Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    Residual Feature Attentional Fusion Network for Lightweight Chest CT Image Super-Resolution

    Kun Yang1,2, Lei Zhao1, Xianghui Wang1, Mingyang Zhang1, Linyan Xue1,2, Shuang Liu1,2, Kun Liu1,2,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5159-5176, 2023, DOI:10.32604/cmc.2023.036401

    Abstract The diagnosis of COVID-19 requires chest computed tomography (CT). High-resolution CT images can provide more diagnostic information to help doctors better diagnose the disease, so it is of clinical importance to study super-resolution (SR) algorithms applied to CT images to improve the resolution of CT images. However, most of the existing SR algorithms are studied based on natural images, which are not suitable for medical images; and most of these algorithms improve the reconstruction quality by increasing the network depth, which is not suitable for machines with limited resources. To alleviate these issues, we propose a residual feature attentional fusion… More >

  • Open Access

    ARTICLE

    TC-Net: A Modest & Lightweight Emotion Recognition System Using Temporal Convolution Network

    Muhammad Ishaq1, Mustaqeem Khan1,2, Soonil Kwon1,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3355-3369, 2023, DOI:10.32604/csse.2023.037373

    Abstract Speech signals play an essential role in communication and provide an efficient way to exchange information between humans and machines. Speech Emotion Recognition (SER) is one of the critical sources for human evaluation, which is applicable in many real-world applications such as healthcare, call centers, robotics, safety, and virtual reality. This work developed a novel TCN-based emotion recognition system using speech signals through a spatial-temporal convolution network to recognize the speaker’s emotional state. The authors designed a Temporal Convolutional Network (TCN) core block to recognize long-term dependencies in speech signals and then feed these temporal cues to a dense network… More >

  • Open Access

    ARTICLE

    Identification of Rice Leaf Disease Using Improved ShuffleNet V2

    Yang Zhou, Chunjiao Fu, Yuting Zhai, Jian Li, Ziqi Jin, Yanlei Xu*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4501-4517, 2023, DOI:10.32604/cmc.2023.038446

    Abstract Accurate identification of rice diseases is crucial for controlling diseases and improving rice yield. To improve the classification accuracy of rice diseases, this paper proposed a classification and identification method based on an improved ShuffleNet V2 (GE-ShuffleNet) model. Firstly, the Ghost module is used to replace the convolution in the two basic unit modules of ShuffleNet V2, and the unimportant convolution is deleted from the two basic unit modules of ShuffleNet V2. The Hardswish activation function is applied to replace the ReLU activation function to improve the identification accuracy of the model. Secondly, an effective channel attention (ECA) module is… More >

  • Open Access

    ARTICLE

    Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing

    Xinyi Qing1,3, Baopeng Ye2, Yuanquan Shi1,3, Tao Li4,*, Yuling Chen4, Lei Liu1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3607-3624, 2023, DOI:10.32604/cmc.2023.037532

    Abstract Due to its decentralized, tamper-proof, and trust-free characteristics, blockchain is used in the Internet of Things (IoT) to guarantee the reliability of data. However, some technical flaws in blockchain itself prevent the development of these applications, such as the issue with linearly growing storage capacity of blockchain systems. On the other hand, there is a lack of storage resources for sensor devices in IoT, and numerous sensor devices will generate massive data at ultra-high speed, which makes the storage problem of the IoT enabled by blockchain more prominent. There are various solutions to reduce the storage burden by modifying the… More >

  • Open Access

    ARTICLE

    Ether-IoT: A Realtime Lightweight and Scalable Blockchain-Enabled Cache Algorithm for IoT Access Control

    Hafiz Adnan Hussain*, Zulkefli Mansor, Zarina Shukur, Uzma Jafar

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3797-3815, 2023, DOI:10.32604/cmc.2023.034671

    Abstract Several unique characteristics of Internet of Things (IoT) devices, such as distributed deployment and limited storage, make it challenging for standard centralized access control systems to enable access control in today’s large-scale IoT ecosystem. To solve these challenges, this study presents an IoT access control system called Ether-IoT based on the Ethereum Blockchain (BC) infrastructure with Attribute-Based Access Control (ABAC). Access Contract (AC), Cache Contract (CC), Device Contract (DC), and Policy Contract (PC) are the four central smart contracts (SCs) that are included in the proposed system. CC offers a way to save user characteristics in a local cache system… More >

