Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Remote Sensing Image Classification Algorithm Based on Texture Feature and Extreme Learning Machine

    Xiangchun Liu1, Jing Yu2,Wei Song1, 3, *, Xinping Zhang1, Lizhi Zhao1, Antai Wang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1385-1395, 2020, DOI:10.32604/cmc.2020.011308

    Abstract With the development of satellite technology, the satellite imagery of the earth’s surface and the whole surface makes it possible to survey surface resources and master the dynamic changes of the earth with high efficiency and low consumption. As an important tool for satellite remote sensing image processing, remote sensing image classification has become a hot topic. According to the natural texture characteristics of remote sensing images, this paper combines different texture features with the Extreme Learning Machine, and proposes a new remote sensing image classification algorithm. The experimental tests are carried out through the standard test dataset SAT-4 and… More >

  • Open Access

    ARTICLE

    Rate-Energy Tradeoff for Wireless Simultaneous Information and Power Transfer in Full-Duplex and Half-Duplex Systems

    Xiaoye Shi1, *, Jin Sun1, Dongming Li1, Fei Ding2, Zhaowei Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1373-1384, 2020, DOI:10.32604/cmc.2020.011018

    Abstract In this paper, we study the rate-energy tradeoff for wireless simultaneous information and power transfer in full-duplex and half-duplex scenarios. To this end, the weighting function of energy efficiency and transmission rate, as rate-energy tradeoff metric is first introduced and the metric optimization problem is formulated. Applying Karush-Kuhn-Tucker (KKT) conditions for Lagrangian optimality and a series of mathematical approximations, the metric optimization problem can be simplified. The closed-form solution of the power ratio is obtained, building direct relationship between power ratio and the rate-energy tradeoff metric. By choosing power ratio, one can make the tradeoff between information rate and harvested… More >

  • Open Access

    ARTICLE

    Ensemble Learning Based on GBDT and CNN for Adoptability Prediction

    Yunfan Ye1, Fang Liu1, *, Shan Zhao2, Wanting Hu3, Zhiyao Liang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1361-1372, 2020, DOI:10.32604/cmc.2020.011632

    Abstract By efficiently and accurately predicting the adoptability of pets, shelters and rescuers can be positively guided on improving attraction of pet profiles, reducing animal suffering and euthanization. Previous prediction methods usually only used a single type of content for training. However, many pets contain not only textual content, but also images. To make full use of textual and visual information, this paper proposed a novel method to process pets that contain multimodal information. We employed several CNN (Convolutional Neural Network) based models and other methods to extract features from images and texts to obtain the initial multimodal representation, then reduce… More >

  • Open Access

    ARTICLE

    Fast Compass Alignment for Strapdown Inertial Navigation System

    Jin Sun1, Dengyin Zhang1, *, Xiaoye Shi1, Fei Ding1, 2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1349-1360, 2020, DOI:10.32604/cmc.2020.011459

    Abstract Initial alignment is the precondition for strapdown inertial navigation system (SINS) to navigate. Its two important indexes are accuracy and rapidity, the accuracy of the initial alignment is directly related to the working accuracy of SINS, but in selfalignment, the two indexes are often contradictory. In view of the limitations of conventional data processing algorithms, a novel method of compass alignment based on stored data and repeated navigation calculation for SINS is proposed. By means of data storage, the same data is used in different stages of the initial alignment, which is beneficial to shorten the initial alignment time and… More >

  • Open Access

    ARTICLE

    End-to-End Latency Evaluation of the Sat5G Network Based on Stochastic Network Calculus

    Huaifeng Shi1, Chengsheng Pan1, *, Li Yang2, Debin Wei2, Yunqing Shi3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1335-1348, 2020, DOI:10.32604/cmc.2020.011005

