Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Secret Key Optimization for Secure Speech Communications

    Osama S. Faragallah1,*, Mahmoud Farouk2, Hala S. El-Sayed3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3025-3037, 2022, DOI:10.32604/cmc.2022.019951

    Abstract This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains. The first question is, what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains. The second question is the relation between the number of sub-keys, the number of secret keys used, and the audio speech signal block’s size. Finally, how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.… More >

  • Open Access

    ARTICLE

    Opto-Video Encryption Based on Logistic Adjusted Sine map in FrFT

    Osama S. Faragallah1,*, Ashraf Afifi1, Ibrahim F. Elashry2, Ensherah A. Naeem3, Heba M. El-Hoseny4, Ahmed I. Sallam5, Hala S. El-sayed6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3651-3663, 2022, DOI:10.32604/cmc.2022.019827

    Abstract In the last few years, videos became the most common form of information transmitted over the internet, and a lot of the traffic is confidential and must be protected and delivered safely to its intended users. This introduces the challenges of presenting encryption systems that can encode videos securely and efficiently at the same time. This paper presents an efficient opto-video encryption system using Logistic Adjusted Sine map (LASM) in the Fractional Fourier Transform (FrFT). In the presented opto-video LASM-based FrFT scheme, the encoded video is split into distinct frames and transformed into optical signals utilizing an optical supply. Each… More >

  • Open Access

    ARTICLE

    Metaheuristics Algorithm for Tuning of PID Controller of Mobile Robot System

    Harsh Goud1, Prakash Chandra Sharma2, Kashif Nisar3,7,*, Muhammad Reazul Haque4, Ag. Asri Ag. Ibrahim3, Narendra Singh Yadav2, Pankaj Swarnkar5, Manoj Gupta6, Laxmi Chand6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3481-3492, 2022, DOI:10.32604/cmc.2022.019764

    Abstract Robots in the medical industry are becoming more common in daily life because of various advantages such as quick response, less human interference, high dependability, improved hygiene, and reduced aging effects. That is why, in recent years, robotic aid has emerged as a blossoming solution to many challenges in the medical industry. In this manuscript, meta-heuristics (MH) algorithms, specifically the Firefly Algorithm (FF) and Genetic Algorithm (GA), are applied to tune PID controller constraints such as Proportional gain Kp Integral gain Ki and Derivative gain Kd. The controller is used to control Mobile Robot System (MRS) at the required set… More >

  • Open Access

    ARTICLE

    Finger Vein Authentication Based on Wavelet Scattering Networks

    Amjad Rehman1, Majid Harouni2,*, Maedeh Omidiravesh3, Suliman Mohamed Fati1, Saeed Ali Bahaj4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3369-3383, 2022, DOI:10.32604/cmc.2022.016410

    Abstract Biometric-based authentication systems have attracted more attention than traditional authentication techniques such as passwords in the last two decades. Multiple biometrics such as fingerprint, palm, iris, palm vein and finger vein and other biometrics have been introduced. One of the challenges in biometrics is physical injury. Biometric of finger vein is of the biometrics least exposed to physical damage. Numerous methods have been proposed for authentication with the help of this biometric that suffer from weaknesses such as high computational complexity and low identification rate. This paper presents a novel method of scattering wavelet-based identity identification. Scattering wavelet extracts image… More >

  • Open Access

    ARTICLE

    Game Theory-Based IoT Efficient Power Control in Cognitive UAV

    Fadhil Mukhlif1,*, Norafida Ithnin1, Omar B. Abdulghafoor2, Faiz Alotaibi3, Nourah Saad Alotaibi4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1561-1578, 2022, DOI:10.32604/cmc.2022.026074

    Abstract With the help of network densification, network coverage as well as the throughput can be improved via ultra-dense networks (UDNs). In tandem, Unmanned Aerial Vehicle (UAV) communications have recently garnered much attention because of their high agility as well as widespread applications. In this paper, a cognitive UAV is proposed for wireless nodes power pertaining to the IoT ground terminal. Further, the UAV is included in the IoT system as the source of power for the wireless nodes as well as for resource allocation. The quality of service (QoS) related to the cognitive node was considered as a utility function… More >

