Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,427)
  • Open Access

    ARTICLE

    Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs

    Nagaraju Pacharla, K. Srinivasa Reddy*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3089-3110, 2024, DOI:10.32604/cmc.2024.048133

    Abstract With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing system to fix the issues.… More >

  • Open Access

    ARTICLE

    A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction

    Jun Li1,2, Minqing Zhang1,2,*, Ke Niu1, Yingnan Zhang1, Xiaoyuan Yang1,2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2085-2103, 2024, DOI:10.32604/cmc.2024.048095

    Abstract Among steganalysis techniques, detection against MV (motion vector) domain-based video steganography in the HEVC (High Efficiency Video Coding) standard remains a challenging issue. For the purpose of improving the detection performance, this paper proposes a steganalysis method that can perfectly detect MV-based steganography in HEVC. Firstly, we define the local optimality of MVP (Motion Vector Prediction) based on the technology of AMVP (Advanced Motion Vector Prediction). Secondly, we analyze that in HEVC video, message embedding either using MVP index or MVD (Motion Vector Difference) may destroy the above optimality of MVP. And then, we define the optimal rate of MVP… More >

  • Open Access

    ARTICLE

    An Implementation of Multiscale Line Detection and Mathematical Morphology for Efficient and Precise Blood Vessel Segmentation in Fundus Images

    Syed Ayaz Ali Shah1,*, Aamir Shahzad1,*, Musaed Alhussein2, Chuan Meng Goh3, Khursheed Aurangzeb2, Tong Boon Tang4, Muhammad Awais5

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2565-2583, 2024, DOI:10.32604/cmc.2024.047597

    Abstract Diagnosing various diseases such as glaucoma, age-related macular degeneration, cardiovascular conditions, and diabetic retinopathy involves segmenting retinal blood vessels. The task is particularly challenging when dealing with color fundus images due to issues like non-uniform illumination, low contrast, and variations in vessel appearance, especially in the presence of different pathologies. Furthermore, the speed of the retinal vessel segmentation system is of utmost importance. With the surge of now available big data, the speed of the algorithm becomes increasingly important, carrying almost equivalent weightage to the accuracy of the algorithm. To address these challenges, we present a novel approach for retinal… More > Graphic Abstract

    An Implementation of Multiscale Line Detection and Mathematical Morphology for Efficient and Precise Blood Vessel Segmentation in Fundus Images

  • Open Access

    ARTICLE

    Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network

    Ruchun Jia1, Jianwei Zhang1,*, Yi Lin1, Yunxiang Han1, Feike Yang2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2523-2546, 2024, DOI:10.32604/cmc.2024.047543

    Abstract In order to enhance the accuracy of Air Traffic Control (ATC) cybersecurity attack detection, in this paper, a new clustering detection method is designed for air traffic control network security attacks. The feature set for ATC cybersecurity attacks is constructed by setting the feature states, adding recursive features, and determining the feature criticality. The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data. An autoencoder is introduced into the AI (artificial intelligence) algorithm to encode and decode the characteristics of ATC… More >

  • Open Access

    ARTICLE

    Developing Lexicons for Enhanced Sentiment Analysis in Software Engineering: An Innovative Multilingual Approach for Social Media Reviews

    Zohaib Ahmad Khan1, Yuanqing Xia1,*, Ahmed Khan2, Muhammad Sadiq2, Mahmood Alam3, Fuad A. Awwad4, Emad A. A. Ismail4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2771-2793, 2024, DOI:10.32604/cmc.2024.046897

    Abstract Sentiment analysis is becoming increasingly important in today’s digital age, with social media being a significant source of user-generated content. The development of sentiment lexicons that can support languages other than English is a challenging task, especially for analyzing sentiment analysis in social media reviews. Most existing sentiment analysis systems focus on English, leaving a significant research gap in other languages due to limited resources and tools. This research aims to address this gap by building a sentiment lexicon for local languages, which is then used with a machine learning algorithm for efficient sentiment analysis. In the first step, a… More >

  • Open Access

    ARTICLE

    Enhanced Object Detection and Classification via Multi-Method Fusion

    Muhammad Waqas Ahmed1, Nouf Abdullah Almujally2, Abdulwahab Alazeb3, Asaad Algarni4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3315-3331, 2024, DOI:10.32604/cmc.2024.046501

