Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Hybrid Efficient Convolution Operators for Visual Tracking

    Yu Wang*

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 63-72, 2021, DOI:10.32604/jai.2021.010455

    Abstract Visual tracking is a classical computer vision problem with many applications. Efficient convolution operators (ECO) is one of the most outstanding visual tracking algorithms in recent years, it has shown great performance using discriminative correlation filter (DCF) together with HOG, color maps and VGGNet features. Inspired by new deep learning models, this paper propose a hybrid efficient convolution operators integrating fully convolution network (FCN) and residual network (ResNet) for visual tracking, where FCN and ResNet are introduced in our proposed method to segment the objects from backgrounds and extract hierarchical feature maps of objects, respectively. Compared with the traditional VGGNet,… More >

  • Open Access

    ARTICLE

    Evaluation Model of Farmer Training Effect Based on AHP–A Case Study of Hainan Province

    Shengjie Li, Chaosheng Tang*

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 55-62, 2021, DOI:10.32604/jai.2021.017408

    Abstract On the basis of studying the influencing factors of training effect evaluation, this paper constructs an AHP-fuzzy comprehensive evaluation model for farmers’ vocational training activities in Hainan Province to evaluate farmers’ training effect, which overcomes the limitations of traditional methods. Firstly, the content and index system of farmer training effect evaluation are established by analytic hierarchy process, and the weight value of each index is determined. Then, the fuzzy comprehensive evaluation (FCE) of farmer training effect is carried out by using multi-level FCE. The joint use of AHP and FCE improves the reliability and effectiveness of the evaluation process and… More >

  • Open Access

    ARTICLE

    A Generation Method of Letter-Level Adversarial Samples

    Huixuan Xu1, Chunlai Du1, Yanhui Guo2,*, Zhijian Cui1, Haibo Bai1

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 45-53, 2021, DOI:10.32604/jai.2021.016305

    Abstract In recent years, with the rapid development of natural language processing, the security issues related to it have attracted more and more attention. Character perturbation is a common security problem. It can try to completely modify the input classification judgment of the target program without people’s attention by adding, deleting, or replacing several characters, which can reduce the effectiveness of the classifier. Although the current research has provided various methods of perturbation attacks on characters, the success rate of some methods is still not ideal. This paper mainly studies the sample generation of optimal perturbation characters and proposes a characterlevel… More >

  • Open Access

    ARTICLE

    Investigating and Modelling of Task Offloading Latency in Edge-Cloud Environment

    Jaber Almutairi1, Mohammad Aldossary2,*,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4143-4160, 2021, DOI:10.32604/cmc.2021.018145

    Abstract Recently, the number of Internet of Things (IoT) devices connected to the Internet has increased dramatically as well as the data produced by these devices. This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing. However, different service architecture and offloading strategies have a different impact on the service time performance of IoT applications. Therefore, this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network. Also, it introduces the… More >

  • Open Access

    ARTICLE

    Virtual Reality-Based Random Dot Kinematogram

    Jun Ma1, Hyo-Jung Kim2, Ji-Soo Kim3,4, Eek-Sung Lee5, Min Hong6,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4205-4213, 2021, DOI:10.32604/cmc.2021.018080

    Abstract This research implements a random dot kinematogram (RDK) using virtual reality (VR) and analyzes the results based on normal subjects. Visual motion perception is one of visual functions localized to a specific cortical area, the human motion perception area (human analogue for the middle temporal/middle superior temporal area) located in the parieto–occipito–temporal junction of the human brain. The RDK measures visual motion perception capabilities. The stimuli in conventional RDK methods are presented using a monitor screen, so these devices require a spacious dark room for installation and use. Recently, VR technology has been implemented in different medical domains. The test… More >

  • Open Access

    ARTICLE

    Bit Rate Reduction in Cloud Gaming Using Object Detection Technique

    Daniyal Baig1, Tahir Alyas1, Muhammad Hamid2, Muhammad Saleem3, Saadia Malik4, Nadia Tabassum5,*, Natash Ali Mian6

