Journals / CMC / Vol.62, No.3
Table of Content


  • ARTICLE

    Free Vibration Analysis of FG-CNTRC Cylindrical Pressure Vessels Resting on Pasternak Foundation with Various Boundary Conditions

    Mohammad Arefi1, Masoud Mohammadi1, Ali Tabatabaeian1, Timon Rabczuk2, *
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1001-1023, 2020, DOI:10.32604/cmc.2020.08052
    Abstract This study focuses on vibration analysis of cylindrical pressure vessels constructed by functionally graded carbon nanotube reinforced composites (FG-CNTRC). The vessel is under internal pressure and surrounded by a Pasternak foundation. This investigation was founded based on two-dimensional elastic analysis and used Hamilton’s principle to drive the governing equations. The deformations and effectivemechanical properties of the reinforced structure were elicited from the first-order shear theory (FSDT) and rule of mixture, respectively. The main goal of this study is to show the effects of various design parameters such as boundary conditions, reinforcement distribution, foundation parameters, and aspect ratio on the free… More >

  • ARTICLE

    Hybrid Clustering Algorithms with GRASP to Construct an Initial Solution for the MVPPDP

    Abeer I. Alhujaylan1, 2, *, Manar I. Hosny1
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1025-1051, 2020, DOI:10.32604/cmc.2020.08742
    Abstract Mobile commerce (m-commerce) contributes to increasing the popularity of electronic commerce (e-commerce), allowing anybody to sell or buy goods using a mobile device or tablet anywhere and at any time. As demand for e-commerce increases tremendously, the pressure on delivery companies increases to organise their transportation plans to achieve profits and customer satisfaction. One important planning problem in this domain is the multi-vehicle profitable pickup and delivery problem (MVPPDP), where a selected set of pickup and delivery customers need to be served within certain allowed trip time. In this paper, we proposed hybrid clustering algorithms with the greedy randomised adaptive… More >

  • ARTICLE

    A Review of Data Cleaning Methods for Web Information System

    Jinlin Wang1, Xing Wang1, *, Yuchen Yang1, Hongli Zhang1, Binxing Fang1
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1053-1075, 2020, DOI:10.32604/cmc.2020.08675
    Abstract Web information system (WIS) is frequently-used and indispensable in daily social life. WIS provides information services in many scenarios, such as electronic commerce, communities, and edutainment. Data cleaning plays an essential role in various WIS scenarios to improve the quality of data service. In this paper, we present a review of the state-of-the-art methods for data cleaning in WIS. According to the characteristics of data cleaning, we extract the critical elements of WIS, such as interactive objects, application scenarios, and core technology, to classify the existing works. Then, after elaborating and analyzing each category, we summarize the descriptions and challenges… More >

  • ARTICLE

    Ameliorate Security by Introducing Security Server in Software Defined Network

    J. Vijila1, *, A. Albert Raj2
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1077-1096, 2020, DOI:10.32604/cmc.2020.08534
    Abstract Software Defined Network (SDN) deals with huge data processing units which possess network management. However, due to centralization behavior ensuring security in SDN is the major concern. In this work to ensure security, a security server has been at its aid to check the vulnerability of the networks and to keep an eye on the packet according to the screening policies. A Secure Shell Connection (SSH) is established by the security server which does a frequent inspection of the network’s logs. Malware detection and the Intrusion Detection System policies are also incorporated in the server for the effective scanning of… More >

  • ARTICLE

    High Speed Network Intrusion Detection System (NIDS) Using Low Power Precomputation Based Content Addressable Memory

    R. Mythili1, *, P. Kalpana2
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1097-1107, 2020, DOI:10.32604/cmc.2020.08396
    Abstract NIDS (Network Intrusion Detection Systems) plays a vital role in security threats to computers and networks. With the onset of gigabit networks, hardware-based Intrusion Detection System gains popularity because of its high performance when compared to the software-based NIDS. The software-based system limits parallel execution, which in turn confines the performance of a modern network. This paper presents a signature-based lookup technique using reconfigurable hardware. Content Addressable Memory (CAM) is used as a lookup table architecture to improve the speed instead of search algorithms. To minimize the power and to increase the speed, precomputation based CAM (PBCAM) can be used,… More >

