Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Visibility Enhancement of Scene Images Degraded by Foggy Weather Condition: An Application to Video Surveillance

    Ghulfam Zahra1, Muhammad Imran1, Abdulrahman M. Qahtani2,*, Abdulmajeed Alsufyani2, Omar Almutiry3, Awais Mahmood3, Fayez Eid Alazemi4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3465-3481, 2021, DOI:10.32604/cmc.2021.017454

    Abstract In recent years, video surveillance application played a significant role in our daily lives. Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence reduces the visibility. The reason behind visibility enhancement of foggy and haze images is to help numerous computer and machine vision applications such as satellite imagery, object detection, target killing, and surveillance. To remove fog and enhance visibility, a number of visibility enhancement algorithms and methods have been proposed in the past. However, these techniques suffer from several limitations that place strong obstacles to the real world outdoor computer… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Two-Stage Data Selection Scheme for Long-Term Influenza Forecasting

    Jaeuk Moon, Seungwon Jung, Sungwoo Park, Eenjun Hwang*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2945-2959, 2021, DOI:10.32604/cmc.2021.017435

    Abstract One popular strategy to reduce the enormous number of illnesses and deaths from a seasonal influenza pandemic is to obtain the influenza vaccine on time. Usually, vaccine production preparation must be done at least six months in advance, and accurate long-term influenza forecasting is essential for this. Although diverse machine learning models have been proposed for influenza forecasting, they focus on short-term forecasting, and their performance is too dependent on input variables. For a country’s long-term influenza forecasting, typical surveillance data are known to be more effective than diverse external data on the Internet. We propose a two-stage data selection… More >

  • Open Access

    ARTICLE

    Real-Time Dense Reconstruction of Indoor Scene

    Jinxing Niu1,*, Qingsheng Hu1, Yi Niu1, Tao Zhang1, Sunil Kumar Jha2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3713-3724, 2021, DOI:10.32604/cmc.2021.017418

    Abstract Real-time dense reconstruction of indoor scenes is of great research value for the application and development of service robots, augmented reality, cultural relics conservation and other fields. ORB-SLAM2 method is one of the excellent open source algorithms in visual SLAM system, which is often used in indoor scene reconstruction. However, it is time-consuming and can only build sparse scene map by using ORB features to solve camera pose. In view of the shortcomings of ORB-SLAM2 method, this article proposes an improved ORB-SLAM2 solution, which uses a direct method based on light intensity to solve the camera pose. It can greatly… More >

  • Open Access

    ARTICLE

    Development of Social Media Analytics System for Emergency Event Detection and Crisis Management

    Shaheen Khatoon1,*, Majed A. Alshamari1, Amna Asif1, Md Maruf Hasan1, Sherif Abdou2, Khaled Mostafa Elsayed3, Mohsen Rashwan4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3079-3100, 2021, DOI:10.32604/cmc.2021.017371

    Abstract Social media platforms have proven to be effective for information gathering during emergency events caused by natural or human-made disasters. Emergency response authorities, law enforcement agencies, and the public can use this information to gain situational awareness and improve disaster response. In case of emergencies, rapid responses are needed to address victims’ requests for help. The research community has developed many social media platforms and used them effectively for emergency response and coordination in the past. However, most of the present deployments of platforms in crisis management are not automated, and their operational success largely depends on experts who analyze… More >

  • Open Access

    ARTICLE

    Enhancements of SDR-Based FPGA System for V2X-VLC Communications

    Lukas Danys1, Radek Martinek1, Rene Jaros1,*, Jan Baros1, Petr Simonik2, Vaclav Snasel3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3629-3652, 2021, DOI:10.32604/cmc.2021.017333

    Abstract This pilot study focuses on a real measurements and enhancements of a software defined radio-based system for vehicle-to everything visible light communication (SDR-V2X-VLC). The presented system is based on a novel adaptive optimization of the feed-forward software defined equalization (FFSDE) methods of the least mean squares (LMS), normalized LMS (NLMS) and QR decomposition-based recursive least squares (QR-RLS) algorithms. Individual parameters of adaptive equalizations are adjusted in real-time to reach the best possible results. Experiments were carried out on a conventional LED Octavia III taillight drafted directly from production line and universal software radio peripherals (USRP) from National Instruments. The transmitting/receiving… More >

