Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Robust Interactive Method for Hand Gestures Recognition Using Machine Learning

    Amal Abdullah Mohammed Alteaimi1,*, Mohamed Tahar Ben Othman1,2

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 577-595, 2022, DOI:10.32604/cmc.2022.023591

    Abstract The Hand Gestures Recognition (HGR) System can be employed to facilitate communication between humans and computers instead of using special input and output devices. These devices may complicate communication with computers especially for people with disabilities. Hand gestures can be defined as a natural human-to-human communication method, which also can be used in human-computer interaction. Many researchers developed various techniques and methods that aimed to understand and recognize specific hand gestures by employing one or two machine learning algorithms with a reasonable accuracy. This work aims to develop a powerful hand gesture recognition model with a 100% recognition rate. We… More >

  • Open Access

    ARTICLE

    A Novel Framework for Windows Malware Detection Using a Deep Learning Approach

    Abdulbasit A. Darem*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 461-479, 2022, DOI:10.32604/cmc.2022.023566

    Abstract Malicious software (malware) is one of the main cyber threats that organizations and Internet users are currently facing. Malware is a software code developed by cybercriminals for damage purposes, such as corrupting the system and data as well as stealing sensitive data. The damage caused by malware is substantially increasing every day. There is a need to detect malware efficiently and automatically and remove threats quickly from the systems. Although there are various approaches to tackle malware problems, their prevalence and stealthiness necessitate an effective method for the detection and prevention of malware attacks. The deep learning-based approach is recently… More >

  • Open Access

    ARTICLE

    High Performance Priority Packets Scheduling Mechanism for Big Data in Smart Cities

    Fawaz Alassery*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 535-559, 2022, DOI:10.32604/cmc.2022.023558

    Abstract Today, Internet of Things (IoT) is a technology paradigm which convinces many researchers for the purpose of achieving high performance of packets delivery in IoT applications such as smart cities. Interconnecting various physical devices such as sensors or actuators with the Internet may causes different constraints on the network resources such as packets delivery ratio, energy efficiency, end-to-end delays etc. However, traditional scheduling methodologies in large-scale environments such as big data smart cities cannot meet the requirements for high performance network metrics. In big data smart cities applications which need fast packets transmission ratio such as sending priority packets to… More >

  • Open Access

    ARTICLE

    Human Pose Estimation and Object Interaction for Sports Behaviour

    Ayesha Arif1, Yazeed Yasin Ghadi2, Mohammed Alarfaj3, Ahmad Jalal1, Shaharyar Kamal1, Dong-Seong Kim4,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1-18, 2022, DOI:10.32604/cmc.2022.023553

    Abstract In the new era of technology, daily human activities are becoming more challenging in terms of monitoring complex scenes and backgrounds. To understand the scenes and activities from human life logs, human-object interaction (HOI) is important in terms of visual relationship detection and human pose estimation. Activities understanding and interaction recognition between human and object along with the pose estimation and interaction modeling have been explained. Some existing algorithms and feature extraction procedures are complicated including accurate detection of rare human postures, occluded regions, and unsatisfactory detection of objects, especially small-sized objects. The existing HOI detection techniques are instance-centric (object-based)… More >

  • Open Access

    ARTICLE

    Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks

    Nadia Mustaqim Ansari1,*, Rashid Hussain2, Sheeraz Arif3, Syed Sajjad Hussain4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1861-1875, 2022, DOI:10.32604/cmc.2022.023516

    Abstract The security of Internet of Things (IoT) is a challenging task for researchers due to plethora of IoT networks. Side Channel Attacks (SCA) are one of the major concerns. The prime objective of SCA is to acquire the information by observing the power consumption, electromagnetic (EM) field, timing analysis, and acoustics of the device. Later, the attackers perform statistical functions to recover the key. Advanced Encryption Standard (AES) algorithm has proved to be a good security solution for constrained IoT devices. This paper implements a simulation model which is used to modify the AES algorithm using logical masking properties. This… More >

  • Open Access

    ARTICLE

    COVID-19 Severity Prediction Using Enhanced Whale with Salp Swarm Feature Classification

    Nebojsa Budimirovic1, E. Prabhu2, Milos Antonijevic1, Miodrag Zivkovic1, Nebojsa Bacanin1,*, Ivana Strumberger1, K. Venkatachalam3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1685-1698, 2022, DOI:10.32604/cmc.2022.023418

