Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Cotton Leaf Diseases Recognition Using Deep Learning and Genetic Algorithm

    Muhammad Rizwan Latif1, Muhamamd Attique Khan1, Muhammad Younus Javed1, Haris Masood2, Usman Tariq3, Yunyoung Nam4,*, Seifedine Kadry5

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2917-2932, 2021, DOI:10.32604/cmc.2021.017364

    Abstract Globally, Pakistan ranks 4 in cotton production, 6 as an importer of raw cotton, and 3 in cotton consumption. Nearly 10% of GDP and 55% of the country's foreign exchange earnings depend on cotton products. Approximately 1.5 million people in Pakistan are engaged in the cotton value chain. However, several diseases such as Mildew, Leaf Spot, and Soreshine affect cotton production. Manual diagnosis is not a good solution due to several factors such as high cost and unavailability of an expert. Therefore, it is essential to develop an automated technique that can accurately detect and recognize these diseases at their… More >

  • Open Access

    ARTICLE

    Screening of COVID-19 Patients Using Deep Learning and IoT Framework

    Harshit Kaushik1, Dilbag Singh2, Shailendra Tiwari3, Manjit Kaur2, Chang-Won Jeong4, Yunyoung Nam5,*, Muhammad Attique Khan6

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3459-3475, 2021, DOI:10.32604/cmc.2021.017337

    Abstract In March 2020, the World Health Organization declared the coronavirus disease (COVID-19) outbreak as a pandemic due to its uncontrolled global spread. Reverse transcription polymerase chain reaction is a laboratory test that is widely used for the diagnosis of this deadly disease. However, the limited availability of testing kits and qualified staff and the drastically increasing number of cases have hampered massive testing. To handle COVID-19 testing problems, we apply the Internet of Things and artificial intelligence to achieve self-adaptive, secure, and fast resource allocation, real-time tracking, remote screening, and patient monitoring. In addition, we implement a cloud platform for… More >

  • Open Access

    ARTICLE

    FogQSYM: An Industry 4.0 Analytical Model for Fog Applications

    M. Iyapparaja1, M. Sathish Kumar1, S. Siva Rama Krishnan1, Chiranji Lal Chowdhary1, Byungun Yoon2, Saurabh Singh2, Gi Hwan Cho3,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3163-3178, 2021, DOI:10.32604/cmc.2021.017302

    Abstract Industry 4.0 refers to the fourth evolution of technology development, which strives to connect people to various industries in terms of achieving their expected outcomes efficiently. However, resource management in an Industry 4.0 network is very complex and challenging. To manage and provide suitable resources to each service, we propose a FogQSYM (Fog–-Queuing system) model; it is an analytical model for Fog Applications that helps divide the application into several layers, then enables the sharing of the resources in an effective way according to the availability of memory, bandwidth, and network services. It follows the Markovian queuing model that helps… More >

  • Open Access

    ARTICLE

    Bayesian Rule Modeling for Interpretable Mortality Classification of COVID-19 Patients

    Jiyoung Yun, Mainak Basak, Myung-Mook Han*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2827-2843, 2021, DOI:10.32604/cmc.2021.017266

    Abstract Coronavirus disease 2019 (COVID-19) has been termed a “Pandemic Disease” that has infected many people and caused many deaths on a nearly unprecedented level. As more people are infected each day, it continues to pose a serious threat to humanity worldwide. As a result, healthcare systems around the world are facing a shortage of medical space such as wards and sickbeds. In most cases, healthy people experience tolerable symptoms if they are infected. However, in other cases, patients may suffer severe symptoms and require treatment in an intensive care unit. Thus, hospitals should select patients who have a high risk… More >

  • Open Access

    ARTICLE

    Towards Privacy-Preserving Cloud Storage: A Blockchain Approach

    Jia-Shun Zhang1, Gang Xu2,*, Xiu-Bo Chen1, Haseeb Ahmad3, Xin Liu4, Wen Liu5,6,7

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2903-2916, 2021, DOI:10.32604/cmc.2021.017227

    Abstract With the rapid development of cloud computing technology, cloud services have now become a new business model for information services. The cloud server provides the IT resources required by customers in a self-service manner through the network, realizing business expansion and rapid innovation. However, due to the insufficient protection of data privacy, the problem of data privacy leakage in cloud storage is threatening cloud computing. To address the problem, we propose BC-PECK, a data protection scheme based on blockchain and public key searchable encryption. Firstly, all the data is protected by the encryption algorithm. The privacy data is encrypted and… More >

