Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,097)
  • Open Access

    ARTICLE

    Non-Local DWI Image Super-Resolution with Joint Information Based on GPU Implementation

    Yanfen Guo1,2, Zhe Cui1,*, Zhipeng Yang3, Xi Wu2, Shaahin Madani4

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1205-1215, 2019, DOI:10.32604/cmc.2019.06029

    Abstract Since the spatial resolution of diffusion weighted magnetic resonance imaging (DWI) is subject to scanning time and other constraints, its spatial resolution is relatively limited. In view of this, a new non-local DWI image super-resolution with joint information method was proposed to improve the spatial resolution. Based on the non-local strategy, we use the joint information of adjacent scan directions to implement a new weighting scheme. The quantitative and qualitative comparison of the datasets of synthesized DWI and real DWI show that this method can significantly improve the resolution of DWI. However, the algorithm ran slowly because of the joint… More >

  • Open Access

    ARTICLE

    Research on Action Recognition and Content Analysis in Videos Based on DNN and MLN

    Wei Song1,2,*, Jing Yu3, Xiaobing Zhao1,2, Antai Wang4

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1189-1204, 2019, DOI:10.32604/cmc.2019.06361

    Abstract In the current era of multimedia information, it is increasingly urgent to realize intelligent video action recognition and content analysis. In the past few years, video action recognition, as an important direction in computer vision, has attracted many researchers and made much progress. First, this paper reviews the latest video action recognition methods based on Deep Neural Network and Markov Logic Network. Second, we analyze the characteristics of each method and the performance from the experiment results. Then compare the emphases of these methods and discuss the application scenarios. Finally, we consider and prospect the development trend and direction of… More >

  • Open Access

    ARTICLE

    Comparative Variance and Multiple Imputation Used for Missing Values in Land Price DataSet

    Longqing Zhang1, Liping Bai1,*, Xinwei Zhang2, Yanghong Zhang2, Feng Sun2, Changcheng Chen2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1175-1187, 2019, DOI:10.32604/cmc.2019.06075

    Abstract Based on the two-dimensional relation table, this paper studies the missing values in the sample data of land price of Shunde District of Foshan City. GeoDa software was used to eliminate the insignificant factors by stepwise regression analysis; NORM software was adopted to construct the multiple imputation models; EM algorithm and the augmentation algorithm were applied to fit multiple linear regression equations to construct five different filling datasets. Statistical analysis is performed on the imputation data set in order to calculate the mean and variance of each data set, and the weight is determined according to the differences. Finally, comprehensive… More >

  • Open Access

    ARTICLE

    Quantum Communication Networks and Trust Management: A Survey

    Shibin Zhang1,*, Yan Chang1, Lili Yan1, Zhiwei Sheng1, Fan Yang1, Guihua Han1, Yuanyuan Huang1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1145-1174, 2019, DOI:10.32604/cmc.2019.05668

    Abstract This paper summarizes the state of art in quantum communication networks and trust management in recent years. As in the classical networks, trust management is the premise and foundation of quantum secure communication and cannot simply be attributed to security issues, therefore the basic and importance of trust management in quantum communication networks should be taken more seriously. Compared with other theories and techniques in quantum communication, the trust of quantum communication and trust management model in quantum communication network environment is still in its initial stage. In this paper, the core technologies of establishing secure and reliable quantum communication… More >

  • Open Access

    ARTICLE

    A Method for Vulnerability Database Quantitative Evaluation

    Tiantian Tan1,*, Baosheng Wang1, Yong Tang1, Xu Zhou1, Jingwen Han2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1129-1144, 2019, DOI:10.32604/cmc.2019.06051

    Abstract During system development, implementation and operation, vulnerability database technique is necessary to system security; there are many vulnerability databases but a lack of quality standardization and general evaluation method are needed. this paper summarized current international popular vulnerability databases, systematically introduced the present situation of current vulnerability databases, and found the problems of vulnerability database technology, extracted common metrics by analyzing vulnerability data of current popular vulnerability databases, introduced 4 measure indexes: the number scale of vulnerabilities, the independence level, the standardization degree and the integrity of vulnerability description, proposed a method for vulnerability database quantitative evaluation using SCAP protocol… More >

