Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Secure and Optimal LOADng Routing for IoT with Composite Routing Metric

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 655-669, 2023, DOI:10.32604/cmc.2023.032207

    Abstract Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things (IoT) network. To overcome this challenge, a secure Lightweight On-demand Ad hoc Distance-vector—Next Generation (LOADng) Routing Protocol is proposed in this paper. As the LOADng protocol is the second version of Ad Hoc On-Demand Distance Vector (AODV) protocol, it retains most of the basic functionality and characteristics of AODV. During the route discovery process, the cyclic shift transposition algorithm (CSTA) is used to encrypt the control packets of the LOADng protocol to improve its security. CSTA approach only… More >

  • Open Access

    ARTICLE

    Hybrid Global Optimization Algorithm for Feature Selection

    Ahmad Taher Azar1,2,*, Zafar Iqbal Khan2, Syed Umar Amin2, Khaled M. Fouad1,3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2021-2037, 2023, DOI:10.32604/cmc.2023.032183

    Abstract This paper proposes Parallelized Linear Time-Variant Acceleration Coefficients and Inertial Weight of Particle Swarm Optimization algorithm (PLTVACIW-PSO). Its designed has introduced the benefits of Parallel computing into the combined power of TVAC (Time-Variant Acceleration Coefficients) and IW (Inertial Weight). Proposed algorithm has been tested against linear, non-linear, traditional, and multiswarm based optimization algorithms. An experimental study is performed in two stages to assess the proposed PLTVACIW-PSO. Phase I uses 12 recognized Standard Benchmarks methods to evaluate the comparative performance of the proposed PLTVACIW-PSO vs. IW based Particle Swarm Optimization (PSO) algorithms, TVAC based PSO algorithms, traditional PSO, Genetic algorithms (GA),… More >

  • Open Access

    ARTICLE

    Impact of Portable Executable Header Features on Malware Detection Accuracy

    Hasan H. Al-Khshali1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 153-178, 2023, DOI:10.32604/cmc.2023.032182

    Abstract One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an exclusive set of 29 features was collected from trusted implementations, this set was used as a baseline to analyze the presented work in this research. A Decision Tree (DT) and Neural Network Multi-Layer Perceptron (NN-MLPC) algorithms were utilized during this work. Both algorithms were chosen after testing a few diverse procedures. This work implements a method of subgrouping features to answer questions such… More >

  • Open Access

    ARTICLE

    A Two-Phase Paradigm for Joint Entity-Relation Extraction

    Bin Ji1, Hao Xu1, Jie Yu1, Shasha Li1, Jun Ma1, Yuke Ji2,*, Huijun Liu1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1303-1318, 2023, DOI:10.32604/cmc.2023.032168

    Abstract An exhaustive study has been conducted to investigate span-based models for the joint entity and relation extraction task. However, these models sample a large number of negative entities and negative relations during the model training, which are essential but result in grossly imbalanced data distributions and in turn cause suboptimal model performance. In order to address the above issues, we propose a two-phase paradigm for the span-based joint entity and relation extraction, which involves classifying the entities and relations in the first phase, and predicting the types of these entities and relations in the second phase. The two-phase paradigm enables… More >

  • Open Access

    ARTICLE

    Multiway Relay Based Framework for Network Coding in Multi-Hop WSNs

    Vinod Kumar Menaria1, Anand Nayyar2, Sandeep Kumar3, Ketan Kotecha4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1199-1216, 2023, DOI:10.32604/cmc.2023.032162

    Abstract In today’s information technology (IT) world, the multi-hop wireless sensor networks (MHWSNs) are considered the building block for the Internet of Things (IoT) enabled communication systems for controlling everyday tasks of organizations and industry to provide quality of service (QoS) in a stipulated time slot to end-user over the Internet. Smart city (SC) is an example of one such application which can automate a group of civil services like automatic control of traffic lights, weather prediction, surveillance, etc., in our daily life. These IoT-based networks with multi-hop communication and multiple sink nodes provide efficient communication in terms of performance parameters… More >

  • Open Access

    ARTICLE

    Dipper Throated Optimization for Detecting Black-Hole Attacks in MANETs

    Reem Alkanhel1, El-Sayed M. El-kenawy2,3, Abdelaziz A. Abdelhamid4,5, Abdelhameed Ibrahim6, Mostafa Abotaleb7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1905-1921, 2023, DOI:10.32604/cmc.2023.032157

