Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,267)
  • Open Access

    ARTICLE

    The Impact of Check Bits on the Performance of Bloom Filter

    Rehan Ullah Khan1, Ali Mustafa Qamar2,*, Suliman A. Alsuhibany2, Mohammed Alsuhaibani2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6037-6046, 2022, DOI:10.32604/cmc.2022.031626

    Abstract Bloom filter (BF) is a space-and-time efficient probabilistic technique that helps answer membership queries. However, BF faces several issues. The problems with traditional BF are generally two. Firstly, a large number of false positives can return wrong content when the data is queried. Secondly, the large size of BF is a bottleneck in the speed of querying and thus uses large memory. In order to solve the above two issues, in this article, we propose the check bits concept. From the implementation perspective, in the check bits approach, before saving the content value in the BF, we obtain the binary… More >

  • Open Access

    ARTICLE

    Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model

    Hadil Shaiba1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Radwa Marzouk4, Heba Mohsen5, Manar Ahmed Hamza6,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6425-6441, 2022, DOI:10.32604/cmc.2022.031625

    Abstract Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords, account identifiers, bank details, etc. In general, these kinds of cyberattacks are made at users through phone calls, emails, or instant messages. The anti-phishing techniques, currently under use, are mainly based on source code features that need to scrape the webpage content. In third party services, these techniques check the classification procedure of phishing Uniform Resource Locators (URLs). Even though Machine Learning (ML) techniques have been lately utilized in the identification of phishing, they still need to undergo feature engineering since… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment

    Fahad F. Alruwaili*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5809-5824, 2022, DOI:10.32604/cmc.2022.031613

    Abstract Internet of Things (IoT) is one of the hottest research topics in recent years, thanks to its dynamic working mechanism that integrates physical and digital world into a single system. IoT technology, applied in industries, is termed as Industrial IoT (IIoT). IIoT has been found to be highly susceptible to attacks from adversaries, based on the difficulties observed in IIoT and its increased dependency upon internet and communication network. Intentional or accidental attacks on these approaches result in catastrophic effects like power outage, denial of vital health services, disruption to civil service, etc., Thus, there is a need exists to… More >

  • Open Access

    ARTICLE

    Two-Fold and Symmetric Repeatability Rates for Comparing Keypoint Detectors

    Ibrahim El rube'*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6495-6511, 2022, DOI:10.32604/cmc.2022.031602

    Abstract The repeatability rate is an important measure for evaluating and comparing the performance of keypoint detectors. Several repeatability rate measurements were used in the literature to assess the effectiveness of keypoint detectors. While these repeatability rates are calculated for pairs of images, the general assumption is that the reference image is often known and unchanging compared to other images in the same dataset. So, these rates are asymmetrical as they require calculations in only one direction. In addition, the image domain in which these computations take place substantially affects their values. The presented scatter diagram plots illustrate how these directional… More >

  • Open Access

    ARTICLE

    Optimization of Adaptive Fuzzy Controller for Maximum Power Point Tracking Using Whale Algorithm

    Mehrdad Ahmadi Kamarposhti1,*, Hassan Shokouhandeh2, Ilhami Colak3, Kei Eguchi4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5041-5061, 2022, DOI:10.32604/cmc.2022.031583

    Abstract The advantage of fuzzy controllers in working with inaccurate and nonlinear inputs is that there is no need for an accurate mathematical model and fast convergence and minimal fluctuations in the maximum power point detector. The capability of online fuzzy tracking systems is maximum power, resistance to radiation and temperature changes, and no need for external sensors to measure radiation intensity and temperature. However, the most important issue is the constant changes in the amount of sunlight that cause the maximum power point to be constantly changing. The controller used in the maximum power point tracking (MPPT) circuit must be… More >

  • Open Access

    ARTICLE

    Optimal FOPID Controllers for LFC Including Renewables by Bald Eagle Optimizer

    Ahmed M. Agwa1, Mohamed Abdeen2, Shaaban M. Shaaban1,3,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5525-5541, 2022, DOI:10.32604/cmc.2022.031580

