Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,653)
  • Open Access

    ARTICLE

    A Real-Time Integrated Face Mask Detector to Curtail Spread of Coronavirus

    Shilpa Sethi1, Mamta Kathuria1,*, Trilok Kaushik2

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.2, pp. 389-409, 2021, DOI:10.32604/cmes.2021.014478 - 19 April 2021

    Abstract Effective strategies to control COVID-19 pandemic need high attention to mitigate negatively impacted communal health and global economy, with the brim-full horizon yet to unfold. In the absence of effective antiviral and limited medical resources, many measures are recommended by WHO to control the infection rate and avoid exhausting the limited medical resources. Wearing mask is among the non-pharmaceutical intervention measures that can be used as barrier to primary route of SARS-CoV2 droplets expelled by presymptomatic or asymptomatic individuals. Regardless of discourse on medical resources and diversities in masks, all countries are mandating coverings over… More >

  • Open Access

    ARTICLE

    GPS Vector Tracking Loop with Fault Detection and Exclusion

    Dah-Jing Jwo*, Meng-Hsien Hsieh

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1785-1805, 2021, DOI:10.32604/cmc.2021.017225 - 13 April 2021

    Abstract In this paper, both the integrity monitoring and fault detection and exclusion (FDE) mechanisms are incorporated into the vector tracking loop (VTL) architecture of the Global Positioning System (GPS) receiver for reliability enhancement. For the VTL, the tasks of signal tracking and navigation state estimation no longer process separately and a single extended Kalman filter (EKF) is employed to simultaneously track the received signals and estimate the receiver’s position, velocity, etc. In contrast to the scalar tracking loop (STL) which utilizes the independent parallel tracking loop approach, the VTL technique is beneficial from the correlation… More >

  • Open Access

    ARTICLE

    General Steganalysis Method of Compressed Speech Under Different Standards

    Peng Liu1, Songbin Li1,*, Qiandong Yan1, Jingang Wang1, Cheng Zhang2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1565-1574, 2021, DOI:10.32604/cmc.2021.016635 - 13 April 2021

    Abstract Analysis-by-synthesis linear predictive coding (AbS-LPC) is widely used in a variety of low-bit-rate speech codecs. Most of the current steganalysis methods for AbS-LPC low-bit-rate compressed speech steganography are specifically designed for a specific coding standard or category of steganography methods, and thus lack generalization capability. In this paper, a general steganalysis method for detecting steganographies in low-bit-rate compressed speech under different standards is proposed. First, the code-element matrices corresponding to different coding standards are concatenated to obtain a synthetic code-element matrix, which will be mapped into an intermediate feature representation by utilizing the pre-trained dictionaries. More >

  • Open Access

    ARTICLE

    Power Allocation Strategy for Secret Key Generation Method in Wireless Communications

    Bin Zhang1, Muhammad Waqas2,3, Shanshan Tu2,*, Syed Mudassir Hussain4, Sadaqat Ur Rehman5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2179-2188, 2021, DOI:10.32604/cmc.2021.016553 - 13 April 2021

    Abstract Secret key generation (SKG) is an emerging technology to secure wireless communication from attackers. Therefore, the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’ uncertainty. However, the physical layer secret key generation (PHY-SKG) depends on two fundamental parameters, i.e., coherence time and power allocation. The coherence time for PHY-SKG is not applicable to secure wireless channels. This is because coherence time is for a certain period of time. Thus, legitimate users generate the secret keys (SKs) with a shorter key length in size. Hence, an attacker… More >

  • Open Access

    ARTICLE

    Game-Oriented Security Strategy Against Hotspot Attacks for Internet of Vehicles

    Juan Guo1, Yanzhu Liu2,*, Shan Li3, Zhi Li4, Sonia Kherbachi5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2145-2157, 2021, DOI:10.32604/cmc.2021.016411 - 13 April 2021

    Abstract With the rapid development of mobile communication technology, the application of internet of vehicles (IoV) services, such as for information services, driving safety, and traffic efficiency, is growing constantly. For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing, encryption and decision-making can be completed at the local end, thus providing real-time and highly reliable communication capability. The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication… More >

  • Open Access

    ARTICLE

    Eye Gaze Detection Based on Computational Visual Perception and Facial Landmarks

    Debajit Datta1, Pramod Kumar Maurya1, Kathiravan Srinivasan2, Chuan-Yu Chang3,*, Rishav Agarwal1, Ishita Tuteja1, V. Bhavyashri Vedula1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2545-2561, 2021, DOI:10.32604/cmc.2021.015478 - 13 April 2021