    Abstract In terms of security and privacy, mobile ad-hoc network (MANET) continues to be in demand for additional debate and development. As more MANET applications become data-oriented, implementing a secure and reliable data transfer protocol becomes a major concern in the architecture. However, MANET’s lack of infrastructure, unpredictable topology, and restricted resources, as well as the lack of a previously permitted trust relationship among connected nodes, contribute to the attack detection burden. A novel detection approach is presented in this paper to classify passive and active black-hole attacks. The proposed approach is based on the dipper throated optimization (DTO) algorithm, which… More >

  • Open Access

    ARTICLE

    CVIP-Net: A Convolutional Neural Network-Based Model for Forensic Radiology Image Classification

    Syeda Naila Batool, Ghulam Gilanie*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1319-1332, 2023, DOI:10.32604/cmc.2023.032121

    Abstract Automated and autonomous decisions of image classification systems have essential applicability in this modern age even. Image-based decisions are commonly taken through explicit or auto-feature engineering of images. In forensic radiology, auto decisions based on images significantly affect the automation of various tasks. This study aims to assist forensic radiology in its biological profile estimation when only bones are left. A benchmarked dataset Radiology Society of North America (RSNA) has been used for research and experiments. Additionally, a locally developed dataset has also been used for research and experiments to cross-validate the results. A Convolutional Neural Network (CNN)-based model named… More >

  • Open Access

    ARTICLE

    A Healthcare System for COVID19 Classification Using Multi-Type Classical Features Selection

    Muhammad Attique Khan1, Majed Alhaisoni2, Muhammad Nazir1, Abdullah Alqahtani3, Adel Binbusayyis3, Shtwai Alsubai3, Yunyoung Nam4, Byeong-Gwon Kang4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1393-1412, 2023, DOI:10.32604/cmc.2023.032064

    Abstract The coronavirus (COVID19), also known as the novel coronavirus, first appeared in December 2019 in Wuhan, China. After that, it quickly spread throughout the world and became a disease. It has significantly impacted our everyday lives, the national and international economies, and public health. However, early diagnosis is critical for prompt treatment and reducing trauma in the healthcare system. Clinical radiologists primarily use chest X-rays, and computerized tomography (CT) scans to test for pneumonia infection. We used Chest CT scans to predict COVID19 pneumonia and healthy scans in this study. We proposed a joint framework for prediction based on classical… More >

  • Open Access

    ARTICLE

    COVID-19 Outbreak Prediction by Using Machine Learning Algorithms

    Tahir Sher1, Abdul Rehman2, Dongsun Kim2,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1561-1574, 2023, DOI:10.32604/cmc.2023.032020

    Abstract COVID-19 is a contagious disease and its several variants put under stress in all walks of life and economy as well. Early diagnosis of the virus is a crucial task to prevent the spread of the virus as it is a threat to life in the whole world. However, with the advancement of technology, the Internet of Things (IoT) and social IoT (SIoT), the versatile data produced by smart devices helped a lot in overcoming this lethal disease. Data mining is a technique that could be used for extracting useful information from massive data. In this study, we used five… More >

  • Open Access

    ARTICLE

    Real-Time Multiple Guava Leaf Disease Detection from a Single Leaf Using Hybrid Deep Learning Technique

    Javed Rashid1,2, Imran Khan1, Ghulam Ali3, Shafiq ur Rehman4, Fahad Alturise5, Tamim Alkhalifah5,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1235-1257, 2023, DOI:10.32604/cmc.2023.032005

    Abstract The guava plant has achieved viable significance in subtropics and tropics owing to its flexibility to climatic environments, soil conditions and higher human consumption. It is cultivated in vast areas of Asian and Non-Asian countries, including Pakistan. The guava plant is vulnerable to diseases, specifically the leaves and fruit, which result in massive crop and profitability losses. The existing plant leaf disease detection techniques can detect only one disease from a leaf. However, a single leaf may contain symptoms of multiple diseases. This study has proposed a hybrid deep learning-based framework for the real-time detection of multiple diseases from a… More >

Displaying 1341-1350 on page 135 of 5350. Per Page