Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (110)
  • Open Access

    ARTICLE

    A Survey of Lower Limb Rehabilitation Systems and Algorithms Based on Functional Electrical Stimulation

    Mingxu Sun1, *, Xueyan Wu2, Qi Liu3, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 281-292, 2020, DOI:10.32604/cmc.2020.06098

    Abstract Functional electrical stimulation is a method of repairing a dysfunctional limb in a stroke patient by using low-intensity electrical stimulation. Currently, it is widely used in smart medical treatment for limb rehabilitation in stroke patients. In this paper, the development of FES systems is sorted out and analyzed in a time order. Then, the progress of functional electrical stimulation in the field of rehabilitation is reviewed in details in two aspects, i.e., system development and algorithm progress. In the system aspect, the development of the first FES control and stimulation system, the core of the lower limb-based neuroprosthesis system and… More >

  • Open Access

    ARTICLE

    Turnip mosaic virus infecting kale plants in Ordu, Turkey

    Sevik MA

    Phyton-International Journal of Experimental Botany, Vol.85, pp. 231-235, 2016, DOI:10.32604/phyton.2016.85.231

    Abstract Brassica oleracea var. acephala L. (kale) is widely grown in the Black Sea Region of Turkey. Kale growing has not been common in the other regions of Turkey. A number of diseases can seriously affect Brassica crop production. Field surveys were done to determine the occurrence of viruses in kale-growing areas in Ordu in 2013-2014. Leaf samples were collected from kale plants and tested for the presence of Turnip mosaic virus (TuMV), Cauliflower mosaic virus (CaMV), Turnip yellow mosaic virus (TYMV), and Cucumber mosaic virus (CMV) by DAS-ELISA and bioassays. Result of serological and biological tests showed that 7.7% of… More >

  • Open Access

    ARTICLE

    Ethnobotanical survey of medicinal plants used in treatment of ticks

    Magwede K1, MP Tshisikhawe1, D Luseba2, RB Bhat1

    Phyton-International Journal of Experimental Botany, Vol.83, pp. 155-165, 2014, DOI:10.32604/phyton.2014.83.155

    Abstract The documentation of traditional knowledge on medicinal use of plants has provided many important drugs that are used worldwide on a daily basis. Traditional remedies had been (and still are) the main source of livestock ailment treatments, especially in regions of poor resources of the Vhembe District, South Africa. In many rural areas of the Republic of South Africa, traditional medicine is sometimes the only available modern orthodox health care for managing both human and animal health. Much work remains to be done regarding the documentation of the existing ethnobotanical knowledge. In this work, we report an inventory list of… More >

  • Open Access

    ARTICLE

    Quantum Communication Networks and Trust Management: A Survey

    Shibin Zhang1,*, Yan Chang1, Lili Yan1, Zhiwei Sheng1, Fan Yang1, Guihua Han1, Yuanyuan Huang1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1145-1174, 2019, DOI:10.32604/cmc.2019.05668

    Abstract This paper summarizes the state of art in quantum communication networks and trust management in recent years. As in the classical networks, trust management is the premise and foundation of quantum secure communication and cannot simply be attributed to security issues, therefore the basic and importance of trust management in quantum communication networks should be taken more seriously. Compared with other theories and techniques in quantum communication, the trust of quantum communication and trust management model in quantum communication network environment is still in its initial stage. In this paper, the core technologies of establishing secure and reliable quantum communication… More >

  • Open Access

    ARTICLE

    A Survey on Digital Image Steganography

    Jiaxin Wang1,*, Mengxin Cheng1, Peng Wu1, Beijing Chen1,2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 87-93, 2019, DOI:10.32604/jihpp.2019.07189

    Abstract Internet brings us not only the convenience of communication but also some security risks, such as intercepting information and stealing information. Therefore, some important information needs to be hidden during communication. Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms. Moreover, their advantages and weaknesses are pointed out. Finally, further research directions are discussed. More >

  • Open Access

    ARTICLE

    Splicing Image and Its Localization: A Survey

    Jinwei Wang1,*, Yangyang Li2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 77-86, 2019, DOI:10.32604/jihpp.2019.07186

    Abstract With the rapid development of information technology, digital images have become an important medium for information transmission. However, manipulating images is becoming a common task with the powerful image editing tools and software, and people can tamper the images content without leaving any visible traces of splicing in order to gain personal goal. Images are easily spliced and distributed, and the situation will be a great threat to social security. The survey covers splicing image and its localization. The present status of splicing image localization approaches is discussed along with a recommendation for future research. More >

  • Open Access

    ARTICLE

    A Survey on Machine Learning Algorithms in Little-Labeled Data for Motor Imagery-Based Brain-Computer Interfaces

    Yuxi Jia1, Feng Li1,2, Fei Wang1,2,*, Yan Gui1,2,3

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 11-21, 2019, DOI:10.32604/jihpp.2019.05979

    Abstract The Brain-Computer Interfaces (BCIs) had been proposed and used in therapeutics for decades. However, the need of time-consuming calibration phase and the lack of robustness, which are caused by little-labeled data, are restricting the advance and application of BCI, especially for the BCI based on motor imagery (MI). In this paper, we reviewed the recent development in the machine learning algorithm used in the MI-based BCI, which may provide potential solutions for addressing the issue. We classified these algorithms into two categories, namely, and enhancing the representation and expanding the training set. Specifically, these methods of enhancing the representation of… More >

  • Open Access

    ARTICLE

    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043

    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

  • Open Access

    ARTICLE

    A Survey on Digital Image Copy-Move Forgery Localization Using Passive Techniques

    Weijin Tan1,*, Yunqing Wu1, Peng Wu1, Beijing Chen1,2

    Journal of New Media, Vol.1, No.1, pp. 11-25, 2019, DOI:10.32604/jnm.2019.06219

    Abstract Digital images can be tampered easily with simple image editing software tools. Therefore, image forensic investigation on the authenticity of digital images’ content is increasingly important. Copy-move is one of the most common types of image forgeries. Thus, an overview of the traditional and the recent copy-move forgery localization methods using passive techniques is presented in this paper. These methods are classified into three types: block-based methods, keypoint-based methods, and deep learning-based methods. In addition, the strengths and weaknesses of these methods are compared and analyzed in robustness and computational cost. Finally, further research directions are discussed. More >

  • Open Access

    ARTICLE

    A Survey of Image Information Hiding Algorithms Based on Deep Learning

    Ruohan Meng1,2,*, Qi Cui1,2, Chengsheng Yuan1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.3, pp. 425-454, 2018, DOI:10.31614/cmes.2018.04765

    Abstract With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed. Image information hiding is to make use of the redundancy of the cover image to hide secret information in it. Ensuring that the stego image cannot be distinguished from the cover image, and sending secret information to receiver through the transmission of the stego image. At present, the model based on deep learning is also widely applied to the field of information hiding. This… More >

Displaying 101-110 on page 11 of 110. Per Page