Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Dis-NDVW: Distributed Network Asset Detection and Vulnerability Warning Platform

    Leilei Li1, Yansong Wang2, Dongjie Zhu2,*, Xiaofang Li3, Haiwen Du4, Yixuan Lu2, Rongning Qu3, Russell Higgs5

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 771-791, 2023, DOI:10.32604/cmc.2023.038268 - 08 June 2023

    Abstract With the rapid development of Internet technology, the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry. However, most existing detection tools operate in a single-node mode and cannot parallelly process large-scale tasks, which cannot meet the current needs of the industry. To address the above issues, this paper proposes a distributed network asset detection and vulnerability warning platform (Dis-NDVW) based on distributed systems and multiple detection tools. Specifically, this paper proposes a distributed message subscription and publication system based on Zookeeper and Kafka, which endows Dis-NDVW… More >

  • Open Access

    ARTICLE

    Non-Cooperative Game of Coordinated Scheduling of Parallel Machine Production and Transportation in Shared Manufacturing

    Peng Liu1,*, Ke Xu1,2, Hua Gong1,2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 239-258, 2023, DOI:10.32604/cmc.2023.038232 - 08 June 2023

    Abstract Given the challenges of manufacturing resource sharing and competition in the modern manufacturing industry, the coordinated scheduling problem of parallel machine production and transportation is investigated. The problem takes into account the coordination of production and transportation before production as well as the disparities in machine spatial position and performance. A non-cooperative game model is established, considering the competition and self-interest behavior of jobs from different customers for machine resources. The job from different customers is mapped to the players in the game model, the corresponding optional processing machine and location are mapped to the… More >

  • Open Access

    ARTICLE

    Appearance Based Dynamic Hand Gesture Recognition Using 3D Separable Convolutional Neural Network

    Muhammad Rizwan1,*, Sana Ul Haq1,*, Noor Gul1,2, Muhammad Asif1, Syed Muslim Shah3, Tariqullah Jan4, Naveed Ahmad5

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1213-1247, 2023, DOI:10.32604/cmc.2023.038211 - 08 June 2023

    Abstract Appearance-based dynamic Hand Gesture Recognition (HGR) remains a prominent area of research in Human-Computer Interaction (HCI). Numerous environmental and computational constraints limit its real-time deployment. In addition, the performance of a model decreases as the subject’s distance from the camera increases. This study proposes a 3D separable Convolutional Neural Network (CNN), considering the model’s computational complexity and recognition accuracy. The 20BN-Jester dataset was used to train the model for six gesture classes. After achieving the best offline recognition accuracy of 94.39%, the model was deployed in real-time while considering the subject’s attention, the instant of… More >

  • Open Access

    ARTICLE

    MVCE-Net: Multi-View Region Feature and Caption Enhancement Co-Attention Network for Visual Question Answering

    Feng Yan1, Wushouer Silamu2, Yanbing Li1,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 65-80, 2023, DOI:10.32604/cmc.2023.038177 - 08 June 2023

    Abstract Visual question answering (VQA) requires a deep understanding of images and their corresponding textual questions to answer questions about images more accurately. However, existing models tend to ignore the implicit knowledge in the images and focus only on the visual information in the images, which limits the understanding depth of the image content. The images contain more than just visual objects, some images contain textual information about the scene, and slightly more complex images contain relationships between individual visual objects. Firstly, this paper proposes a model using image description for feature enhancement. This model encodes… More >

  • Open Access

    ARTICLE

    Effectiveness of Deep Learning Models for Brain Tumor Classification and Segmentation

    Muhammad Irfan1, Ahmad Shaf2,*, Tariq Ali2, Umar Farooq2, Saifur Rahman1, Salim Nasar Faraj Mursal1, Mohammed Jalalah1, Samar M. Alqhtani3, Omar AlShorman4

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 711-729, 2023, DOI:10.32604/cmc.2023.038176 - 08 June 2023

    Abstract A brain tumor is a mass or growth of abnormal cells in the brain. In children and adults, brain tumor is considered one of the leading causes of death. There are several types of brain tumors, including benign (non-cancerous) and malignant (cancerous) tumors. Diagnosing brain tumors as early as possible is essential, as this can improve the chances of successful treatment and survival. Considering this problem, we bring forth a hybrid intelligent deep learning technique that uses several pre-trained models (Resnet50, Vgg16, Vgg19, U-Net) and their integration for computer-aided detection and localization systems in brain… More >