    Abstract Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time, reliability and capacity is an inherent feature of satellite-5G integrated network (Sat5G). However, there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latencysensitive service. To this end, we build a tandem model considering the connection relationship between the various components in Sat5G network architecture, and give an end-to-end latency calculation function based on this model. By introducing stochastic network calculus, we derive the relationship between the end-to-end latency bound and the violation probability considering the traffic characteristics… More >

  • Open Access

    ARTICLE

    Ensemble Strategy for Insider Threat Detection from User Activity Logs

    Shihong Zou1, Huizhong Sun1, *, Guosheng Xu1, Ruijie Quan2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1321-1334, 2020, DOI:10.32604/cmc.2020.09649

    Abstract In the information era, the core business and confidential information of enterprises/organizations is stored in information systems. However, certain malicious inside network users exist hidden inside the organization; these users intentionally or unintentionally misuse the privileges of the organization to obtain sensitive information from the company. The existing approaches on insider threat detection mostly focus on monitoring, detecting, and preventing any malicious behavior generated by users within an organization’s system while ignoring the imbalanced ground-truth insider threat data impact on security. To this end, to be able to detect insider threats more effectively, a data processing tool was developed to… More >

  • Open Access

    ARTICLE

    Case Study: Spark GPU-Enabled Framework to Control COVID-19 Spread Using Cell-Phone Spatio-Temporal Data

    Hussein Shahata Abdallah1, *, Mohamed H. Khafagy1, Fatma A. Omara2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1303-1320, 2020, DOI:10.32604/cmc.2020.011313

    Abstract Nowadays, the world is fighting a dangerous form of Coronavirus that represents an emerging pandemic. Since its early appearance in China Wuhan city, many countries undertook several strict regulations including lockdowns and social distancing measures. Unfortunately, these procedures have badly impacted the world economy. Detecting and isolating positive/probable virus infected cases using a tree tracking mechanism constitutes a backbone for containing and resisting such fast spreading disease. For helping this hard effort, this research presents an innovative case study based on big data processing techniques to build a complete tracking system able to identify the central areas of infected/suspected people,… More >

  • Open Access

    ARTICLE

    Secret Image Communication Scheme Based on Visual Cryptography and Tetrolet Tiling Patterns

    N. RajeshKumar1, D. Yuvaraj2, G. Manikandan3, *, R. BalaKrishnan1, B. Karthikeyan3, D. Narasimhan1, N. R. Raajan4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1283-1301, 2020, DOI:10.32604/cmc.2020.011226

    Abstract Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images. The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image. In this paper, a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed. The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns. The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret… More >

  • Open Access

    ARTICLE

    Polynomials of Degree-Based Indices for Three-Dimensional Mesh Network

    Ali N. A. Koam1, Ali Ahmad2, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1271-1282, 2020, DOI:10.32604/cmc.2020.011736

    Abstract In order to study the behavior and interconnection of network devices, graphs structures are used to formulate the properties in terms of mathematical models. Mesh network (meshnet) is a LAN topology in which devices are connected either directly or through some intermediate devices. These terminating and intermediate devices are considered as vertices of graph whereas wired or wireless connections among these devices are shown as edges of graph. Topological indices are used to reflect structural property of graphs in form of one real number. This structural invariant has revolutionized the field of chemistry to identify molecular descriptors of chemical compounds.… More >

  • Open Access

    ARTICLE

    Statistical Inference of User Experience of Multichannel Audio on Mobile Phones

    Fesal Toosy1, *, Muhammad Sarwar Ehsan1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1253-1270, 2020, DOI:10.32604/cmc.2020.011667

    Abstract Mobile phones and other handheld electronic devices are now ubiquitous and play an important role in our everyday lives. Over the last decade, we have seen a sharp rise in the sophistication of both hardware and software for these devices, thus significantly increasing their utility and use. Electronic devices are now commonly used for the streaming of audio and video and for the regular playback of music. Multichannel audio has now become a popular format and with recent updates in software, the latest audio codecs that support this format can effectively be played back on most electronic devices. As a… More >

Displaying 14201-14210 on page 1421 of 22212. Per Page