  • ARTICLE

    Stabilization for Equal-Order Polygonal Finite Element Method for High Fluid Velocity and Pressure Gradient

    T. Vu-Huu1, 2, C. Le-Thanh3, H. Nguyen-Xuan4, M. Abdel-Wahab5, 6, *
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1109-1123, 2020, DOI:10.32604/cmc.2020.07989
    Abstract This paper presents an adapted stabilisation method for the equal-order mixed scheme of finite elements on convex polygonal meshes to analyse the high velocity and pressure gradient of incompressible fluid flows that are governed by Stokes equations system. This technique is constructed by a local pressure projection which is extremely simple, yet effective, to eliminate the poor or even non-convergence as well as the instability of equal-order mixed polygonal technique. In this research, some numerical examples of incompressible Stokes fluid flow that is coded and programmed by MATLAB will be presented to examine the effectiveness of the proposed stabilised method. More >

  • ARTICLE

    Stochastic Numerical Analysis for Impact of Heavy Alcohol Consumption on Transmission Dynamics of Gonorrhoea Epidemic

    Kamaleldin Abodayeh1, Ali Raza2, *, Muhammad Shoaib Arif2, Muhammad Rafiq3, Mairaj Bibi4, Muhammad Mohsin5
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1125-1142, 2020, DOI:10.32604/cmc.2020.08885
    Abstract This paper aims to perform a comparison of deterministic and stochastic models. The stochastic modelling is a more realistic way to study the dynamics of gonorrhoea infection as compared to its corresponding deterministic model. Also, the deterministic solution is itself mean of the stochastic solution of the model. For numerical analysis, first, we developed some explicit stochastic methods, but unfortunately, they do not remain consistent in certain situations. Then we proposed an implicitly driven explicit method for stochastic heavy alcohol epidemic model. The proposed method is independent of the choice of parameters and behaves well in all scenarios. So, some… More >

  • ARTICLE

    Access Control Policy Based on Friend Circle

    Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1143-1159, 2020, DOI:10.32604/cmc.2020.04949
    Abstract Nowadays, the scale of the user’s personal social network (personal network, a network of the user and their friends, where the user we call “center user”) is becoming larger and more complex. It is difficult to find a suitable way to manage them automatically. In order to solve this problem, we propose an access control model for social network to protect the privacy of the central users, which achieves the access control accurately and automatically. Based on the hybrid friend circle detection algorithm, we consider the aspects of direct judgment, indirect trust judgment and malicious users, a set of multi-angle… More >

  • ARTICLE

    A Performance Fault Diagnosis Method for SaaS Software Based on GBDT Algorithm

    Kun Zhu1, Shi Ying1, *, Nana Zhang1, Rui Wang1, Yutong Wu1, Gongjin Lan2, Xu Wang2
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1161-1185, 2020, DOI:10.32604/cmc.2020.05247
    Abstract SaaS software that provides services through cloud platform has been more widely used nowadays. However, when SaaS software is running, it will suffer from performance fault due to factors such as the software structural design or complex environments. It is a major challenge that how to diagnose software quickly and accurately when the performance fault occurs. For this challenge, we propose a novel performance fault diagnosis method for SaaS software based on GBDT (Gradient Boosting Decision Tree) algorithm. In particular, we leverage the monitoring mean to obtain the performance log and warning log when the SaaS software system runs, and… More >