    Abstract Advances in machine vision systems have revolutionized applications such as autonomous driving, robotic navigation, and augmented reality. Despite substantial progress, challenges persist, including dynamic backgrounds, occlusion, and limited labeled data. To address these challenges, we introduce a comprehensive methodology to enhance image classification and object detection accuracy. The proposed approach involves the integration of multiple methods in a complementary way. The process commences with the application of Gaussian filters to mitigate the impact of noise interference. These images are then processed for segmentation using Fuzzy C-Means segmentation in parallel with saliency mapping techniques to find the most prominent regions. The… More >

  • Open Access

    ARTICLE

    Automatic Finding of Brain-Tumour Group Using CNN Segmentation and Moth-Flame-Algorithm, Selected Deep and Handcrafted Features

    Imad Saud Al Naimi1,2,*, Syed Alwee Aljunid Syed Junid1, Muhammad lmran Ahmad1,*, K. Suresh Manic2,3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2585-2608, 2024, DOI:10.32604/cmc.2024.046461

    Abstract Augmentation of abnormal cells in the brain causes brain tumor (BT), and early screening and treatment will reduce its harshness in patients. BT’s clinical level screening is usually performed with Magnetic Resonance Imaging (MRI) due to its multi-modality nature. The overall aims of the study is to introduce, test and verify an advanced image processing technique with algorithms to automatically extract tumour sections from brain MRI scans, facilitating improved accuracy. The research intends to devise a reliable framework for detecting the BT region in the two-dimensional (2D) MRI slice, and identifying its class with improved accuracy. The methodology for the… More >

  • Open Access

    ARTICLE

    Density Clustering Algorithm Based on KD-Tree and Voting Rules

    Hui Du, Zhiyuan Hu*, Depeng Lu, Jingrui Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3239-3259, 2024, DOI:10.32604/cmc.2024.046314

    Abstract Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets with uneven density. Additionally, they incur substantial computational costs when applied to high-dimensional data due to calculating similarity matrices. To alleviate these issues, we employ the KD-Tree to partition the dataset and compute the K-nearest neighbors (KNN) density for each point, thereby avoiding the computation of similarity matrices. Moreover, we apply the rules of voting elections, treating each data point as a voter and casting a vote for the point with the highest density among its KNN. By utilizing the vote counts of each point, we develop… More >

  • Open Access

    ARTICLE

    Design Pattern and Challenges of Federated Learning with Applications in Industrial Control System

    Hina Batool1, Jiuyun Xu1,*, Ateeq Ur Rehman2, Habib Hamam3,4,5,6

    Journal on Artificial Intelligence, Vol.6, pp. 105-128, 2024, DOI:10.32604/jai.2024.049912

    Abstract Federated Learning (FL) appeared as an encouraging approach for handling decentralized data. Creating a FL system needs both machine learning (ML) knowledge and thinking about how to design system software. Researchers have focused a lot on the ML side of FL, but have not paid enough attention to designing the software architecture. So, in this survey, a set of design patterns is described to tackle the design issues. Design patterns are like reusable solutions for common problems that come up when designing software architecture. This paper focuses on (1) design patterns such as architectures, frameworks, client selection protocols, personalization techniques,… More >

  • Open Access

    REVIEW

    HIFs in hypoxic regulation of the extracellular matrix: focus on little-known player HIF-3

    ALEKSANDRA GORNOSTAEVA, LUDMILA BURAVKOVA, MARGARITA LOBANOVA, ELENA ANDREEVA*

    BIOCELL, Vol.48, No.5, pp. 677-692, 2024, DOI:10.32604/biocell.2024.048873

    Abstract The structural and associated molecules of the extracellular matrix (ECM) complex is an important component of the local milieu of cells, both for maintaining their functions and homeostasis. It is a dynamic structure that is finely tuned to changes in the microenvironment. One of these factors is hypoxia, which can arise in tissues due to physiological or pathological effects. As a result of the hypoxic effect, the properties of the ECM are significantly modified, stiffness increases, the balance between degradation and synthesis of structural proteins shifts, and the deposition of biologically active mediators’ changes. Hypoxia-inducible factors (HIFs) contribute significantly to… More >

Displaying 41-50 on page 5 of 7427. Per Page