Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Detection of Safety Helmet-Wearing Based on the YOLO_CA Model

    Xiaoqin Wu, Songrong Qian*, Ming Yang

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3349-3366, 2023, DOI:10.32604/cmc.2023.043671 - 26 December 2023

    Abstract Safety helmets can reduce head injuries from object impacts and lower the probability of safety accidents, as well as being of great significance to construction safety. However, for a variety of reasons, construction workers nowadays may not strictly enforce the rules of wearing safety helmets. In order to strengthen the safety of construction site, the traditional practice is to manage it through methods such as regular inspections by safety officers, but the cost is high and the effect is poor. With the popularization and application of construction site video monitoring, manual video monitoring has been… More >

  • Open Access

    ARTICLE

    Flag-Based Vehicular Clustering Scheme for Vehicular Ad-Hoc Networks

    Fady Samann1,*, Shavan Askar2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2715-2734, 2023, DOI:10.32604/cmc.2023.043580 - 26 December 2023

    Abstract Clustering schemes in vehicular networks organize vehicles into logical groups. They are vital for improving network performance, accessing the medium, and enabling efficient data dissemination. Most schemes rely on periodically broadcast hello messages to provide up-to-date information about the vehicles. However, the periodic exchange of messages overwhelms the system and reduces efficiency. This paper proposes the Flag-based Vehicular Clustering (FVC) scheme. The scheme leverages a combination of Fitness Score (FS), Link Expiration Time (LET), and clustering status flags to enable efficient cluster formation in a hybrid manner. The FVC relies on the periodic broadcast of… More >

  • Open Access

    ARTICLE

    Multiple-Object Tracking Using Histogram Stamp Extraction in CCTV Environments

    Ye-Yeon Kang1, Geon Park1, Hyun Yoo2, Kyungyong Chung1,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3619-3635, 2023, DOI:10.32604/cmc.2023.043566 - 26 December 2023

    Abstract Object tracking, an important technology in the field of image processing and computer vision, is used to continuously track a specific object or person in an image. This technology may be effective in identifying the same person within one image, but it has limitations in handling multiple images owing to the difficulty in identifying whether the object appearing in other images is the same. When tracking the same object using two or more images, there must be a way to determine that objects existing in different images are the same object. Therefore, this paper attempts… More >

  • Open Access

    ARTICLE

    An Efficient Method for Identifying Lower Limb Behavior Intentions Based on Surface Electromyography

    Liuyi Ling1,2,3, Yiwen Wang1,*, Fan Ding4, Li Jin1, Bin Feng3, Weixiao Li3, Chengjun Wang1, Xianhua Li1

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2771-2790, 2023, DOI:10.32604/cmc.2023.043383 - 26 December 2023

    Abstract Surface electromyography (sEMG) is widely used for analyzing and controlling lower limb assisted exoskeleton robots. Behavior intention recognition based on sEMG is of great significance for achieving intelligent prosthetic and exoskeleton control. Achieving highly efficient recognition while improving performance has always been a significant challenge. To address this, we propose an sEMG-based method called Enhanced Residual Gate Network (ERGN) for lower-limb behavioral intention recognition. The proposed network combines an attention mechanism and a hard threshold function, while combining the advantages of residual structure, which maps sEMG of multiple acquisition channels to the lower limb motion More >

  • Open Access

    ARTICLE

    Utilizing Machine Learning with Unique Pentaplet Data Structure to Enhance Data Integrity

    Abdulwahab Alazeb*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2995-3014, 2023, DOI:10.32604/cmc.2023.043173 - 26 December 2023

    Abstract Data protection in databases is critical for any organization, as unauthorized access or manipulation can have severe negative consequences. Intrusion detection systems are essential for keeping databases secure. Advancements in technology will lead to significant changes in the medical field, improving healthcare services through real-time information sharing. However, reliability and consistency still need to be solved. Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption. Disruptions to data items can propagate throughout the database, making it crucial to reverse fraudulent transactions without delay, especially in… More >

  • Open Access

    ARTICLE

    Data Fusion Architecture Empowered with Deep Learning for Breast Cancer Classification