  • ARTICLE

    Classification and Research of Skin Lesions Based on Machine Learning

    Jian Liu1, Wantao Wang1, Jie Chen2, *, Guozhong Sun3, Alan Yang4
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1187-1200, 2020, DOI:10.32604/cmc.2020.05883
    Abstract Classification of skin lesions is a complex identification challenge. Due to the wide variety of skin lesions, doctors need to spend a lot of time and effort to judge the lesion image which zoomed through the dermatoscopy. The diagnosis which the algorithm of identifying pathological images assists doctors gets more and more attention. With the development of deep learning, the field of image recognition has made longterm progress. The effect of recognizing images through convolutional neural network models is better than traditional image recognition technology. In this work, we try to classify seven kinds of lesion images by various models… More >

  • ARTICLE

    Automatic Detection of Aortic Dissection Based on Morphology and Deep Learning

    Yun Tan1, #, Ling Tan2, #, Xuyu Xiang1, *, Hao Tang2, *, Jiaohua Qin1, Wenyan Pan1
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1201-1215, 2020, DOI:10.32604/cmc.2020.07127
    Abstract Aortic dissection (AD) is a kind of acute and rapidly progressing cardiovascular disease. In this work, we build a CTA image library with 88 CT cases, 43 cases of aortic dissection and 45 cases of health. An aortic dissection detection method based on CTA images is proposed. ROI is extracted based on binarization and morphology opening operation. The deep learning networks (InceptionV3, ResNet50, and DenseNet) are applied after the preprocessing of the datasets. Recall, F1-score, Matthews correlation coefficient (MCC) and other performance indexes are investigated. It is shown that the deep learning methods have much better performance than the traditional… More >

  • ARTICLE

    Prison Term Prediction on Criminal Case Description with Deep Learning

    Shang Li1, Hongli Zhang1, *, Lin Ye1, Shen Su2, Xiaoding Guo1, Haining Yu1, 3, Binxing Fang1
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1217-1231, 2020, DOI:10.32604/cmc.2020.06787
    Abstract The task of prison term prediction is to predict the term of penalty based on textual fact description for a certain type of criminal case. Recent advances in deep learning frameworks inspire us to propose a two-step method to address this problem. To obtain a better understanding and more specific representation of the legal texts, we summarize a judgment model according to relevant law articles and then apply it in the extraction of case feature from judgment documents. By formalizing prison term prediction as a regression problem, we adopt the linear regression model and the neural network model to train… More >

  • ARTICLE

    Empirical Comparisons of Deep Learning Networks on Liver Segmentation

    Yi Shen1, Victor S. Sheng1, 2, *, Lei Wang1, Jie Duan1, Xuefeng Xi1, Dengyong Zhang3, Ziming Cui1
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1233-1247, 2020, DOI:10.32604/cmc.2020.07450
    Abstract Accurate segmentation of CT images of liver tumors is an important adjunct for the liver diagnosis and treatment of liver diseases. In recent years, due to the great improvement of hard device, many deep learning based methods have been proposed for automatic liver segmentation. Among them, there are the plain neural network headed by FCN and the residual neural network headed by Resnet, both of which have many variations. They have achieved certain achievements in medical image segmentation. In this paper, we firstly select five representative structures, i.e., FCN, U-Net, Segnet, Resnet and Densenet, to investigate their performance on liver… More >

  • ARTICLE

    Research on the Application of Super Resolution Reconstruction Algorithm for Underwater Image

    Tingting Yang1, Shuwen Jia1, Hao Ma2, *
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1249-1258, 2020, DOI:10.32604/cmc.2020.05777
    Abstract Underwater imaging is widely used in ocean, river and lake exploration, but it is affected by properties of water and the optics. In order to solve the lower-resolution underwater image formed by the influence of water and light, the image super-resolution reconstruction technique is applied to the underwater image processing. This paper addresses the problem of generating super-resolution underwater images by convolutional neural network framework technology. We research the degradation model of underwater images, and analyze the lower-resolution factors of underwater images in different situations, and compare different traditional super-resolution image reconstruction algorithms. We further show that the algorithm of… More >