    Abstract In this study, a bald eagle optimizer (BEO) is used to get optimal parameters of the fractional-order proportional–integral–derivative (FOPID) controller for load frequency control (LFC). Since BEO takes only a very short time in finding the optimal solution, it is selected for designing the FOPID controller that improves the system stability and maintains the frequency within a satisfactory range at different loads. Simulations and demonstrations are carried out using MATLAB-R2020b. The performance of the BEO-FOPID controller is evaluated using a two-zone interlinked power system at different loads and under uncertainty of wind and solar energies. The robustness of the BEO-FOPID… More >

  • Open Access

    ARTICLE

    Intelligent Slime Mould Optimization with Deep Learning Enabled Traffic Prediction in Smart Cities

    Manar Ahmed Hamza1,*, Hadeel Alsolai2, Jaber S. Alzahrani3, Mohammad Alamgeer4,5, Mohamed Mahmoud Sayed6, Abu Sarwar Zamani1, Ishfaq Yaseen1, Abdelwahed Motwakel1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6563-6577, 2022, DOI:10.32604/cmc.2022.031541

    Abstract Intelligent Transportation System (ITS) is one of the revolutionary technologies in smart cities that helps in reducing traffic congestion and enhancing traffic quality. With the help of big data and communication technologies, ITS offers real-time investigation and highly-effective traffic management. Traffic Flow Prediction (TFP) is a vital element in smart city management and is used to forecast the upcoming traffic conditions on transportation network based on past data. Neural Network (NN) and Machine Learning (ML) models are widely utilized in resolving real-time issues since these methods are capable of dealing with adaptive data over a period of time. Deep Learning… More >

  • Open Access

    ARTICLE

    Asymmetric Patch Element Reflectarray with Dual Linear and Dual Circular Polarization

    M. Hashim Dahri1, M. H. Jamaluddin2, M. Inam3, M. R. Kamarudin4, F. C. Seman4, A. Y. I. Ashyap4, Z. A. Shamsan5,*, K. Almuhanna5, F. Alorifi5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6085-6101, 2022, DOI:10.32604/cmc.2022.031532

    Abstract A reflectarray antenna consisting of asymmetrical patch elements is proposed, which is capable of producing dual linear and dual circular polarized operation at 26 GHz frequency. The main purpose of this design is to support four different polarizations using the same patch element. The proposed reflectarray has a single layer configuration with a linearly polarized feed and circular ring slots in the ground plane. Asymmetric patch element is designed from a square patch element by tilting its one vertical side to some optimized inclination. A wide reflection phase range of 600° is obtained with the asymmetric patch element during unit cell… More >

  • Open Access

    ARTICLE

    Active Authentication Protocol for IoV Environment with Distributed Servers

    Saravanan Manikandan1, Mosiur Rahaman1, Yu-Lin Song1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5789-5808, 2022, DOI:10.32604/cmc.2022.031490

    Abstract The Internet of Vehicles (IoV) has evolved as an advancement over the conventional Vehicular Ad-hoc Networks (VANETs) in pursuing a more optimal intelligent transportation system that can provide various intelligent solutions and enable a variety of applications for vehicular traffic. Massive volumes of data are produced and communicated wirelessly among the different relayed entities in these vehicular networks, which might entice adversaries and endanger the system with a wide range of security attacks. To ensure the security of such a sensitive network, we proposed a distributed authentication mechanism for IoV based on blockchain technology as a distributed ledger with an… More >

  • Open Access

    ARTICLE

    A Novel Optimized Language-Independent Text Summarization Technique

    Hanan A. Hosni Mahmoud1,*, Alaaeldin M. Hafez2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5121-5136, 2022, DOI:10.32604/cmc.2022.031485

    Abstract A substantial amount of textual data is present electronically in several languages. These texts directed the gear to information redundancy. It is essential to remove this redundancy and decrease the reading time of these data. Therefore, we need a computerized text summarization technique to extract relevant information from group of text documents with correlated subjects. This paper proposes a language-independent extractive summarization technique. The proposed technique presents a clustering-based optimization technique. The clustering technique determines the main subjects of the text, while the proposed optimization technique minimizes redundancy, and maximizes significance. Experiments are devised and evaluated using BillSum dataset for… More >

Displaying 1361-1370 on page 137 of 5267. Per Page