Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Motion-Planning Algorithm for a Hyper-Redundant Manipulator in Narrow Spaces

    Lei Zhang1,2,*, Shouzhi Huang1,2, Zhaocai Du3, Guangyao Ouyang1,2, Heping Chen4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4817-4832, 2022, DOI:10.32604/cmc.2022.026845

    Abstract In this study, a hyper-redundant manipulator was designed for detection and searching in narrow spaces for aerospace and earthquake rescue applications. A forward kinematics equation for the hyper-redundant manipulator was derived using the homogeneous coordinate transformation method. Based on the modal function backbone curve method and the known path, an improved modal method for the backbone curves was proposed. First, the configuration of the backbone curve for the hyper-redundant manipulator was divided into two parts: a mode function curve segment of the mode function and a known path segment. By changing the discrete points along the known path, the backbone… More >

  • Open Access

    ARTICLE

    Hybrid Metaheuristics Based License Plate Character Recognition in Smart City

    Esam A. AlQaralleh1, Fahad Aldhaban2, Halah Nasseif2, Bassam A.Y. Alqaralleh2,*, Tamer AbuKhalil3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5727-5740, 2022, DOI:10.32604/cmc.2022.026780

    Abstract Recent technological advancements have been used to improve the quality of living in smart cities. At the same time, automated detection of vehicles can be utilized to reduce crime rate and improve public security. On the other hand, the automatic identification of vehicle license plate (LP) character becomes an essential process to recognize vehicles in real time scenarios, which can be achieved by the exploitation of optimal deep learning (DL) approaches. In this article, a novel hybrid metaheuristic optimization based deep learning model for automated license plate character recognition (HMODL-ALPCR) technique has been presented for smart city environments. The major… More >

  • Open Access

    ARTICLE

    Importance of Adaptive Photometric Augmentation for Different Convolutional Neural Network

    Saraswathi Sivamani1, Sun Il Chon1, Do Yeon Choi1, Dong Hoon Lee2, Ji Hwan Park1,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4433-4452, 2022, DOI:10.32604/cmc.2022.026759

    Abstract Existing segmentation and augmentation techniques on convolutional neural network (CNN) has produced remarkable progress in object detection. However, the nominal accuracy and performance might be downturned with the photometric variation of images that are directly ignored in the training process, along with the context of the individual CNN algorithm. In this paper, we investigate the effect of a photometric variation like brightness and sharpness on different CNN. We observe that random augmentation of images weakens the performance unless the augmentation combines the weak limits of photometric variation. Our approach has been justified by the experimental result obtained from the PASCAL… More >

  • Open Access

    ARTICLE

    Compiler IR-Based Program Encoding Method for Software Defect Prediction

    Yong Chen1, Chao Xu1,*, Jing Selena He2, Sheng Xiao3, Fanfan Shen1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5251-5272, 2022, DOI:10.32604/cmc.2022.026750

    Abstract With the continuous expansion of software applications, people's requirements for software quality are increasing. Software defect prediction is an important technology to improve software quality. It often encodes the software into several features and applies the machine learning method to build defect prediction classifiers, which can estimate the software areas is clean or buggy. However, the current encoding methods are mainly based on the traditional manual features or the AST of source code. Traditional manual features are difficult to reflect the deep semantics of programs, and there is a lot of noise information in AST, which affects the expression of… More >

  • Open Access

    ARTICLE

    Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet

    Muhamad Erza Aminanto1,2,*, Ibnu Rifqi Purbomukti3, Harry Chandra2, Kwangjo Kim4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5301-5314, 2022, DOI:10.32604/cmc.2022.026749

    Abstract Internet of Things (IoT) networks leverage wireless communication protocols, which adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several examples of different attacks existing in Wi-Fi networks. Intrusion Detection System (IDS) became one solution to distinguish those attacks from benign traffic. Deep learning techniques have been intensively utilized to classify the attacks. However, the main issue of utilizing deep learning models is projecting the data, notably tabular data, into an image. This study proposes a novel projection from wireless network attacks data into a grid-based image for feeding one of the Convolutional Neural Network (CNN) models, EfficientNet. We… More >

  • Open Access

    ARTICLE

    Automated Artificial Intelligence Empowered Colorectal Cancer Detection and Classification Model

