Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Feature Extraction and Classification of Photovoltaic Panels Based on Convolutional Neural Network

    S. Prabhakaran1,*, R. Annie Uthra1, J. Preetharoselyn2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1437-1455, 2023, DOI:10.32604/cmc.2023.032300

    Abstract Photovoltaic (PV) boards are a perfect way to create eco-friendly power from daylight. The defects in the PV panels are caused by various conditions; such defective PV panels need continuous monitoring. The recent development of PV panel monitoring systems provides a modest and viable approach to monitoring and managing the condition of the PV plants. In general, conventional procedures are used to identify the faulty modules earlier and to avoid declines in power generation. The existing deep learning architectures provide the required output to predict the faulty PV panels with less accuracy and a more time-consuming process. To increase the… More >

  • Open Access

    ARTICLE

    A Novel Siamese Network for Few/Zero-Shot Handwritten Character Recognition Tasks

    Nagwa Elaraby*, Sherif Barakat, Amira Rezk

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1837-1854, 2023, DOI:10.32604/cmc.2023.032288

    Abstract Deep metric learning is one of the recommended methods for the challenge of supporting few/zero-shot learning by deep networks. It depends on building a Siamese architecture of two homogeneous Convolutional Neural Networks (CNNs) for learning a distance function that can map input data from the input space to the feature space. Instead of determining the class of each sample, the Siamese architecture deals with the existence of a few training samples by deciding if the samples share the same class identity or not. The traditional structure for the Siamese architecture was built by forming two CNNs from scratch with randomly… More >

  • Open Access

    ARTICLE

    Filter and Embedded Feature Selection Methods to Meet Big Data Visualization Challenges

    Kamal A. ElDahshan, AbdAllah A. AlHabshy, Luay Thamer Mohammed*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 817-839, 2023, DOI:10.32604/cmc.2023.032287

    Abstract This study focuses on meeting the challenges of big data visualization by using of data reduction methods based the feature selection methods. To reduce the volume of big data and minimize model training time (Tt) while maintaining data quality. We contributed to meeting the challenges of big data visualization using the embedded method based “Select from model (SFM)” method by using “Random forest Importance algorithm (RFI)” and comparing it with the filter method by using “Select percentile (SP)” method based chi square “Chi2” tool for selecting the most important features, which are then fed into a classification process using the… More >

  • Open Access

    ARTICLE

    Optimized Evaluation of Mobile Base Station by Modern Topological Invariants

    Khalid Hamid1, Muhammad Waseem Iqbal2,*, Muhammad Usman Ashraf3, Ahmed Mohammed Alghamdi4, Adel A. Bahaddad5, Khalid Ali Almarhabi6

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 363-378, 2023, DOI:10.32604/cmc.2023.032271

    Abstract Due to a tremendous increase in mobile traffic, mobile operators have started to restructure their networks to offload their traffic. New research directions will lead to fundamental changes in the design of future Fifth-generation (5G) cellular networks. For the formal reason, the study solves the physical network of the mobile base station for the prediction of the best characteristics to develop an enhanced network with the help of graph theory. Any number that can be uniquely calculated by a graph is known as a graph invariant. During the last two decades, innumerable numerical graph invariants have been portrayed and used… More >

  • Open Access

    ARTICLE

    Real Objects Understanding Using 3D Haptic Virtual Reality for E-Learning Education

    Samia Allaoua Chelloug1,*, Hamid Ashfaq2, Suliman A. Alsuhibany3, Mohammad Shorfuzzaman4, Abdulmajeed Alsufyani4, Ahmad Jalal2, Jeongmin Park5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1607-1624, 2023, DOI:10.32604/cmc.2023.032245

