Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    Attention-Based Deep Learning Model for Early Detection of Parkinson's Disease

    Mohd Sadiq1, Mohd Tauheed Khan2,*, Sarfaraz Masood3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5183-5200, 2022, DOI:10.32604/cmc.2022.020531 - 14 January 2022

    Abstract Parkinson's disease (PD), classified under the category of a neurological syndrome, affects the brain of a person which leads to the motor and non-motor symptoms. Among motor symptoms, one of the major disabling symptom is Freezing of Gait (FoG) that affects the daily standard of living of PD patients. Available treatments target to improve the symptoms of PD. Detection of PD at the early stages is an arduous task due to being indistinguishable from a healthy individual. This work proposed a novel attention-based model for the detection of FoG events and PD, and measuring the… More >

  • Open Access

    ARTICLE

    E-mail Spam Classification Using Grasshopper Optimization Algorithm and Neural Networks

    Sanaa A. A. Ghaleb1,3,4, Mumtazimah Mohamad1, Syed Abdullah Fadzli1, Waheed A.H.M. Ghanem2,3,4,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4749-4766, 2022, DOI:10.32604/cmc.2022.020472 - 14 January 2022

    Abstract Spam has turned into a big predicament these days, due to the increase in the number of spam emails, as the recipient regularly receives piles of emails. Not only is spam wasting users’ time and bandwidth. In addition, it limits the storage space of the email box as well as the disk space. Thus, spam detection is a challenge for individuals and organizations alike. To advance spam email detection, this work proposes a new spam detection approach, using the grasshopper optimization algorithm (GOA) in training a multilayer perceptron (MLP) classifier for categorizing emails as ham More >

  • Open Access

    ARTICLE

    Hybrid In-Vehicle Background Noise Reduction for Robust Speech Recognition: The Possibilities of Next Generation 5G Data Networks

    Radek Martinek1, Jan Baros1, Rene Jaros1, Lukas Danys1,*, Jan Nedoma2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4659-4676, 2022, DOI:10.32604/cmc.2022.019904 - 14 January 2022

    Abstract This pilot study focuses on employment of hybrid LMS-ICA system for in-vehicle background noise reduction. Modern vehicles are nowadays increasingly supporting voice commands, which are one of the pillars of autonomous and SMART vehicles. Robust speaker recognition for context-aware in-vehicle applications is limited to a certain extent by in-vehicle background noise. This article presents the new concept of a hybrid system, which is implemented as a virtual instrument. The highly modular concept of the virtual car used in combination with real recordings of various driving scenarios enables effective testing of the investigated methods of in-vehicle More >

  • Open Access

    ARTICLE

    Building a Trust Model for Secure Data Sharing (TM-SDS) in Edge Computing Using HMAC Techniques

    K. Karthikeyan*, P. Madhavan

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4183-4197, 2022, DOI:10.32604/cmc.2022.019802 - 14 January 2022

    Abstract With the rapid growth of Internet of Things (IoT) based models, and the lack amount of data makes cloud computing resources insufficient. Hence, edge computing-based techniques are becoming more popular in present research domains that makes data storage, and processing effective at the network edges. There are several advanced features like parallel processing and data perception are available in edge computing. Still, there are some challenges in providing privacy and data security over networks. To solve the security issues in Edge Computing, Hash-based Message Authentication Code (HMAC) algorithm is used to provide solutions for preserving More >

  • Open Access

    ARTICLE

    Profiling Casualty Severity Levels of Road Accident Using Weighted Majority Voting

    Saba Awan1, Zahid Mehmood2,*, Hassan Nazeer Chaudhry3, Usman Tariq4, Amjad Rehman5, Tanzila Saba5, Muhammad Rashid6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4609-4626, 2022, DOI:10.32604/cmc.2022.019404 - 14 January 2022

