Login
Register
Tech Science Press Partners with Morressier to Provide Editorial Teams with Integrity Intelligence at Scale
Revue Internationale de Géomatique (RIG) welcomes its new Editor-in-Chief Prof. Manchun Li
Henderson Office Address Change Notification
Frontiers in Heat and Mass Transfer Welcomes Prof. Chun Yang as Editor-in-Chief
In Memoriam: Professor Kazuo Umezawa
Tech Science Press Collaborates with STM to Promote Open Access Publishing
select journals Advances in Computational Mechanics BIOCELL Centaurus Congenital Heart Disease Computers, Materials & Continua Computer Modeling in Engineering & Sciences Computer Systems Science and Engineering Digital Engineering and Digital Twin Energy Engineering Fluid Dynamics & Materials Processing Frontiers in Heat and Mass Transfer Intelligent Automation & Soft Computing The International Conference on Computational & Experimental Engineering and Sciences International Journal of Mental Health Promotion Journal on Artificial Intelligence Journal of Advanced Optics and Photonics Journal on Big Data Journal of Blockchain and Intelligent Computing Journal of Cyber Security Journal of Information Hiding and Privacy Protection Journal of Intelligent Medicine and Healthcare Journal on Internet of Things Journal of New Media Journal of Polymer Materials Journal of Quantum Computing Journal of Renewable Materials Molecular & Cellular Biomechanics Oncologie Oncology Research Phyton-International Journal of Experimental Botany Psycho-Oncologie Revue Internationale de Géomatique Structural Durability & Health Monitoring Structural Longevity Sound & Vibration
Select Type
select year
Open Access
ARTICLE
Sarah M. Alhammad1, Doaa Sami Khafaga1,*, Aya Y. Hamed2, Osama El-Koumy3, Ehab R. Mohamed3, Khalid M. Hosny3
Computer Systems Science and Engineering, Vol.47, No.3, pp. 2939-2952, 2023, DOI:10.32604/csse.2023.041011
Abstract Face mask detection has several applications, including real-time surveillance, biometrics, etc. Identifying face masks is also helpful for crowd control and ensuring people wear them publicly. With monitoring personnel, it is impossible to ensure that people wear face masks; automated systems are a much superior option for face mask detection and monitoring. This paper introduces a simple and efficient approach for masked face detection. The architecture of the proposed approach is very straightforward; it combines deep learning and local binary patterns to extract features and classify them as masked or unmasked. The proposed system requires hardware with minimal power consumption… More >
Muhammad Fezan Afzal1, Imran Khan1, Javed Rashid1,2,3, Mubbashar Saddique4,*, Heba G. Mohamed5
CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3653-3670, 2023, DOI:10.32604/cmc.2023.041627
Abstract Software Product Line (SPL) is a group of software-intensive systems that share common and variable resources for developing a particular system. The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints (CTC). CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things (IoT) devices because different Internet devices and protocols are communicated. Therefore, managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex, time-consuming, and hard. However, the CTC… More >
Zeliang An1, Tianqi Zhang1,*, Debang Liu1, Yuqing Xu2, Gert Frølund Pedersen2, Ming Shen2
CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2817-2834, 2023, DOI:10.32604/cmc.2023.037832
Abstract With the advent of the Industry 5.0 era, the Internet of Things (IoT) devices face unprecedented proliferation, requiring higher communications rates and lower transmission delays. Considering its high spectrum efficiency, the promising filter bank multicarrier (FBMC) technique using offset quadrature amplitude modulation (OQAM) has been applied to Beyond 5G (B5G) industry IoT networks. However, due to the broadcasting nature of wireless channels, the FBMC-OQAM industry IoT network is inevitably vulnerable to adversary attacks from malicious IoT nodes. The FBMC-OQAM industry cognitive radio network (ICRNet) is proposed to ensure security at the physical layer to tackle the above challenge. As a… More >
Denis Benka*, Sabína Vašová, Michal Kebísek, Maximilián Strémy
Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2519-2535, 2023, DOI:10.32604/iasc.2023.040799