  • Open Access

    ARTICLE

    A Vicenary Analysis of SARS-CoV-2 Genomes

    Sk Sarif Hassan1, Ranjeet Kumar Rout2, Kshira Sagar Sahoo3, Nz Jhanjhi4, Saiyed Umer5, Thamer A. Tabbakh6,*, Zahrah A. Almusaylim7

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3477-3493, 2021, DOI:10.32604/cmc.2021.017206

    Abstract Coronaviruses are responsible for various diseases ranging from the common cold to severe infections like the Middle East syndromes and the severe acute respiratory syndrome. However, a new coronavirus strain known as COVID-19 developed into a pandemic resulting in an ongoing global public health crisis. Therefore, there is a need to understand the genomic transformations that occur within this family of viruses in order to limit disease spread and develop new therapeutic targets. The nucleotide sequences of SARS-CoV-2 are consist of several bases. These bases can be classified into purines and pyrimidines according to their chemical composition. Purines include adenine… More >

  • Open Access

    ARTICLE

    Controlled Quantum Network Coding Without Loss of Information

    Xing-Bo Pan1, Xiu-Bo Chen1,*, Gang Xu2, Haseeb Ahmad3, Tao Shang4, Zong-Peng Li5,6, Yi-Xian Yang1

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3967-3979, 2021, DOI:10.32604/cmc.2021.017087

    Abstract Quantum network coding is used to solve the congestion problem in quantum communication, which will promote the transmission efficiency of quantum information and the total throughput of quantum network. We propose a novel controlled quantum network coding without information loss. The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie. Firstly, two pairs of three-particle non-maximum entangled states are pre-shared between senders and controller. By adding auxiliary particles and local operations, the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the basis.… More >

  • Open Access

    ARTICLE

    Emergency Decision-Making Based on q-Rung Orthopair Fuzzy Rough Aggregation Information

    Ahmed B. Khoshaim1, Saleem Abdullah2, Shahzaib Ashraf3,*, Muhammad Naeem4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4077-4094, 2021, DOI:10.32604/cmc.2021.016973

    Abstract With the frequent occurrences of emergency events, emergency decision making (EDM) plays an increasingly significant role in coping with such situations and has become an important and challenging research area in recent times. It is essential for decision makers to make reliable and reasonable emergency decisions within a short span of time, since inappropriate decisions may result in enormous economic losses and social disorder. To handle emergency effectively and quickly, this paper proposes a new EDM method based on the novel concept of q-rung orthopair fuzzy rough (q-ROPR) set. A novel list of q-ROFR aggregation information, detailed description of the… More >

  • Open Access

    ARTICLE

    EDSM-Based Binary Protocol State Machine Reversing

    Shen Wang1,*, Fanghui Sun1, Hongli Zhang1, Dongyang Zhan1,2, Shuang Li3, Jun Wang1

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3711-3725, 2021, DOI:10.32604/cmc.2021.016562

    Abstract Internet communication protocols define the behavior rules of network components when they communicate with each other. With the continuous development of network technologies, many private or unknown network protocols are emerging in endlessly various network environments. Herein, relevant protocol specifications become difficult or unavailable to translate in many situations such as network security management and intrusion detection. Although protocol reverse engineering is being investigated in recent years to perform reverse analysis on the specifications of unknown protocols, most existing methods have proven to be time-consuming with limited efficiency, especially when applied on unknown protocol state machines. This paper proposes a… More >

  • Open Access

    ARTICLE

    An Efficient Scheme for Interference Mitigation in 6G-IoT Wireless Networks

    Fahd N. Al-Wesabi1,*, Imran Khan2, Nadhem Nemri3, Mohammed A. Al-Hagery4, Huda G. Iskander5, Quang Ngoc Nguyen6, Babar Shah7, Ki-Il Kim8

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3889-3902, 2021, DOI:10.32604/cmc.2021.016218

    Abstract The Internet of Things (IoT) is the fourth technological revolution in the global information industry after computers, the Internet, and mobile communication networks. It combines radio-frequency identification devices, infrared sensors, global positioning systems, and various other technologies. Information sensing equipment is connected via the Internet, thus forming a vast network. When these physical devices are connected to the Internet, the user terminal can be extended and expanded to exchange information, communicate with anything, and carry out identification, positioning, tracking, monitoring, and triggering of corresponding events on each device in the network. In real life, the IoT has a wide range… More >

Displaying 3031-3040 on page 304 of 5427. Per Page