Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (190)
  • Open Access

    ARTICLE

    Securing Copyright Using 3D Objects Blind Watermarking Scheme

    Hussein Abulkasim1,*, Mona Jamjoom2, Safia Abbas2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5969-5983, 2022, DOI:10.32604/cmc.2022.027999 - 21 April 2022

    Abstract Recently, securing Copyright has become a hot research topic due to rapidly advancing information technology. As a host cover, watermarking methods are used to conceal or embed sensitive information messages in such a manner that it was undetectable to a human observer in contemporary times. Digital media covers may often take any form, including audio, video, photos, even DNA data sequences. In this work, we present a new methodology for watermarking to hide secret data into 3-D objects. The technique of blind extraction based on reversing the steps of the data embedding process is used.… More >

  • Open Access

    ARTICLE

    Discrete Firefly Algorithm for Optimizing Topology Generation and Core Mapping of Network-on-Chip

    S. Parvathi*, S. Umamaheswari

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 15-32, 2022, DOI:10.32604/iasc.2022.025290 - 15 April 2022

    Abstract Network-on-chip (NoC) proves to be the best alternative to replace the traditional bus-based interconnection in Multi-Processor System on a Chip (MPSoCs). Irregular NoC topologies are highly recommended and utilised in various applications as they are application specific. Optimized mapping of the cores in a NoC plays a major role in its performance. Firefly algorithm is a bio-inspired meta-heuristic approach. Discretized firefly algorithm is used in our proposed work. In this work, two optimization algorithms are proposed: Topology Generation using Discrete Firefly Algorithm (TGDFA) and Core Mapping using Discrete Firefly Algorithm (CMDFA) for multimedia benchmark applications,… More >

  • Open Access

    ARTICLE

    DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

    Jyoti Khandelwal1, Vijay Kumar Sharma1, Dilbag Singh2,*, Atef Zaguia3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3299-3312, 2022, DOI:10.32604/cmc.2022.023116 - 29 March 2022

    Abstract Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel's threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image More >

  • Open Access

    ARTICLE

    Hybrid Machine Learning Model for Face Recognition Using SVM

    Anil Kumar Yadav1, R. K. Pateriya2, Nirmal Kumar Gupta3, Punit Gupta4,*, Dinesh Kumar Saini4, Mohammad Alahmadi5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2697-2712, 2022, DOI:10.32604/cmc.2022.023052 - 29 March 2022

    Abstract Face recognition systems have enhanced human-computer interactions in the last ten years. However, the literature reveals that current techniques used for identifying or verifying faces are not immune to limitations. Principal Component Analysis-Support Vector Machine (PCA-SVM) and Principal Component Analysis-Artificial Neural Network (PCA-ANN) are among the relatively recent and powerful face analysis techniques. Compared to PCA-ANN, PCA-SVM has demonstrated generalization capabilities in many tasks, including the ability to recognize objects with small or large data samples. Apart from requiring a minimal number of parameters in face detection, PCA-SVM minimizes generalization errors and avoids overfitting problems More >

  • Open Access

    ARTICLE

    CI-Block: A Blockchain System for Information Management of Collaborative Innovation

    Ruhao Ma1,*, Fansheng Meng1, Haiwen Du2,3

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1623-1637, 2022, DOI:10.32604/iasc.2022.026748 - 24 March 2022

    Abstract Blockchain technology ensures the security of cross-organizational data sharing in the process of collaborative innovation. It drives the development of collaborative innovation in discrete manufacturing to intelligent innovation. However, collaborative innovation is a multi-role, networked, and open resource-sharing process. Therefore, it is easy to form information barriers and increase the risk of cooperation between organizations. In this paper, we firstly analyze the blockchain-based information management models in the traditional discrete manufacturing collaborative innovation process. Then, we found that in the process of industry-university-research (IUR) collaborative innovation, consensus servers maintain too many connections due to the… More >

  • Open Access

    ARTICLE

    Research on Thunderstorm Identification Based on Discrete Wavelet Transform

    Xiaopeng Li1, Ziyuan Xu3,4, Jin Han1,*, Xingming Sun1,2, Yi Cao5

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1153-1166, 2022, DOI:10.32604/iasc.2022.023261 - 08 February 2022

