Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Curvelet Transform Based on Edge Preserving Filter for Retinal Blood Vessel Segmentation

    Sonali Dash1, Sahil Verma2,*, Kavita2, N. Z. Jhanjhi3, Mehedi Masud4, Mohammed Baz5

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2459-2476, 2022, DOI:10.32604/cmc.2022.020904

    Abstract Segmentation of vessel in retinal fundus images is a primary step for the clinical identification for specific eye diseases. Effective diagnosis of vascular pathologies from angiographic images is thus a vital aspect and generally depends on segmentation of vascular structure. Although various approaches for retinal vessel segmentation are extensively utilized, however, the responses are lower at vessel's edges. The curvelet transform signifies edges better than wavelets, and hence convenient for multiscale edge enhancement. The bilateral filter is a nonlinear filter that is capable of providing effective smoothing while preserving strong edges. Fast bilateral filter is an advanced version of bilateral… More >

  • Open Access

    ARTICLE

    Novel Algorithm for Mobile Robot Path Planning in Constrained Environment

    Aisha Muhammad1,5, Mohammed A. H. Ali2,*, Sherzod Turaev3, Ibrahim Haruna Shanono4,5, Fadhl Hujainah6, Mohd Nashrul Mohd Zubir2, Muhammad Khairi Faiz2, Erma Rahayu Mohd Faizal1, Rawad Abdulghafor8

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2697-2719, 2022, DOI:10.32604/cmc.2022.020873

    Abstract This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. This approach gives the possibility to find the path for a wheel mobile robot considering some constraints during the robot movement in both known and unknown environments. The feasible path is determined between the start and goal positions by generating wave of points in all direction towards the goal point with adhering to constraints. In simulation, the proposed method has been tested in several working environments with… More >

  • Open Access

    ARTICLE

    Exploring the Approaches to Data Flow Computing

    Mohammad B. Khan1, Abdul R. Khan2,*, Hasan Alkahtani2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2333-2346, 2022, DOI:10.32604/cmc.2022.020623

    Abstract Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widely used for general purpose computing. Processors based on the data flow architecture employ fine-grain data-driven parallelism. These architectures have the potential to exploit the inherent parallelism in compute intensive applications like signal processing, image and video processing and so on and can thus achieve faster throughputs and higher power efficiency. In this paper, several data flow computing architectures are explored, and their main architectural features are studied. Furthermore, a classification of the processors is presented based on whether they employ either… More >

  • Open Access

    ARTICLE

    A DQN-Based Cache Strategy for Mobile Edge Networks

    Siyuan Sun1,*, Junhua Zhou2, Jiuxing Wen3, Yifei Wei1, Xiaojun Wang4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3277-3291, 2022, DOI:10.32604/cmc.2022.020471

    Abstract The emerging mobile edge networks with content caching capability allows end users to receive information from adjacent edge servers directly instead of a centralized data warehouse, thus the network transmission delay and system throughput can be improved significantly. Since the duplicate content transmissions between edge network and remote cloud can be reduced, the appropriate caching strategy can also improve the system energy efficiency of mobile edge networks to a great extent. This paper focuses on how to improve the network energy efficiency and proposes an intelligent caching strategy according to the cached content distribution model for mobile edge networks based… More >

  • Open Access

    ARTICLE

    Generating A New Shilling Attack for Recommendation Systems

    Pradeep Kumar Singh1, Pijush Kanti Dutta Pramanik1, Madhumita Sardar1, Anand Nayyar2,3,*, Mehedi Masud4, Prasenjit Choudhury1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2827-2846, 2022, DOI:10.32604/cmc.2022.020437

    Abstract A collaborative filtering-based recommendation system has been an integral part of e-commerce and e-servicing. To keep the recommendation systems reliable, authentic, and superior, the security of these systems is very crucial. Though the existing shilling attack detection methods in collaborative filtering are able to detect the standard attacks, in this paper, we prove that they fail to detect a new or unknown attack. We develop a new attack model, named Obscure attack, with unknown features and observed that it has been successful in biasing the overall top-N list of the target users as intended. The Obscure attack is able to… More >

  • Open Access

    ARTICLE

    Deep Image Restoration Model: A Defense Method Against Adversarial Attacks

    Kazim Ali1,*, Adnan N. Qureshi1, Ahmad Alauddin Bin Arifin2, Muhammad Shahid Bhatti3, Abid Sohail3, Rohail Hassan4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2209-2224, 2022, DOI:10.32604/cmc.2022.020111

