Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Improving Date Fruit Classification Using CycleGAN-Generated Dataset

    Dina M. Ibrahim1,2,*, Nada M. Elshennawy2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 331-348, 2022, DOI:10.32604/cmes.2022.016419

    Abstract Dates are an important part of human nutrition. Dates are high in essential nutrients and provide a number of health benefits. Date fruits are also known to protect against a number of diseases, including cancer and heart disease. Date fruits have several sizes, colors, tastes, and values. There are a lot of challenges facing the date producers. One of the most significant challenges is the classification and sorting of dates. But there is no public dataset for date fruits, which is a major limitation in order to improve the performance of convolutional neural networks (CNN) models and avoid the overfitting… More >

  • Open Access

    ARTICLE

    A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare

    Chien-Ming Chen1,*, Shuangshuang Liu1, Shehzad Ashraf Chaudhry2, Yeh-Cheng Chen3, Muhammad Asghar khan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 307-329, 2022, DOI:10.32604/cmes.2022.018749

    Abstract With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people, medical institutions, and medical equipment. However, with the openness of network transmission, the security and privacy of information transmission have become a major problem. Recently, Masud et al. proposed a lightweight anonymous user authentication protocol for IoT medical treatment, claiming that their method can resist various attacks. However, through analysis of the protocol, we observed that their protocol cannot effectively resist privileged internal attacks,… More >

  • Open Access

    ARTICLE

    On Degenerate Array Type Polynomials

    Lan Wu1, Xue-Yan Chen1, Muhammet Cihat Dağli2, Feng Qi3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 295-305, 2022, DOI:10.32604/cmes.2022.018778

    Abstract In the paper, with the help of the Faá di Bruno formula and an identity of the Bell polynomials of the second kind, the authors define degenerate λ-array type polynomials, establish two explicit formulas, and present several recurrence relations of degenerate λ-array type polynomials and numbers. More >

  • Open Access

    ARTICLE

    k-Order Fibonacci Polynomials on AES-Like Cryptology

    Mustafa Asci, Suleyman Aydinyuz*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 277-293, 2022, DOI:10.32604/cmes.2022.017898

    Abstract The Advanced Encryption Standard (AES) is the most widely used symmetric cipher today. AES has an important place in cryptology. Finite field, also known as Galois Fields, are cornerstones for understanding any cryptography. This encryption method on AES is a method that uses polynomials on Galois fields. In this paper, we generalize the AES-like cryptology on 2 × 2 matrices. We redefine the elements of k-order Fibonacci polynomials sequences using a certain irreducible polynomial in our cryptology algorithm. So, this cryptology algorithm is called AES-like cryptology on the k-order Fibonacci polynomial matrix. More >

  • Open Access

    ARTICLE

    Game Outlier Behavior Detection System Based on Dynamic Time Warp Algorithm

    Shinjin Kang1, Soo Kyun Kim2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 219-237, 2022, DOI:10.32604/cmes.2022.018413

    Abstract This paper proposes a methodology for using multi-modal data in gameplay to detect outlier behavior. The proposed methodology collects, synchronizes, and quantifies time-series data from webcams, mouses, and keyboards. Facial expressions are varied on a one-dimensional pleasure axis, and changes in expression in the mouth and eye areas are detected separately. Furthermore, the keyboard and mouse input frequencies are tracked to determine the interaction intensity of users. Then, we apply a dynamic time warp algorithm to detect outlier behavior. The detected outlier behavior graph patterns were the play patterns that the game designer did not intend or play patterns that… More >

  • Open Access

    ARTICLE

    Mu-Net: Multi-Path Upsampling Convolution Network for Medical Image Segmentation

    Jia Chen1, Zhiqiang He1, Dayong Zhu1, Bei Hui1,*, Rita Yi Man Li2, Xiao-Guang Yue3,4,5

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 73-95, 2022, DOI:10.32604/cmes.2022.018565

    Abstract Medical image segmentation plays an important role in clinical diagnosis, quantitative analysis, and treatment process. Since 2015, U-Net-based approaches have been widely used for medical image segmentation. The purpose of the U-Net expansive path is to map low-resolution encoder feature maps to full input resolution feature maps. However, the consecutive deconvolution and convolutional operations in the expansive path lead to the loss of some high-level information. More high-level information can make the segmentation more accurate. In this paper, we propose MU-Net, a novel, multi-path upsampling convolution network to retain more high-level information. The MU-Net mainly consists of three parts: contracting… More >

  • Open Access

    ARTICLE

    Noise Pollution Reduction through a Novel Optimization Procedure in Passive Control Methods

    Haojie Lian1,2, Leilei Chen2,3, Xiao Lin4, Wenchang Zhao5,*, Stephane P. A. Bordas6,7, Mingdong Zhou8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 1-18, 2022, DOI:10.32604/cmes.2022.019705

    Abstract This paper proposes a novel optimization framework in passive control techniques to reduce noise pollution. The geometries of the structures are represented by Catmull-Clark subdivision surfaces, which are able to build gap-free Computer-Aided Design models and meanwhile tackle the extraordinary points that are commonly encountered in geometric modelling. The acoustic fields are simulated using the isogeometric boundary element method, and a density-based topology optimization is conducted to optimize distribution of sound-absorbing materials adhered to structural surfaces. The approach enables one to perform acoustic optimization from Computer-Aided Design models directly without needing meshing and volume parameterization, thereby avoiding the geometric errors… More >

  • Open Access

    EDITORIAL

    Introduction to the Special Issue on Novel Methods of Topology Optimization and Engineering Applications

    Kai Long1,*, Xiaodong Huang2, Zunyi Duan3, Xuan Wang4, Quhao Li5

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 27-29, 2022, DOI:10.32604/cmes.2022.020822

    Abstract This article has no abstract. More >

  • Open Access

    EDITORIAL

    Introduction to the Special Issue on Intelligent Models for Security and Resilience in Cyber Physical Systems

    Qi Liu1,*, Xiaodong Liu2, Radu Grosu3, Ching-Nung Yang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 23-26, 2022, DOI:10.32604/cmes.2022.020646

    Abstract This article has no abstract. More >

  • Open Access

    EDITORIAL

    Introduction to the Special Issue on “Innovation and Application of Intelligent Processing of Data, Information and Knowledge in E-Commerce”

    Honghao Gao1,2, Jung Yoon Kim2,*, Yuyu Yin3

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 19-21, 2022, DOI:10.32604/cmes.2022.019665

    Abstract This article has no abstract. More >

Displaying 9211-9220 on page 922 of 22225. Per Page