    Sahar Arooj1, Muhammad Farhan Khan2, Tariq Shahzad3, Muhammad Adnan Khan4,5,6, Muhammad Umar Nasir7, Muhammad Zubair1, Atta-ur-Rahman8, Khmaies Ouahada3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2813-2831, 2023, DOI:10.32604/cmc.2023.043013 - 26 December 2023

    Abstract Breast cancer (BC) is the most widespread tumor in females worldwide and is a severe public health issue. BC is the leading reason of death affecting females between the ages of 20 to 59 around the world. Early detection and therapy can help women receive effective treatment and, as a result, decrease the rate of breast cancer disease. The cancer tumor develops when cells grow improperly and attack the healthy tissue in the human body. Tumors are classified as benign or malignant, and the absence of cancer in the breast is considered normal. Deep learning,… More >

  • Open Access

    ARTICLE

    Multi-Equipment Detection Method for Distribution Lines Based on Improved YOLOx-s

    Lei Hu1,*, Yuanwen Lu1, Si Wang2, Wenbin Wang3, Yongmei Zhang4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2735-2749, 2023, DOI:10.32604/cmc.2023.042974 - 26 December 2023

    Abstract The YOLOx-s network does not sufficiently meet the accuracy demand of equipment detection in the autonomous inspection of distribution lines by Unmanned Aerial Vehicle (UAV) due to the complex background of distribution lines, variable morphology of equipment, and large differences in equipment sizes. Therefore, aiming at the difficult detection of power equipment in UAV inspection images, we propose a multi-equipment detection method for inspection of distribution lines based on the YOLOx-s. Based on the YOLOx-s network, we make the following improvements: 1) The Receptive Field Block (RFB) module is added after the shallow feature layer… More >

  • Open Access

    ARTICLE

    Joint On-Demand Pruning and Online Distillation in Automatic Speech Recognition Language Model Optimization

    Soonshin Seo1,2, Ji-Hwan Kim2,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2833-2856, 2023, DOI:10.32604/cmc.2023.042816 - 26 December 2023

    Abstract Automatic speech recognition (ASR) systems have emerged as indispensable tools across a wide spectrum of applications, ranging from transcription services to voice-activated assistants. To enhance the performance of these systems, it is important to deploy efficient models capable of adapting to diverse deployment conditions. In recent years, on-demand pruning methods have obtained significant attention within the ASR domain due to their adaptability in various deployment scenarios. However, these methods often confront substantial trade-offs, particularly in terms of unstable accuracy when reducing the model size. To address challenges, this study introduces two crucial empirical findings. Firstly,… More >

  • Open Access

    ARTICLE

    DL-Powered Anomaly Identification System for Enhanced IoT Data Security

    Manjur Kolhar*, Sultan Mesfer Aldossary

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2857-2879, 2023, DOI:10.32604/cmc.2023.042726 - 26 December 2023

    Abstract In many commercial and public sectors, the Internet of Things (IoT) is deeply embedded. Cyber security threats aimed at compromising the security, reliability, or accessibility of data are a serious concern for the IoT. Due to the collection of data from several IoT devices, the IoT presents unique challenges for detecting anomalous behavior. It is the responsibility of an Intrusion Detection System (IDS) to ensure the security of a network by reporting any suspicious activity. By identifying failed and successful attacks, IDS provides a more comprehensive security capability. A reliable and efficient anomaly detection system… More >

  • Open Access

    ARTICLE

    Nuclei Segmentation in Histopathology Images Using Structure-Preserving Color Normalization Based Ensemble Deep Learning Frameworks

    Manas Ranjan Prusty1, Rishi Dinesh2, Hariket Sukesh Kumar Sheth2, Alapati Lakshmi Viswanath2, Sandeep Kumar Satapathy2,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3077-3094, 2023, DOI:10.32604/cmc.2023.042718 - 26 December 2023

    Abstract This paper presents a novel computerized technique for the segmentation of nuclei in hematoxylin and eosin (H&E) stained histopathology images. The purpose of this study is to overcome the challenges faced in automated nuclei segmentation due to the diversity of nuclei structures that arise from differences in tissue types and staining protocols, as well as the segmentation of variable-sized and overlapping nuclei. To this extent, the approach proposed in this study uses an ensemble of the UNet architecture with various Convolutional Neural Networks (CNN) architectures as encoder backbones, along with stain normalization and test time… More >

Displaying 7851-7860 on page 786 of 31561. Per Page