Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (156)
  • Open Access

    ARTICLE

    Multi-Index Image Retrieval Hash Algorithm Based on Multi-View Feature Coding

    Rong Duan1, Junshan Tan1, *, Jiaohua Qin1, Xuyu Xiang1, Yun Tan1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2335-2350, 2020, DOI:10.32604/cmc.2020.012161

    Abstract In recent years, with the massive growth of image data, how to match the image required by users quickly and efficiently becomes a challenge. Compared with single-view feature, multi-view feature is more accurate to describe image information. The advantages of hash method in reducing data storage and improving efficiency also make us study how to effectively apply to large-scale image retrieval. In this paper, a hash algorithm of multi-index image retrieval based on multi-view feature coding is proposed. By learning the data correlation between different views, this algorithm uses multi-view data with deeper level image semantics to achieve better retrieval… More >

  • Open Access

    ARTICLE

    Adaptive Binary Coding for Scene Classification Based on Convolutional Networks

    Shuai Wang1, Xianyi Chen2, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2065-2077, 2020, DOI:10.32604/cmc.2020.09857

    Abstract With the rapid development of computer technology, millions of images are produced everyday by different sources. How to efficiently process these images and accurately discern the scene in them becomes an important but tough task. In this paper, we propose a novel supervised learning framework based on proposed adaptive binary coding for scene classification. Specifically, we first extract some high-level features of images under consideration based on available models trained on public datasets. Then, we further design a binary encoding method called one-hot encoding to make the feature representation more efficient. Benefiting from the proposed adaptive binary coding, our method… More >

  • Open Access

    ARTICLE

    QDCT Encoding-Based Retrieval for Encrypted JPEG Images

    Qiuju Ji1, Peipeng Yu1, Zhihua Xia1, *

    Journal on Big Data, Vol.2, No.1, pp. 33-51, 2020, DOI:10.32604/jbd.2020.01004

    Abstract Aprivacy-preserving search model for JPEG images is proposed in paper, which uses the bag-of-encrypted-words based on QDCT (Quaternion Discrete Cosine Transform) encoding. The JPEG image is obtained by a series of steps such as DCT (Discrete Cosine Transform) transformation, quantization, entropy coding, etc. In this paper, we firstly transform the images from spatial domain into quaternion domain. By analyzing the algebraic relationship between QDCT and DCT, a QDCT quantization table and QDTC coding for color images are proposed. Then the compressed image data is encrypted after the steps of block permutation, intra-block permutation, single table substitution and stream cipher. At… More >

  • Open Access

    ARTICLE

    An Intelligent Tumors Coding Method Based on Drools

    Panjie Yang1,*,#, Gang Liu2,#, Xiaoyu Li1,*, Liyuan Qin1, Xiaoxia Liu3

    Journal of New Media, Vol.2, No.3, pp. 111-119, 2020, DOI:10.32604/jnm.2020.010135

    Abstract In order to solve the problems of low efficiency and heavy workload of tumor coding in hospitals, we proposed a Drools-based intelligent tumors coding method. At present, most tumor hospitals use manual coding, the trained coders follow the main diagnosis selection rules to select the main diagnosis from the discharge diagnosis of the tumor patients, and then code all the discharge diagnoses according to the coding rules. Owing to different coders have different familiarity with the main diagnosis selection rules and ICD-10 disease coding, it will reduce the efficiency of the artificial coding results and affect the quality of the… More >

  • Open Access

    ARTICLE

    Developing an Adaptation Process for Real-Coded Genetic Algorithms

    Ridvan Saraçoğlu*, Ahmet Fatih Kazankaya

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 13-19, 2020, DOI:10.32604/csse.2020.35.013

    Abstract The genetic algorithm (GA) is a metaheuristic method which simulates the life cycle and the survival of the fittest in the nature for solving optimization problems. This study aimed to develop enhanced operation by modifying the current GA. This development process includes an adaptation method that contains certain developments and adds a new process to the classic algorithm. Individuals of a population will be trialed to adapt to the current solution of the problem by taking them separately for each generation. With this adaptation method, it is more likely to get better results in a shorter time. Experimental results show… More >