  • ARTICLE

    An Efficient Steganalysis Model Based on Multi-Scale LTP and Derivative Filters

    Yuwei Chen1, 2, Yuling Chen1, *, Yu Yang1, 2, Xinda Hao2, Ning Wang2
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1259-1271, 2020, DOI:10.32604/cmc.2020.06723
    Abstract Local binary pattern (LBP) is one of the most advanced image classification recognition operators and is commonly used in texture detection area. Research indicates that LBP also has a good application prospect in steganalysis. However, the existing LBP-based steganalysis algorithms are only capable to detect the least significant bit (LSB) and the least significant bit matching (LSBM) algorithms. To solve this problem, this paper proposes a steganalysis model called msdeLTP, which is based on multi-scale local ternary patterns (LTP) and derivative filters. The main characteristics of the msdeLTP are as follows: First, to reduce the interference of image content on… More >

  • ARTICLE

    A Novel Bidirectional LSTM and Attention Mechanism Based Neural Network for Answer Selection in Community Question Answering

    Bo Zhang1, Haowen Wang1, #, Longquan Jiang1, Shuhan Yuan2, Meizi Li1, *
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1273-1288, 2020, DOI:10.32604/cmc.2020.07269
    Abstract Deep learning models have been shown to have great advantages in answer selection tasks. The existing models, which employ encoder-decoder recurrent neural network (RNN), have been demonstrated to be effective. However, the traditional RNN-based models still suffer from limitations such as 1) high-dimensional data representation in natural language processing and 2) biased attentive weights for subsequent words in traditional time series models. In this study, a new answer selection model is proposed based on the Bidirectional Long Short-Term Memory (Bi-LSTM) and attention mechanism. The proposed model is able to generate the more effective question-answer pair representation. Experiments on a question… More >

  • ARTICLE

    Phase Field Modelling Allotropic Transformation of Solid Solution

    Yaochan Zhu1, 2, *, Hua Qiu1, Håkan Hallberg3
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1289-1302, 2020, DOI:10.32604/cmc.2020.06281
    Abstract Based on multiphase field conception and integrated with the idea of vectorvalued phase field, a phase field model for typical allotropic transformation of solid solution is proposed. The model takes the non-uniform distribution of grain boundaries of parent phase and crystal orientation into account in proper way, as being illustrated by the simulation of austenite to ferrite transformation in low carbon steel. It is found that the misorientation dependent grain boundary mobility shows strong influence on the formation of ferrite morphology comparing with the weak effect exerted by misorientation dependent grain boundary energy. The evolution of various types of grain… More >

  • ARTICLE

    Wind-Induced Vibration Control for Substation Frame on Viscous Damper

    Bingji Lan1, Kanghao Yan1, *
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1303-1315, 2020, DOI:10.32604/cmc.2020.06584
    Abstract In order to study the wind-induced vibration control effect of the viscous damper on the large-scale substation frame, this paper takes the large-scale 1000 kV substation frame of western Inner Mongolia as an example. The time-history sample of pulsating wind load is simulated by harmonic superposition method based on Matlab software. 6 kinds of viscous damper arrangement schemes have been designed, and SAP2000 finite element software is used for fine modeling and input wind speed time history load for nonlinear time history analysis. The displacement and acceleration of a typical node are the indicators of wind vibration control. The wind-induced… More >

  • ARTICLE

    DDoS Attack Detection via Multi-Scale Convolutional Neural Network

    Jieren Cheng1, 2, Yifu Liu1, *, Xiangyan Tang1, Victor S. Sheng3, Mengyang Li1, Junqi Li1
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1317-1333, 2020, DOI:10.32604/cmc.2020.06177
    Abstract Distributed Denial-of-Service (DDoS) has caused great damage to the network in the big data environment. Existing methods are characterized by low computational efficiency, high false alarm rate and high false alarm rate. In this paper, we propose a DDoS attack detection method based on network flow grayscale matrix feature via multiscale convolutional neural network (CNN). According to the different characteristics of the attack flow and the normal flow in the IP protocol, the seven-tuple is defined to describe the network flow characteristics and converted into a grayscale feature by binary. Based on the network flow grayscale matrix feature (GMF), the… More >

