Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    A Multi-Level Threshold Method for Edge Detection and Segmentation Based on Entropy

    Mohamed A. El-Sayed1, *, Abdelmgeid A. Ali2, Mohamed E. Hussien3, Hameda A. Sennary3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 1-16, 2020, DOI:10.32604/cmc.2020.08444

    Abstract The essential tool in image processing, computer vision and machine vision is edge detection, especially in the fields of feature extraction and feature detection. Entropy is a basic area in information theory. The entropy, in image processing field has a role associated with image settings. As an initial step in image processing, the entropy is always used the image’s segmentation to determine the regions of image which is used to separate the background and objects in image. Image segmentation known as the process which divides the image into multiple regions or sets of pixels. Many applications have been development to… More >

  • Open Access

    RETRACTION

    Retraction Notice to: Implementation System of Human Eye Tracking Algorithm Based on FPGA

    Zhong Liu1, 2, Xin’an Wang1, Chengjun Sun1, Ken Lu3

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1487-1487, 2020, DOI:10.32604/cmc.2020.04597

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Investigating the Use of Email Application in Illiterate and SemiIlliterate Population

    Sadeeq Jan1, Imran Maqsood2, Salman Ahmed3, *, Zahid Wadud3, Iftikhar Ahmad4

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1473-1486, 2020, DOI:10.32604/cmc.2020.08917

    Abstract The use of electronic communication has been significantly increased over the last few decades. Email is one of the most well-known means of electronic communication. Traditional email applications are widely used by a large population; however, illiterate and semi-illiterate people face challenges in using them. A major population of Pakistan is illiterate that has little or no practice of computer usage. In this paper, we investigate the challenges of using email applications by illiterate and semiilliterate people. In addition, we also propose a solution by developing an application tailored to the needs of illiterate/semi-illiterate people. Research shows that illiterate people… More >

  • Open Access

    ARTICLE

    CNN Approaches for Classification of Indian Leaf Species Using Smartphones

    M. Vilasini1, *, P. Ramamoorthy2

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1445-1472, 2020, DOI:10.32604/cmc.2020.08857

    Abstract Leaf species identification leads to multitude of societal applications. There is enormous research in the lines of plant identification using pattern recognition. With the help of robust algorithms for leaf identification, rural medicine has the potential to reappear as like the previous decades. This paper discusses CNN based approaches for Indian leaf species identification from white background using smartphones. Variations of CNN models over the features like traditional shape, texture, color and venation apart from the other miniature features of uniformity of edge patterns, leaf tip, margin and other statistical features are explored for efficient leaf classification. More >

  • Open Access

    ARTICLE

    A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning

    Jieren Cheng1, 2, Junqi Li2, *, Xiangyan Tang2, Victor S. Sheng3, Chen Zhang2, Mengyang Li2

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1423-1443, 2020, DOI:10.32604/cmc.2020.06176

    Abstract Distributed Denial of Service (DDoS) attack has become one of the most destructive network attacks which can pose a mortal threat to Internet security. Existing detection methods cannot effectively detect early attacks. In this paper, we propose a detection method of DDoS attacks based on generalized multiple kernel learning (GMKL) combining with the constructed parameter R. The super-fusion feature value (SFV) and comprehensive degree of feature (CDF) are defined to describe the characteristic of attack flow and normal flow. A method for calculating R based on SFV and CDF is proposed to select the combination of kernel function and regularization… More >

  • Open Access

    ARTICLE

    An Extended Approach for Generating Unitary Matrices for Quantum Circuits

    Zhiqiang Li1, *, Wei Zhang1, Gaoman Zhang1, Juan Dai1, Jiajia Hu1, Marek Perkowski2, Xiaoyu Song2

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1413-1421, 2020, DOI:10.32604/cmc.2020.07483