    Abstract To determine the individual circumstances that account for a road traffic accident, it is crucial to consider the unplanned connections amongst various factors related to a crash that results in high casualty levels. Analysis of the road accident data concentrated mainly on categorizing accidents into different types using individually built classification methods which limit the prediction accuracy and fitness of the model. In this article, we proposed a multi-model hybrid framework of the weighted majority voting (WMV) scheme with parallel structure, which is designed by integrating individually implemented multinomial logistic regression (MLR) and multilayer perceptron… More >

  • Open Access

    ARTICLE

    Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

    Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5039-5059, 2022, DOI:10.32604/cmc.2022.019289 - 14 January 2022

    Abstract Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive… More >

  • Open Access

    ARTICLE

    Location Prediction for Improved Human Safety at Complex Environments

    S. G. Siddharth1,*, G. M. Tamilselvan2, C. Venkatesh3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5219-5234, 2022, DOI:10.32604/cmc.2022.019252 - 14 January 2022

    Abstract In underground operation, primary consideration is safety. In recent decades, for minimizing accident and for preventing major economic losses and casualties, wireless sensors are used by various large mineral countries through early warning. The Improved DV-Hop Localization Algorithm (IDVHLA) is used in existing works for doing this. However, accurate anchor node detection is impossible in existing works with the malicious nodes presence, where there won't be any accurate sharing of anchor node's location information. In case of emergency situation, faster communication is a highly complex one. A technique called Modified Distance Vector Hop based Multipath… More >

  • Open Access

    ARTICLE

    PSO Based Multi-Objective Approach for Controlling PID Controller

    Harsh Goud1, Prakash Chandra Sharma2, Kashif Nisar3, Ag. Asri Ag. Ibrahim3,*, Muhammad Reazul Haque4, Narendra Singh Yadav2, Pankaj Swarnkar5, Manoj Gupta6, Laxmi Chand6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4409-4423, 2022, DOI:10.32604/cmc.2022.019217 - 14 January 2022

    Abstract CSTR (Continuous stirred tank reactor) is employed in process control and chemical industries to improve response characteristics and system efficiency. It has a highly nonlinear characteristic that includes complexities in its control and design. Dynamic performance is compassionate to change in system parameters which need more effort for planning a significant controller for CSTR. The reactor temperature changes in either direction from the defined reference value. It is important to note that the intensity of chemical actions inside the CSTR is dependent on the various levels of temperature, and deviation from reference values may cause… More >

  • Open Access

    ARTICLE

    New 5G Kaiser-Based Windowing to Reduce Out of Band Emission

    Ahmed Hammoodi1, Lukman Audah1 , Laith Al-Jobouri2,*, Mazin Abed Mohammed3, Mustafa S. Aljumaily4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2721-2738, 2022, DOI:10.32604/cmc.2022.020091 - 14 December 2021

    Abstract OFDM based waveforms are considered as the main part of the latest cellular communications standard (namely 5G). Many inherited problems from the OFDM-Based LTE are still under investigation. Getting rid of the out of band emissions is one of these problems. Ensuring low out of band emission (OOBE) is deemed as one of the most critical challenges to support development of future technologies such as 6G and beyond. Universal Filtered Multi Carrier (UFMC) has been considered as one of the candidate waveforms for the 5G communications due to its robustness against Inter Carrier Interference (ICI)… More >

  • Open Access

    ARTICLE

    Optimizing Energy Conservation in V2X Communications for 5G Networks

    Arif Husen1,2, Abid Soahil1,*, Mohammad Hijji2, Muhammad Hasanain Chaudary1, Farooq Ahmed1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3479-3495, 2022, DOI:10.32604/cmc.2022.023840 - 07 December 2021

    Abstract The smart vehicles are one of critical enablers for automated services in smart cities to provide intelligent transportation means without human intervention. In order to fulfil requirements, Vehicle-to-Anything(V2X) communications aims to manage massive connectivity and high traffic load on base stations and extend the range over multiple hops in 5G networks. However, V2X networking faces several challenges from dynamic topology caused by high velocity of nodes and routing overhead that degrades the network performance and increases energy consumption. The existing routing scheme for V2X networking lacks energy efficiency and scalability for high velocity nodes with More >

Displaying 4171-4180 on page 418 of 7234. Per Page