  • ARTICLE

    Consensus of Multi-Agent Systems with Input Constraints Based on Distributed Predictive Control Scheme

    Yueqi Hou1, Xiaolong Liang1, 2, Lyulong He1, Jiaqiang Zhang1, *, Jie Zhu3, Baoxiang Ren3
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1335-1349, 2020, DOI:10.32604/cmc.2020.06869
    Abstract Consensus control of multi-agent systems has attracted compelling attentions from various scientific communities for its promising applications. This paper presents a discrete-time consensus protocol for a class of multi-agent systems with switching topologies and input constraints based on distributed predictive control scheme. The consensus protocol is not only distributed but also depends on the errors of states between agent and its neighbors. We focus mainly on dealing with the input constraints and a distributed model predictive control scheme is developed to achieve stable consensus under the condition that both velocity and acceleration constraints are included simultaneously. The acceleration constraint is… More >

  • ARTICLE

    Service Scheduling Based on Edge Computing for Power Distribution IoT

    Zhu Liu1, 2, *, Xuesong Qiu1, Shuai Zhang2, Siyang Deng2, Guangyi Liu3, *
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1351-1364, 2020, DOI:10.32604/cmc.2020.07334
    Abstract With the growing amounts of multi-micro grids, electric vehicles, smart home, smart cities connected to the Power Distribution Internet of Things (PD-IoT) system, greater computing resource and communication bandwidth are required for power distribution. It probably leads to extreme service delay and data congestion when a large number of data and business occur in emergence. This paper presents a service scheduling method based on edge computing to balance the business load of PD-IoT. The architecture, components and functional requirements of the PD-IoT with edge computing platform are proposed. Then, the structure of the service scheduling system is presented. Further, a… More >

  • ARTICLE

    Defend Against Adversarial Samples by Using Perceptual Hash

    Changrui Liu1, Dengpan Ye1, *, Yueyun Shang2, Shunzhi Jiang1, Shiyu Li1, Yuan Mei1, Liqiang Wang3
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1365-1386, 2020, DOI:10.32604/cmc.2020.07421
    Abstract Image classifiers that based on Deep Neural Networks (DNNs) have been proved to be easily fooled by well-designed perturbations. Previous defense methods have the limitations of requiring expensive computation or reducing the accuracy of the image classifiers. In this paper, we propose a novel defense method which based on perceptual hash. Our main goal is to destroy the process of perturbations generation by comparing the similarities of images thus achieve the purpose of defense. To verify our idea, we defended against two main attack methods (a white-box attack and a black-box attack) in different DNN-based image classifiers and show that,… More >

  • ARTICLE

    Secrecy Outage Probability Analysis Based on Cognitive Decodeand-Forward Relaying

    Ruoyu Su1, 4, Xiaojun Sun1, 3, Fei Ding1, 2, *, Dengyin Zhang1, 2, Hongbo Zhu1, 2, M. I. M. Wahab5
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1387-1395, 2020, DOI:10.32604/cmc.2020.06864
    Abstract Wireless communications have to face to several different security issues in practice due to the nature of broadcast. The information theory is well known to provide efficient approaches to address security issues in wireless communications, which attracts much attention in both industry and academia in recent years. In this paper, inspired by information theory, we study the outage probability of the opportunistic relay selection based on cognitive decode-and-forward relaying with the secrecy consideration. Specifically, the closed-form expression of the outage probability is proposed. Moreover, the asymptotic performance evaluation on the basis of the analytical results is investigated. The simulation results… More >

  • ARTICLE

    Evaluating the Topology Coverage of BGP Monitors

    Shen Su1, Zhihong Tian1, Jing Qiu1, *, Yu Jiang1, *, Yanbin Sun1, Mohan Li1, Dunqiu Fan2, Haining Yu3
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1397-1412, 2020, DOI:10.32604/cmc.2020.06319
    Abstract BGP monitors are currently the main data resource of AS-level topology measurement, and the integrity of measurement result is limited to the location of such BGP monitors. However, there is currently no work to conduct a comprehensive study of the range of measurement results for a single BGP monitor. In this paper, we take the first step to describe the observed topology of each BGP monitor. To that end, we first investigate the construction and theoretical up-limit of the measured topology of a BGP monitor based on the valley-free model, then we evaluate the individual parts of the measured topology… More >