    Abstract In the past two decades, there has been a lot of work on computer vision technology that incorporates many tasks which implement basic filtering to image classification. The major research areas of this field include object detection and object recognition. Moreover, wireless communication technologies are presently adopted and they have impacted the way of education that has been changed. There are different phases of changes in the traditional system. Perception of three-dimensional (3D) from two-dimensional (2D) image is one of the demanding tasks. Because human can easily perceive but making 3D using software will take time manually. Firstly, the blackboard… More >

  • Open Access

    ARTICLE

    Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment

    Salaheddine Kably1,2,*, Tajeddine Benbarrad1, Nabih Alaoui2, Mounir Arioua1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 253-278, 2023, DOI:10.32604/cmc.2023.032220

    Abstract Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion… More >

  • Open Access

    ARTICLE

    Optimization Task Scheduling Using Cooperation Search Algorithm for Heterogeneous Cloud Computing Systems

    Ahmed Y. Hamed1, M. Kh. Elnahary1,*, Faisal S. Alsubaei2, Hamdy H. El-Sayed1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2133-2148, 2023, DOI:10.32604/cmc.2023.032215

    Abstract Cloud computing has taken over the high-performance distributed computing area, and it currently provides on-demand services and resource polling over the web. As a result of constantly changing user service demand, the task scheduling problem has emerged as a critical analytical topic in cloud computing. The primary goal of scheduling tasks is to distribute tasks to available processors to construct the shortest possible schedule without breaching precedence restrictions. Assignments and schedules of tasks substantially influence system operation in a heterogeneous multiprocessor system. The diverse processes inside the heuristic-based task scheduling method will result in varying makespan in the heterogeneous computing… More >

  • Open Access

    ARTICLE

    Secure and Optimal LOADng Routing for IoT with Composite Routing Metric

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 655-669, 2023, DOI:10.32604/cmc.2023.032207

    Abstract Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things (IoT) network. To overcome this challenge, a secure Lightweight On-demand Ad hoc Distance-vector—Next Generation (LOADng) Routing Protocol is proposed in this paper. As the LOADng protocol is the second version of Ad Hoc On-Demand Distance Vector (AODV) protocol, it retains most of the basic functionality and characteristics of AODV. During the route discovery process, the cyclic shift transposition algorithm (CSTA) is used to encrypt the control packets of the LOADng protocol to improve its security. CSTA approach only… More >

  • Open Access

    ARTICLE

    Hybrid Global Optimization Algorithm for Feature Selection

    Ahmad Taher Azar1,2,*, Zafar Iqbal Khan2, Syed Umar Amin2, Khaled M. Fouad1,3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2021-2037, 2023, DOI:10.32604/cmc.2023.032183

    Abstract This paper proposes Parallelized Linear Time-Variant Acceleration Coefficients and Inertial Weight of Particle Swarm Optimization algorithm (PLTVACIW-PSO). Its designed has introduced the benefits of Parallel computing into the combined power of TVAC (Time-Variant Acceleration Coefficients) and IW (Inertial Weight). Proposed algorithm has been tested against linear, non-linear, traditional, and multiswarm based optimization algorithms. An experimental study is performed in two stages to assess the proposed PLTVACIW-PSO. Phase I uses 12 recognized Standard Benchmarks methods to evaluate the comparative performance of the proposed PLTVACIW-PSO vs. IW based Particle Swarm Optimization (PSO) algorithms, TVAC based PSO algorithms, traditional PSO, Genetic algorithms (GA),… More >

  • Open Access

    ARTICLE

    Impact of Portable Executable Header Features on Malware Detection Accuracy

    Hasan H. Al-Khshali1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 153-178, 2023, DOI:10.32604/cmc.2023.032182

    Abstract One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an exclusive set of 29 features was collected from trusted implementations, this set was used as a baseline to analyze the presented work in this research. A Decision Tree (DT) and Neural Network Multi-Layer Perceptron (NN-MLPC) algorithms were utilized during this work. Both algorithms were chosen after testing a few diverse procedures. This work implements a method of subgrouping features to answer questions such… More >

Displaying 1411-1420 on page 142 of 5427. Per Page