Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    Video Summarization Approach Based on Binary Robust Invariant Scalable Keypoints and Bisecting K-Means

    Sameh Zarif1,2,*, Eman Morad1, Khalid Amin1, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3565-3583, 2024, DOI:10.32604/cmc.2024.046185

    Abstract Due to the exponential growth of video data, aided by rapid advancements in multimedia technologies. It became difficult for the user to obtain information from a large video series. The process of providing an abstract of the entire video that includes the most representative frames is known as static video summarization. This method resulted in rapid exploration, indexing, and retrieval of massive video libraries. We propose a framework for static video summary based on a Binary Robust Invariant Scalable Keypoint (BRISK) and bisecting K-means clustering algorithm. The current method effectively recognizes relevant frames using BRISK by extracting keypoints and the… More >

  • Open Access

    ARTICLE

    A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images

    Yuejie Li1,2,*, Shijun Li3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3041-3070, 2024, DOI:10.32604/cmc.2023.045741

    Abstract 6G is envisioned as the next generation of wireless communication technology, promising unprecedented data speeds, ultra-low Latency, and ubiquitous Connectivity. In tandem with these advancements, blockchain technology is leveraged to enhance computer vision applications’ security, trustworthiness, and transparency. With the widespread use of mobile devices equipped with cameras, the ability to capture and recognize Chinese characters in natural scenes has become increasingly important. Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount, such as facial recognition or personal healthcare monitoring. Users can control their visual data and grant or revoke access as needed. Recognizing Chinese characters from images… More >

  • Open Access

    ARTICLE

    A Scalable Interconnection Scheme in Many-Core Systems

    Allam Abumwais*, Mujahed Eleyat

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 615-632, 2023, DOI:10.32604/cmc.2023.038810

    Abstract Recent architectures of multi-core systems may have a relatively large number of cores that typically ranges from tens to hundreds; therefore called many-core systems. Such systems require an efficient interconnection network that tries to address two major problems. First, the overhead of power and area cost and its effect on scalability. Second, high access latency is caused by multiple cores’ simultaneous accesses of the same shared module. This paper presents an interconnection scheme called N-conjugate Shuffle Clusters (NCSC) based on multi-core multi-cluster architecture to reduce the overhead of the just mentioned problems. NCSC eliminated the need for router devices and… More >

  • Open Access

    REVIEW

    Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey

    Md. Shohidul Islam1,*, Md. Arafatur Rahman2, Mohamed Ariff Bin Ameedeen1, Husnul Ajra1, Zahian Binti Ismail1, Jasni Mohamad Zain3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 43-123, 2024, DOI:10.32604/cmes.2023.028687

    Abstract Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges. However, the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes. There is the biggest challenge of data integrity and scalability, including significant computing complexity and inapplicable latency on regional network diversity, operating system… More > Graphic Abstract

    Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey

  • Open Access

    ARTICLE

    Edge of Things Inspired Robust Intrusion Detection Framework for Scalable and Decentralized Applications

    Abdulaziz Aldribi1,2,*, Aman Singh2,3, Jose Breñosa3,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3865-3881, 2023, DOI:10.32604/csse.2023.037748

    Abstract Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications. Internet of Things (IoT), fog computing, edge computing, cloud computing, and the edge of things are the spine of all real-time and scalable applications. Conspicuously, this study proposed a novel framework for a real-time and scalable application that changes dynamically with time. In this study, IoT deployment is recommended for data acquisition. The Pre-Processing of data with local edge and fog nodes is implemented in this study. The threshold-oriented data classification method is deployed to improve the intrusion detection mechanism’s performance.… More >

  • Open Access

    ARTICLE

    Scalable Blockchain Technology for Tracking the Provenance of the Agri-Food

    B. Subashini*, D. Hemavathi

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3339-3358, 2023, DOI:10.32604/cmc.2023.035074