  • Open Access

    ARTICLE

    ILSM: Incorporated Lightweight Security Model for Improving QOS in WSN

    Ansar Munir Shah1, Mohammed Aljubayri2, Muhammad Faheem Khan1, Jarallah Alqahtani2,*, Mahmood ul Hassan3, Adel Sulaiman2, Asadullah Shaikh2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2471-2488, 2023, DOI:10.32604/csse.2023.034951

    Abstract In the network field, Wireless Sensor Networks (WSN) contain prolonged attention due to afresh augmentations. Industries like health care, traffic, defense, and many more systems espoused the WSN. These networks contain tiny sensor nodes containing embedded processors, Tiny OS, memory, and power source. Sensor nodes are responsible for forwarding the data packets. To manage all these components, there is a need to select appropriate parameters which control the quality of service of WSN. Multiple sensor nodes are involved in transmitting vital information, and there is a need for secure and efficient routing to reach the quality of service. But due… More >

  • Open Access

    ARTICLE

    A Novel Lightweight Image Encryption Scheme

    Rawia Abdulla Mohammed1,*, Maisa’a Abid Ali Khodher1, Ashwak Alabaichi2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2137-2153, 2023, DOI:10.32604/cmc.2023.036861

    Abstract Encryption algorithms are one of the methods to protect data during its transmission through an unsafe transmission medium. But encryption methods need a lot of time during encryption and decryption, so it is necessary to find encryption algorithms that consume little time while preserving the security of the data. In this paper, more than one algorithm was combined to obtain high security with a short implementation time. A chaotic system, DNA computing, and Salsa20 were combined. A proposed 5D chaos system was used to generate more robust keys in a Salsa algorithm and DNA computing. Also, the confusion is performed… More >

  • Open Access

    ARTICLE

    A Deep Learning-Based Crowd Counting Method and System Implementation on Neural Processing Unit Platform

    Yuxuan Gu, Meng Wu*, Qian Wang, Siguang Chen, Lijun Yang

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 493-512, 2023, DOI:10.32604/cmc.2023.035974

    Abstract In this paper, a deep learning-based method is proposed for crowd-counting problems. Specifically, by utilizing the convolution kernel density map, the ground truth is generated dynamically to enhance the feature-extracting ability of the generator model. Meanwhile, the “cross stage partial” module is integrated into congested scene recognition network (CSRNet) to obtain a lightweight network model. In addition, to compensate for the accuracy drop owing to the lightweight model, we take advantage of “structured knowledge transfer” to train the model in an end-to-end manner. It aims to accelerate the fitting speed and enhance the learning ability of the student model. The… More >

  • Open Access

    ARTICLE

    Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things

    Ahmad O. Aseeri1, Sajjad Hussain Chauhdary2,*, Mohammed Saeed Alkatheiri3, Mohammed A. Alqarni4, Yu Zhuang5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1901-1918, 2023, DOI:10.32604/cmc.2023.028777

    Abstract IoT devices rely on authentication mechanisms to render secure message exchange. During data transmission, scalability, data integrity, and processing time have been considered challenging aspects for a system constituted by IoT devices. The application of physical unclonable functions (PUFs) ensures secure data transmission among the internet of things (IoT) devices in a simplified network with an efficient time-stamped agreement. This paper proposes a secure, lightweight, cost-efficient reinforcement machine learning framework (SLCR-MLF) to achieve decentralization and security, thus enabling scalability, data integrity, and optimized processing time in IoT devices. PUF has been integrated into SLCR-MLF to improve the security of the… More >

  • Open Access

    ARTICLE

    A Lightweight Electronic Water Pump Shell Defect Detection Method Based on Improved YOLOv5s

    Qunbiao Wu1, Zhen Wang1,*, Haifeng Fang1, Junji Chen1, Xinfeng Wan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 961-979, 2023, DOI:10.32604/csse.2023.036239

    Abstract For surface defects in electronic water pump shells, the manual detection efficiency is low, prone to misdetection and leak detection, and encounters problems, such as uncertainty. To improve the speed and accuracy of surface defect detection, a lightweight detection method based on an improved YOLOv5s method is proposed to replace the traditional manual detection methods. In this method, the MobileNetV3 module replaces the backbone network of YOLOv5s, depth-separable convolution is introduced, the parameters and calculations are reduced, and CIoU_Loss is used as the loss function of the boundary box regression to improve its detection accuracy. A dataset of electronic pump… More >

Displaying 31-40 on page 4 of 100. Per Page