    Mahmoud Ragab1,2,3,*, Ashwag Albukhari2,4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5577-5591, 2022, DOI:10.32604/cmc.2022.026715

    Abstract Colorectal cancer is one of the most commonly diagnosed cancers and it develops in the colon region of large intestine. The histopathologist generally investigates the colon biopsy at the time of colonoscopy or surgery. Early detection of colorectal cancer is helpful to maintain the concept of accumulating cancer cells. In medical practices, histopathological investigation of tissue specimens generally takes place in a conventional way, whereas automated tools that use Artificial Intelligence (AI) techniques can produce effective results in disease detection performance. In this background, the current study presents an Automated AI-empowered Colorectal Cancer Detection and Classification (AAI-CCDC) technique. The proposed… More >

  • Open Access

    ARTICLE

    Smart Deep Learning Based Human Behaviour Classification for Video Surveillance

    Esam A. AlQaralleh1, Fahad Aldhaban2, Halah Nasseif2, Malek Z. Alksasbeh3, Bassam A. Y. Alqaralleh2,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5593-5605, 2022, DOI:10.32604/cmc.2022.026666

    Abstract Real-time video surveillance system is commonly employed to aid security professionals in preventing crimes. The use of deep learning (DL) technologies has transformed real-time video surveillance into smart video surveillance systems that automate human behavior classification. The recognition of events in the surveillance videos is considered a hot research topic in the field of computer science and it is gaining significant attention. Human action recognition (HAR) is treated as a crucial issue in several applications areas and smart video surveillance to improve the security level. The advancements of the DL models help to accomplish improved recognition performance. In this view,… More >

  • Open Access

    ARTICLE

    Network Traffic Obfuscation System for IIoT-Cloud Control Systems

    Yangjae Lee1, Sung Hoon Baek2, Jung Taek Seo3, Ki-Woong Park1,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4911-4929, 2022, DOI:10.32604/cmc.2022.026657

    Abstract One of the latest technologies enabling remote control, operational efficiency upgrades, and real-time big-data monitoring in an industrial control system (ICS) is the IIoT-Cloud ICS, which integrates the Industrial Internet of Things (IIoT) and the cloud into the ICS. Although an ICS benefits from the application of IIoT and the cloud in terms of cost reduction, efficiency improvement, and real-time monitoring, the application of this technology to an ICS poses an unprecedented security risk by exposing its terminal devices to the outside world. An adversary can collect information regarding senders, recipients, and prime-time slots through traffic analysis and use it… More >

  • Open Access

    ARTICLE

    A Dynamic Multi-ary Query Tree Protocol for Passive RFID Anti-collision

    Gang Li1, Haoyang Sun1, Zhenbing Li1, Peiqi Wu1, Daniele Inserra1,*, Jian Su2, Xiaochuan Fang3, Guangjun Wen1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4931-4944, 2022, DOI:10.32604/cmc.2022.026654

    Abstract

    In this paper, a dynamic multi-ary query tree (DMQT) anti-collision protocol for Radio Frequency Identification (RFID) systems is proposed for large scale passive RFID tag identification. The proposed DMQT protocol is based on an iterative process between the reader and tags which identifies the position of collision bits through map commands and dynamically encodes them to optimize slots allocation through query commands. In this way, the DMQT completely eliminates empty slots and greatly reduces collision slots, which in turn reduces the identification time and energy costs. In addition and differently to other known protocols, the DMQT does not need to… More >

  • Open Access

    ARTICLE

    Improving Method of Anomaly Detection Performance for Industrial IoT Environment

    Junwon Kim1, Jiho Shin2, Ki-Woong Park3, Jung Taek Seo4,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5377-5394, 2022, DOI:10.32604/cmc.2022.026619

    Abstract Industrial Control System (ICS), which is based on Industrial IoT (IIoT), has an intelligent mobile environment that supports various mobility, but there is a limit to relying only on the physical security of the ICS environment. Due to various threat factors that can disrupt the workflow of the IIoT, machine learning-based anomaly detection technologies are being presented; it is also essential to study for increasing detection performance to minimize model errors for promoting stable ICS operation. In this paper, we established the requirements for improving the anomaly detection performance in the IIoT-based ICS environment by analyzing the related cases. After… More >

Displaying 8381-8390 on page 839 of 22248. Per Page