Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (137)
  • Open Access

    ARTICLE

    An Intelligent Detection Method for Optical Remote Sensing Images Based on Improved YOLOv7

    Chao Dong, Xiangkui Jiang*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3015-3036, 2023, DOI:10.32604/cmc.2023.044735

    Abstract To address the issue of imbalanced detection performance and detection speed in current mainstream object detection algorithms for optical remote sensing images, this paper proposes a multi-scale object detection model for remote sensing images on complex backgrounds, called DI-YOLO, based on You Only Look Once v7-tiny (YOLOv7-tiny). Firstly, to enhance the model’s ability to capture irregular-shaped objects and deformation features, as well as to extract high-level semantic information, deformable convolutions are used to replace standard convolutions in the original model. Secondly, a Content Coordination Attention Feature Pyramid Network (CCA-FPN) structure is designed to replace the Neck part of the original… More >

  • Open Access

    ARTICLE

    Multiple-Object Tracking Using Histogram Stamp Extraction in CCTV Environments

    Ye-Yeon Kang1, Geon Park1, Hyun Yoo2, Kyungyong Chung1,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3619-3635, 2023, DOI:10.32604/cmc.2023.043566

    Abstract Object tracking, an important technology in the field of image processing and computer vision, is used to continuously track a specific object or person in an image. This technology may be effective in identifying the same person within one image, but it has limitations in handling multiple images owing to the difficulty in identifying whether the object appearing in other images is the same. When tracking the same object using two or more images, there must be a way to determine that objects existing in different images are the same object. Therefore, this paper attempts to determine the same object… More >

  • Open Access

    ARTICLE

    Real-Time Prediction Algorithm for Intelligent Edge Networks with Federated Learning-Based Modeling

    Seungwoo Kang1, Seyha Ros1, Inseok Song1, Prohim Tam1, Sa Math2, Seokhoon Kim1,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1967-1983, 2023, DOI:10.32604/cmc.2023.045020

    Abstract Intelligent healthcare networks represent a significant component in digital applications, where the requirements hold within quality-of-service (QoS) reliability and safeguarding privacy. This paper addresses these requirements through the integration of enabler paradigms, including federated learning (FL), cloud/edge computing, software-defined/virtualized networking infrastructure, and converged prediction algorithms. The study focuses on achieving reliability and efficiency in real-time prediction models, which depend on the interaction flows and network topology. In response to these challenges, we introduce a modified version of federated logistic regression (FLR) that takes into account convergence latencies and the accuracy of the final FL model within healthcare networks. To establish… More >

  • Open Access

    ARTICLE

    Force Sensitive Resistors-Based Real-Time Posture Detection System Using Machine Learning Algorithms

    Arsal Javaid1, Areeb Abbas1, Jehangir Arshad1, Mohammad Khalid Imam Rahmani2,*, Sohaib Tahir Chauhdary3, Mujtaba Hussain Jaffery1, Abdulbasid S. Banga2,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1795-1814, 2023, DOI:10.32604/cmc.2023.044140

    Abstract To detect the improper sitting posture of a person sitting on a chair, a posture detection system using machine learning classification has been proposed in this work. The addressed problem correlates to the third Sustainable Development Goal (SDG), ensuring healthy lives and promoting well-being for all ages, as specified by the World Health Organization (WHO). An improper sitting position can be fatal if one sits for a long time in the wrong position, and it can be dangerous for ulcers and lower spine discomfort. This novel study includes a practical implementation of a cushion consisting of a grid of 3… More >

  • Open Access

    ARTICLE

    Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT

    Muhammad Tahir1,2,*, Mingchu Li1,2, Irfan Khan1,2, Salman A. Al Qahtani3, Rubia Fatima4, Javed Ali Khan5, Muhammad Shahid Anwar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2529-2544, 2023, DOI:10.32604/cmc.2023.042403

    Abstract Real-time health data monitoring is pivotal for bolstering road services’ safety, intelligence, and efficiency within the Internet of Health Things (IoHT) framework. Yet, delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems. We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this. This strategy is devised to streamline the data retrieval path, subsequently diminishing network strain. Crafting an adept cache processing scheme poses its own set of challenges, especially given the transient nature of monitoring data and the imperative for swift data transmission, intertwined with resource allocation tactics.… More >

  • Open Access

    ARTICLE

    Convolutional Neural Network Model for Fire Detection in Real-Time Environment

    Abdul Rehman, Dongsun Kim*, Anand Paul

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2289-2307, 2023, DOI:10.32604/cmc.2023.036435

    Abstract Disasters such as conflagration, toxic smoke, harmful gas or chemical leakage, and many other catastrophes in the industrial environment caused by hazardous distance from the peril are frequent. The calamities are causing massive fiscal and human life casualties. However, Wireless Sensors Network-based adroit monitoring and early warning of these dangerous incidents will hamper fiscal and social fiasco. The authors have proposed an early fire detection system uses machine and/or deep learning algorithms. The article presents an Intelligent Industrial Monitoring System (IIMS) and introduces an Industrial Smart Social Agent (ISSA) in the Industrial SIoT (ISIoT) paradigm. The proffered ISSA empowers smart… More >

