Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    An Algorithm to Reduce Compression Ratio in Multimedia Applications

    Dur-e-Jabeen1,*, Tahmina Khan2, Rumaisa Iftikhar1, Ali Akbar Siddique1, Samiya Asghar1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 539-557, 2023, DOI:10.32604/cmc.2023.032393

    Abstract In recent years, it has been evident that internet is the most effective means of transmitting information in the form of documents, photographs, or videos around the world. The purpose of an image compression method is to encode a picture with fewer bits while retaining the decompressed image’s visual quality. During transmission, this massive data necessitates a lot of channel space. In order to overcome this problem, an effective visual compression approach is required to resize this large amount of data. This work is based on lossy image compression and is offered for static color images. The quantization procedure determines… More >

  • Open Access

    ARTICLE

    Deep Attention Network for Pneumonia Detection Using Chest X-Ray Images

    Sukhendra Singh1, Sur Singh Rawat2, Manoj Gupta3, B. K. Tripathi4, Faisal Alanzi5, Arnab Majumdar6, Pattaraporn Khuwuthyakorn7, Orawit Thinnukool7,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1673-1691, 2023, DOI:10.32604/cmc.2023.032364

    Abstract In computer vision, object recognition and image categorization have proven to be difficult challenges. They have, nevertheless, generated responses to a wide range of difficult issues from a variety of fields. Convolution Neural Networks (CNNs) have recently been identified as the most widely proposed deep learning (DL) algorithms in the literature. CNNs have unquestionably delivered cutting-edge achievements, particularly in the areas of image classification, speech recognition, and video processing. However, it has been noticed that the CNN-training assignment demands a large amount of data, which is in low supply, especially in the medical industry, and as a result, the training… More >

  • Open Access

    ARTICLE

    Quantum Oblivious Transfer with Reusable Bell State

    Shu-Yu Kuo1, Kuo-Chun Tseng2, Yao-Hsin Chou3, Fan-Hsun Tseng4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 915-932, 2023, DOI:10.32604/cmc.2023.032320

    Abstract In cryptography, oblivious transfer (OT) is an important multi-party cryptographic primitive and protocol, that is suitable for many upper-layer applications, such as secure computation, remote coin-flipping, electrical contract signing and exchanging secrets simultaneously. However, some no-go theorems have been established, indicating that one-out-of-two quantum oblivious transfer (QOT) protocols with unconditional security are impossible. Fortunately, some one-out-of-two QOT protocols using the concept of Crépeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem, but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT. This paper proposes a novel and efficient one-out-of-two… More >

  • Open Access

    ARTICLE

    Feature Extraction and Classification of Photovoltaic Panels Based on Convolutional Neural Network

    S. Prabhakaran1,*, R. Annie Uthra1, J. Preetharoselyn2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1437-1455, 2023, DOI:10.32604/cmc.2023.032300

    Abstract Photovoltaic (PV) boards are a perfect way to create eco-friendly power from daylight. The defects in the PV panels are caused by various conditions; such defective PV panels need continuous monitoring. The recent development of PV panel monitoring systems provides a modest and viable approach to monitoring and managing the condition of the PV plants. In general, conventional procedures are used to identify the faulty modules earlier and to avoid declines in power generation. The existing deep learning architectures provide the required output to predict the faulty PV panels with less accuracy and a more time-consuming process. To increase the… More >

  • Open Access

    ARTICLE

    A Novel Siamese Network for Few/Zero-Shot Handwritten Character Recognition Tasks

    Nagwa Elaraby*, Sherif Barakat, Amira Rezk

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1837-1854, 2023, DOI:10.32604/cmc.2023.032288

    Abstract Deep metric learning is one of the recommended methods for the challenge of supporting few/zero-shot learning by deep networks. It depends on building a Siamese architecture of two homogeneous Convolutional Neural Networks (CNNs) for learning a distance function that can map input data from the input space to the feature space. Instead of determining the class of each sample, the Siamese architecture deals with the existence of a few training samples by deciding if the samples share the same class identity or not. The traditional structure for the Siamese architecture was built by forming two CNNs from scratch with randomly… More >

