Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Image Denoising with Adaptive Weighted Graph Filtering

    Ying Chen1, 2, Yibin Tang3, Lin Zhou1, Yan Zhou3, 4, Jinxiu Zhu3, Li Zhao1, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1219-1232, 2020, DOI:10.32604/cmc.2020.010638

    Abstract Graph filtering, which is founded on the theory of graph signal processing, is proved as a useful tool for image denoising. Most graph filtering methods focus on learning an ideal lowpass filter to remove noise, where clean images are restored from noisy ones by retaining the image components in low graph frequency bands. However, this lowpass filter has limited ability to separate the low-frequency noise from clean images such that it makes the denoising procedure less effective. To address this issue, we propose an adaptive weighted graph filtering (AWGF) method to replace the design of traditional ideal lowpass filter. In… More >

  • Open Access

    ARTICLE

    A Pupil-Positioning Method Based on the Starburst Model

    Pingping Yu1, Wenjie Duan1, Yi Sun2, Ning Cao3, *, Zhenzhou Wang1, Guojun Lu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1199-1217, 2020, DOI:10.32604/cmc.2020.010384

    Abstract Human eye detection has become an area of interest in the field of computer vision with an extensive range of applications in human-computer interaction, disease diagnosis, and psychological and physiological studies. Gaze-tracking systems are an important research topic in the human-computer interaction field. As one of the core modules of the head-mounted gaze-tracking system, pupil positioning affects the accuracy and stability of the system. By tracking eye movements to better locate the center of the pupil, this paper proposes a method for pupil positioning based on the starburst model. The method uses vertical and horizontal coordinate integral projections in the… More >

  • Open Access

    ARTICLE

    Research on the Pedestrian Re-Identification Method Based on Local Features and Gait Energy Images

    Xinliang Tang1, Xing Sun1, Zhenzhou Wang1, Pingping Yu1, Ning Cao2, *, Yunfeng Xu3

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1185-1198, 2020, DOI:10.32604/cmc.2020.010283

    Abstract The appearance of pedestrians can vary greatly from image to image, and different pedestrians may look similar in a given image. Such similarities and variabilities in the appearance and clothing of individuals make the task of pedestrian re-identification very challenging. Here, a pedestrian re-identification method based on the fusion of local features and gait energy image (GEI) features is proposed. In this method, the human body is divided into four regions according to joint points. The color and texture of each region of the human body are extracted as local features, and GEI features of the pedestrian gait are also… More >

  • Open Access

    ARTICLE

    A Method for Assessing the Fairness of Health Resource Allocation Based on Geographical Grid

    Jin Han1, Wenhao Jiang1, Jin Shi2, *, Sun Xin2, Jin Peng2, Haibo Liu3

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1171-1184, 2020, DOI:10.32604/cmc.2019.07447

    Abstract The assessment of the fairness of health resource allocation is an important part of the study for the fairness of social development. The data used in most of the existing assessment methods comes from statistical yearbooks or field survey sampling. These statistics are generally based on administrative areas and are difficult to support a fine-grained evaluation model. In response to these problems, the evaluation method proposed in this paper is based on the query statistics of the geographic grid of the target area, which are more accurate and efficient. Based on the query statistics of hot words in the geographic… More >

  • Open Access

    ARTICLE

    Simulation of Coupling Process of Flexible Needle Insertion into Soft Tissue Based on ABAQUS

    Linze Wang1, Dedong Gao1, *, Jiajie Fu1, Yuzhou Luo2, Shijian Zhao1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1153-1169, 2020, DOI:10.32604/cmc.2020.010073

    Abstract In order to get to the desired target inside the body, it is essential to investigate the needle-tissue coupling process and calculate the tissue deformation. A cantilever beam model is presented to predicting the deflection and bending angle of flexible needle by analyzing the distribution of the force on needle shaft during the procedure of needle insertion into soft tissue. Furthermore, a finite element (FE) coupling model is proposed to simulate the needle-tissue interactive process. The plane and spatial models are created to relate the needle and tissue nodes. Combined with the cantilever beam model and the finite element needle-tissue… More >

