Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Analytical Model for Underwater Wireless Sensor Network Energy Consumption Reduction

    Huma Hasan Rizvi1,2, Sadiq Ali Khan1, Rabia Noor Enam2, Kashif Nisar3,*, Muhammad Reazul Haque4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1611-1626, 2022, DOI:10.32604/cmc.2022.023081

    Abstract In an Underwater Wireless Sensor Network (UWSN), extreme energy loss is carried out by the early expiration of sensor nodes and causes a reduction in efficiency in the submerged acoustic sensor system. Systems based on clustering strategies, instead of each node sending information by itself, utilize cluster heads to collect information inside the clusters for forwarding collective information to sink. This can effectively minimize the total energy loss during transmission. The environment of UWSN is 3D architecture-based and follows a complex hierarchical clustering strategy involving its most effecting unique parameters such as propagation delay and limited transmission bandwidth. Round base… More >

  • Open Access

    ARTICLE

    Smart Anti-Pinch Window Simulation Using H-/H Criterion and MOPSO

    Maedeh Mohammadi Azni1, Mohammad Ali Sadrnia1, Shahab S. Band2,*, Zulkefli Bin Mansor3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 215-226, 2022, DOI:10.32604/cmc.2022.023030

    Abstract Automobile power windows are mechanisms that can be opened and shut with the press of a button. Although these windows can comfort the effort of occupancy to move the window, failure to recognize the person's body part at the right time will result in damage and in some cases, loss of that part. An anti-pinch mechanism is an excellent choice to solve this problem, which detects the obstacle in the glass path immediately and moves it down. In this paper, an optimal solution is presented for fault detection of the anti-pinch window system. The anti-pinch makes it possible to detect… More >

  • Open Access

    ARTICLE

    Computer-Vision Based Object Detection and Recognition for Service Robot in Indoor Environment

    Kiran Jot Singh1, Divneet Singh Kapoor1,*, Khushal Thakur1, Anshul Sharma1, Xiao-Zhi Gao2

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 197-213, 2022, DOI:10.32604/cmc.2022.022989

    Abstract The near future has been envisioned as a collaboration of humans with mobile robots to help in the day-to-day tasks. In this paper, we present a viable approach for a real-time computer vision based object detection and recognition for efficient indoor navigation of a mobile robot. The mobile robotic systems are utilized mainly for home assistance, emergency services and surveillance, in which critical action needs to be taken within a fraction of second or real-time. The object detection and recognition is enhanced with utilization of the proposed algorithm based on the modification of You Look Only Once (YOLO) algorithm, with… More >

  • Open Access

    ARTICLE

    Effective Frameworks Based on Infinite Mixture Model for Real-World Applications

    Norah Saleh Alghamdi1, Sami Bourouis2,*, Nizar Bouguila3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1139-1156, 2022, DOI:10.32604/cmc.2022.022959

    Abstract Interest in automated data classification and identification systems has increased over the past years in conjunction with the high demand for artificial intelligence and security applications. In particular, recognizing human activities with accurate results have become a topic of high interest. Although the current tools have reached remarkable successes, it is still a challenging problem due to various uncontrolled environments and conditions. In this paper two statistical frameworks based on nonparametric hierarchical Bayesian models and Gamma distribution are proposed to solve some real-world applications. In particular, two nonparametric hierarchical Bayesian models based on Dirichlet process and Pitman-Yor process are developed.… More >

  • Open Access

    ARTICLE

    An Efficient and Reliable Multicasting for Smart Cities

    Faheem Khan1, Muhammad Zahid2, Hüseyin Gürüler3, Ilhan Tarimer3, Taegkeun Whangbo1,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 663-678, 2022, DOI:10.32604/cmc.2022.022934

    Abstract The Internet of thing (IoT) is a growing concept for smart cities, and it is compulsory to communicate data between different networks and devices. In the IoT, communication should be rapid with less delay and overhead. For this purpose, flooding is used for reliable data communication in a smart cities concept but at the cost of higher overhead, energy consumption and packet drop etc. This paper aims to increase the efficiency in term of overhead and reliability in term of delay by using multicasting and unicasting instead of flooding during packet forwarding in a smart city using the IoT concept.… More >