    Abstract Lightning has been one of the most talked-about natural disasters worldwide in recent years, as it poses a great threat to all industries and can cause huge economic losses. Thunderstorms are often accompanied by natural phenomena such as lightning strikes and lightning, and many scholars have studied deeply the regulations of thunderstorm generation, movement and dissipation to reduce the risk of lightning damage. Most of the current methods for studying thunderstorms focus on using more complex algorithms based on radar or lightning data, which increases the computational burden and reduces the computational efficiency to some… More >

  • Open Access

    ARTICLE

    Mechanism behind Time Dependent Elasticity of Crumb Rubber-Nano-Asphalt Hybrids Using Discrete Relaxation Spectrum

    Lili Han1,2, Mulian Zheng2,*, Hongbing Guo1, Tao Wang3, Jiajian Zhu4, Pouria Hajikarimi5

    Journal of Renewable Materials, Vol.10, No.6, pp. 1727-1752, 2022, DOI:10.32604/jrm.2022.018467 - 20 January 2022

    Abstract Crumb rubber powder is a successfully used renewable material obtained from waste tire rubber, which has been incorporated into paving asphalt since the 1930s due to its good resistance to deformation and fatigue as well as its eco-friendly performance. In this study, carbon nanotubes and nano silica were incorporated into the terminal blend crumb rubber modified asphalt technology to remedy the issues of excessive desulfurization and degradation of ground tyre rubber with this technology. The mechanism behind the high temperature delayed elastic properties of the crumb rubber-nano-asphalt hybrids was experimentally investigated based on discrete relaxation… More >

  • Open Access

    ARTICLE

    Efficient Data Compression of ECG Signal Based on Modified Discrete Cosine Transform

    Ashraf Mohamed Ali Hassan1, Mohammed S. Alzaidi2, Sherif S. M. Ghoneim2,3,*, Waleed El Nahal4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4391-4408, 2022, DOI:10.32604/cmc.2022.024044 - 14 January 2022

    Abstract This paper introduced an efficient compression technique that uses the compressive sensing (CS) method to obtain and recover sparse electrocardiography (ECG) signals. The recovery of the signal can be achieved by using sampling rates lower than the Nyquist frequency. A novel analysis was proposed in this paper. To apply CS on ECG signal, the first step is to generate a sparse signal, which can be obtained using Modified Discrete Cosine Transform (MDCT) on the given ECG signal. This transformation is a promising key for other transformations used in this search domain and can be considered… More >

  • Open Access

    ARTICLE

    A Provably Secure and Efficient Remote Password Authentication Scheme Using Smart Cards

    Fairuz Shohaimay1,2, Eddie Shahril Ismail1,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6125-6145, 2022, DOI:10.32604/cmc.2022.022759 - 14 January 2022

    Abstract Communication technology has advanced dramatically amid the 21st century, increasing the security risk in safeguarding sensitive information. The remote password authentication (RPA) scheme is the simplest cryptosystem that serves as the first line of defence against unauthorised entity attacks. Although the literature contains numerous RPA schemes, to the best of the authors’ knowledge, only few schemes based on the integer factorisation problem (IFP) and the discrete logarithm problem (DLP) that provided a provision for session key agreement to ensure proper mutual authentication. Furthermore, none of the previous schemes provided formal security proof using the random oracle… More >

  • Open Access

    ARTICLE

    A Discrete Numerical Study of the Effect of the Thickness and the Porosity of the Sand Cushion on the Impact Response Due to the Rockfall

    Song Yuan1, Peng Zhao2,*, Liangpu Li1,*, Xibao Wang1, Jun Liu3, Bo Zhang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1683-1698, 2022, DOI:10.32604/cmes.2022.018507 - 30 December 2021

    Abstract The prevention and the reduction of the rockfall are the common measures of the prevention and the reduction of disasters. When the rock-shed resists the impact of the rockfall, the force that acts on the structure consists of the cushion dead load and the impact-induced load, of which the dynamic process of the propagation of the impact-induced load is complex. Therefore, we conducted a numerical study to investigate the impact of the rockfall. Considering the highly discrete characteristic of the sand, we developed a numerical model on the basis of the discrete element method (DEM).… More >

Displaying 71-80 on page 8 of 190. Per Page