Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in the network and made network… More >

  • Open Access

    ARTICLE

    Sea-Land Segmentation of Remote Sensing Images Based on SDW-UNet

    Tianyu Liu1,3,4, Pengyu Liu1,2,3,4,*, Xiaowei Jia5, Shanji Chen2, Ying Ma2, Qian Gao1,3,4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1033-1045, 2023, DOI:10.32604/csse.2023.028225

    Abstract Image segmentation of sea-land remote sensing images is of great importance for downstream applications including shoreline extraction, the monitoring of near-shore marine environment, and near-shore target recognition. To mitigate large number of parameters and improve the segmentation accuracy, we propose a new Squeeze-Depth-Wise UNet (SDW-UNet) deep learning model for sea-land remote sensing image segmentation. The proposed SDW-UNet model leverages the squeeze-excitation and depth-wise separable convolution to construct new convolution modules, which enhance the model capacity in combining multiple channels and reduces the model parameters. We further explore the effect of position-encoded information in NLP (Natural Language Processing) domain on sea-land… More >

  • Open Access

    ARTICLE

    Fault Diagnosis of Wind Turbine Generator with Stacked Noise Reduction Autoencoder Based on Group Normalization

    Sihua Wang1,2, Wenhui Zhang1,2,*, Gaofei Zheng1,2, Xujie Li1,2, Yougeng Zhao1,2

    Energy Engineering, Vol.119, No.6, pp. 2431-2445, 2022, DOI:10.32604/ee.2022.020779

    Abstract In order to improve the condition monitoring and fault diagnosis of wind turbines, a stacked noise reduction autoencoding network based on group normalization is proposed in this paper. The network is based on SCADA data of wind turbine operation, firstly, the group normalization (GN) algorithm is added to solve the problems of stack noise reduction autoencoding network training and slow convergence speed, and the RMSProp algorithm is used to update the weight and the bias of the autoenccoder, which further optimizes the problem that the loss function swings too much during the update process. Finally, in the last layer of… More >

  • Open Access

    ARTICLE

    A Hybrid Security Framework for Medical Image Communication

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Ashraf A. M. Khalaf3, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2713-2730, 2022, DOI:10.32604/cmc.2022.028739

    Abstract Authentication of the digital image has much attention for the digital revolution. Digital image authentication can be verified with image watermarking and image encryption schemes. These schemes are widely used to protect images against forgery attacks, and they are useful for protecting copyright and rightful ownership. Depending on the desirable applications, several image encryption and watermarking schemes have been proposed to moderate this attention. This framework presents a new scheme that combines a Walsh Hadamard Transform (WHT)-based image watermarking scheme with an image encryption scheme based on Double Random Phase Encoding (DRPE). First, on the sender side, the secret medical… More >

  • Open Access

    ARTICLE

    Secure Cancelable Template Based on Double Random Phase Encoding and Entropy Segmentation

    Ahmed M. Ayoup1,*, Ashraf A. M. Khalaf1, Fathi E. Abd El-Samie2, Fahad Alraddady3, Salwa M. Serag Eldin3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4067-4085, 2022, DOI:10.32604/cmc.2022.025767

    Abstract In this paper, a proposed cancellable biometric scheme is based on multiple biometric image identifiers, Arnold’s cat map and double random phase encoding (DRPE) to obtain cancellable biometric templates. The proposed segmentation scheme that is used to select the region of interest for generating cancelable templates is based on chaos entropy low correlation statistical metrics. The objective of segmentation is to reduce the computational cost and reliability of template creation. The left and right biometric (iris, fingerprint, palm print and face) are divided into non-overlapping blocks of the same dimensions. To define the region of interest (ROI), we select the… More >

  • Open Access

    ARTICLE

    Vehicle Density Prediction in Low Quality Videos with Transformer Timeseries Prediction Model (TTPM)

