Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,331)
  • Open Access

    ARTICLE

    Analysis of Wireless Backhaul Networks Based on Aerial Platform Technology for 6G Systems

    Sooeun Song1, Minsu Choi1, Yunyeong Goh1, Jusik Yun1, Wonsuk Yoo1, Wonsik Yang1, Jaewook Jung1, Jong-Moon Chung1, *

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 473-494, 2020, DOI:10.32604/cmc.2020.09052

    Abstract As next generation communication technologies emerge, new high data rate applications and high-definition large-screen video streaming have become very popular. As a result, network traffic has been increasing so much that existing backhaul networks soon will not be able to support all traffic demands. To support these needs in future 6G mobile systems, the establishment of an additional backhaul wireless network is considered essential. As one of the solutions, a wireless backhaul network based on an aerial platform has been proposed. In order to explore the potential of aerial platforms as wireless backhaul networks, in More >

  • Open Access

    ARTICLE

    Fusion of Medical Images in Wavelet Domain: A Hybrid Implementation

    Satya Prakash Yadav1, *, Sachin Yadav2

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 303-321, 2020, DOI:10.32604/cmes.2020.08459 - 01 January 2020

    Abstract This paper presents a low intricate, profoundly energy effective MRI Images combination intended for remote visual sensor frameworks which leads to improved understanding and implementation of treatment; especially for radiology. This is done by combining the original picture which leads to a significant reduction in the computation time and frequency. The proposed technique conquers the calculation and energy impediment of low power tools and is examined as far as picture quality and energy is concerned. Reenactments are performed utilizing MATLAB 2018a, to quantify the resultant vitality investment funds and the reproduction results show that the More >

  • Open Access

    ARTICLE

    The Frequency Selection of SH0 Waves for Total Transmission and Its Application in the Damage Detection of Aircrafts

    Yanchao Yue1, *, Tangbing Chen1, Lingling Zhang1, Moustafa Abdelsalam1, Josephine Musanyufu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 259-272, 2020, DOI:10.32604/cmes.2020.07218 - 01 January 2020

    Abstract Based on wave interference, a methodology to realize the total transmission phenomenon of SH0 waves is proposed in this paper. After a systematical theoretical investigation, an exact frequency of a flat plate consisting of another medium with finite length, is obtained, which is furthermore exemplified by the finite element method. This frequency is the same as the classical Fabry-Perot condition and dependent on the thickness of the material. It has been revealed that an SH0 wave, with its wavelength equal to twice of the length of another medium, can totally transmit across the medium without… More >

  • Open Access

    ARTICLE

    Shadow Detection and Removal From Photo-Realistic Synthetic Urban Image Using Deep Learning

    Hee-Jin Yoon1, Kang-Jik Kim1, Jun-Chul Chun1,*

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 459-472, 2020, DOI:10.32604/cmc.2020.08799

    Abstract Recently, virtual reality technology that can interact with various data is used for urban design and analysis. Reality, one of the most important elements in virtual reality technology, means visual expression so that a person can experience threedimensional space like reality. To obtain this realism, real-world data are used in the various fields. For example, in order to increase the realism of 3D modeled building textures real aerial images are utilized in 3D modelling. However, the aerial image captured during the day can be shadowed by the sun and it can cause the distortion or… More >

  • Open Access

    ARTICLE

    A Convolution-Based System for Malicious URLs Detection

    Chaochao Luo1, Shen Su2, *, Yanbin Sun2, Qingji Tan3, Meng Han4, Zhihong Tian2, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 399-411, 2020, DOI:10.32604/cmc.2020.06507

    Abstract Since the web service is essential in daily lives, cyber security becomes more and more important in this digital world. Malicious Uniform Resource Locator (URL) is a common and serious threat to cybersecurity. It hosts unsolicited content and lure unsuspecting users to become victim of scams, such as theft of private information, monetary loss, and malware installation. Thus, it is imperative to detect such threats. However, traditional approaches for malicious URLs detection that based on the blacklists are easy to be bypassed and lack the ability to detect newly generated malicious URLs. In this paper, More >

  • Open Access

    ARTICLE

    SSD Real-Time Illegal Parking Detection Based on Contextual Information Transmission

