baowei Wang1,2,*, Weiwen Kong1, Wei Li1, Neal N. Xiong3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 679-695, 2019, DOI:10.32604/cmc.2019.06106

    Abstract Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only increase the data size, but… More >

  • Open Access

    ARTICLE

    R2N: A Novel Deep Learning Architecture for Rain Removal from Single Image

    Yecai Guo1,2,*, Chen Li1,2, Qi Liu3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 829-843, 2019, DOI:10.32604/cmc.2019.03729

    Abstract Visual degradation of captured images caused by rainy streaks under rainy weather can adversely affect the performance of many open-air vision systems. Hence, it is necessary to address the problem of eliminating rain streaks from the individual rainy image. In this work, a deep convolution neural network (CNN) based method is introduced, called Rain-Removal Net (R2N), to solve the single image de-raining issue. Firstly, we decomposed the rainy image into its high-frequency detail layer and low-frequency base layer. Then, we used the high-frequency detail layer to input the carefully designed CNN architecture to learn the mapping between it and its… More >

  • Open Access

    ARTICLE

    Online Magnetic Flux Leakage Detection System for Sucker Rod Defects Based on LabVIEW Programming

    Ou Zhang1,*, Xueye Wei1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 529-544, 2019, DOI:10.32604/cmc.2019.04075

    Abstract Aiming at the detection of the sucker rod defects, a real-time detection system is designed using the non-destructive testing technology of magnetic flux leakage (MFL). An MFL measurement system consists of many parts, and this study focuses on the signal acquisition and processing system. First of all, this paper introduces the hardware part of the acquisition system in detail, including the selection of the Hall-effect sensor, the design of the signal conditioning circuit, and the working process of the single chip computer (SCM) control serial port. Based on LabVIEW, a graphical programming software, the software part of the acquisition system… More >

  • Open Access

    ARTICLE

    Detecting Iris Liveness with Batch Normalized Convolutional Neural Network

    Min Long1,2,*, Yan Zeng1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 493-504, 2019, DOI:10.32604/cmc.2019.04378

    Abstract Aim to countermeasure the presentation attack for iris recognition system, an iris liveness detection scheme based on batch normalized convolutional neural network (BNCNN) is proposed to improve the reliability of the iris authentication system. The BNCNN architecture with eighteen layers is constructed to detect the genuine iris and fake iris, including convolutional layer, batch-normalized (BN) layer, Relu layer, pooling layer and full connected layer. The iris image is first preprocessed by iris segmentation and is normalized to 256×256 pixels, and then the iris features are extracted by BNCNN. With these features, the genuine iris and fake iris are determined by… More >

  • Open Access

    ARTICLE

    Improve Computer Visualization of Architecture Based on the Bayesian Network

    Tao Shen1,*, Yukari Nagai1, Chan Gao2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 307-318, 2019, DOI:10.32604/cmc.2019.04876

    Abstract Computer visualization has marvelous effects when it is applied in various fields, especially in architectural design. As an emerging force in the innovation industry, architects and design agencies have already demonstrated the value of architectural visual products in actual application projects. Based on the digital image technology, virtual presentation of future scenes simulates architecture design, architectural renderings and multimedia videos. Therefore, it can help design agencies transform the theoretical design concept into a lively and realistic visual which can provide the audience with a clearer understanding of the engineering and construction projects. However, it is challenging for designers to produce… More >

  • Open Access

    ARTICLE

    Spatial Quantitative Analysis of Garlic Price Data Based on ArcGIS Technology

    Guojing Wu1, Chao Zhang1,*, Pingzeng Liu1, Wanming Ren2, Yong Zheng2, Feng Guo1, Xiaowei Chen3, Russell Higgs4

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 183-195, 2019, DOI:10.32604/cmc.2019.03792

    Abstract In order to solve the hidden regional relationship among garlic prices, this paper carries out spatial quantitative analysis of garlic price data based on ArcGIS technology. The specific analysis process is to collect prices of garlic market from 2015 to 2017 in different regions of Shandong Province, using the Moran's Index to obtain monthly Moran indicators are positive, so as to analyze the overall positive relationship between garlic prices; then using the geostatistical analysis tool in ArcGIS to draw a spatial distribution Grid diagram, it was found that the price of garlic has a significant geographical agglomeration phenomenon and showed… More >

Displaying 2851-2860 on page 286 of 2889. Per Page