  • Open Access

    ARTICLE

    Kernel Search-Framework for Dynamic Controller Placement in Software-Defined Network

    Ali Abdi Seyedkolaei1, Seyed Amin Hosseini Seno1,*, Rahmat Budiarto2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3391-3410, 2021, DOI:10.32604/cmc.2021.017313

    Abstract In software-defined networking (SDN) networks, unlike traditional networks, the control plane is located separately in a device or program. One of the most critical problems in these networks is a controller placement problem, which has a significant impact on the network’s overall performance. This paper attempts to provide a solution to this problem aiming to reduce the operational cost of the network and improve their survivability and load balancing. The researchers have proposed a suitable framework called kernel search introducing integer programming formulations to address the controller placement problem. It demonstrates through careful computational studies that the formulations can design… More >

  • Open Access

    ARTICLE

    Gait Recognition via Cross Walking Condition Constraint

    Runsheng Wang1, Hefei Ling1,*, Ping Li1, Yuxuan Shi1, Lei Wu1, Jialie Shen2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3045-3060, 2021, DOI:10.32604/cmc.2021.017275

    Abstract Gait recognition is a biometric technique that captures human walking pattern using gait silhouettes as input and can be used for long-term recognition. Recently proposed video-based methods achieve high performance. However, gait covariates or walking conditions, i.e., bag carrying and clothing, make the recognition of intra-class gait samples hard. Advanced methods simply use triplet loss for metric learning, which does not take the gait covariates into account. For alleviating the adverse influence of gait covariates, we propose cross walking condition constraint to explicitly consider the gait covariates. Specifically, this approach designs center-based and pair-wise loss functions to decrease discrepancy of… More >

  • Open Access

    ARTICLE

    Energy-Efficient Deployment of Water Quality Sensor Networks

    Qian Sun1,2, Zhiping Shen1,2, Jinglin Liang1,2, Xiaoyi Wang1,2,*, Jiping Xu1,2, Li Wang1,2, Huiyan Zhang1,2, Jiabin Yu1,2, Ning Cao3, Ruichao Wang4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3967-3977, 2021, DOI:10.32604/cmc.2021.017252

    Abstract Water quality sensor networks are promising tools for the exploration of oceans. Some key areas need to be monitored effectively. Water quality sensors are deployed randomly or uniformly, however, and understanding how to deploy sensor nodes reasonably and realize effective monitoring of key areas on the basis of monitoring the whole area is an urgent problem to be solved. Additionally, energy is limited in water quality sensor networks. When moving sensor nodes, we should extend the life cycle of the sensor networks as much as possible. In this study, sensor nodes in non-key monitored areas are moved to key areas.… More >

  • Open Access

    ARTICLE

    Describe the Mathematical Model for Exchanging Waves Between Bacterial and Cellular DNA

    Mohamed S. Mohamed1,*, Sayed K. Elagan1, Saad J. Almalki1, Muteb R. Alharthi1, Mohamed F. El-Badawy2, Amr M. S. Mahdy1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3615-3628, 2021, DOI:10.32604/cmc.2021.017208

    Abstract In this article, we have shown that bacterial DNA could act like some coils which interact with coil-like DNA of host cells. By decreasing the separating distance between two bacterial cellular DNA, the interaction potential, entropy, and the number of microstates of the system grow. Moreover, the system gives its energy to the medium and the temperature of the host body grows. This could be seen as fever in diseases. By emitting some special waves and changing the temperature of the medium, the effects of bacterial waves could be reduced and bacterial diseases could be controlled. Many investigators have shown… More >

  • Open Access

    ARTICLE

    A Secure Rotation Invariant LBP Feature Computation in Cloud Environment

    Shiqi Wang1, Mingfang Jiang2,*, Jiaohua Qin1, Hengfu Yang2, Zhichen Gao3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2979-2993, 2021, DOI:10.32604/cmc.2021.017094

    Abstract In the era of big data, outsourcing massive data to a remote cloud server is a promising approach. Outsourcing storage and computation services can reduce storage costs and computational burdens. However, public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users. Privacy-preserving feature extraction techniques are an effective solution to this issue. Because the Rotation Invariant Local Binary Pattern (RILBP) has been widely used in various image processing fields, we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper (called PPRILBP). To protect image content,… More >

Displaying 11951-11960 on page 1196 of 22212. Per Page