Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Profiling Casualty Severity Levels of Road Accident Using Weighted Majority Voting

    Saba Awan1, Zahid Mehmood2,*, Hassan Nazeer Chaudhry3, Usman Tariq4, Amjad Rehman5, Tanzila Saba5, Muhammad Rashid6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4609-4626, 2022, DOI:10.32604/cmc.2022.019404

    Abstract To determine the individual circumstances that account for a road traffic accident, it is crucial to consider the unplanned connections amongst various factors related to a crash that results in high casualty levels. Analysis of the road accident data concentrated mainly on categorizing accidents into different types using individually built classification methods which limit the prediction accuracy and fitness of the model. In this article, we proposed a multi-model hybrid framework of the weighted majority voting (WMV) scheme with parallel structure, which is designed by integrating individually implemented multinomial logistic regression (MLR) and multilayer perceptron (MLP) classifiers using three different… More >

  • Open Access

    ARTICLE

    Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

    Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5039-5059, 2022, DOI:10.32604/cmc.2022.019289

    Abstract Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive companies use the “patch and… More >

  • Open Access

    ARTICLE

    Location Prediction for Improved Human Safety at Complex Environments

    S. G. Siddharth1,*, G. M. Tamilselvan2, C. Venkatesh3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5219-5234, 2022, DOI:10.32604/cmc.2022.019252

    Abstract In underground operation, primary consideration is safety. In recent decades, for minimizing accident and for preventing major economic losses and casualties, wireless sensors are used by various large mineral countries through early warning. The Improved DV-Hop Localization Algorithm (IDVHLA) is used in existing works for doing this. However, accurate anchor node detection is impossible in existing works with the malicious nodes presence, where there won't be any accurate sharing of anchor node's location information. In case of emergency situation, faster communication is a highly complex one. A technique called Modified Distance Vector Hop based Multipath Routing Protocol (MDVHMRP) is introduced… More >

  • Open Access

    ARTICLE

    PSO Based Multi-Objective Approach for Controlling PID Controller

    Harsh Goud1, Prakash Chandra Sharma2, Kashif Nisar3, Ag. Asri Ag. Ibrahim3,*, Muhammad Reazul Haque4, Narendra Singh Yadav2, Pankaj Swarnkar5, Manoj Gupta6, Laxmi Chand6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4409-4423, 2022, DOI:10.32604/cmc.2022.019217

    Abstract CSTR (Continuous stirred tank reactor) is employed in process control and chemical industries to improve response characteristics and system efficiency. It has a highly nonlinear characteristic that includes complexities in its control and design. Dynamic performance is compassionate to change in system parameters which need more effort for planning a significant controller for CSTR. The reactor temperature changes in either direction from the defined reference value. It is important to note that the intensity of chemical actions inside the CSTR is dependent on the various levels of temperature, and deviation from reference values may cause degradation of biomass quality. Design… More >

  • Open Access

    ARTICLE

    New 5G Kaiser-Based Windowing to Reduce Out of Band Emission

    Ahmed Hammoodi1, Lukman Audah1 , Laith Al-Jobouri2,*, Mazin Abed Mohammed3, Mustafa S. Aljumaily4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2721-2738, 2022, DOI:10.32604/cmc.2022.020091

    Abstract OFDM based waveforms are considered as the main part of the latest cellular communications standard (namely 5G). Many inherited problems from the OFDM-Based LTE are still under investigation. Getting rid of the out of band emissions is one of these problems. Ensuring low out of band emission (OOBE) is deemed as one of the most critical challenges to support development of future technologies such as 6G and beyond. Universal Filtered Multi Carrier (UFMC) has been considered as one of the candidate waveforms for the 5G communications due to its robustness against Inter Carrier Interference (ICI) and the Inter Symbol Interference… More >

  • Open Access

    ARTICLE

    Optimizing Energy Conservation in V2X Communications for 5G Networks

    Arif Husen1,2, Abid Soahil1,*, Mohammad Hijji2, Muhammad Hasanain Chaudary1, Farooq Ahmed1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3479-3495, 2022, DOI:10.32604/cmc.2022.023840