    Abstract In this paper, we do research on generating unitary matrices for quantum circuits automatically. We consider that quantum circuits are divided into six types, and the unitary operator expressions for each type are offered. Based on this, we propose an algorithm for computing the circuit unitary matrices in detail. Then, for quantum logic circuits composed of quantum logic gates, a faster method to compute unitary matrices of quantum circuits with truth table is introduced as a supplement. Finally, we apply the proposed algorithm to different reversible benchmark circuits based on NCT library (including NOT gate, Controlled-NOT gate, Toffoli gate) and… More >

  • Open Access

    ARTICLE

    Evaluating the Topology Coverage of BGP Monitors

    Shen Su1, Zhihong Tian1, Jing Qiu1, *, Yu Jiang1, *, Yanbin Sun1, Mohan Li1, Dunqiu Fan2, Haining Yu3

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1397-1412, 2020, DOI:10.32604/cmc.2020.06319

    Abstract BGP monitors are currently the main data resource of AS-level topology measurement, and the integrity of measurement result is limited to the location of such BGP monitors. However, there is currently no work to conduct a comprehensive study of the range of measurement results for a single BGP monitor. In this paper, we take the first step to describe the observed topology of each BGP monitor. To that end, we first investigate the construction and theoretical up-limit of the measured topology of a BGP monitor based on the valley-free model, then we evaluate the individual parts of the measured topology… More >

  • Open Access

    ARTICLE

    Secrecy Outage Probability Analysis Based on Cognitive Decodeand-Forward Relaying

    Ruoyu Su1, 4, Xiaojun Sun1, 3, Fei Ding1, 2, *, Dengyin Zhang1, 2, Hongbo Zhu1, 2, M. I. M. Wahab5

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1387-1395, 2020, DOI:10.32604/cmc.2020.06864

    Abstract Wireless communications have to face to several different security issues in practice due to the nature of broadcast. The information theory is well known to provide efficient approaches to address security issues in wireless communications, which attracts much attention in both industry and academia in recent years. In this paper, inspired by information theory, we study the outage probability of the opportunistic relay selection based on cognitive decode-and-forward relaying with the secrecy consideration. Specifically, the closed-form expression of the outage probability is proposed. Moreover, the asymptotic performance evaluation on the basis of the analytical results is investigated. The simulation results… More >

  • Open Access

    ARTICLE

    Defend Against Adversarial Samples by Using Perceptual Hash

    Changrui Liu1, Dengpan Ye1, *, Yueyun Shang2, Shunzhi Jiang1, Shiyu Li1, Yuan Mei1, Liqiang Wang3

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1365-1386, 2020, DOI:10.32604/cmc.2020.07421

    Abstract Image classifiers that based on Deep Neural Networks (DNNs) have been proved to be easily fooled by well-designed perturbations. Previous defense methods have the limitations of requiring expensive computation or reducing the accuracy of the image classifiers. In this paper, we propose a novel defense method which based on perceptual hash. Our main goal is to destroy the process of perturbations generation by comparing the similarities of images thus achieve the purpose of defense. To verify our idea, we defended against two main attack methods (a white-box attack and a black-box attack) in different DNN-based image classifiers and show that,… More >

  • Open Access

    ARTICLE

    Service Scheduling Based on Edge Computing for Power Distribution IoT

    Zhu Liu1, 2, *, Xuesong Qiu1, Shuai Zhang2, Siyang Deng2, Guangyi Liu3, *

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1351-1364, 2020, DOI:10.32604/cmc.2020.07334

    Abstract With the growing amounts of multi-micro grids, electric vehicles, smart home, smart cities connected to the Power Distribution Internet of Things (PD-IoT) system, greater computing resource and communication bandwidth are required for power distribution. It probably leads to extreme service delay and data congestion when a large number of data and business occur in emergence. This paper presents a service scheduling method based on edge computing to balance the business load of PD-IoT. The architecture, components and functional requirements of the PD-IoT with edge computing platform are proposed. Then, the structure of the service scheduling system is presented. Further, a… More >

Displaying 4201-4210 on page 421 of 5350. Per Page