    Huanrong Tang1, Aoming Peng1, Dongming Zhang2, Tianming Liu3, Jianquan Ouyang1, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 293-307, 2020, DOI:10.32604/cmc.2020.06427

    Abstract With the improvement of the national economic level, the number of vehicles is still increasing year by year. According to the statistics of National Bureau of Statics, the number is approximately up to 327 million in China by the end of 2018, which makes urban traffic pressure continues to rise so that the negative impact of urban traffic order is growing. Illegal parking-the common problem in the field of transportation security is urgent to be solved and traditional methods to address it are mainly based on ground loop and manual supervision, which may miss detection… More >

  • Open Access

    ARTICLE

    Fire Detection Method Based on Improved Fruit Fly Optimization-Based SVM

    Fangming Bi1, 2, Xuanyi Fu1, 2, Wei Chen1, 2, 3, *, Weidong Fang4, Xuzhi Miao1, 2, Biruk Assefa1, 5

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 199-216, 2020, DOI:10.32604/cmc.2020.06258

    Abstract Aiming at the defects of the traditional fire detection methods, which are caused by false positives and false negatives in large space buildings, a fire identification detection method based on video images is proposed. The algorithm first uses the hybrid Gaussian background modeling method and the RGB color model to perform fire prejudgment on the video image, which can eliminate most non-fire interferences. Secondly, the traditional regional growth algorithm is improved and the fire image segmentation effect is effectively improved. Then, based on the segmented image, the dynamic and static features of the fire flame More >

  • Open Access

    ARTICLE

    Research on Privacy Disclosure Detection Method in Social Networks Based on Multi-Dimensional Deep Learning

    Yabin Xu1, 2, *, Xuyang Meng1, Yangyang Li3, Xiaowei Xu4, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 137-155, 2020, DOI:10.32604/cmc.2020.05825

    Abstract In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users, this paper takes microblog as the research object to study the detection of privacy disclosure in social networks. First, we perform fast privacy leak detection on the currently published text based on the fastText model. In the case that the text to be published contains certain private information, we fully consider the aggregation effect of the private information leaked by different channels, and establish a convolution neural network model based on multi-dimensional features (MF-CNN) to More >

  • Open Access

    ARTICLE

    Numerical Simulations for Stochastic Computer Virus Propagation Model

    Muhammad Shoaib Arif1, *, Ali Raza1, Muhammad Rafiq2, Mairaj Bibi3, Javeria Nawaz Abbasi3, Amna Nazeer3, Umer Javed4

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 61-77, 2020, DOI:10.32604/cmc.2020.08595

    Abstract We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript. We are comparing the solutions of stochastic and deterministic computer virus models. Outcomes of a threshold number R0 hold in stochastic computer virus model. If R0 < 1 then in such a condition virus controlled in the computer population while R0 > 1 shows virus rapidly spread in the computer population. Unfortunately, stochastic numerical techniques fail to cope with large step sizes of time. The suggested structure of the stochastic non-standard finite difference technique can never violate the dynamical properties. On More >

  • Open Access

    ORIGINAL ARTICLE

    Nicotine exerts neuroprotective effects by attenuating local inflammatory cytokine production following crush injury to rat sciatic nerves

    Dewei Wang1, Tianyang Gao2, Yingwei Zhao1, Ye Mao1, Zhigang Sheng1, Qing Lan1

    European Cytokine Network, Vol.30, No.2, pp. 59-66, 2019, DOI:10.1684/ ecn.2019.0426

    Abstract Background: Recent studies have demonstrated that nicotine exhibited anti-inflammatory and neuroprotective properties by interacting with the alpha 7 nicotinic acetylcholine receptor (α7nAChR). However, the role of nicotine in regeneration during peripheral nerve injury has not been elucidated. The aim of this study was to investigate whether nicotine down-regulated production of proinflammatory cytokines and promoted peripheral nerve regeneration in rats. Methods: Rats challenged with sciatic nerve crush injury were treated with nicotine (1.5 mg/kg), three times per day. The expression of the proinflammatory cytokines tumor necrosis factor alpha (TNF-α) and interleukin (IL-1β), pinch test results, growth-associated… More >

Displaying 3581-3590 on page 359 of 4331. Per Page