  • Open Access

    ARTICLE

    Filter and Embedded Feature Selection Methods to Meet Big Data Visualization Challenges

    Kamal A. ElDahshan, AbdAllah A. AlHabshy, Luay Thamer Mohammed*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 817-839, 2023, DOI:10.32604/cmc.2023.032287

    Abstract This study focuses on meeting the challenges of big data visualization by using of data reduction methods based the feature selection methods. To reduce the volume of big data and minimize model training time (Tt) while maintaining data quality. We contributed to meeting the challenges of big data visualization using the embedded method based “Select from model (SFM)” method by using “Random forest Importance algorithm (RFI)” and comparing it with the filter method by using “Select percentile (SP)” method based chi square “Chi2” tool for selecting the most important features, which are then fed into a classification process using the… More >

  • Open Access

    ARTICLE

    Optimized Evaluation of Mobile Base Station by Modern Topological Invariants

    Khalid Hamid1, Muhammad Waseem Iqbal2,*, Muhammad Usman Ashraf3, Ahmed Mohammed Alghamdi4, Adel A. Bahaddad5, Khalid Ali Almarhabi6

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 363-378, 2023, DOI:10.32604/cmc.2023.032271

    Abstract Due to a tremendous increase in mobile traffic, mobile operators have started to restructure their networks to offload their traffic. New research directions will lead to fundamental changes in the design of future Fifth-generation (5G) cellular networks. For the formal reason, the study solves the physical network of the mobile base station for the prediction of the best characteristics to develop an enhanced network with the help of graph theory. Any number that can be uniquely calculated by a graph is known as a graph invariant. During the last two decades, innumerable numerical graph invariants have been portrayed and used… More >

  • Open Access

    ARTICLE

    Real Objects Understanding Using 3D Haptic Virtual Reality for E-Learning Education

    Samia Allaoua Chelloug1,*, Hamid Ashfaq2, Suliman A. Alsuhibany3, Mohammad Shorfuzzaman4, Abdulmajeed Alsufyani4, Ahmad Jalal2, Jeongmin Park5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1607-1624, 2023, DOI:10.32604/cmc.2023.032245

    Abstract In the past two decades, there has been a lot of work on computer vision technology that incorporates many tasks which implement basic filtering to image classification. The major research areas of this field include object detection and object recognition. Moreover, wireless communication technologies are presently adopted and they have impacted the way of education that has been changed. There are different phases of changes in the traditional system. Perception of three-dimensional (3D) from two-dimensional (2D) image is one of the demanding tasks. Because human can easily perceive but making 3D using software will take time manually. Firstly, the blackboard… More >

  • Open Access

    ARTICLE

    Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment

    Salaheddine Kably1,2,*, Tajeddine Benbarrad1, Nabih Alaoui2, Mounir Arioua1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 253-278, 2023, DOI:10.32604/cmc.2023.032220

    Abstract Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion… More >

  • Open Access

    ARTICLE

    Optimization Task Scheduling Using Cooperation Search Algorithm for Heterogeneous Cloud Computing Systems

    Ahmed Y. Hamed1, M. Kh. Elnahary1,*, Faisal S. Alsubaei2, Hamdy H. El-Sayed1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2133-2148, 2023, DOI:10.32604/cmc.2023.032215

    Abstract Cloud computing has taken over the high-performance distributed computing area, and it currently provides on-demand services and resource polling over the web. As a result of constantly changing user service demand, the task scheduling problem has emerged as a critical analytical topic in cloud computing. The primary goal of scheduling tasks is to distribute tasks to available processors to construct the shortest possible schedule without breaching precedence restrictions. Assignments and schedules of tasks substantially influence system operation in a heterogeneous multiprocessor system. The diverse processes inside the heuristic-based task scheduling method will result in varying makespan in the heterogeneous computing… More >

Displaying 1331-1340 on page 134 of 5350. Per Page