    Abstract The pandemic situation in 2020 brought about a ‘digitized new normal’ and created various issues within the current education systems. One of the issues is the monitoring of students during online examination situations. A system to determine the student’s eye gazes during an examination can help to eradicate malpractices. In this work, we track the users’ eye gazes by incorporating twelve facial landmarks around both eyes in conjunction with computer vision and the HAAR classifier. We aim to implement eye gaze detection by considering facial landmarks with two different Convolutional Neural Network (CNN) models, namely More >

  • Open Access

    ARTICLE

    Spatial-Resolution Independent Object Detection Framework for Aerial Imagery

    Sidharth Samanta1, Mrutyunjaya Panda1, Somula Ramasubbareddy2, S. Sankar3, Daniel Burgos4,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1937-1948, 2021, DOI:10.32604/cmc.2021.014406 - 13 April 2021

    Abstract Earth surveillance through aerial images allows more accurate identification and characterization of objects present on the surface from space and airborne platforms. The progression of deep learning and computer vision methods and the availability of heterogeneous multispectral remote sensing data make the field more fertile for research. With the evolution of optical sensors, aerial images are becoming more precise and larger, which leads to a new kind of problem for object detection algorithms. This paper proposes the “Sliding Region-based Convolutional Neural Network (SRCNN),” which is an extension of the Faster Region-based Convolutional Neural Network (RCNN) More >

  • Open Access

    ARTICLE

    The Differences in Lower Extremity Joints Energy Dissipation Strategy during Landing between Athletes with Symptomatic Patellar Tendinopathy (PT) and without Patellar Tendinopathy (UPT)

    Datao Xu1, Zhenghui Lu1, Siqin Shen2, Gusztáv Fekete2, Ukadike C. Ugbolue3, Yaodong Gu1,*

    Molecular & Cellular Biomechanics, Vol.18, No.2, pp. 107-118, 2021, DOI:10.32604/mcb.2021.015453 - 09 April 2021

    Abstract Patellar tendinopathy is a clinical symptom of patellar tendons characterized by local pain in the front of the knee joint. It is common among basketball and volleyball players. Patients with patellar tendinopathy may exhibit different landing strategies during landing compared to healthy individuals. The purpose of this study was to compare the differences in lower limb joint energy dissipation (eccentric work) values for the symptomatic patellar tendinopathy (PT) athletes and no patellar tendinopathy (UPT) athletes during single-leg landing. A total of 26 (PT: 13, UPT:13) semi-professional male basketball and volleyball player’s kinetic data were collected… More >

  • Open Access

    ARTICLE

    An Anomaly Detection Method of Industrial Data Based on Stacking Integration

    Kunkun Wang1,2, Xianda Liu2,3,4,*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 9-19, 2021, DOI:10.32604/jai.2021.016706 - 02 April 2021

    Abstract With the development of Internet technology, the computing power of data has increased, and the development of machine learning has become faster and faster. In the industrial production of industrial control systems, quality inspection and safety production of process products have always been our concern. Aiming at the low accuracy of anomaly detection in process data in industrial control system, this paper proposes an anomaly detection method based on stacking integration using the machine learning algorithm. Data are collected from the industrial site and processed by feature engineering. Principal component analysis (PCA) and integrated rule… More >

  • Open Access

    ARTICLE

    Natural History of Kawashima Palliation in Single-Ventricle and Interrupted Inferior Vena Cava Heart Disease in China 11 Years Result

    Yajuan Zhang, Jun Yan*, Qiang Wang, Shoujun Li, Jing Sun, Shuo Dong, Jiachen Li

    Congenital Heart Disease, Vol.16, No.4, pp. 383-392, 2021, DOI:10.32604/CHD.2021.015479 - 19 April 2021

    Abstract Background: The long-term outcomes of patients treated with a Kawashima procedure and keeping the antegrade pulmonary blood flow (AnPBF) in single-ventricle (SV) and interrupted inferior vena cava (IVC) heart disease is still uncertain as yet. Methods: We investigated 18 patients who underwent the Kawashima procedure with SV physiology and an interrupted IVC between January 2009 and June 2018, perioperative, operative and postoperative characteristics were recorded. Results: A total of 18 patients underwent the Kawashima procedure at a median age of 2.7 years (range 0.5–24.7 years), of which 12 (66.7%) were male and 6 (33.3%) were female. The… More >

Displaying 1001-1010 on page 101 of 1653. Per Page