Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    YOLO-SIFD: YOLO with Sliced Inference and Fractal Dimension Analysis for Improved Fire and Smoke Detection

    Mariam Ishtiaq1,2, Jong-Un Won1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5343-5361, 2025, DOI:10.32604/cmc.2025.061466 - 06 March 2025

    Abstract Fire detection has held stringent importance in computer vision for over half a century. The development of early fire detection strategies is pivotal to the realization of safe and smart cities, inhabitable in the future. However, the development of optimal fire and smoke detection models is hindered by limitations like publicly available datasets, lack of diversity, and class imbalance. In this work, we explore the possible ways forward to overcome these challenges posed by available datasets. We study the impact of a class-balanced dataset to improve the fire detection capability of state-of-the-art (SOTA) vision-based models and proposeMore >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique

    Chin-Shiuh Shieh1, Thanh-Lam Nguyen1, Thanh-Tuan Nguyen2,*, Mong-Fong Horng1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4881-4912, 2025, DOI:10.32604/cmc.2025.061001 - 06 March 2025

    Abstract DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity, capable of crippling critical infrastructures and disrupting services globally. As networks continue to expand and threats become more sophisticated, there is an urgent need for Intrusion Detection Systems (IDS) capable of handling these challenges effectively. Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics. This paper presents a novel approach for detecting unknown Distributed Denial of Service (DDoS) attacks by integrating Sliced Iterative Normalizing Flows (SINF) into IDS. SINF utilizes the… More >

  • Open Access

    ARTICLE

    Multi-Layer Deep Sparse Representation for Biological Slice Image Inpainting

    Haitao Hu1, Hongmei Ma2, Shuli Mei1,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3813-3832, 2023, DOI:10.32604/cmc.2023.041416 - 08 October 2023

    Abstract Biological slices are an effective tool for studying the physiological structure and evolution mechanism of biological systems. However, due to the complexity of preparation technology and the presence of many uncontrollable factors during the preparation processing, leads to problems such as difficulty in preparing slice images and breakage of slice images. Therefore, we proposed a biological slice image small-scale corruption inpainting algorithm with interpretability based on multi-layer deep sparse representation, achieving the high-fidelity reconstruction of slice images. We further discussed the relationship between deep convolutional neural networks and sparse representation, ensuring the high-fidelity characteristic of… More >

  • Open Access

    ARTICLE

    An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing

    Ratih Hikmah Puspita1, Jehad Ali1,*, Byeong-hee Roh2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4611-4631, 2023, DOI:10.32604/cmc.2023.033598 - 31 March 2023

    Abstract 5G use cases, for example enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and an ultra-reliable low latency communication (URLLC), need a network architecture capable of sustaining stringent latency and bandwidth requirements; thus, it should be extremely flexible and dynamic. Slicing enables service providers to develop various network slice architectures. As users travel from one coverage region to another area, the call must be routed to a slice that meets the same or different expectations. This research aims to develop and evaluate an algorithm to make handover decisions appearing in 5G sliced networks. Rules of… More >

  • Open Access

    ARTICLE

    Transplanted choroidal plexus epithelial cells can integrate with organotypic spinal cord slices into a new system

    JINGJIE LIU1,#, XIAOYAN DING2,#, LI XIANG1, SHENGLI HUANG3,*

    BIOCELL, Vol.46, No.6, pp. 1537-1544, 2022, DOI:10.32604/biocell.2022.018441 - 07 February 2022

    Abstract This study aimed to evaluate the integration of transplanted choroidal plexus epithelial cells with organotypic spinal cord slices. Organotypic spinal cord slices, normally cultured for 6 days, were divided into control group (Ctrl) and transplanted group (T). The choroidal plexus epithelial cells were dissociated and primary cultured (C group). The choroidal plexus epithelial cells cultured for 6–7 days were labeled by 1,1’-dioctadecyl-3,3,3’,3’-tetramethyl-indocarbocyanineperchlorate (CM-Dil), and were identified by transthyretin (TTR) in immunocytochemistry. They were adjusted to the density of 0.5–1 × 107/ml, then 2 μl cells suspension were transplanted to the spinal cord slices in the T… More >

  • Open Access

    ARTICLE

    2D Finite Element Analysis of Asynchronous Machine Influenced Under Power Quality Perturbations