    Abstract Due to an increase in agricultural mislabeling and carelesshandling of non-perishable foods in recent years, consumers have been calling for the food sector to be more transparent. Due to information dispersion between divisions and the propensity to record inaccurate data, current traceability solutions typically fail to provide reliable farm-to-fork histories ofproducts. The three most enticing characteristics of blockchain technology areopenness, integrity, and traceability, which make it a potentially crucial tool for guaranteeing the integrity and correctness of data. In this paper, we suggest a permissioned blockchain system run by organizations, such as regulatory bodies, to promote the origin-tracking of shelf-stable… More >

  • Open Access

    ARTICLE

    Ether-IoT: A Realtime Lightweight and Scalable Blockchain-Enabled Cache Algorithm for IoT Access Control

    Hafiz Adnan Hussain*, Zulkefli Mansor, Zarina Shukur, Uzma Jafar

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3797-3815, 2023, DOI:10.32604/cmc.2023.034671

    Abstract Several unique characteristics of Internet of Things (IoT) devices, such as distributed deployment and limited storage, make it challenging for standard centralized access control systems to enable access control in today’s large-scale IoT ecosystem. To solve these challenges, this study presents an IoT access control system called Ether-IoT based on the Ethereum Blockchain (BC) infrastructure with Attribute-Based Access Control (ABAC). Access Contract (AC), Cache Contract (CC), Device Contract (DC), and Policy Contract (PC) are the four central smart contracts (SCs) that are included in the proposed system. CC offers a way to save user characteristics in a local cache system… More >

  • Open Access

    ARTICLE

    Performance Measurement of Energy Efficient and Highly Scalable Hybrid Adder

    B. Annapoorani*, P. Marikkannu

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2659-2672, 2023, DOI:10.32604/csse.2023.025075

    Abstract The adders are the vital arithmetic operation for any arithmetic operations like multiplication, subtraction, and division. Binary number additions are performed by the digital circuit known as the adder. In VLSI (Very Large Scale Integration), the full adder is a basic component as it plays a major role in designing the integrated circuits applications. To minimize the power, various adder designs are implemented and each implemented designs undergo defined drawbacks. The designed adder requires high power when the driving capability is perfect and requires low power when the delay occurred is more. To overcome such issues and to obtain better… More >

  • Open Access

    ARTICLE

    Efficient Scalable Template-Matching Technique for Ancient Brahmi Script Image

    Sandeep Kaur*, Bharat Bhushan Sagar

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1541-1559, 2023, DOI:10.32604/cmc.2023.032857

    Abstract Analysis and recognition of ancient scripts is a challenging task as these scripts are inscribed on pillars, stones, or leaves. Optical recognition systems can help in preserving, sharing, and accelerate the study of the ancient scripts, but lack of standard dataset for such scripts is a major constraint. Although many scholars and researchers have captured and uploaded inscription images on various websites, manual searching, downloading and extraction of these images is tedious and error prone. Web search queries return a vast number of irrelevant results, and manually extracting images for a specific script is not scalable. This paper proposes a… More >

  • Open Access

    ARTICLE

    Truncation and Rounding-Based Scalable Approximate Multiplier Design for Computer Imaging Applications

    S. Rooban1,*, A. Yamini Naga Ratnam1, M. V. S. Ramprasad2, N. Subbulakshmi3, R. Uma Mageswari4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5169-5184, 2022, DOI:10.32604/cmc.2022.027974

    Abstract Advanced technology used for arithmetic computing application, comprises greater number of approximate multipliers and approximate adders. Truncation and Rounding-based Scalable Approximate Multiplier (TRSAM) distinguish a variety of modes based on height (h) and truncation (t) as TRSAM (h, t) in the architecture. This TRSAM operation produces higher absolute error in Least Significant Bit (LSB) data shift unit. A new scalable approximate multiplier approach that uses truncation and rounding TRSAM (3, 7) is proposed to increase the multiplier accuracy. With the help of foremost one bit architecture, the proposed scalable approximate multiplier approach reduces the partial products. The proposed approximate TRSAM… More >

Displaying 1-10 on page 1 of 19. Per Page