    Abstract Computerized tomography (CT) scans and X-rays play an important role in the diagnosis of COVID-19 and pneumonia. On the basis of the image analysis results of chest CT and X-rays, the severity of lung infection is monitored using a tool. Many researchers have done in diagnosis of lung infection in an accurate and efficient takes lot of time and inefficient. To overcome these issues, our proposed study implements four cascaded stages. First, for pre-processing, a mean filter is used. Second, texture feature extraction uses principal component analysis (PCA). Third, a modified whale optimization algorithm is used (MWOA) for a feature… More >

  • Open Access

    ARTICLE

    A Compact 28 GHz Millimeter Wave Antenna for Future Wireless Communication

    Shahid Khan1,2, Adil Bashir3, Haider Ali4, Abdul Rauf5, Mohamed Marey6,*, Hala Mostafa7, Ikram Syed8

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 301-314, 2022, DOI:10.32604/cmc.2022.023397

    Abstract This article presents a novel modified chuck wagon dinner bell shaped millimeter wave (mm-wave) antenna at 28 GHz. The proposed design has ultra-thin Rogers 5880 substrate with relative permittivity of 2.2. The design consists of T shaped resonating elements and two open ended side stubs. The desired 28 GHz frequency response is achieved by careful parametric modeling of the proposed structure. The maximum achieved single element gain at the desired resonance frequency is 3.45 dBi. The efficiency of the proposed design over the operating band is more than 88%. The impedance bandwidth achieved for −10 dB reference value is nearly… More >

  • Open Access

    ARTICLE

    Intelligent DoS Attack Detection with Congestion Control Technique for VANETs

    R. Gopi1, Mahantesh Mathapati2, B. Prasad3, Sultan Ahmad4, Fahd N. Al-Wesabi5, Manal Abdullah Alohali6,*, Anwer Mustafa Hilal7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 141-156, 2022, DOI:10.32604/cmc.2022.023306

    Abstract Vehicular Ad hoc Network (VANET) has become an integral part of Intelligent Transportation Systems (ITS) in today's life. VANET is a network that can be heavily scaled up with a number of vehicles and road side units that keep fluctuating in real world. VANET is susceptible to security issues, particularly DoS attacks, owing to maximum unpredictability in location. So, effective identification and the classification of attacks have become the major requirements for secure data transmission in VANET. At the same time, congestion control is also one of the key research problems in VANET which aims at minimizing the time expended… More >

  • Open Access

    ARTICLE

    Classification of Desertification on the North Bank of Qinghai Lake

    Wenzheng Yu1, Xin Yao1, Li Shao2, Jing Liu1, Yanbo Shen3,4,*, Hanxiaoya Zhang5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 695-711, 2022, DOI:10.32604/cmc.2022.023191

    Abstract In this paper, RS, GIS and GPS technologies are used to interpret the remote sensing images of the north shore of Qinghai Lake from 1987 to 2014 according to the inversion results of vegetation coverage (FVC), albedo, land surface temperature (LST), soil moisture (WET) and other major parameters after image preprocessing, such as radiometric correction, geometric correction and atmospheric correction. On this basis, the decision tree classification method based on landsat8 remote sensing image is used to classify the desertification land in this area, and the development and change of desertification in this period are analyzed. The results show that… More >

  • Open Access

    ARTICLE

    Fusion-Based Deep Learning Model for Hyperspectral Images Classification

    Kriti1, Mohd Anul Haq2, Urvashi Garg1, Mohd Abdul Rahim Khan2,*, V. Rajinikanth3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 939-957, 2022, DOI:10.32604/cmc.2022.023169

    Abstract A crucial task in hyperspectral image (HSI) taxonomy is exploring effective methodologies to effusively practice the 3-D and spectral data delivered by the statistics cube. For classification of images, 3-D data is adjudged in the phases of pre-cataloging, an assortment of a sample, classifiers, post-cataloging, and accurateness estimation. Lastly, a viewpoint on imminent examination directions for proceeding 3-D and spectral approaches is untaken. In topical years, sparse representation is acknowledged as a dominant classification tool to effectually labels deviating difficulties and extensively exploited in several imagery dispensation errands. Encouraged by those efficacious solicitations, sparse representation (SR) has likewise been presented… More >

Displaying 2221-2230 on page 223 of 5427. Per Page