Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (535)
  • Open Access

    ARTICLE

    Visible-Infrared Person Re-Identification via Quadratic Graph Matching and Block Reasoning

    Junfeng Lin1, Jialin Ma1,*, Wei Chen1,2, Hao Wang1, Weiguo Ding1, Mingyao Tang1

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1013-1029, 2025, DOI:10.32604/cmc.2025.062895 - 09 June 2025

    Abstract The cross-modal person re-identification task aims to match visible and infrared images of the same individual. The main challenges in this field arise from significant modality differences between individuals and the lack of high-quality cross-modal correspondence methods. Existing approaches often attempt to establish modality correspondence by extracting shared features across different modalities. However, these methods tend to focus on local information extraction and fail to fully leverage the global identity information in the cross-modal features, resulting in limited correspondence accuracy and suboptimal matching performance. To address this issue, we propose a quadratic graph matching method… More >

  • Open Access

    ARTICLE

    Rising Bubbles and Ensuing Wake Effects in Bottom-Blown Copper Smelters

    Zhi Yang1,2, Xiaohui Zhang1,2,*, Xinting Tong3, Yutang Zhao4, Teng Xia1,2, Hua Wang1,2

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.5, pp. 1133-1150, 2025, DOI:10.32604/fdmp.2025.061737 - 30 May 2025

    Abstract In bottom-blown copper smelting processes, oxygen-enriched air is typically injected into the melt through a lance, generating bubbles that ascend and agitate the melt, enhancing mass, momentum, and heat transfer within the furnace. The melt’s viscosity, which varies across reaction stages, and the operating conditions influence bubble size and dynamics. This study investigates the interplay between melt viscosity and bubble diameter on bubble motion using numerical simulations and experiments. In particular, the volume of fluid (VOF) method and Ω-identification technique were employed to analyze bubble velocity, deformation, trajectories, and wake characteristics. The results showed that More >

  • Open Access

    REVIEW

    Review and Comparative Analysis of System Identification Methods for Perturbed Motorized Systems

    Helen Shin Huey Wee, Nur Syazreen Ahmad*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 1301-1354, 2025, DOI:10.32604/cmes.2025.063611 - 30 May 2025

    Abstract This paper reviews recent advancements in system identification methods for perturbed motorized systems, focusing on brushed DC motors, brushless DC motors, and permanent magnet synchronous motors. It examines data acquisition setups and evaluates conventional and metaheuristic optimization algorithms, highlighting their advantages, limitations, and applications. The paper explores emerging trends in model structures and parameter optimization techniques that address specific perturbations such as varying loads, noise, and friction. A comparative performance analysis is also included to assess several widely used optimization methods, including least squares (LS), particle swarm optimization (PSO), grey wolf optimizer (GWO), bat algorithm… More >

  • Open Access

    ARTICLE

    Morpho-Physiological Indices for Identification of Heat Tolerant Wheat Genotypes (Triticum aestivum L.) at Seedling Stage

    S. Y. Labonno, M. S. Raihan, M. Mohi-Ud-Din, A. K. M. Aminul Islam*

    Phyton-International Journal of Experimental Botany, Vol.94, No.5, pp. 1545-1563, 2025, DOI:10.32604/phyton.2025.063916 - 29 May 2025

    Abstract Morpho-physiological evaluation of a crop’s genetic resources is necessary to find possible genotypes to include in breeding initiatives. The objective of this study was to identify heat-tolerant wheat genotypes among36 mutant lines using morpho-physiological indices. Seedlings of mutant lines and check varieties were grown under both normal (control) and heat-stress conditions in growth chambers. Data were recorded on root-shoot parameters (length, fresh weight, dry weight, and ratio), relative water content (RWC), stability of cell membrane, pigment content, and chlorophyll fluorescence. Two-way analysis of variance showed significant (p < 0.01, p < 0.001) variation among15 morpho-physiological features… More >

  • Open Access

    ARTICLE

    Real-Time Identification Technology for Encrypted DNS Traffic with Privacy Protection

    Zhipeng Qin1,2,*, Hanbing Yan3, Biyang Zhang2, Peng Wang2, Yitao Li3

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5811-5829, 2025, DOI:10.32604/cmc.2025.063308 - 19 May 2025

    Abstract With the widespread adoption of encrypted Domain Name System (DNS) technologies such as DNS over Hyper Text Transfer Protocol Secure (HTTPS), traditional port and protocol-based traffic analysis methods have become ineffective. Although encrypted DNS enhances user privacy protection, it also provides concealed communication channels for malicious software, compelling detection technologies to shift towards statistical feature-based and machine learning approaches. However, these methods still face challenges in real-time performance and privacy protection. This paper proposes a real-time identification technology for encrypted DNS traffic with privacy protection. Firstly, a hierarchical architecture of cloud-edge-end collaboration is designed, incorporating More >

