Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,926)
  • Open Access

    ARTICLE

    A Fully Adaptive Active Queue Management Method for Congestion Prevention at the Router Buffer

    Ali Alshahrani1, Ahmad Adel Abu-Shareha2,*, Qusai Y. Shambour2, Basil Al-Kasasbeh1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1679-1698, 2023, DOI:10.32604/cmc.2023.043545

    Abstract Active queue management (AQM) methods manage the queued packets at the router buffer, prevent buffer congestion, and stabilize the network performance. The bursty nature of the traffic passing by the network routers and the slake behavior of the existing AQM methods leads to unnecessary packet dropping. This paper proposes a fully adaptive active queue management (AAQM) method to maintain stable network performance, avoid congestion and packet loss, and eliminate unnecessary packet dropping. The proposed AAQM method is based on load and queue length indicators and uses an adaptive mechanism to adjust the dropping probability based on the buffer status. The… More >

  • Open Access

    ARTICLE

    Shadow Extraction and Elimination of Moving Vehicles for Tracking Vehicles

    Kalpesh Jadav1, Vishal Sorathiya1,*, Walid El-Shafai2, Torki Altameem3, Moustafa H. Aly4, Vipul Vekariya5, Kawsar Ahmed6, Francis M. Bui6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2009-2030, 2023, DOI:10.32604/cmc.2023.043168

    Abstract Shadow extraction and elimination is essential for intelligent transportation systems (ITS) in vehicle tracking application. The shadow is the source of error for vehicle detection, which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting, vehicle detection, vehicle tracking, and classification. Most of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets, but the process of extracting shadows from moving vehicles in low light of real scenes is difficult. The real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods… More >

  • Open Access

    ARTICLE

    Mobile-Deep Based PCB Image Segmentation Algorithm Research

    Lisang Liu1, Chengyang Ke1,*, He Lin2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2443-2461, 2023, DOI:10.32604/cmc.2023.042582

    Abstract Aiming at the problems of inaccurate edge segmentation, the hole phenomenon of segmenting large-scale targets, and the slow segmentation speed of printed circuit boards (PCB) in the image segmentation process, a PCB image segmentation model Mobile-Deep based on DeepLabv3+ semantic segmentation framework is proposed. Firstly, the DeepLabv3+ feature extraction network is replaced by the lightweight model MobileNetv2, which effectively reduces the number of model parameters; secondly, for the problem of positive and negative sample imbalance, a new loss function is composed of Focal Loss combined with Dice Loss to solve the category imbalance and improve the model discriminative ability; in… More >

  • Open Access

    ARTICLE

    Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management

    Lizhe Zhang1,2,*, Yongqiang Huang2, Jia Nie2, Kenian Wang1,2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1467-1488, 2023, DOI:10.32604/cmc.2023.042305

    Abstract System-wide information management (SWIM) is a complex distributed information transfer and sharing system for the next generation of Air Transportation System (ATS). In response to the growing volume of civil aviation air operations, users accessing different authentication domains in the SWIM system have problems with the validity, security, and privacy of SWIM-shared data. In order to solve these problems, this paper proposes a SWIM cross-domain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication. The scheme uses a consistent hash algorithm with virtual nodes in combination with a… More >

  • Open Access

    ARTICLE

    Fine-Grained Classification of Remote Sensing Ship Images Based on Improved VAN

    Guoqing Zhou, Liang Huang, Qiao Sun*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1985-2007, 2023, DOI:10.32604/cmc.2023.040902

    Abstract The remote sensing ships’ fine-grained classification technology makes it possible to identify certain ship types in remote sensing images, and it has broad application prospects in civil and military fields. However, the current model does not examine the properties of ship targets in remote sensing images with mixed multi-granularity features and a complicated backdrop. There is still an opportunity for future enhancement of the classification impact. To solve the challenges brought by the above characteristics, this paper proposes a Metaformer and Residual fusion network based on Visual Attention Network (VAN-MR) for fine-grained classification tasks. For the complex background of remote… More >

  • Open Access

    ARTICLE

    Leveraging Blockchain with Optimal Deep Learning-Based Drug Supply Chain Management for Pharmaceutical Industries

    Shanthi Perumalsamy, Venkatesh Kaliyamurthy*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2341-2357, 2023, DOI:10.32604/cmc.2023.040269

