Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    JShellDetector: A Java Fileless Webshell Detector Based on Program Analysis

    Xuyan Song, Yiting Qin, Xinyao Liu, Baojiang Cui*, Junsong Fu

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.034505

    Abstract Fileless webshell attacks against Java web applications have become more frequent in recent years as Java has gained market share. Webshell is a malicious script that can remotely execute commands and invade servers. It is widely used in attacks against web applications. In contrast to traditional file-based webshells, fileless webshells leave no traces on the hard drive, which means they are invisible to most antivirus software. To make matters worse, although there are some studies on fileless webshells, almost all of them are aimed at web applications developed in the PHP language. The complex mechanism of Java makes researchers face… More >

  • Open Access

    ARTICLE

    Deep Learning Based Face Detection and Identification of Criminal Suspects

    S. Sandhya1, A. Balasundaram2,*, Ayesha Shaik1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2331-2343, 2023, DOI:10.32604/cmc.2023.032715

    Abstract Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past decade. One of the most tedious tasks is to track a suspect once a crime is committed. As most of the crimes are committed by individuals who have a history of felonies, it is essential for a monitoring system that does not just detect the person’s face who has committed the crime, but also their identity. Hence, a smart criminal detection and identification system that makes use of the OpenCV Deep Neural Network (DNN) model which employs a… More >

  • Open Access

    ARTICLE

    Stress Detector Supported Galvanic Skin Response System with IoT and LabVIEW GUI

    Rajesh Singh1, Anita Gehlot1, Ritika Saxena2, Khalid Alsubhi3, Divya Anand1,*, Irene Delgado Noya4,5, Shaik Vaseem Akram1, Sushabhan Choudhury2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1217-1233, 2023, DOI:10.32604/cmc.2023.023894

    Abstract Stress is now a serious disease that exists due to changes in working life and food ecosystems around the world. In general, it is difficult for a person to know if they are under stress. According to previous research, temperature, heart rate variability (HRV), humidity, and blood pressure are used to assess stress levels with the use of instruments. With the development of sensor technology and wireless connectivity, people around the world are adopting and using smart devices. In this study, a bio signal detection device with Internet of Things (IoT) capability with a galvanic skin reaction (GSR) sensor is… More >

  • Open Access

    ARTICLE

    Two-Fold and Symmetric Repeatability Rates for Comparing Keypoint Detectors

    Ibrahim El rube'*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6495-6511, 2022, DOI:10.32604/cmc.2022.031602

    Abstract The repeatability rate is an important measure for evaluating and comparing the performance of keypoint detectors. Several repeatability rate measurements were used in the literature to assess the effectiveness of keypoint detectors. While these repeatability rates are calculated for pairs of images, the general assumption is that the reference image is often known and unchanging compared to other images in the same dataset. So, these rates are asymmetrical as they require calculations in only one direction. In addition, the image domain in which these computations take place substantially affects their values. The presented scatter diagram plots illustrate how these directional… More >

  • Open Access

    ARTICLE

    Truncation and Rounding-Based Scalable Approximate Multiplier Design for Computer Imaging Applications

    S. Rooban1,*, A. Yamini Naga Ratnam1, M. V. S. Ramprasad2, N. Subbulakshmi3, R. Uma Mageswari4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5169-5184, 2022, DOI:10.32604/cmc.2022.027974

    Abstract Advanced technology used for arithmetic computing application, comprises greater number of approximate multipliers and approximate adders. Truncation and Rounding-based Scalable Approximate Multiplier (TRSAM) distinguish a variety of modes based on height (h) and truncation (t) as TRSAM (h, t) in the architecture. This TRSAM operation produces higher absolute error in Least Significant Bit (LSB) data shift unit. A new scalable approximate multiplier approach that uses truncation and rounding TRSAM (3, 7) is proposed to increase the multiplier accuracy. With the help of foremost one bit architecture, the proposed scalable approximate multiplier approach reduces the partial products. The proposed approximate TRSAM… More >

