Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    Improved Hybrid Deep Collaborative Filtering Approach for True Recommendations

    Muhammad Ibrahim1, Imran Sarwar Bajwa1, Nadeem Sarwar2,*, Haroon Abdul Waheed3, Muhammad Zulkifl Hasan4, Muhammad Zunnurain Hussain4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5301-5317, 2023, DOI:10.32604/cmc.2023.032856 - 28 December 2022

    Abstract Recommendation services become an essential and hot research topic for researchers nowadays. Social data such as Reviews play an important role in the recommendation of the products. Improvement was achieved by deep learning approaches for capturing user and product information from a short text. However, such previously used approaches do not fairly and efficiently incorporate users’ preferences and product characteristics. The proposed novel Hybrid Deep Collaborative Filtering (HDCF) model combines deep learning capabilities and deep interaction modeling with high performance for True Recommendations. To overcome the cold start problem, the new overall rating is generated… More >

  • Open Access

    ARTICLE

    A Coprocessor Architecture for 80/112-bit Security Related Applications

    Muhammad Rashid*, Majid Alotaibi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6849-6865, 2023, DOI:10.32604/cmc.2023.032849 - 28 December 2022

    Abstract We have proposed a flexible coprocessor key-authentication architecture for 80/112-bit security-related applications over field by employing Elliptic-curve Diffie Hellman (ECDH) protocol. Towards flexibility, a serial input/output interface is used to load/produce secret, public, and shared keys sequentially. Moreover, to reduce the hardware resources and to achieve a reasonable time for cryptographic computations, we have proposed a finite field digit-serial multiplier architecture using combined shift and accumulate techniques. Furthermore, two finite-state-machine controllers are used to perform efficient control functionalities. The proposed coprocessor architecture over and is programmed using Verilog and then implemented on Xilinx Virtex-7 FPGA More >

  • Open Access

    ARTICLE

    Generating Time-Series Data Using Generative Adversarial Networks for Mobility Demand Prediction

    Subhajit Chatterjee1, Yung-Cheol Byun2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5507-5525, 2023, DOI:10.32604/cmc.2023.032843 - 28 December 2022

    Abstract The increasing penetration rate of electric kickboard vehicles has been popularized and promoted primarily because of its clean and efficient features. Electric kickboards are gradually growing in popularity in tourist and education-centric localities. In the upcoming arrival of electric kickboard vehicles, deploying a customer rental service is essential. Due to its free-floating nature, the shared electric kickboard is a common and practical means of transportation. Relocation plans for shared electric kickboards are required to increase the quality of service, and forecasting demand for their use in a specific region is crucial. Predicting demand accurately with… More >

  • Open Access

    ARTICLE

    Efficient Body-Transfer Wheelchair for Assisting Functionally Impaired People

    Chyi-Yeu Lin1,2,3, Bahrudin1, Salman Masroor1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4881-4900, 2023, DOI:10.32604/cmc.2023.032837 - 28 December 2022

    Abstract Functionally impaired people always have difficulty accomplishing activities of daily living. In this regard, tasks including toileting and bathing have a higher prevalence rate of injuries and greater risk of falling. In this study, a body-transfer wheelchair was developed to assist people in transferring from bed to wheelchair for bathing, and toileting. The body-transfer wheelchair is a semi-automatic wheelchair that has features such as a controlled leg and backrest, linkage commode slot, and height adjustment. The wheelchair consists of a seat and a main frame that can be detached to enable bathtub transfer. This mechanism… More >

  • Open Access

    ARTICLE

    Shared Cache Based on Content Addressable Memory in a Multi-Core Architecture

    Allam Abumwais*, Mahmoud Obaid

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4951-4963, 2023, DOI:10.32604/cmc.2023.032822 - 28 December 2022

    Abstract Modern shared-memory multi-core processors typically have shared Level 2 (L2) or Level 3 (L3) caches. Cache bottlenecks and replacement strategies are the main problems of such architectures, where multiple cores try to access the shared cache simultaneously. The main problem in improving memory performance is the shared cache architecture and cache replacement. This paper documents the implementation of a Dual-Port Content Addressable Memory (DPCAM) and a modified Near-Far Access Replacement Algorithm (NFRA), which was previously proposed as a shared L2 cache layer in a multi-core processor. Standard Performance Evaluation Corporation (SPEC) Central Processing Unit (CPU)… More >