    Abstract Due to its complexity and involvement of numerous stakeholders, the pharmaceutical supply chain presents many challenges that companies must overcome to deliver necessary medications to patients efficiently. The pharmaceutical supply chain poses different challenging issues, encompasses supply chain visibility, cold-chain shipping, drug counterfeiting, and rising prescription drug prices, which can considerably surge out-of-pocket patient costs. Blockchain (BC) offers the technical base for such a scheme, as it could track legitimate drugs and avoid fake circulation. The designers presented the procedure of BC with fabric for creating a secured drug supply-chain management (DSCM) method. With this motivation, the study presents a… More >

  • Open Access

    ARTICLE

    Addressing the Issues and Developments Correlated with Envisaged 5G Mobile Technologies: Comprehensive Solutions

    Idrees Sarhan Kocher*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2205-2223, 2023, DOI:10.32604/cmc.2023.039392

    Abstract Fifth Generation (5G) communications are regarded as the cornerstone to household consumer experience improvements and smart manufacturing revolution from the standpoint of industries' objectives. It is anticipated that Envisaged 5G (E5G) mobile technology would be operational in certain developed countries by 2023. The Internet of Things (IoTs) will transform how humans live when combined with smart and integrated sensing devices, such as in-home sensing devices. Recent research is being carried out all over the world to produce a new technique that can be crucial in the success of the anticipated 5G mobile technology. High output, reduced latency, highly reliable, greater… More >

  • Open Access

    ARTICLE

    A Novel Unsupervised MRI Synthetic CT Image Generation Framework with Registration Network

    Liwei Deng1, Henan Sun1, Jing Wang2, Sijuan Huang3, Xin Yang3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2271-2287, 2023, DOI:10.32604/cmc.2023.039062

    Abstract In recent years, radiotherapy based only on Magnetic Resonance (MR) images has become a hot spot for radiotherapy planning research in the current medical field. However, functional computed tomography (CT) is still needed for dose calculation in the clinic. Recent deep-learning approaches to synthesized CT images from MR images have raised much research interest, making radiotherapy based only on MR images possible. In this paper, we proposed a novel unsupervised image synthesis framework with registration networks. This paper aims to enforce the constraints between the reconstructed image and the input image by registering the reconstructed image with the input image… More >

  • Open Access

    ARTICLE

    Optimizing Fully Convolutional Encoder-Decoder Network for Segmentation of Diabetic Eye Disease

    Abdul Qadir Khan1, Guangmin Sun1,*, Yu Li1, Anas Bilal2, Malik Abdul Manan1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2481-2504, 2023, DOI:10.32604/cmc.2023.043239

    Abstract In the emerging field of image segmentation, Fully Convolutional Networks (FCNs) have recently become prominent. However, their effectiveness is intimately linked with the correct selection and fine-tuning of hyperparameters, which can often be a cumbersome manual task. The main aim of this study is to propose a more efficient, less labour-intensive approach to hyperparameter optimization in FCNs for segmenting fundus images. To this end, our research introduces a hyperparameter-optimized Fully Convolutional Encoder-Decoder Network (FCEDN). The optimization is handled by a novel Genetic Grey Wolf Optimization (G-GWO) algorithm. This algorithm employs the Genetic Algorithm (GA) to generate a diverse set of… More >

  • Open Access

    ARTICLE

    Convolutional Neural Network Model for Fire Detection in Real-Time Environment

    Abdul Rehman, Dongsun Kim*, Anand Paul

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2289-2307, 2023, DOI:10.32604/cmc.2023.036435

    Abstract Disasters such as conflagration, toxic smoke, harmful gas or chemical leakage, and many other catastrophes in the industrial environment caused by hazardous distance from the peril are frequent. The calamities are causing massive fiscal and human life casualties. However, Wireless Sensors Network-based adroit monitoring and early warning of these dangerous incidents will hamper fiscal and social fiasco. The authors have proposed an early fire detection system uses machine and/or deep learning algorithms. The article presents an Intelligent Industrial Monitoring System (IIMS) and introduces an Industrial Smart Social Agent (ISSA) in the Industrial SIoT (ISIoT) paradigm. The proffered ISSA empowers smart… More >

Displaying 1-10 on page 1 of 2926. Per Page