  • ARTICLE

    An Extended Approach for Generating Unitary Matrices for Quantum Circuits

    Zhiqiang Li1, *, Wei Zhang1, Gaoman Zhang1, Juan Dai1, Jiajia Hu1, Marek Perkowski2, Xiaoyu Song2
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1413-1421, 2020, DOI:10.32604/cmc.2020.07483
    Abstract In this paper, we do research on generating unitary matrices for quantum circuits automatically. We consider that quantum circuits are divided into six types, and the unitary operator expressions for each type are offered. Based on this, we propose an algorithm for computing the circuit unitary matrices in detail. Then, for quantum logic circuits composed of quantum logic gates, a faster method to compute unitary matrices of quantum circuits with truth table is introduced as a supplement. Finally, we apply the proposed algorithm to different reversible benchmark circuits based on NCT library (including NOT gate, Controlled-NOT gate, Toffoli gate) and… More >

  • ARTICLE

    A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning

    Jieren Cheng1, 2, Junqi Li2, *, Xiangyan Tang2, Victor S. Sheng3, Chen Zhang2, Mengyang Li2
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1423-1443, 2020, DOI:10.32604/cmc.2020.06176
    Abstract Distributed Denial of Service (DDoS) attack has become one of the most destructive network attacks which can pose a mortal threat to Internet security. Existing detection methods cannot effectively detect early attacks. In this paper, we propose a detection method of DDoS attacks based on generalized multiple kernel learning (GMKL) combining with the constructed parameter R. The super-fusion feature value (SFV) and comprehensive degree of feature (CDF) are defined to describe the characteristic of attack flow and normal flow. A method for calculating R based on SFV and CDF is proposed to select the combination of kernel function and regularization… More >

  • ARTICLE

    CNN Approaches for Classification of Indian Leaf Species Using Smartphones

    M. Vilasini1, *, P. Ramamoorthy2
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1445-1472, 2020, DOI:10.32604/cmc.2020.08857
    Abstract Leaf species identification leads to multitude of societal applications. There is enormous research in the lines of plant identification using pattern recognition. With the help of robust algorithms for leaf identification, rural medicine has the potential to reappear as like the previous decades. This paper discusses CNN based approaches for Indian leaf species identification from white background using smartphones. Variations of CNN models over the features like traditional shape, texture, color and venation apart from the other miniature features of uniformity of edge patterns, leaf tip, margin and other statistical features are explored for efficient leaf classification. More >

  • ARTICLE

    Investigating the Use of Email Application in Illiterate and SemiIlliterate Population

    Sadeeq Jan1, Imran Maqsood2, Salman Ahmed3, *, Zahid Wadud3, Iftikhar Ahmad4
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1473-1486, 2020, DOI:10.32604/cmc.2020.08917
    Abstract The use of electronic communication has been significantly increased over the last few decades. Email is one of the most well-known means of electronic communication. Traditional email applications are widely used by a large population; however, illiterate and semi-illiterate people face challenges in using them. A major population of Pakistan is illiterate that has little or no practice of computer usage. In this paper, we investigate the challenges of using email applications by illiterate and semiilliterate people. In addition, we also propose a solution by developing an application tailored to the needs of illiterate/semi-illiterate people. Research shows that illiterate people… More >

  • RETRACTION

    Retraction Notice to: Implementation System of Human Eye Tracking Algorithm Based on FPGA

    Zhong Liu1, 2, Xin’an Wang1, Chengjun Sun1, Ken Lu3
    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1487-1487, 2020, DOI:10.32604/cmc.2020.04597
    Abstract This article has no abstract. More >

Share Link

WeChat scan