    D. Suvitha*, M. Vijayalakshmi

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 873-894, 2023, DOI:10.32604/csse.2023.025189

    Abstract Recent advancement in low-cost cameras has facilitated surveillance in various developing towns in India. The video obtained from such surveillance are of low quality. Still counting vehicles from such videos are necessity to avoid traffic congestion and allows drivers to plan their routes more precisely. On the other hand, detecting vehicles from such low quality videos are highly challenging with vision based methodologies. In this research a meticulous attempt is made to access low-quality videos to describe traffic in Salem town in India, which is mostly an un-attempted entity by most available sources. In this work profound Detection Transformer (DETR)… More >

  • Open Access

    ARTICLE

    Errorless Underwater Channel Selection Scheme Using Forward Error Rectification and Modulation

    A. Herald1,*, C. Vennila2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 753-768, 2022, DOI:10.32604/iasc.2022.025362

    Abstract Acoustic and optical communication are the best options for data transmission in underwater communication. This paper presents the simulation model of an underwater wireless optical communication channel using the Errorless Channel Selection Using Forward Error Rectification and Modulation Progression (ECFM). The suitable modulation methods are used to encode and transfer the packets properly, the data is encoded in differential phase shift key mode at the phase of the light wave carrier. In addition, to send and receive data, an error rectification method is developed in the transport layer, which improves network speed. In addition, we create connections by observing the… More >

  • Open Access

    ARTICLE

    Person Re-Identification Using LBPH and K-Reciprocal Encoding

    V. Manimaran*, K. G. Srinivasagan

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1109-1121, 2022, DOI:10.32604/iasc.2022.023145

    Abstract Individual re-identification proof (Re-ID) targets recovering an individual of interest across different non-covering cameras. With the recent development of technological algorithm and expanding request of intelligence video observation, it has acquired fundamentally expanded interest in the computer vision. Person re-identification is characterized as the issue of perceiving an individual caught in different occasions and additionally areas more than a few nonoverlapping camera sees, thinking about a huge arrangement of up-and-comers. This issue influences essentially the administration of disseminated, multiview observation frameworks, in which subjects should be followed across better places, either deduced or on-the-fly when they travel through various areas.… More >

  • Open Access

    ARTICLE

    Research on Multi-View Image Reconstruction Technology Based on Auto-Encoding Learning

    Tao Zhang1, Shaokui Gu1, Jinxing Niu1,*, Yi Cao2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4603-4614, 2022, DOI:10.32604/cmc.2022.027079

    Abstract Traditional three-dimensional (3D) image reconstruction method, which highly dependent on the environment and has poor reconstruction effect, is easy to lead to mismatch and poor real-time performance. The accuracy of feature extraction from multiple images affects the reliability and real-time performance of 3D reconstruction technology. To solve the problem, a multi-view image 3D reconstruction algorithm based on self-encoding convolutional neural network is proposed in this paper. The algorithm first extracts the feature information of multiple two-dimensional (2D) images based on scale and rotation invariance parameters of Scale-invariant feature transform (SIFT) operator. Secondly, self-encoding learning neural network is introduced into the… More >

  • Open Access

    ARTICLE

    Compiler IR-Based Program Encoding Method for Software Defect Prediction

    Yong Chen1, Chao Xu1,*, Jing Selena He2, Sheng Xiao3, Fanfan Shen1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5251-5272, 2022, DOI:10.32604/cmc.2022.026750

    Abstract With the continuous expansion of software applications, people's requirements for software quality are increasing. Software defect prediction is an important technology to improve software quality. It often encodes the software into several features and applies the machine learning method to build defect prediction classifiers, which can estimate the software areas is clean or buggy. However, the current encoding methods are mainly based on the traditional manual features or the AST of source code. Traditional manual features are difficult to reflect the deep semantics of programs, and there is a lot of noise information in AST, which affects the expression of… More >

Displaying 11-20 on page 2 of 38. Per Page