Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Time and Space Efficient Multi-Model Convolution Vision Transformer for Tomato Disease Detection from Leaf Images with Varied Backgrounds

    Ankita Gangwar1, Vijaypal Singh Dhaka1, Geeta Rani2,*, Shrey Khandelwal1, Ester Zumpano3,4, Eugenio Vocaturo3,4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 117-142, 2024, DOI:10.32604/cmc.2024.048119

    Abstract A consumption of 46.9 million tons of processed tomatoes was reported in 2022 which is merely 20% of the total consumption. An increase of 3.3% in consumption is predicted from 2024 to 2032. Tomatoes are also rich in iron, potassium, antioxidant lycopene, vitamins A, C and K which are important for preventing cancer, and maintaining blood pressure and glucose levels. Thus, tomatoes are globally important due to their widespread usage and nutritional value. To face the high demand for tomatoes, it is mandatory to investigate the causes of crop loss and minimize them. Diseases are one of the major causes… More >

  • Open Access

    ARTICLE

    Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

    Christy James Jose1,*, M. S. Rajasree2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1357-1372, 2023, DOI:10.32604/csse.2023.025672

    Abstract The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’ identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s (GWCK-CC). First, a Gaussian Weighted… More >

  • Open Access

    ARTICLE

    Mobile Devices Interface Adaptivity Using Ontologies

    Muhammad Waseem Iqbal1, Muhammad Raza Naqvi2, Muhammad Adnan Khan3,4, Faheem Khan5, T. Whangbo5,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4767-4784, 2022, DOI:10.32604/cmc.2022.023239

    Abstract Currently, many mobile devices provide various interaction styles and modes which create complexity in the usage of interfaces. The context offers the information base for the development of Adaptive user interface (AUI) frameworks to overcome the heterogeneity. For this purpose, the ontological modeling has been made for specific context and environment. This type of philosophy states to the relationship among elements (e.g., classes, relations, or capacities etc.) with understandable satisfied representation. The context mechanisms can be examined and understood by any machine or computational framework with these formal definitions expressed in Web ontology language (WOL)/Resource description frame work (RDF). The… More >

  • Open Access

    ARTICLE

    Multi-Floor Indoor Trajectory Reconstruction Using Mobile Devices

    Sultan Alamri1,*, Kartini Nurfalah2, Kiki Adhinugraha3

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.3, pp. 927-948, 2021, DOI:10.32604/cmes.2021.014852

    Abstract An indoor trajectory is the path of an object moving through corridors and stairs inside a building. There are various types of technologies that can be used to reconstruct the path of a moving object and detect its position. GPS has been used for reconstruction in outdoor environments, but for indoor environments, mobile devices with embedded sensors are used. An accelerometer sensor and a magnetometer sensor are used to detect human movement and reconstruct the trajectory on a single floor. In an indoor environment, there are many activities that will create the trajectory similar to an outdoor environment, such as… More >

  • Open Access

    ABSTRACT

    A Post-processing for the reduction of blocking artifact in mobile devices

    Dae-Hyun Park1, Hyun-Hee Park2, Yoon Kim1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.11, No.4, pp. 113-114, 2009, DOI:10.3970/icces.2009.011.113

    Abstract In this paper, we propose a post-processing visual enhancement technique to reduce the blocking artifacts in block based DCT decoded image for mobile devices that has allocation of the restricted resource. This algorithm uses the adaptive deblocking filter to remove grid noise and ringing noise in monotone areas. To decide whether monotone region or not, we introduce a notion of Flatness. Also, a new directional filter is utilized to get rid of staircase noise and preserve the original edge component. The directional filter is applied according to the direction of edge, which is corrected in the process of directional vector… More >

  • Open Access

    ARTICLE

    Design and Performance Comparison of Rotated Y-Shaped Antenna Using Different Metamaterial Surfaces for 5G Mobile Devices

    Jalal Khan1, Daniyal Ali Sehrai1, Mushtaq Ahmad Khan1, Haseeb Ahmad Khan2, Salman Ahmad3, Arslan Ali4, Arslan Arif5, Anwer Ahmad Memon6, Sahib Khan1,4,*

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 409-420, 2019, DOI:10.32604/cmc.2019.06883

    Abstract In this paper, a rotated Y-shaped antenna is designed and compared in terms of performance using a conventional and EBG ground planes for future Fifth Generation (5G) cellular communication system. The rotated Y-shaped antenna is designed to transmit at 38 GHz which is one of the most prominent candidate bands for future 5G communication systems. In the design of conventional antenna and metamaterial surfaces (mushroom, slotted), Rogers-5880 substrate having relative permittivity, thickness and loss tangent of 2.2, 0.254 mm, and 0.0009 respectively have been used. The conventional rotated Y-shaped antenna offers a satisfactory wider bandwidth (0.87 GHz) at 38.06 GHz… More >

  • Open Access

    ARTICLE

    Securing Display Path for Security-Sensitive Applications on Mobile Devices

    Jinhua Cui1,2, Yuanyuan Zhang3, Zhiping Cai1,*, Anfeng Liu4, Yangyang Li5

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 17-35, 2018, DOI:10.3970/cmc.2018.055.017

    Abstract While smart devices based on ARM processor bring us a lot of convenience, they also become an attractive target of cyber-attacks. The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities. Nowadays, adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application. A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device. In this work, we present a scheme named SecDisplay for trusted display service, it… More >

Displaying 1-10 on page 1 of 7. Per Page