  • Open Access

    ARTICLE

    Reliable Differentiated Services Optimization for Network Coding Cooperative Communication System

    Anfeng Liu1, Jie Min1, Kaoru Ota2, Ming Zhao3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 235-250, 2018, DOI:10.32604/csse.2018.33.235

    Abstract Software-Defined Networking (SDN) is a new network architecture with flexibility and scalability, researchers introduced the core idea of SDN into wireless network, and a cooperative communication system based on network coding is proposed. In this paper, we carry on an investigation in differentiated service strategy of network coding cooperative communication system. The meaning of differentiated services is for the different applications take different power for data transmission and the transmission power is associated with their reliability needs. In other words, transmission power control is performed in the presence of known reliability, we named the scheme Reliability-Bounded Transmission Power Control (RTPC)… More >

  • Open Access

    ARTICLE

    Multi-Level Feature-Based Ensemble Model for Target-Related Stance Detection

    Shi Li1, Xinyan Cao1, *, Yiting Nan2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 777-788, 2020, DOI:10.32604/cmc.2020.010870

    Abstract Stance detection is the task of attitude identification toward a standpoint. Previous work of stance detection has focused on feature extraction but ignored the fact that irrelevant features exist as noise during higher-level abstracting. Moreover, because the target is not always mentioned in the text, most methods have ignored target information. In order to solve these problems, we propose a neural network ensemble method that combines the timing dependence bases on long short-term memory (LSTM) and the excellent extracting performance of convolutional neural networks (CNNs). The method can obtain multi-level features that consider both local and global features. We also… More >

  • Open Access

    ARTICLE

    Continuous-Variable Quantum Network Coding Based on Quantum Discord

    Tao Shang1, *, Ran Liu1, Jianwei Liu1, Yafei Hou2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1629-1645, 2020, DOI:10.32604/cmc.2020.09820

    Abstract Establishing entanglement is an essential task of quantum communication technology. Beyond entanglement, quantum discord, as a measure of quantum correlation, is a necessary prerequisite to the success of entanglement distribution. To realize efficient quantum communication based on quantum discord, in this paper, we consider the practical advantages of continuous variables and propose a feasible continuous-variable quantum network coding scheme based on quantum discord. By means of entanglement distribution by separable states, it can achieve quantum entanglement distribution from sources to targets in a butterfly network. Compared with the representative discrete-variable quantum network coding schemes, the proposed continuous-variable quantum network coding… More >

  • Open Access

    ARTICLE

    An Amorphous 2-Dimensional Barcode

    Han Jin1, Shi Jin2, *, Junfeng Wu2

    Journal of Cyber Security, Vol.2, No.1, pp. 37-48, 2020, DOI:10.32604/jcs.2020.07209

    Abstract Most existing 2-dimensional barcodes are designed with a fixed shape and clear area. Having a fixed shape and clear area makes the barcode difficult to lay out with other text and pictures. To solve this problem, an amorphous 2-dimensional barcode is presented in this paper. The barcode uses encoding graph units to encode data. There are two key points in a 2-dimensional barcode: One is the encoding graph unit, the other is its encoding rules. Because encoding graph units of a 2-dimensional barcode are surrounded by other graphics, the units should be self-positioned and distinguished from other units. This paper… More >

  • Open Access

    ARTICLE

    Text Compression Based on Letter’s Prefix in the Word

    Majed AbuSafiya1, *

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 17-30, 2020, DOI:10.32604/cmc.2020.09282

    Abstract Huffman [Huffman (1952)] encoding is one of the most known compression algorithms. In its basic use, only one encoding is given for the same letter in text to compress. In this paper, a text compression algorithm that is based on Huffman encoding is proposed. Huffman encoding is used to give different encodings for the same letter depending on the prefix preceding it in the word. A deterministic finite automaton (DFA) that recognizes the words of the text is constructed. This DFA records the frequencies for letters that label the transitions. Every state will correspond to one of the prefixes of… More >

Displaying 131-140 on page 14 of 156. Per Page