    Jasmin Pamela S1 , R. Saranya1 , V. Indragandhi1 , R. Raja Singh1 , V. Subramaniyaswamy2, Yuvaraja Teekaraman3 , Shabana Urooj4,*, Norah Alwadai5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5745-5763, 2022, DOI:10.32604/cmc.2022.020093 - 11 October 2021

    Abstract

    Asynchronous machines are predominantly preferred in industrial sectors for its reliability. Power quality perturbations have a greater impact on industries; among the different power quality events, voltage fluctuations are the most common and that may cause adverse effect on machine's operation since they are longer enduring. The article discusses a numerical technique for evaluating asynchronous motors while taking into account magnetic saturation, losses, leakage flux, and voltage drop. A 2D linear analysis involving a multi-slice time stepping finite element model is used to predict the end effects. As an outcome, the magnetic saturation and losses are

    More >

  • Open Access

    ARTICLE

    Application Value of Multi-Slice Spiral CT Multiplanar Reconstruction Technique in the Diagnosis and Clinicopathological Analysis of Gastrointestinal Lymphoma

    Yongtao Yu, Guangdong Zou*

    Oncologie, Vol.23, No.2, pp. 293-301, 2021, DOI:10.32604/Oncologie.2021.015520 - 22 June 2021

    Abstract Objective: The purpose was to explore the value of multi-slice spiral CT (MSCT) multiplanar reconstruction technique in the diagnosis and clinicopathological analysis of gastrointestinal lymphoma (GIL). Methods: 82 GIL patients treated in our hospital from February 2018 to February 2019 were selected as the experimental group of this study, and 82 patients with other gastrointestinal tumors diagnosed by pathology during the same period were selected as the control group. Both groups of patients were scanned by MSCT and analyzed by multiplanar reconstruction technique to compare the diagnostic results and clinicopathological indexes of the two groups. Results: The… More >

  • Open Access

    ARTICLE

    An Authentication Mechanism for Autonomous Vehicle ECU Utilizing a Novel Slice-Based PUF Design

    Jihai Yang1, Zongtao Duan1, Muyao Wang2, Jabar Mahmood1, Yuanyuan Xiao1, Yun Yang1,*

    Journal of New Media, Vol.2, No.4, pp. 157-165, 2020, DOI:10.32604/jnm.2020.014309 - 23 December 2020

    Abstract Modern autonomous vehicles are getting progressively popular and increasingly getting closer to the core of future development in transportation field. However, there is no reliable authentication mechanism for the unmanned vehicle communication system, this phenomenon draws attention about the security of autonomous vehicles of people in all aspects. Physical Unclonable Function (PUF) circuits is light-weight, and it can product unique and unpredictable digital signature utilizing the manufacturing variations occur in each die and these exact silicon features cannot be recreated theoretically. Considering security issues of communication between Electronic Control Units (ECUs) in vehicles, we propose… More >

  • Open Access

    ARTICLE

    SI Bitmap Index and Optimization for Membership Query

    Shu Gaoa,b,*, Zhen Wanga, Liangchen Chena

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 683-689, 2019, DOI:10.31209/2018.100000061

    Abstract The explosive growth of data produced by internet of things has contributed to the abundance of data. Since then, efficient indexing and querying techniques for data retrieval has become a major challenge. Bitmap index and its extension techniques, which involve a bit sequence that represents a specified property and indicates the data items that satisfies this property, are well-known methods to improve processing time for complex and interactive queries on the read-mostly or append-only data. This paper proposes an improved bitmap index technique, named Sliced-Interval Bitmap Index (SI Bitmap Index), which is efficient in both More >

  • Open Access

    ARTICLE

    A Heterogeneous Virtual Machines Resource Allocation Scheme in Slices Architecture of 5G Edge Datacenter

    Changming Zhao1,2,*, Tiejun Wang2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 423-437, 2019, DOI:10.32604/cmc.2019.07501

    Abstract In the paper, we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment. In general, the different slices for different task scenarios exist in the same edge layer synchronously. A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity. In the condition, the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment. Based on the slicing and container concept, we propose the resource allocation… More >

Displaying 1-10 on page 1 of 11. Per Page