  • Open Access

    ARTICLE

    Detection of Behavioral Patterns Employing a Hybrid Approach of Computational Techniques

    Rohit Raja1, Chetan Swarup2, Abhishek Kumar3,*, Kamred Udham Singh4, Teekam Singh5, Dinesh Gupta6, Neeraj Varshney7, Swati Jain8

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2015-2031, 2022, DOI:10.32604/cmc.2022.022904

    Abstract As far as the present state is concerned in detecting the behavioral pattern of humans (subject) using morphological image processing, a considerable portion of the study has been conducted utilizing frontal vision data of human faces. The present research work had used a side vision of human-face data to develop a theoretical framework via a hybrid analytical model approach. In this example, hybridization includes an artificial neural network (ANN) with a genetic algorithm (GA). We researched the geometrical properties extracted from side-vision human-face data. An additional study was conducted to determine the ideal number of geometrical characteristics to pick while… More >

  • Open Access

    ARTICLE

    An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography

    Daniyal M. Alghazzawi1, Osama Bassam J. Rabie1, Surbhi Bhatia2, Syed Hamid Hasan1,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1173-1193, 2022, DOI:10.32604/cmc.2022.022748

    Abstract The Deep Neural Networks (DNN) training process is widely affected by backdoor attacks. The backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavior with data poisoning triggers. The state-of-art backdoor attacks mainly follow a certain assumption that the trigger is sample-agnostic and different poisoned samples use the same trigger. To overcome this problem, in this work we are creating a backdoor attack to check their strength to withstand complex defense strategies, and in order to achieve this objective, we are developing an improved Convolutional Neural Network (ICNN) model… More >

  • Open Access

    ARTICLE

    Intelligent Cloud IoMT Health Monitoring-Based System for COVID-19

    Hameed AlQaheri1,*, Manash Sarkar2, Saptarshi Gupta3, Bhavya Gaur4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 497-517, 2022, DOI:10.32604/cmc.2022.022735

    Abstract The most common alarming and dangerous disease in the world today is the coronavirus disease 2019 (COVID-19). The coronavirus is perceived as a group of coronaviruses which causes mild to severe respiratory diseases among human beings. The infection is spread by aerosols emitted from infected individuals during talking, sneezing, and coughing. Furthermore, infection can occur by touching a contaminated surface followed by transfer of the viral load to the face. Transmission may occur through aerosols that stay suspended in the air for extended periods of time in enclosed spaces. To stop the spread of the pandemic, it is crucial to… More >

  • Open Access

    ARTICLE

    Design of Machine Learning Based Smart Irrigation System for Precision Agriculture

    Khalil Ibrahim Mohammad Abuzanouneh1, Fahd N. Al-Wesabi2, Amani Abdulrahman Albraikan3, Mesfer Al Duhayyim4, M. Al-Shabi5, Anwer Mustafa Hilal6, Manar Ahmed Hamza6,*, Abu Sarwar Zamani6, K. Muthulakshmi7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 109-124, 2022, DOI:10.32604/cmc.2022.022648

    Abstract Agriculture 4.0, as the future of farming technology, comprises numerous key enabling technologies towards sustainable agriculture. The use of state-of-the-art technologies, such as the Internet of Things, transform traditional cultivation practices, like irrigation, to modern solutions of precision agriculture. To achieve effective water resource usage and automated irrigation in precision agriculture, recent technologies like machine learning (ML) can be employed. With this motivation, this paper design an IoT and ML enabled smart irrigation system (IoTML-SIS) for precision agriculture. The proposed IoTML-SIS technique allows to sense the parameters of the farmland and make appropriate decisions for irrigation. The proposed IoTML-SIS model… More >

  • Open Access

    ARTICLE

    Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks

    Saima Kauser1, Tauqeer Safdar Malik1,*, Mohd Hilmi Hasan2, Emelia Akashah P. Akhir2, Syed Muhammad Husnain Kazmi3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1251-1273, 2022, DOI:10.32604/cmc.2022.022475

    Abstract A web browser is the most basic tool for accessing the internet from any of the machines/equipment. Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors. Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack. These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment. Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and… More >

Displaying 2231-2240 on page 224 of 5427. Per Page