Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Instant Edit Propagation on Images Based on Bilateral Grid

    Feng Li1,2, Chaofeng Ou2, Yan Gui1,2,3,*, Lingyun Xiang1,2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 643-656, 2019, DOI:10.32604/cmc.2019.06094

    Abstract The ability to quickly and intuitively edit digital content has become increasingly important in our everyday life. However, existing edit propagation methods for editing digital images are typically based on optimization with high computational cost for large inputs. Moreover, existing edit propagation methods are generally inefficient and highly time-consuming. Accordingly, to improve edit efficiency, this paper proposes a novel edit propagation method using a bilateral grid, which can achieve instant propagation of sparse image edits. Firstly, given an input image with user interactions, we resample each of its pixels into a regularly sampled bilateral grid, which facilitates efficient mapping from… More >

  • Open Access

    ARTICLE

    ICVSS: A New Method for Vulnerability Quantitative Grading

    Tiantian Tan1,*, Baosheng Wang1, Yong Tang1, Xu Zhou1, Jingwen Han2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 629-641, 2019, DOI:10.32604/cmc.2019.06049

    Abstract Vulnerability technology is the basic of network security technology, vulnerability quantitative grading methods, such as CVSS, WIVSS, ICVSS, provide a reference to vulnerability management, but the problems of ignoring the risk elevation caused by a group of vulnerabilities and low accuracy of exploitable level evaluation exist in current vulnerability quantitative grading methods. To solve problems above in current network security quantitative evaluation methods, this paper verified the high relevance degree between type and exploitable score of vulnerability, proposed a new vulnerability quantitative grading method ICVSS, ICVSS can explore attack path using continuity level defined by privilege, add vulnerability type to… More >

  • Open Access

    ARTICLE

    Generating Questions Based on Semi-Automated and End-to-End Neural Network

    Tianci Xia1,2, Yuan Sun1,2,*, Xiaobing Zhao1,2, Wei Song1, Yumiao Guo3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 617-628, 2019, DOI:10.32604/cmc.2019.05860

    Abstract With the emergence of large-scale knowledge base, how to use triple information to generate natural questions is a key technology in question answering systems. The traditional way of generating questions require a lot of manual intervention and produce lots of noise. To solve these problems, we propose a joint model based on semi-automated model and End-to-End neural network to automatically generate questions. The semi-automated model can generate question templates and real questions combining the knowledge base and center graph. The End-to-End neural network directly sends the knowledge base and real questions to BiLSTM network. Meanwhile, the attention mechanism is utilized… More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

    Weidong Fang1, Wuxiong Zhang1,2,*, QianQian Zhao1,2, Xiaohong Ji3, Wei Chen4, Biruk Assefa5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 583-599, 2019, DOI:10.32604/cmc.2019.05237

    Abstract As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether… More >

  • Open Access

    ARTICLE

    Keyphrase Generation Based on Self-Attention Mechanism

    Kehua Yang1,*, Yaodong Wang1, Wei Zhang1, Jiqing Yao2, Yuquan Le1

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 569-581, 2019, DOI:10.32604/cmc.2019.05952

    Abstract Keyphrase greatly provides summarized and valuable information. This information can help us not only understand text semantics, but also organize and retrieve text content effectively. The task of automatically generating it has received considerable attention in recent decades. From the previous studies, we can see many workable solutions for obtaining keyphrases. One method is to divide the content to be summarized into multiple blocks of text, then we rank and select the most important content. The disadvantage of this method is that it cannot identify keyphrase that does not include in the text, let alone get the real semantic meaning… More >

  • Open Access

    ARTICLE

    Improvement of Flat Surfaces Quality of Aluminum Alloy 6061-O By a Proposed Trajectory of Ball Burnishing Tool

    Ruba Alghazoul1, Almohanad Makki1, Magd Abdel Wahab2,3,*

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 555-568, 2019, DOI:10.32604/cmc.2019.06337