    Abstract These days, deep learning and computer vision are much-growing fields in this modern world of information technology. Deep learning algorithms and computer vision have achieved great success in different applications like image classification, speech recognition, self-driving vehicles, disease diagnostics, and many more. Despite success in various applications, it is found that these learning algorithms face severe threats due to adversarial attacks. Adversarial examples are inputs like images in the computer vision field, which are intentionally slightly changed or perturbed. These changes are humanly imperceptible. But are misclassified by a model with high probability and severely affects the performance or prediction.… More >

  • Open Access

    ARTICLE

    Plant Disease Diagnosis and Image Classification Using Deep Learning

    Rahul Sharma1, Amar Singh1, Kavita2, N. Z. Jhanjhi3, Mehedi Masud4, Emad Sami Jaha5, Sahil Verma2,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2125-2140, 2022, DOI:10.32604/cmc.2022.020017

    Abstract Indian agriculture is striving to achieve sustainable intensification, the system aiming to increase agricultural yield per unit area without harming natural resources and the ecosystem. Modern farming employs technology to improve productivity. Early and accurate analysis and diagnosis of plant disease is very helpful in reducing plant diseases and improving plant health and food crop productivity. Plant disease experts are not available in remote areas thus there is a requirement of automatic low-cost, approachable and reliable solutions to identify the plant diseases without the laboratory inspection and expert's opinion. Deep learning-based computer vision techniques like Convolutional Neural Network (CNN) and… More >

  • Open Access

    ARTICLE

    HELP-WSN-A Novel Adaptive Multi-Tier Hybrid Intelligent Framework for QoS Aware WSN-IoT Networks

    J. Sampathkumar*, N. Malmurugan

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2107-2123, 2022, DOI:10.32604/cmc.2022.019983

    Abstract Wireless Sensor Network is considered as the intermediate layer in the paradigm of Internet of things (IoT) and its effectiveness depends on the mode of deployment without sacrificing the performance and energy efficiency. WSN provides ubiquitous access to location, the status of different entities of the environment and data acquisition for long term IoT monitoring. Achieving the high performance of the WSN-IoT network remains to be a real challenge since the deployment of these networks in the large area consumes more power which in turn degrades the performance of the networks. So, developing the robust and QoS (quality of services)… More >

  • Open Access

    ARTICLE

    Hybrid Renewable Energy Resources Management for Optimal Energy Operation in Nano-Grid

    Faiza Qayyum1, Faisal Jamil1, Shabir Ahmad2, Do-Hyeun Kim1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2091-2105, 2022, DOI:10.32604/cmc.2022.019898

    Abstract Renewable energy resources are deemed a potential energy production source due to their cost efficiency and harmless reaction to the environment, unlike non-renewable energy resources. However, they often fail to meet energy requirements in unfavorable weather conditions. The concept of Hybrid renewable energy resources addresses this issue by integrating both renewable and non-renewable energy resources to meet the required energy load. In this paper, an intelligent cost optimization algorithm is proposed to maximize the use of renewable energy resources and minimum utilization of non-renewable energy resources to meet the energy requirement for a nanogrid infrastructure. An actual data set comprising… More >

  • Open Access

    ARTICLE

    A Novel Workload-Aware and Optimized Write Cycles in NVRAM

    J. P. Shri Tharanyaa1,*, D. Sharmila2, R. Saravana Kumar3

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2667-2681, 2022, DOI:10.32604/cmc.2022.019889

    Abstract With the emergence of the Internet of things (IoT), embedded systems have now changed its dimensionality and it is applied in various domains such as healthcare, home automation and mainly Industry 4.0. These Embedded IoT devices are mostly battery-driven. It has been analyzed that usage of Dynamic Random-Access Memory (DRAM) centered core memory is considered the most significant source of high energy utility in Embedded IoT devices. For achieving the low power consumption in these devices, Non-volatile memory (NVM) devices such as Parameter Random Access Memory (PRAM) and Spin-Transfer Torque Magnetic Random-Access Memory (STT-RAM) are becoming popular among main memory… More >

Displaying 2391-2400 on page 240 of 5350. Per Page