Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,020)
  • Open Access

    ARTICLE

    Stereo Matching Method Based on Space-Aware Network Model

    Jilong Bian1,*, Jinfeng Li2

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.1, pp. 175-189, 2021, DOI:10.32604/cmes.2021.014635 - 30 March 2021

    Abstract The stereo matching method based on a space-aware network is proposed, which divides the network into three sections: Basic layer, scale layer, and decision layer. This division is beneficial to integrate residue network and dense network into the space-aware network model. The vertical splitting method for computing matching cost by using the space-aware network is proposed for solving the limitation of GPU RAM. Moreover, a hybrid loss is brought forward to boost the performance of the proposed deep network. In the proposed stereo matching method, the space-aware network is used to calculate the matching cost More >

  • Open Access

    ARTICLE

    Research on 48 V Super Capacitor Micro Hybrid System with 12 V Power Supply Multiplexing Function

    Wei Shi1, Shusheng Xiong1,*, Wei Li2, Bohao Zhang3

    Energy Engineering, Vol.118, No.3, pp. 643-654, 2021, DOI:10.32604/EE.2021.014643 - 22 March 2021

    Abstract 48 V lithium battery micro hybrid system is the most fuel economy vehicle which can be mass produced at present. However, with the irreversible internal resistance increase of the key component 48 V lithium battery, and the capacity continues to decline, the system performance deteriorate. Worst case could be the system not functional in the middle and later age of vehicle life cycle. This paper studies the feasibility of using 48 V super capacitor as the replacement to 48 V lithium battery, and uses a 12 V module of 48 V super capacitor as the… More >

  • Open Access

    ARTICLE

    Traffic Engineering in Dynamic Hybrid Segment Routing Networks

    Yingya Guo1,2,3,7, Kai Huang1, Cheng Hu4,*, Jiangyuan Yao5, Siyu Zhou6

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 655-670, 2021, DOI:10.32604/cmc.2021.016364 - 22 March 2021

    Abstract The emergence of Segment Routing (SR) provides a novel routing paradigm that uses a routing technique called source packet routing. In SR architecture, the paths that the packets choose to route on are indicated at the ingress router. Compared with shortest-path-based routing in traditional distributed routing protocols, SR can realize a flexible routing by implementing an arbitrary flow splitting at the ingress router. Despite the advantages of SR, it may be difficult to update the existing IP network to a full SR deployed network, for economical and technical reasons. Updating partial of the traditional IP… More >

  • Open Access

    ARTICLE

    A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images

    Ahmed S. Salama1,2,3, Mohamed Amr Mokhtar3, Mazhar B. Tayel3, Esraa Eldesouky4,6, Ahmed Ali5,6,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 431-446, 2021, DOI:10.32604/cmc.2021.016165 - 22 March 2021

    Abstract Assuring medical images protection and robustness is a compulsory necessity nowadays. In this paper, a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform (DWT) with the energy compaction of the Discrete Wavelet Transform (DCT). The multi-level Encryption-based Hybrid Fusion Technique (EbhFT) aims to achieve great advances in terms of imperceptibility and security of medical images. A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform. Afterwards, a 64-bit hex key is employed to encrypt the host image as well as participate in the… More >

  • Open Access

    ARTICLE

    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    Omar Almomani*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 409-429, 2021, DOI:10.32604/cmc.2021.016113 - 22 March 2021

    Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has… More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Architecture to Forecast Maximum Load Duration Using Time-of-Use Pricing Plans

    Jinseok Kim1, Babar Shah2, Ki-Il Kim3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 283-301, 2021, DOI:10.32604/cmc.2021.016042 - 22 March 2021

    Abstract Load forecasting has received crucial research attention to reduce peak load and contribute to the stability of power grid using machine learning or deep learning models. Especially, we need the adequate model to forecast the maximum load duration based on time-of-use, which is the electricity usage fare policy in order to achieve the goals such as peak load reduction in a power grid. However, the existing single machine learning or deep learning forecasting cannot easily avoid overfitting. Moreover, a majority of the ensemble or hybrid models do not achieve optimal results for forecasting the maximum… More >

  • Open Access

    ARTICLE

    Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique

    Ali A. R. Alkhafaji*, Nilam Nur Amir Sjarif, M. A. Shahidan, Nurulhuda Firdaus Mohd Azmi, Haslina Md Sarkan, Suriayati Chuprat

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 77-102, 2021, DOI:10.32604/cmc.2021.015770 - 22 March 2021

    Abstract The text of the Quran is principally dependent on the Arabic language. Therefore, improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difficult challenges that researchers face today. Consequently, the diacritical marks in the Holy Quran which represent Arabic vowels () known as the kashida (or “extended letters”) must be protected from changes. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC);… More >

  • Open Access

    ARTICLE

    Hybrid Metamodeling/Metaheuristic Assisted Multi-Transmitters Placement Planning

    Amir Parnianifard1, Muhammad Saadi2, Manus Pengnoo1, Muhammad Ali Imran3, Sattam Al Otaibi4, Pruk Sasithong1, Pisit Vanichchanunt5, Tuchsanai Polysuwan6, Lunchakorn Wuttisittikulkij1,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 569-587, 2021, DOI:10.32604/cmc.2021.015730 - 22 March 2021

    Abstract With every passing day, the demand for data traffic is increasing, and this urges the research community not only to look for an alternating spectrum for communication but also urges radio frequency planners to use the existing spectrum efficiently. Cell sizes are shrinking with every upcoming communication generation, which makes base station placement planning even more complex and cumbersome. In order to make the next-generation cost-effective, it is important to design a network in such a way that it utilizes the minimum number of base stations while ensuring seamless coverage and quality of service. This… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Hybrid Intelligent Intrusion Detection System

    Muhammad Ashfaq Khan1,2, Yangwoo Kim1,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 671-687, 2021, DOI:10.32604/cmc.2021.015647 - 22 March 2021

    Abstract Machine learning (ML) algorithms are often used to design effective intrusion detection (ID) systems for appropriate mitigation and effective detection of malicious cyber threats at the host and network levels. However, cybersecurity attacks are still increasing. An ID system can play a vital role in detecting such threats. Existing ID systems are unable to detect malicious threats, primarily because they adopt approaches that are based on traditional ML techniques, which are less concerned with the accurate classification and feature selection. Thus, developing an accurate and intelligent ID system is a priority. The main objective of… More >

  • Open Access

    ARTICLE

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    Muhammad Adil1, Jehad Ali2, Muhammad Sajjad Khan3, Junsu Kim3, Ryan Alturki4, Mohammad Zakarya4, Mukhtaj Khan4, Rahim Khan4, Su Min Kim3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967 - 22 March 2021

    Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and More >

Displaying 781-790 on page 79 of 1020. Per Page