  • Open Access

    ARTICLE

    Dipper Throated Optimization Algorithm for Unconstrained Function and Feature Selection

    Ali E. Takieldeen1, El-Sayed M. El-kenawy1,2, Mohammed Hadwan3,4,5,*, Rokaia M. Zaki6,7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1465-1481, 2022, DOI:10.32604/cmc.2022.026026

    Abstract Dipper throated optimization (DTO) algorithm is a novel with a very efficient metaheuristic inspired by the dipper throated bird. DTO has its unique hunting technique by performing rapid bowing movements. To show the efficiency of the proposed algorithm, DTO is tested and compared to the algorithms of Particle Swarm Optimization (PSO), Whale Optimization Algorithm (WOA), Grey Wolf Optimizer (GWO), and Genetic Algorithm (GA) based on the seven unimodal benchmark functions. Then, ANOVA and Wilcoxon rank-sum tests are performed to confirm the effectiveness of the DTO compared to other optimization techniques. Additionally, to demonstrate the proposed algorithm's suitability for solving complex… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Enabling Cybersecurity in the Internet-of-Critical Infrastructures

    Mahmoud Ragab1,2,3,*, Ali Altalbe1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1579-1592, 2022, DOI:10.32604/cmc.2022.025828

    Abstract Due to the drastic increase in the number of critical infrastructures like nuclear plants, industrial control systems (ICS), transportation, it becomes highly vulnerable to several attacks. They become the major targets of cyberattacks due to the increase in number of interconnections with other networks. Several research works have focused on the design of intrusion detection systems (IDS) using machine learning (ML) and deep learning (DL) models. At the same time, Blockchain (BC) technology can be applied to improve the security level. In order to resolve the security issues that exist in the critical infrastructures and ICS, this study designs a… More >

  • Open Access

    ARTICLE

    An Energy-Efficient 12b 2.56 MS/s SAR ADC Using Successive Scaling of Reference Voltages

    Hojin Kang1, Syed Asmat Ali Shah2, HyungWon Kim1,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2127-2139, 2022, DOI:10.32604/cmc.2022.025798

    Abstract This paper presents an energy efficient architecture for successive approximation register (SAR) analog to digital converter (ADC). SAR ADCs with a capacitor array structure have been widely used because of its simple architecture and relatively high speed. However, conventional SAR ADCs consume relatively high energy due to the large number of capacitors used in the capacitor array and their sizes scaled up along with the number of bits. The proposed architecture reduces the energy consumption as well as the capacitor size by employing a new array architecture that scales down the reference voltages instead of scaling up the capacitor sizes.… More >

  • Open Access

    ARTICLE

    Energy-Efficient Static Data Collector-based Scheme in Smart Cities

    Adel D. Rajab*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2077-2092, 2022, DOI:10.32604/cmc.2022.025736

    Abstract In the Internet of Things (IoT)-based smart city applications, employing the Data Collectors (DC) as the data brokers between the nodes and Base Station (BS) can be a promising solution to enhance the energy efficiency of energy-constrained IoT sensor nodes. There are several schemes that utilize mobile DCs to collect the data packets from sensor nodes. However, moving DCs along the hundreds of thousands of sensors sparsely distributed across a smart city is considered a design challenge in such schemes. Another concern lies in how these mobile DCs are being powered. Therefore, to overcome these limitations, we exploit multiple energy-limited… More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Electricity Consumption Prediction

    Maissa A. Al Metrik*, Dhiaa A. Musleh

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1427-1444, 2022, DOI:10.32604/cmc.2022.025722

    Abstract Electricity, being the most efficient secondary energy, contributes for a larger proportion of overall energy usage. Due to a lack of storage for energy resources, over supply will result in energy dissipation and substantial investment waste. Accurate electricity consumption prediction is vital because it allows for the preparation of potential power generation systems to satisfy the growing demands for electrical energy as well as: smart distributed grids, assessing the degree of socioeconomic growth, distributed system design, tariff plans, demand-side management, power generation planning, and providing electricity supply stability by balancing the amount of electricity produced and consumed. This paper proposes… More >

Displaying 2051-2060 on page 206 of 5350. Per Page