  • Open Access

    ARTICLE

    A High Gain, Noise Cancelling 2515-4900 MHz CMOS LNA for China Mobile 5G Communication Application

    Xiaorong Zhao1, Weili Cheng2, Hongjin Zhu1, Chunpeng Ge3, Gengyuan Zhou1, *, Zhongjun Fu1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1139-1151, 2020, DOI:10.32604/cmc.2020.010220

    Abstract With the development of the times, people’s requirements for communication technology are becoming higher and higher. 4G communication technology has been unable to meet development needs, and 5G communication technology has emerged as the times require. This article proposes the design of a low-noise amplifier (LNA) that will be used in the 5G band of China Mobile Communications. A low noise amplifier for mobile 5G communication is designed based on Taiwan Semiconductor Manufacturing Company (TSMC) 0.13 μm Radio Frequency (RF) Complementary Metal Oxide Semiconductor (CMOS) process. The LNA employs self-cascode devices in currentreuse configuration to enable lower supply voltage operation… More >

  • Open Access

    ARTICLE

    Behavioral Feature and Correlative Detection of Multiple Types of Node in the Internet of Vehicles

    Pengshou Xie1, Guoqiang Ma1, *, Tao Feng1, Yan Yan1, 2, Xueming Han1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1127-1137, 2020, DOI:10.32604/cmc.2020.09695

    Abstract Undoubtedly, uncooperative or malicious nodes threaten the safety of Internet of Vehicles (IoV) by destroying routing or data. To this end, some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication, data, energy, etc., to detect and evaluate vehicle nodes. However, it is difficult to effectively assess the trust level of a vehicle node only by message forwarding, data consistency, and energy sufficiency. In order to resolve these problems, a novel mechanism and a new trust calculating model is proposed in this paper. First, the four tuple… More >

  • Open Access

    ARTICLE

    Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack

    Xiaoling Yu1, Chungen Xu1, *, Lei Xu1, Yuntao Wang2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1107-1125, 2020, DOI:10.32604/cmc.2020.09680

    Abstract To save the local storage, users store the data on the cloud server who offers convenient internet services. To guarantee the data privacy, users encrypt the data before uploading them into the cloud server. Since encryption can reduce the data availability, public-key encryption with keyword search (PEKS) is developed to achieve the retrieval of the encrypted data without decrypting them. However, most PEKS schemes cannot resist quantum computing attack, because the corresponding hardness assumptions are some number theory problems that can be solved efficiently under quantum computers. Besides, the traditional PEKS schemes have an inherent security issue that they cannot… More >

  • Open Access

    ARTICLE

    A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain

    Hangjun Zhou1, *, Guang Sun1, 2, Sha Fu1, Xiaoping Fan1, Wangdong Jiang1, Shuting Hu1, Lingjiao Li1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1091-1105, 2020, DOI:10.32604/cmc.2020.09834

    Abstract Supply Chain Finance (SCF) is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain. In recent years, with the deep integration of supply chain and Internet, Big Data, Artificial Intelligence, Internet of Things, Blockchain, etc., the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes. However, with the rapid development of new technologies, the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming more covertly scattered among normal… More >

  • Open Access

    ARTICLE

    Research on Detection Method of Interest Flooding Attack on Content Centric Network

    Yabin Xu1, 2, 3, *, Ting Xu3, Xiaowei Xu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1075-1089, 2020, DOI:10.32604/cmc.2020.09849

    Abstract To improve the attack detection capability of content centric network (CCN), we propose a detection method of interest flooding attack (IFA) making use of the feature of self-similarity of traffic and the information entropy of content name of interest packet. On the one hand, taking advantage of the characteristics of self-similarity is very sensitive to traffic changes, calculating the Hurst index of the traffic, to identify initial IFA attacks. On the other hand, according to the randomness of user requests, calculating the information entropy of content name of the interest packets, to detect the severity of the IFA attack, is.… More >

Displaying 4111-4120 on page 412 of 5427. Per Page