  • Open Access

    ARTICLE

    Identification of PBL Gene Family in Tree Peonies and Its Function in Regulating Pollen Tube Growth

    Yuxin Zhao, Zhanxiang Tan, Yuying Li, Kaiyue Zhang, Lili Guo*, Xiaogai Hou*

    Phyton-International Journal of Experimental Botany, Vol.94, No.4, pp. 1159-1176, 2025, DOI:10.32604/phyton.2025.063737 - 30 April 2025

    Abstract Receptor-like cytoplasmic kinases (RLCKs) play a crucial role in the physiological processes of plant growth and development and stress response. To elucidate the characteristics and functions of the PBL gene family in tree peonies, the whole genome identification of PBL family members in tree peonies was conducted using a bioinformatics approach based on the published Arabidopsis thaliana PBL protein sequence. A total of 51 PoPBL members were identified, which were distributed unevenly on five chromosomes in the tree peony. PoPBL proteins were localized in the nucleus, cytoplasm, chloroplasts, and mitochondria, with most members of the same clade… More >

  • Open Access

    ARTICLE

    A Freudian Group Psychology Perspective on the Psychological Mechanisms in South Korean Elite Sports Teams: Implications for Mental Health

    Hyunkyun Ahn1, Yeon-Hee Choi2,*, Young-Vin Kim3,*

    International Journal of Mental Health Promotion, Vol.27, No.4, pp. 451-468, 2025, DOI:10.32604/ijmhp.2025.060896 - 30 April 2025

    Abstract Objectives: In this study, we examined the psychological impact of hierarchical and authoritarian structures in elite sports teams in South Korea on the ego formation and mental health of athletes. We aimed to analyze how these environments shape psychological well-being in athletes, drawing on Freud’s group psychology theory, while integrating perspectives from the Self-Determination Theory (SDT) and Social Identity Theory (SIT). Methods: We applied a qualitative case-study approach, with data collected through in-depth interviews with eight retired elite table tennis players from South Korea. These athletes shared their experiences with psychological mechanisms in their teams… More >

  • Open Access

    ARTICLE

    A Novel Approach to Enhanced Cancelable Multi-Biometrics Personal Identification Based on Incremental Deep Learning

    Ali Batouche1, Souham Meshoul2,*, Hadil Shaiba3, Mohamed Batouche2,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1727-1752, 2025, DOI:10.32604/cmc.2025.063227 - 16 April 2025

    Abstract The field of biometric identification has seen significant advancements over the years, with research focusing on enhancing the accuracy and security of these systems. One of the key developments is the integration of deep learning techniques in biometric systems. However, despite these advancements, certain challenges persist. One of the most significant challenges is scalability over growing complexity. Traditional methods either require maintaining and securing a growing database, introducing serious security challenges, or relying on retraining the entire model when new data is introduced—a process that can be computationally expensive and complex. This challenge underscores the… More >

  • Open Access

    ARTICLE

    Deep Learning Algorithm for Person Re-Identification Based on Dual Network Architecture

    Meng Zhu1,2, Xingyue Wang3, Honge Ren3,4,*, Abeer Hakeem5, Linda Mohaisen5,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2889-2905, 2025, DOI:10.32604/cmc.2025.061421 - 16 April 2025

    Abstract Changing a person’s posture and low resolution are the key challenges for person re-identification (ReID) in various deep learning applications. In this paper, we introduce an innovative architecture using a dual attention network that includes an attention module and a joint measurement module of spatial-temporal information. The proposed approach can be classified into two main tasks. Firstly, the spatial attention feature map is formed by aggregating features in the spatial dimension. Additionally, the same operation is carried out on the channel dimension to form channel attention feature maps. Therefore, the receptive field size is adjusted… More >

  • Open Access

    ARTICLE

    VPM-Net: Person Re-ID Network Based on Visual Prompt Technology and Multi-Instance Negative Pooling

    Haitao Xie, Yuliang Chen, Yunjie Zeng, Lingyu Yan, Zhizhi Wang, Zhiwei Ye*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3389-3410, 2025, DOI:10.32604/cmc.2025.060783 - 16 April 2025

    Abstract With the rapid development of intelligent video surveillance technology, pedestrian re-identification has become increasingly important in multi-camera surveillance systems. This technology plays a critical role in enhancing public safety. However, traditional methods typically process images and text separately, applying upstream models directly to downstream tasks. This approach significantly increases the complexity of model training and computational costs. Furthermore, the common class imbalance in existing training datasets limits model performance improvement. To address these challenges, we propose an innovative framework named Person Re-ID Network Based on Visual Prompt Technology and Multi-Instance Negative Pooling (VPM-Net). First, we… More >

Displaying 41-50 on page 5 of 535. Per Page