  • Open Access

    ARTICLE

    Efficient Group Blind Signature for Medical Data Anonymous Authentication in Blockchain-Enabled IoMT

    Chaoyang Li*, Bohao Jiang, Yanbu Guo, Xiangjun Xin

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 591-606, 2023, DOI:10.32604/cmc.2023.038129 - 08 June 2023

    Abstract Blockchain technology promotes the development of the Internet of medical things (IoMT) from the centralized form to distributed trust mode as blockchain-based Internet of medical things (BIoMT). Although blockchain improves the cross-institution data sharing ability, there still exist the problems of authentication difficulty and privacy leakage. This paper first describes the architecture of the BIoMT system and designs an anonymous authentication model for medical data sharing. This BIoMT system is divided into four layers: perceptual, network, platform, and application. The model integrates an anonymous authentication scheme to guarantee secure data sharing in the network ledger.… More >

  • Open Access

    ARTICLE

    Vehicle Detection and Tracking in UAV Imagery via YOLOv3 and Kalman Filter

    Shuja Ali1, Ahmad Jalal1, Mohammed Hamad Alatiyyah2, Khaled Alnowaiser3, Jeongmin Park4,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1249-1265, 2023, DOI:10.32604/cmc.2023.038114 - 08 June 2023

    Abstract Unmanned aerial vehicles (UAVs) can be used to monitor traffic in a variety of settings, including security, traffic surveillance, and traffic control. Numerous academics have been drawn to this topic because of the challenges and the large variety of applications. This paper proposes a new and efficient vehicle detection and tracking system that is based on road extraction and identifying objects on it. It is inspired by existing detection systems that comprise stationary data collectors such as induction loops and stationary cameras that have a limited field of view and are not mobile. The goal… More >

  • Open Access

    ARTICLE

    Leveraging Gradient-Based Optimizer and Deep Learning for Automated Soil Classification Model

    Hadeel Alsolai1, Mohammed Rizwanullah2,*, Mashael Maashi3, Mahmoud Othman4, Amani A. Alneil2, Amgad Atta Abdelmageed2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 975-992, 2023, DOI:10.32604/cmc.2023.037936 - 08 June 2023

    Abstract Soil classification is one of the emanating topics and major concerns in many countries. As the population has been increasing at a rapid pace, the demand for food also increases dynamically. Common approaches used by agriculturalists are inadequate to satisfy the rising demand, and thus they have hindered soil cultivation. There comes a demand for computer-related soil classification methods to support agriculturalists. This study introduces a Gradient-Based Optimizer and Deep Learning (DL) for Automated Soil Classification (GBODL-ASC) technique. The presented GBODL-ASC technique identifies various kinds of soil using DL and computer vision approaches. In the… More >

  • Open Access

    ARTICLE

    Identification of Tuberculosis and Coronavirus Patients Using Hybrid Deep Learning Models

    Mohammed A. Al Ghamdi*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 881-894, 2023, DOI:10.32604/cmc.2023.037826 - 08 June 2023

    Abstract Considerable resources, technology, and efforts are being utilized worldwide to eradicate the coronavirus. Although certain measures taken to prevent the further spread of the disease have been successful, efforts to completely wipe out the coronavirus have been insufficient. Coronavirus patients have symptoms similar to those of chest Tuberculosis (TB) or pneumonia patients. Chest tuberculosis and coronavirus are similar because both diseases affect the lungs, cause coughing and produce an irregular respiratory system. Both diseases can be confirmed through X-ray imaging. It is a difficult task to diagnose COVID-19, as coronavirus testing kits are neither excessively… More >

  • Open Access

    ARTICLE

    Unsupervised Log Anomaly Detection Method Based on Multi-Feature

    Shiming He1, Tuo Deng1, Bowen Chen1, R. Simon Sherratt2, Jin Wang1,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 517-541, 2023, DOI:10.32604/cmc.2023.037392 - 08 June 2023

    Abstract Log anomaly detection is an important paradigm for system troubleshooting. Existing log anomaly detection based on Long Short-Term Memory (LSTM) networks is time-consuming to handle long sequences. Transformer model is introduced to promote efficiency. However, most existing Transformer-based log anomaly detection methods convert unstructured log messages into structured templates by log parsing, which introduces parsing errors. They only extract simple semantic feature, which ignores other features, and are generally supervised, relying on the amount of labeled data. To overcome the limitations of existing methods, this paper proposes a novel unsupervised log anomaly detection method based… More >

Displaying 9211-9220 on page 922 of 31561. Per Page