    Abstract The smart vehicles are one of critical enablers for automated services in smart cities to provide intelligent transportation means without human intervention. In order to fulfil requirements, Vehicle-to-Anything(V2X) communications aims to manage massive connectivity and high traffic load on base stations and extend the range over multiple hops in 5G networks. However, V2X networking faces several challenges from dynamic topology caused by high velocity of nodes and routing overhead that degrades the network performance and increases energy consumption. The existing routing scheme for V2X networking lacks energy efficiency and scalability for high velocity nodes with dense distribution. In order to… More >

  • Open Access

    ARTICLE

    Empathic Responses of Behavioral-Synchronization in Human-Agent Interaction

    Sung Park1,*, Seongeon Park2, Mincheol Whang2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3761-3784, 2022, DOI:10.32604/cmc.2022.023738

    Abstract Artificial entities, such as virtual agents, have become more pervasive. Their long-term presence among humans requires the virtual agent's ability to express appropriate emotions to elicit the necessary empathy from the users. Affective empathy involves behavioral mimicry, a synchronized co-movement between dyadic pairs. However, the characteristics of such synchrony between humans and virtual agents remain unclear in empathic interactions. Our study evaluates the participant's behavioral synchronization when a virtual agent exhibits an emotional expression congruent with the emotional context through facial expressions, behavioral gestures, and voice. Participants viewed an emotion-eliciting video stimulus (negative or positive) with a virtual agent. The… More >

  • Open Access

    ARTICLE

    Prediction of Changed Faces with HSCNN

    Jinho Han*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3747-3759, 2022, DOI:10.32604/cmc.2022.023683

    Abstract Convolutional Neural Networks (CNN) have been successfully employed in the field of image classification. However, CNN trained using images from several years ago may be unable to identify how such images have changed over time. Cross-age face recognition is, therefore, a substantial challenge. Several efforts have been made to resolve facial changes over time utilizing recurrent neural networks (RNN) with CNN. The structure of RNN contains hidden contextual information in a hidden state to transfer a state in the previous step to the next step. This paper proposes a novel model called Hidden State-CNN (HSCNN). This adds to CNN a… More >

  • Open Access

    ARTICLE

    Design of QoS Aware Routing Protocol for IoT Assisted Clustered WSN

    Ashit Kumar Dutta1, S. Srinivasan2, Bobbili Prasada Rao3, B. Hemalatha4, Irina V. Pustokhina5, Denis A. Pustokhin6, Gyanendra Prasad Joshi7,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3785-3801, 2022, DOI:10.32604/cmc.2022.023657

    Abstract In current days, the domain of Internet of Things (IoT) and Wireless Sensor Networks (WSN) are combined for enhancing the sensor related data transmission in the forthcoming networking applications. Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks. In this view, this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing (EMO-QoSCMR) Protocol for IoT assisted WSN. The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy, throughput, delay, and lifetime. The proposed model involves… More >

  • Open Access

    ARTICLE

    Distance Matrix and Markov Chain Based Sensor Localization in WSN

    Omaima Bamasaq1, Daniyal Alghazzawi2, Surbhi Bhatia3, Pankaj Dadheech4,*, Farrukh Arslan5, Sudhakar Sengan6, Syed Hamid Hassan2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4051-4068, 2022, DOI:10.32604/cmc.2022.023634

    Abstract Applications based on Wireless Sensor Networks (WSN) have shown to be quite useful in monitoring a particular geographic area of interest. Relevant geometries of the surrounding environment are essential to establish a successful WSN topology. But it is literally hard because constructing a localization algorithm that tracks the exact location of Sensor Nodes (SN) in a WSN is always a challenging task. In this research paper, Distance Matrix and Markov Chain (DM-MC) model is presented as node localization technique in which Distance Matrix and Estimation Matrix are used to identify the position of the node. The method further employs a… More >

Displaying 2291-2300 on page 230 of 5350. Per Page