Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    A Video Captioning Method by Semantic Topic-Guided Generation

    Ou Ye, Xinli Wei, Zhenhua Yu*, Yan Fu, Ying Yang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1071-1093, 2024, DOI:10.32604/cmc.2023.046418

    Abstract In the video captioning methods based on an encoder-decoder, limited visual features are extracted by an encoder, and a natural sentence of the video content is generated using a decoder. However, this kind of method is dependent on a single video input source and few visual labels, and there is a problem with semantic alignment between video contents and generated natural sentences, which are not suitable for accurately comprehending and describing the video contents. To address this issue, this paper proposes a video captioning method by semantic topic-guided generation. First, a 3D convolutional neural network is utilized to extract the… More >

  • Open Access

    ARTICLE

    Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

    Ali Arshad1,*, Muhammad Nadeem2, Saman Riaz1, Syeda Wajiha Zahra2, Ashit Kumar Dutta3, Zaid Alzaid4, Rana Alabdan5, Badr Almutairi6, Sultan Almotairi4,7

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3065-3089, 2023, DOI:10.32604/cmc.2023.035695

    Abstract There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker will not be able to… More >

  • Open Access

    ARTICLE

    Quaternion Integers Based Higher Length Cyclic Codes and Their Decoding Algorithm

    Muhammad Sajjad1, Tariq Shah1,*, Mohammad Mazyad Hazzazi2, Adel R. Alharbi3, Iqtadar Hussain4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1177-1194, 2022, DOI:10.32604/cmc.2022.025245

    Abstract The decoding algorithm for the correction of errors of arbitrary Mannheim weight has discussed for Lattice constellations and codes from quadratic number fields. Following these lines, the decoding algorithms for the correction of errors of length cyclic codes over quaternion integers of Quaternion Mannheim weight one up to two coordinates have considered. In continuation, the case of cyclic codes of lengths and has studied to improve the error correction efficiency. In this study, we present the decoding of cyclic codes of length and length 2 (where is prime integer and is Euler phi function) over Hamilton Quaternion integers of Quaternion… More >

  • Open Access

    ARTICLE

    Decoding of Factorial Experimental Design Models Implemented in Production Process

    Borislav Savkovic1, Pavel Kovac1, Branislav Dudic2,3,*, Michal Gregus2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1661-1675, 2022, DOI:10.32604/cmc.2022.021642

    Abstract The paper deals with factorial experimental design models decoding. For the ease of calculation of the experimental mathematical models, it is convenient first to code the independent variables. When selecting independent variables, it is necessary to take into account the range covered by each. A wide range of choices of different variables is presented in this paper. After calculating the regression model, its variables must be returned to their original values for the model to be easy recognized and represented. In the paper, the procedures of simple first order models, with interactions and with second order models, are presented, which… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Decoding and AP Selection for Radio Stripe Network

    Aman Kumar Mishra, Vijayakumar Ponnusamy*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 131-148, 2022, DOI:10.32604/iasc.2022.021017

    Abstract

    Cell-Free massive MIMO (mMIMO) offers promising features such as higher spectral efficiency, higher energy efficiency and superior spatial diversity, which makes it suitable to be adopted in beyond 5G (B5G) networks. However, the original form of Cell-Free massive MIMO requires each AP to be connected to CPU via front haul (front-haul constraints) resulting in huge economic costs and network synchronization issues. Radio Stripe architecture of cell-free mMIMO is one such architecture of cell-free mMIMO which is suitable for practical deployment. In this paper, we propose DNN Based Parallel Decoding in Radio Stripe (DNNBPDRS) to decode the symbols of User Equipments… More >

  • Open Access

    ARTICLE

    Low Complexity Decoding Algorithm for Uplink SCMA Based on Aerial Spherical Decoding

    Xiaohong Ji1, Junjun Du1, Guoqing Jia1,*, Weidong Fang2,3

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 737-746, 2021, DOI:10.32604/iasc.2021.013009

    Abstract As a new non-orthogonal multiple access technology for 5G massive machine type communication scenario, the sparse code multiple access (SCMA) has greatly improved the spectrum efficiency due to the high connection density. SCMA combines QAM (Quadrature Amplitude Modulation) modulation and sparse spreading into a codebook set to obtain forming gain. The user binary bit data is directly mapped into multi-dimensional codewords in the transmitter. The receiver uses the message passing algorithm (MPA) for multi-user detection to achieve efficient decoding. However, MPA is a good solution for SCMA, though its high complexity limits the application in practical systems. In order to… More >

  • Open Access

    ARTICLE

    LDPC Code’s Decoding Algorithms for Wireless Sensor Network: a Brief Review

    Weidong Fang1, Wuxiong Zhang1,2, Lianhai Shan1,*, Biruk Assefa3, Wei Chen4

    Journal of New Media, Vol.1, No.1, pp. 45-50, 2019, DOI:10.32604/jnm.2019.05786

    Abstract As an effective error correction technology, the Low Density Parity Check Code (LDPC) has been researched and applied by many scholars. Meanwhile, LDPC codes have some prominent performances, which involves close to the Shannon limit, achieving a higher bit rate and a fast decoding. However, whether these excellent characteristics are suitable for the resource-constrained Wireless Sensor Network (WSN), it seems to be seldom concerned. In this article, we review the LDPC code’s structure brief.ly, and them classify and summarize the LDPC codes’ construction and decoding algorithms, finally, analyze the applications of LDPC code for WSN. We believe that our contributions… More >

Displaying 1-10 on page 1 of 7. Per Page