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3653-3669, 2021, DOI:10.32604/cmc.2021.017948

    Abstract The past two decades witnessed a broad-increase in web technology and on-line gaming. Enhancing the broadband confinements is viewed as one of the most significant variables that prompted new gaming technology. The immense utilization of web applications and games additionally prompted growth in the handled devices and moving the limited gaming experience from user devices to online cloud servers. As internet capabilities are enhanced new ways of gaming are being used to improve the gaming experience. In cloud-based video gaming, game engines are hosted in cloud gaming data centers, and compressed gaming scenes are rendered to the players over the… More >

  • Open Access

    ARTICLE

    A Secure Intrusion Detection System in Cyberphysical Systems Using a Parameter-Tuned Deep-Stacked Autoencoder

    Nojood O. Aljehane*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3915-3929, 2021, DOI:10.32604/cmc.2021.017905

    Abstract Cyber physical systems (CPSs) are a networked system of cyber (computation, communication) and physical (sensors, actuators) elements that interact in a feedback loop with the assistance of human interference. Generally, CPSs authorize critical infrastructures and are considered to be important in the daily lives of humans because they form the basis of future smart devices. Increased utilization of CPSs, however, poses many threats, which may be of major significance for users. Such security issues in CPSs represent a global issue; therefore, developing a robust, secure, and effective CPS is currently a hot research topic. To resolve this issue, an intrusion… More >

  • Open Access

    ARTICLE

    Mobile Memory Management System Based on User’s Application Usage Patterns

    Jaehwan Lee, Sangoh Park*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4031-4050, 2021, DOI:10.32604/cmc.2021.017872

    Abstract Currently, the number of functions to improve user convenience in smartphone applications is increasing. In addition, more mobile applications are being loaded into mobile operating system memory for faster launches, thus increasing the memory requirements for smartphones. The memory used by applications in mobile operating systems is managed using software; allocated memory is freed up by either considering the usage state of the application or terminating the least recently used (LRU) application. As LRU-based memory management schemes do not consider the application launch frequency in a low memory situation, currently used mobile operating systems can lead to the termination of… More >

  • Open Access

    ARTICLE

    DTLM-DBP: Deep Transfer Learning Models for DNA Binding Proteins Identification

    Sara Saber1, Uswah Khairuddin2,*, Rubiyah Yusof2, Ahmed Madani1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3563-3576, 2021, DOI:10.32604/cmc.2021.017769

    Abstract The identification of DNA binding proteins (DNABPs) is considered a major challenge in genome annotation because they are linked to several important applied and research applications of cellular functions e.g., in the study of the biological, biophysical, and biochemical effects of antibiotics, drugs, and steroids on DNA. This paper presents an efficient approach for DNABPs identification based on deep transfer learning, named “DTLM-DBP.” Two transfer learning methods are used in the identification process. The first is based on the pre-trained deep learning model as a feature’s extractor and classifier. Two different pre-trained Convolutional Neural Networks (CNN), AlexNet 8 and VGG… More >

  • Open Access

    ARTICLE

    Research on Forecasting Flowering Phase of Pear Tree Based on Neural Network

    Zhenzhou Wang1, Yinuo Ma1, Pingping Yu1,*, Ning Cao2, Heiner Dintera3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3431-3446, 2021, DOI:10.32604/cmc.2021.017729

    Abstract Predicting the blooming season of ornamental plants is significant for guiding adjustments in production decisions and providing viewing periods and routes. The current strategies for observation of ornamental plant booming periods are mainly based on manpower and experience, which have problems such as inaccurate recognition time, time-consuming and energy sapping. Therefore, this paper proposes a neural network-based method for predicting the flowering phase of pear tree. Firstly, based on the meteorological observation data of Shijiazhuang Meteorological Station from 2000 to 2019, three principal components (the temperature factor, weather factor, and humidity factor) with high correlation coefficient with the flowering phase… More >

Displaying 11941-11950 on page 1195 of 22225. Per Page