  • Open Access

    ARTICLE

    Adaptive Handover Decision Inspired By Biological Mechanism in Vehicle Ad-hoc Networks

    Xuting Duan1,2,3, Jingyi Wei1,2,3, Daxin Tian1,2,3,*, Jianshan Zhou1,2,3,4, Haiying Xia5, Xin Li6, Kunxian Zheng1,2,3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1117-1128, 2019, DOI:10.32604/cmc.2019.05578

    Abstract In vehicle ad-hoc networks (VANETs), the proliferation of wireless communication will give rise to the heterogeneous access environment where network selection becomes significant. Motivated by the self-adaptive paradigm of cellular attractors, this paper regards an individual communication as a cell, so that we can apply the revised attractor selection model to induce each connected vehicle. Aiming at improving the Quality of Service (QoS), we presented the bio-inspired handover decision-making mechanism. In addition, we employ the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) for any vehicle to choose an access network. This paper proposes a novel framework… More >

  • Open Access

    ARTICLE

    MMLUP: Multi-Source & Multi-Task Learning for User Profiles in Social Network

    Dongjie Zhu1, Yuhua Wang1, Chuiju You2,*, Jinming Qiu2,3, Ning Cao2, Chenjing Gong4, Guohua Yang5, Helen Min Zhou6

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1105-1115, 2019, DOI:10.32604/cmc.2019.06041

    Abstract With the rapid development of the mobile Internet, users generate massive data in different forms in social network every day, and different characteristics of users are reflected by these social media data. How to integrate multiple heterogeneous information and establish user profiles from multiple perspectives plays an important role in providing personalized services, marketing, and recommendation systems. In this paper, we propose Multi-source & Multi-task Learning for User Profiles in Social Network which integrates multiple social data sources and contains a multi-task learning framework to simultaneously predict various attributes of a user. Firstly, we design their own feature extraction models… More >

  • Open Access

    ARTICLE

    Research on Flight First Service Model and Algorithms for the Gate Assignment Problem

    Jiarui Zhang1, Gang Wang2,*, Siyuan Tong1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1091-1104, 2019, DOI:10.32604/cmc.2019.05907

    Abstract Aiming at the problem of gate allocation of transit flights, a flight first service model is established. Under the constraints of maximizing the utilization rate of gates and minimizing the transit time, the idea of “first flight serving first” is used to allocate the first time, and then the hybrid algorithm of artificial fish swarm and simulated annealing is used to find the optimal solution. That means the fish swarm algorithm with the swallowing behavior is employed to find the optimal solution quickly, and the simulated annealing algorithm is used to obtain a global optimal allocation scheme for the optimal… More >

  • Open Access

    ARTICLE

    Security Analysis of Smart Speaker: Security Attacks and Mitigation

    Youngseok Park1, Hyunsang Choi1, Sanghyun Cho1, Young-Gab Kim2,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1075-1090, 2019, DOI:10.32604/cmc.2019.08520

    Abstract The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, we describe the detail attack… More >

  • Open Access

    ARTICLE

    Genetic-Frog-Leaping Algorithm for Text Document Clustering

    Lubna Alhenak1, Manar Hosny1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1045-1074, 2019, DOI:10.32604/cmc.2019.08355

    Abstract In recent years, the volume of information in digital form has increased tremendously owing to the increased popularity of the World Wide Web. As a result, the use of techniques for extracting useful information from large collections of data, and particularly documents, has become more necessary and challenging. Text clustering is such a technique; it consists in dividing a set of text documents into clusters (groups), so that documents within the same cluster are closely related, whereas documents in different clusters are as different as possible. Clustering depends on measuring the content (i.e., words) of a document in terms of… More >

Displaying 16411-16420 on page 1642 of 22097. Per Page