  • Open Access

    ARTICLE

    Inhibition of Ehrlich ascites carcinoma growth by melatonin: Studies with micro-CT

    SEHER YILMAZ1,2,*, ZÜLEYHA DOĞANYIĞIT3, MERT OCAK4, EVRIM SUNA ARIKAN SÖYLEMEZ5, ASLI OKAN OFLAMAZ3, SÜMEYYE UÇAR6, ŞÜKRÜ ATEŞ1, AMMAD AHMAD FAROOQI7

    Oncology Research, Vol.32, No.1, pp. 175-185, 2024, DOI:10.32604/or.2023.042350

    Abstract Melatonin is a versatile indolamine synthesized and secreted by the pineal gland in response to the photoperiodic information received by the retinohypothalamic signaling pathway. Melatonin has many benefits, such as organizing circadian rhythms and acting as a powerful hormone. We aimed to show the antitumor effects of melatonin in both in vivo and in vitro models through the mammalian target of rapamycin (mTOR) signaling pathway and the Argyrophilic Nucleolar Regulatory Region (AgNOR), using the Microcomputed Tomography (Micro CT). Ehrlich ascites carcinoma (EAC) cells were administered into the mice by subcutaneous injection. Animals with solid tumors were injected intraperitoneally with 50… More > Graphic Abstract

    Inhibition of Ehrlich ascites carcinoma growth by melatonin: Studies with micro-CT

  • Open Access

    ARTICLE

    CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission

    Osama S. Younes1,2,*, Abdulmohsen Alharbi1, Ali Yasseen1, Faisal Alshareef1, Faisal Albalawi1, Umar A. Albalawi1,3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2895-2920, 2023, DOI:10.32604/csse.2023.040162

    Abstract Due to their significant correlation and redundancy, conventional block cipher cryptosystems are not efficient in encrypting multimedia data. Stream ciphers based on Cellular Automata (CA) can provide a more effective solution. The CA have recently gained recognition as a robust cryptographic primitive, being used as pseudorandom number generators in hash functions, block ciphers and stream ciphers. CA have the ability to perform parallel transformations, resulting in high throughput performance. Additionally, they exhibit a natural tendency to resist fault attacks. Few stream cipher schemes based on CA have been proposed in the literature. Though, their encryption/decryption throughput is relatively low, which… More >

  • Open Access

    ARTICLE

    Real-Time Remote-Mentored Echocardiography in Management of Newborns with Critical Congenital Heart Defects

    Håvard Bjerkeseth Solvin1,2,5,*, Simone Goa Diab1,4, Ole Jakob Elle2,3, Henrik Holmstrøm1,4, Henrik Brun2,4,*

    Congenital Heart Disease, Vol.18, No.5, pp. 551-559, 2023, DOI:10.32604/chd.2023.031537

    Abstract Background: The management of suspected critical congenital heart defects (CCHD) relies on timely echocardiographic diagnosis. The availability of experienced echocardiographers is limited or even non-existent in many hospitals with obstetric units. This study evaluates remote-mentored echocardiography performed by physicians without experience in imaging of congenital heart defects (CHD). Methods: The setup included a pediatric cardiologist in a separate room, guiding a physician without experience in echocardiographic imaging of CHD in the examination of a symptomatic newborn. This remote-mentoring pair was blinded to the diagnosis of the newborn and presented with a simplified patient history. The echocardiographic images were streamed to… More > Graphic Abstract

    Real-Time Remote-Mentored Echocardiography in Management of Newborns with Critical Congenital Heart Defects

  • Open Access

    ARTICLE

    Siamese Dense Pixel-Level Fusion Network for Real-Time UAV Tracking

    Zhenyu Huang1,2, Gun Li2, Xudong Sun1, Yong Chen1, Jie Sun1, Zhangsong Ni1,*, Yang Yang1,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3219-3238, 2023, DOI:10.32604/cmc.2023.039489

    Abstract Onboard visual object tracking in unmanned aerial vehicles (UAVs) has attracted much interest due to its versatility. Meanwhile, due to high precision, Siamese networks are becoming hot spots in visual object tracking. However, most Siamese trackers fail to balance the tracking accuracy and time within onboard limited computational resources of UAVs. To meet the tracking precision and real-time requirements, this paper proposes a Siamese dense pixel-level network for UAV object tracking named SiamDPL. Specifically, the Siamese network extracts features of the search region and the template region through a parameter-shared backbone network, then performs correlation matching to obtain the candidate… More >

Displaying 11-20 on page 2 of 137. Per Page