  • Open Access

    ARTICLE

    IoT Based Smart Framework Monitoring System for Power Station

    Arodh Lal Karn1, Panneer Selvam Manickam2, R. Saravanan3,*, Roobaea Alroobaea4, Jasem Almotiri4, Sudhakar Sengan5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6019-6037, 2023, DOI:10.32604/cmc.2023.032791 - 28 December 2022

    Abstract Power Station (PS) monitoring systems are becoming critical, ensuring electrical safety through early warning, and in the event of a PS fault, the power supply is quickly disconnected. Traditional technologies are based on relays and don’t have a way to capture and store user data when there is a problem. The proposed framework is designed with the goal of providing smart environments for protecting electrical types of equipment. This paper proposes an Internet of Things (IoT)-based Smart Framework (SF) for monitoring the Power Devices (PD) which are being used in power substations. A Real-Time Monitoring… More >

  • Open Access

    ARTICLE

    Automated Autism Spectral Disorder Classification Using Optimal Machine Learning Model

    Hanan Abdullah Mengash1, Hamed Alqahtani2, Mohammed Maray3, Mohamed K. Nour4, Radwa Marzouk1, Mohammed Abdullah Al-Hagery5, Heba Mohsen6, Mesfer Al Duhayyim7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5251-5265, 2023, DOI:10.32604/cmc.2023.032729 - 28 December 2022

    Abstract Autism Spectrum Disorder (ASD) refers to a neuro-disorder where an individual has long-lasting effects on communication and interaction with others. Advanced information technology which employs artificial intelligence (AI) model has assisted in early identify ASD by using pattern detection. Recent advances of AI models assist in the automated identification and classification of ASD, which helps to reduce the severity of the disease. This study introduces an automated ASD classification using owl search algorithm with machine learning (ASDC-OSAML) model. The proposed ASDC-OSAML model majorly focuses on the identification and classification of ASD. To attain this, the More >

  • Open Access

    ARTICLE

    Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment

    Fatma S. Alrayes1, Nuha Alshuqayran2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Abdullah Mohamed5, Amgad Atta Abdelmageed Mohammed6, Gouse Pasha Mohammed6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6737-6753, 2023, DOI:10.32604/cmc.2023.032591 - 28 December 2022

    Abstract Recently, Internet of Things (IoT) devices have developed at a faster rate and utilization of devices gets considerably increased in day to day lives. Despite the benefits of IoT devices, security issues remain challenging owing to the fact that most devices do not include memory and computing resources essential for satisfactory security operation. Consequently, IoT devices are vulnerable to different kinds of attacks. A single attack on networking system/device could result in considerable data to data security and privacy. But the emergence of artificial intelligence (AI) techniques can be exploited for attack detection and classification… More >

  • Open Access

    ARTICLE

    A Novel Efficient Patient Monitoring FER System Using Optimal DL-Features

    Mousa Alhajlah*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6161-6175, 2023, DOI:10.32604/cmc.2023.032505 - 28 December 2022

    Abstract Automated Facial Expression Recognition (FER) serves as the backbone of patient monitoring systems, security, and surveillance systems. Real-time FER is a challenging task, due to the uncontrolled nature of the environment and poor quality of input frames. In this paper, a novel FER framework has been proposed for patient monitoring. Preprocessing is performed using contrast-limited adaptive enhancement and the dataset is balanced using augmentation. Two lightweight efficient Convolution Neural Network (CNN) models MobileNetV2 and Neural search Architecture Network Mobile (NasNetMobile) are trained, and feature vectors are extracted. The Whale Optimization Algorithm (WOA) is utilized to More >

  • Open Access

    ARTICLE

    Process Mining Discovery Techniques for Software Architecture Lightweight Evaluation Framework

    Mahdi Sahlabadi, Ravie Chandren Muniyandi, Zarina Shukur, Faizan Qamar*, Syed Hussain Ali Kazmi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5777-5797, 2023, DOI:10.32604/cmc.2023.032504 - 28 December 2022

    Abstract This research recognizes the limitation and challenges of adapting and applying Process Mining as a powerful tool and technique in the Hypothetical Software Architecture (SA) Evaluation Framework with the features and factors of lightweightness. Process mining deals with the large-scale complexity of security and performance analysis, which are the goals of SA evaluation frameworks. As a result of these conjectures, all Process Mining researches in the realm of SA are thoroughly reviewed, and nine challenges for Process Mining Adaption are recognized. Process mining is embedded in the framework and to boost the quality of the… More >

Displaying 3011-3020 on page 302 of 7234. Per Page