Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    A Deep Learning-Based Recognition Approach for the Conversion of Multilingual Braille Images

    Abdulmalik AlSalman1, Abdu Gumaei1,*, Amani AlSalman2, Suheer Al-Hadhrami1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3847-3864, 2021, DOI:10.32604/cmc.2021.015614

    Abstract Braille-assistive technologies have helped blind people to write, read, learn, and communicate with sighted individuals for many years. These technologies enable blind people to engage with society and help break down communication barriers in their lives. The Optical Braille Recognition (OBR) system is one example of these technologies. It plays an important role in facilitating communication between sighted and blind people and assists sighted individuals in the reading and understanding of the documents of Braille cells. However, a clear gap exists in current OBR systems regarding asymmetric multilingual conversion of Braille documents. Few systems allow sighted people to read and… More >

  • Open Access

    ARTICLE

    Multi-Scale Blind Image Quality Predictor Based on Pyramidal Convolution

    Feng Yuan, Xiao Shao*

    Journal on Big Data, Vol.2, No.4, pp. 167-176, 2020, DOI:10.32604/jbd.2020.015357

    Abstract Traditional image quality assessment methods use the hand-crafted features to predict the image quality score, which cannot perform well in many scenes. Since deep learning promotes the development of many computer vision tasks, many IQA methods start to utilize the deep convolutional neural networks (CNN) for IQA task. In this paper, a CNN-based multi-scale blind image quality predictor is proposed to extract more effectivity multi-scale distortion features through the pyramidal convolution, which consists of two tasks: A distortion recognition task and a quality regression task. For the first task, image distortion type is obtained by the fully connected layer. For… More >

  • Open Access

    ARTICLE

    Research on the Optimization Design of Intersections for Safe Operation of Large Trucks

    Yujie Bao, Pincheng Wang*, Yuhang Li

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 143-154, 2020, DOI:10.32604/jihpp.2020.09759

    Abstract When big trucks are running at urban road intersections, they are easy to interfere with other motor vehicles, and the turning big trucks are easy to have conflicts with non-motor vehicles and pedestrians, which will affect the safety of intersections. This paper first studied the intersection of trucks to the running trajectory, on this basis, through the establishment of mathematical model analysis of large truck steering conditions inside the wheel, and the influence of blind area to the driver. In the research of intersection safety design, the safety design is divided into three parts: Entrance road, internal operation and signal… More >

  • Open Access

    ARTICLE

    Research and Analysis of WSN Node Location in Highway Traffic Based on Priority

    Congrong Tang1, *

    Journal of Quantum Computing, Vol.2, No.1, pp. 1-9, 2020, DOI:10.32604/jqc.2020.09153

    Abstract With the rapid development of highway transportation in China, intelligent transportation has become an important part of the traffic structure, and wireless sensor networks are also widely used in intelligent transportation. However, in the wireless traffic sensor network, there is a certain error in the positioning of the anchor blind nodes. In the process of tracking the feedback information, the results of determining the position are very different. Based on the maximum degree of tension, the road traffic wireless Research and analysis of blind node location in sensor networks, and propose solutions and measures to reduce monitoring results. More >

  • Open Access

    ARTICLE

    An Efficient and Practical Quantum Blind Signature Protocol with Relaxed Security Model

    Jun Zhang1, *, Hao Xiao2, Hongqun Zhai1, Xiaoli Meng3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 301-313, 2020, DOI:10.32604/cmc.2020.07681

    Abstract Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness. Owing to the potential unconditional security, quantum blind signature (QBS) is more advantageous than the classical ones. In this paper, an efficient and practical quantum blind signature scheme relaxed security model is presented, where quantum superposition, decoy qubits and hash function are used for the purpose of blindness. Compared with previous QBS scheme, the presented scheme is more efficient and practical with a relaxed security model, in which the… More >

  • Open Access

    ARTICLE

    Effects of PEMFs on Patients’ Recovery after Reconstruction with Use of Double-looped Semitendinosus and Gracilis Tendon Grafts: a Multicenter, Prospective, Randomized and Double-blind Study

    R. Cadossi1, L. Massari2, F. Benazzo3, F. Falez4, S. Giannini5, C. Zorzi6, L. Pederzini7, S. Setti1

    Molecular & Cellular Biomechanics, Vol.3, No.4, pp. 239-240, 2006, DOI:10.32604/mcb.2006.003.239

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things

    Chaoyang Li1,2,3, Gang Xu2, Yuling Chen1,*, Haseeb Ahmad4, Jian Li3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 711-726, 2019, DOI:10.32604/cmc.2019.06279

    Abstract Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public, distributed and decentration. And blockchain-enabled internet of things (BIoT) has a tendency to make a revolutionary change for the internet of things (IoT) which requires distributed trustless consensus. However, the scalability and security issues become particularly important with the dramatically increasing number of IoT devices. Especially, with the development of quantum computing, many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks. In this paper, an anti-quantum proxy blind signature scheme based on the lattice cryptography has been… More >

  • Open Access

    ARTICLE

    A Fair Blind Signature Scheme to Revoke Malicious Vehicles in VANETs

    Xiaoliang Wang1,*, Jianming Jiang1,2, Shujing Zhao1, Liang Bai1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 249-262, 2019, DOI:10.32604/cmc.2019.04088

    Abstract With the rapid development of IoT (Internet of Things), VANETs (Vehicular Ad-Hoc Networks) have become an attractive ad-hoc network that brings convenience into people’s lives. Vehicles can be informed of the position, direction, speed and other real-time information of nearby vehicles to avoid traffic jams and accidents. However, VANET environments could be dangerous in the absence of security protection. Because of the openness and self-organization of VANETs, there are plenty of malicious pathways. To guarantee vehicle security, the research aims to provide an effective VANET security mechanism that can track malicious vehicles as necessary. Therefore, this work focuses on malicious… More >

  • Open Access

    ARTICLE

    Full-Blind Delegating Private Quantum Computation

    Wenjie Liu1,2,*, Zhenyu Chen2, Jinsuo Liu3, Zhaofeng Su4, Lianhua Chi5

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 211-223, 2018, DOI: 10.3970/cmc.2018.02288

    Abstract The delegating private quantum computation (DQC) protocol with the universal quantum gate set {X,Z,H,P,R,CNOT} was firstly proposed by Broadbent et al. [Broadbent (2015)], and then Tan et al. [Tan and Zhou (2017)] tried to put forward a half-blind DQC protocol (HDQC) with another universal set {H,P,CNOT,T}. However, the decryption circuit of Toffoli gate (i.e. T) is a little redundant, and Tan et al.’s protocol [Tan and Zhou (2017)] exists the information leak. In addition, both of these two protocols just focus on the blindness of data (i.e. the client’s input and output), but do not consider the blindness of computation… More >

Displaying 11-20 on page 2 of 19. Per Page