    Abstract Burnishing is a profitable process of surface finishing due to its ability to be automated, which makes burnishing method more desirable than other finishing methods. To obtain high surface finish, non-stop operation is required for CNC machine and we can attain that by choosing a suitable trajectory of the finishing tool. In other words, burnishing paths should be multidirectional rather than monotonic, in order to cover uniformly the surface. Indeed, the burnishing force is also a key parameter of the burnishing process because it determines the degree of plastic deformation, and that makes determining the optimum burnishing force an essential… More >

  • Open Access

    ARTICLE

    Human Behavior Classification Using Geometrical Features of Skeleton and Support Vector Machines

    Syed Muhammad Saqlain Shah1,*, Tahir Afzal Malik2, Robina khatoon1, Syed Saqlain Hassan3, Faiz Ali Shah4

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 535-553, 2019, DOI:10.32604/cmc.2019.07948

    Abstract Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers. In this paper, we have presented methodology to recognize human behavior in thin crowd which may be very helpful in surveillance. Research have mostly focused the problem of human detection in thin crowd, overall behavior of the crowd and actions of individuals in video sequences. Vision based Human behavior modeling is a complex task as it involves human detection, tracking, classifying normal and abnormal behavior. The proposed methodology takes input video and applies Gaussian based segmentation technique followed by post processing through presenting… More >

  • Open Access

    ARTICLE

    Dynamics of the Moving Ring Load Acting in the System “Hollow Cylinder + Surrounding Medium” with Inhomogeneous Initial Stresses

    Surkay D. Akbarov1,2, Emin T. Bagirov2, Muslum Ozisik3,*

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 503-534, 2019, DOI:10.32604/cmc.2019.07561

    Abstract This paper studies the influence of the inhomogeneous initial stress state in the system consisting of a hollow cylinder and surrounding elastic medium on the dynamics of the moving ring load acting in the interior of the cylinder. It is assumed that in the initial state the system is compressed by uniformly distributed normal forces acting at infinity in the radial inward direction and as a result of this compression the inhomogeneous initial stresses appear in the system. After appearance of the initial stresses, the interior of the hollow cylinder is loaded by the moving ring load and so it… More >

  • Open Access

    ARTICLE

    Implementing the Node Based Smoothed Finite Element Method as User Element in Abaqus for Linear and Nonlinear Elasticity

    S. Kshrisagar1, A. Francis1, J. J. Yee2, S. Natarajan1, C. K. Lee3,*

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 481-502, 2019, DOI:10.32604/cmc.2019.07967

    Abstract In this paper, the node based smoothed-strain Abaqus user element (UEL) in the framework of finite element method is introduced. The basic idea behind of the node based smoothed finite element (NSFEM) is that finite element cells are divided into subcells and subcells construct the smoothing domain associated with each node of a finite element cell [Liu, Dai and Nguyen-Thoi (2007)]. Therefore, the numerical integration is globally performed over smoothing domains. It is demonstrated that the proposed UEL retains all the advantages of the NSFEM, i.e., upper bound solution, overly soft stiffness and free from locking in compressible and nearly-incompressible… More >

  • Open Access

    ARTICLE

    Geek Talents: Who are the Top Experts on GitHub and Stack Overflow?

    Yijun Tian 1, *, Waii Ng1, Jialiang Cao1, Suzanne McIntosh1

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 465-479, 2019, DOI:10.32604/cmc.2019.07818

    Abstract In the field of Computer Science, software developers need to use a wide array of social collaborative platforms for learning and cooperating. The most popular ones are GitHub and Stack Overflow. Existing platforms only support search queries to extract relevant repository information from GitHub, or questions and answers from Stack Overflow. This ignores the valuable coder-related part-who are the top experts (geek talents) in a specific area? This information is important to companies, open source projects, and to those who want to learn from an expert role model. Thus, how to find the right developers is quite a crucial yet… More >

Displaying 17291-17300 on page 1730 of 22225. Per Page