Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (54)
  • Open Access

    ARTICLE

    Activation Redistribution Based Hybrid Asymmetric Quantization Method of Neural Networks

    Lu Wei, Zhong Ma*, Chaojie Yang

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 981-1000, 2024, DOI:10.32604/cmes.2023.027085 - 22 September 2023

    Abstract The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing. Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedded devices. In order to reduce the complexity and overhead of deploying neural networks on Integer-only hardware, most current quantization methods use a symmetric quantization mapping strategy to quantize a floating-point neural network into an integer network. However, although symmetric quantization has the advantage of easier implementation, it is sub-optimal for cases where the range could be skewed and not symmetric. This often comes at the… More > Graphic Abstract

    Activation Redistribution Based Hybrid Asymmetric Quantization Method of Neural Networks

  • Open Access

    ARTICLE

    Asymmetric Loss Based on Image Properties for Deep Learning-Based Image Restoration

    Linlin Zhu, Yu Han, Xiaoqi Xi, Zhicun Zhang, Mengnan Liu, Lei Li, Siyu Tan, Bin Yan*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3367-3386, 2023, DOI:10.32604/cmc.2023.045878 - 26 December 2023

    Abstract Deep learning techniques have significantly improved image restoration tasks in recent years. As a crucial component of deep learning, the loss function plays a key role in network optimization and performance enhancement. However, the currently prevalent loss functions assign equal weight to each pixel point during loss calculation, which hampers the ability to reflect the roles of different pixel points and fails to exploit the image’s characteristics fully. To address this issue, this study proposes an asymmetric loss function based on the image and data characteristics of the image recovery task. This novel loss function… More >

  • Open Access

    ARTICLE

    Lubrication of Asymmetric Rollers Using Roelands Viscosity–Pressure-Temperature Relationship

    Swetha Lanka1, Venkata Subrahmanyam Sajja1,*, Dhaneshwar Prasad2

    Frontiers in Heat and Mass Transfer, Vol.21, pp. 385-405, 2023, DOI:10.32604/fhmt.2023.042544 - 30 November 2023

    Abstract An attempt is made to analyse some lubrication characteristics of rigid cylindrical asymmetric rollers under adiabatic and isothermal boundaries with rolling and sliding motion lubricated by a non-Newtonian incompressible Bingham plastic fluid under the behaviour of line contact. Here the lower surface is considered to move quicker than that of the upper surface; and the Roelands viscosity model is considered and assumed to depend upon the fluid pressure and the mean film temperature. The governing equations for fluid flow such as equations of motion with continuity and the momentum energy equation are solved using Runge-Kutta More >

  • Open Access

    ARTICLE

    Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field

    Mohammad Mazyad Hazzazi1, Hafeez Ur Rehman2,*, Tariq Shah2, Hajra Younas2

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2033-2060, 2023, DOI:10.32604/cmc.2023.040629 - 30 August 2023

    Abstract Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem. In this paper, we introduce an asymmetric key algorithm for specifically processing images with larger bit values. To overcome the separate flaws of elliptic curve cryptography (ECC) and the Hill cipher (HC), we present an approach to picture encryption by combining these two encryption approaches. In addition, to strengthen our scheme, the group laws are defined over the rational points of a given elliptic curve (EC) over a Galois field (GF). The exclusive-or (XOR) function is used instead of More >

  • Open Access

    PROCEEDINGS

    Study on the Influence of the Longitudinal Position of the Fire Source on the Movement Behavior of the Asymmetric Flow Field in Tunnel Fire

    Lu He1,*, Yuhang Zhou1, Guoqing Zhu1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.2, pp. 1-1, 2023, DOI:10.32604/icces.2023.08939

    Abstract The longitudinal position of the fire source is one of the key parameters affecting the flow field characteristics in a long-distance tunnel. In this paper, a series of numerical simulations were carried out to analyze the influence of the longitudinal position and the heat release rate (HRR) on the induced airflow on both sides of the fire source and the smoke movement behaviors characteristics in the long-distance tunnel. It is found that under the induction of thermal pressure, an asymmetric induced air flow is formed near the fire source, resulting in asymmetric dynamic parameters of More >

  • Open Access

    ARTICLE

    Research on Asymmetric Fault Location of Wind Farm Collection System Based on Compressed Sensing

    Huanan Yu1, Gang Han1,*, Hansong Luo2, He Wang1

    Energy Engineering, Vol.120, No.9, pp. 2029-2057, 2023, DOI:10.32604/ee.2023.028365 - 03 August 2023

    Abstract Aiming at the problem that most of the cables in the power collection system of offshore wind farms are buried deep in the seabed, which makes it difficult to detect faults, this paper proposes a two-step fault location method based on compressed sensing and ranging equation. The first step is to determine the fault zone through compressed sensing, and improve the data measurement, dictionary design and algorithm reconstruction: Firstly, the phase-locked loop trigonometric function method is used to suppress the spike phenomenon when extracting the fault voltage, so that the extracted voltage value will not… More >

  • Open Access

    ARTICLE

    ASYMMETRIC PHENOMENON OF FLICKERING FLAME UNDER DIFFERENT CO-FLOW VELOCITIES

    Wenhua Liua,b, Mo Yangc,a,*, Yuwen Zhangb , Guiliang Liua , Liang Linga , Xuchen Yinga,*

    Frontiers in Heat and Mass Transfer, Vol.20, pp. 1-7, 2023, DOI:10.5098/hmt.20.15

    Abstract In this study, numerical investigations are performed on a partially premixed flame of methane and air in two- and three-dimensional models. Nonlinear method is adopted to illustrate the asymmetric phenomenon that affects the flame stability under various co-flow velocities. According to the results, the mathematical relationship between the flame flickering frequency Stanton number and the dimensionless velocity Froude number has been summarized as St=0.7Fr-0.46. The bifurcation phenomena under different Reynold numbers are found to have significant influence on the system stability. Two critical bifurcation points, which is when Re=300 and Re=1200, are determined as the onset More >

  • Open Access

    ARTICLE

    Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems

    T. Haritha, A. Anitha*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3923-3939, 2023, DOI:10.32604/cmc.2023.036278 - 31 March 2023

    Abstract In crowded cities, searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’ time, increases air pollution, and traffic congestion. Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement. But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number, personal identity, and desired destination. This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’ security… More >

  • Open Access

    ARTICLE

    On a Novel Extended Lomax Distribution with Asymmetric Properties and Its Statistical Applications

    Aisha Fayomi1, Christophe Chesneau2,*, Farrukh Jamal3, Ali Algarni1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2371-2403, 2023, DOI:10.32604/cmes.2023.027000 - 09 March 2023

    Abstract In this article, we highlight a new three-parameter heavy-tailed lifetime distribution that aims to extend the modeling possibilities of the Lomax distribution. It is called the extended Lomax distribution. The considered distribution naturally appears as the distribution of a transformation of a random variable following the logweighted power distribution recently introduced for percentage or proportion data analysis purposes. As a result, its cumulative distribution has the same functional basis as that of the Lomax distribution, but with a novel special logarithmic term depending on several parameters. The modulation of this logarithmic term reveals new types… More >

  • Open Access

    ARTICLE

    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2625-2640, 2023, DOI:10.32604/cmc.2023.030899 - 31 October 2022

    Abstract Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud… More >

Displaying 11-20 on page 2 of 54. Per Page