  • Open Access

    ARTICLE

    A Multi-Scale Grasp Detector Based on Fully Matching Model

    Xinheng Yuan, Hao Yu, Houlin Zhang, Li Zheng, Erbao Dong*, Heng’an Wu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.2, pp. 281-301, 2022, DOI:10.32604/cmes.2022.021383

    Abstract Robotic grasping is an essential problem at both the household and industrial levels, and unstructured objects have always been difficult for grippers. Parallel-plate grippers and algorithms, focusing on partial information of objects, are one of the widely used approaches. However, most works predict single-size grasp rectangles for fixed cameras and gripper sizes. In this paper, a multi-scale grasp detector is proposed to predict grasp rectangles with different sizes on RGB-D or RGB images in real-time for hand-eye cameras and various parallel-plate grippers. The detector extracts feature maps of multiple scales and conducts predictions on each scale independently. To guarantee independence… More >

  • Open Access

    ARTICLE

    Image Captioning Using Detectors and Swarm Based Learning Approach for Word Embedding Vectors

    B. Lalitha1,*, V. Gomathi2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 173-189, 2023, DOI:10.32604/csse.2023.024118

    Abstract IC (Image Captioning) is a crucial part of Visual Data Processing and aims at understanding for providing captions that verbalize an image’s important elements. However, in existing works, because of the complexity in images, neglecting major relation between the object in an image, poor quality image, labelling it remains a big problem for researchers. Hence, the main objective of this work attempts to overcome these challenges by proposing a novel framework for IC. So in this research work the main contribution deals with the framework consists of three phases that is image understanding, textual understanding and decoding. Initially, the image… More >

  • Open Access

    ARTICLE

    Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method

    J. S. Sujin1,*, S. Sophia2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 157-171, 2023, DOI:10.32604/csse.2023.023747

    Abstract Digital picture forgery detection has recently become a popular and significant topic in image processing. Due to advancements in image processing and the availability of sophisticated software, picture fabrication may hide evidence and hinder the detection of such criminal cases. The practice of modifying original photographic images to generate a forged image is known as digital image forging. A section of an image is copied and pasted into another part of the same image to hide an item or duplicate particular image elements in copy-move forgery. In order to make the forgeries real and inconspicuous, geometric or post-processing techniques are… More >

  • Open Access

    ARTICLE

    Efficient Centralized Cooperative Spectrum Sensing Techniques for Cognitive Networks

    P. Gnanasivam1, G. T. Bharathy1,*, V. Rajendran2, T. Tamilselvi1

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 55-65, 2023, DOI:10.32604/csse.2023.023374

    Abstract Wireless Communication is a system for communicating information from one point to other, without utilizing any connections like wire, cable, or other physical medium. Cognitive Radio (CR) based systems and networks are a revolutionary new perception in wireless communications. Spectrum sensing is a vital task of CR to avert destructive intrusion with licensed primary or main users and discover the accessible spectrum for the efficient utilization of the spectrum. Centralized Cooperative Spectrum Sensing (CSS) is a kind of spectrum sensing. Most of the test metrics designed till now for sensing the spectrum is produced by using the Sample Covariance Matrix… More >

  • Open Access

    ARTICLE

    Deep Learning Control for Autonomous Robot

    Rihem Farkh1,2, Saad Alhuwaimel3,*, Sultan Alzahrani3, Khaled Al Jaloud1, Mohammad Tabrez Quasim4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2811-2824, 2022, DOI:10.32604/cmc.2022.020259

    Abstract Several applications of machine learning and artificial intelligence, have acquired importance and come to the fore as a result of recent advances and improvements in these approaches. Autonomous cars are one such application. This is expected to have a significant and revolutionary influence on society. Integration with smart cities, new infrastructure and urban planning with sophisticated cyber-security are some of the current ramifications of self-driving automobiles. The autonomous automobile, often known as self-driving systems or driverless vehicles, is a vehicle that can perceive its surroundings and navigate predetermined routes without human involvement. Cars are on the verge of evolving into… More >

Displaying 11-20 on page 2 of 34. Per Page