Abstract Pattern recognition algorithms are commonly utilized to discover certain patterns, particularly in image-based data. Our study focuses on quasiperiodic oscillations (QPO) in celestial objects referred to as cataclysmic variables (CV). We are dealing with interestingly indistinct QPO signals, which we analyze using a power density spectrum (PDS). The confidence in detecting the latter using certain statistical approaches may come out with less significance than the truth. We work with real and simulated QPO data of a CV called MV Lyrae. Our primary statistical tool for determining confidence levels is sigma intervals. The aforementioned CV has scientifically proven QPO existence, but… More >
RETRACTION
Siti Julia Rosli1,2, Hasliza A Rahim1,2,*, Khairul Najmy Abdul Rani1,2, Ruzelita Ngadiran2,3, Wan Azani Mustafa3,4, Muzammil Jusoh1,2, Mohd Najib Mohd Yasin1,2, Thennarasan Sabapathy1,2, Mohamedfareq Abdulmalek5, Wan Suryani Firuz Wan Ariffin2, Ahmed Alkhayyat6
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2571-2571, 2023, DOI:10.32604/cmc.2023.045533
Abstract This article has no abstract. More >
Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*
Journal of Cyber Security, Vol.4, No.4, pp. 287-298, 2022, DOI:10.32604/jcs.2023.042486
Abstract Unmanned Aerial Vehicles (UAVs) proliferate quickly and play a significant part in crucial tasks, so it is important to protect the security and integrity of UAV communication channels. Intrusion Detection Systems (IDSs) are required to protect the UAV communication infrastructure from unauthorized access and harmful actions. In this paper, we examine a new approach for enhancing intrusion detection in UAV communication channels by utilizing the Long Short-Term Memory network (LSTM) combined with the Synthetic Minority Oversampling Technique (SMOTE) algorithm, and this integration is the binary classification method (LSTM-SMOTE). We successfully achieved 99.83% detection accuracy by using the proposed approach and… More >
Arindam Banerjee1,*, Aniruddha Ghosh2, Mainuck Das2
Journal of Quantum Computing, Vol.4, No.3, pp. 121-133, 2022, DOI:10.32604/jqc.2022.034059
Abstract In this paper, focus has been given to design and implement signed binary subtraction in quantum logic. Since the type of operand may be positive or negative, therefore a novel algorithm has been developed to detect the type of operand and as per the selection of the type of operands, separate design techniques have been developed to make the circuit compact and work very efficiently. Two separate methods have been shown in the paper to perform the signed subtraction. The results show promising for the second method in respect of ancillary input count and garbage output count but at the… More >
Xiaoli Jing, Xianpeng Wang*, Xiang Lan, Ting Su
CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1789-1804, 2023, DOI:10.32604/cmes.2023.028477
Abstract At present, the traditional channel estimation algorithms have the disadvantages of over-reliance on initial conditions and high complexity. The bacterial foraging optimization (BFO)-based algorithm has been applied in wireless communication and signal processing because of its simple operation and strong self-organization ability. But the BFO-based algorithm is easy to fall into local optimum. Therefore, this paper proposes the quantum bacterial foraging optimization (QBFO)-binary orthogonal matching pursuit (BOMP) channel estimation algorithm to the problem of local optimization. Firstly, the binary matrix is constructed according to whether atoms are selected or not. And the support set of the sparse signal is recovered… More >
Adnan Hasan Bdair Aighuraibawi1,2, Selvakumar Manickam1,*, Rosni Abdullah3, Zaid Abdi Alkareem Alyasseri4,5, Ayman Khallel6, Dilovan Asaad Zebari9, Hussam Mohammed Jasim7, Mazin Mohammed Abed8, Zainb Hussein Arif7
Computer Systems Science and Engineering, Vol.47, No.1, pp. 553-574, 2023, DOI:10.32604/csse.2023.037948
Abstract Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system… More >
Khalil Chebil1,2, Skander Htiouech3, Mahdi Khemakhem1,2,4,*
CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 233-263, 2023, DOI:10.32604/cmes.2023.026476
Abstract Crowd management and analysis (CMA) systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles (UAVs) use. Crowd tracking using UAVs is among the most important services provided by a CMA. In this paper, we studied the periodic crowd-tracking (PCT) problem. It consists in using UAVs to follow-up crowds, during the life-cycle of an open crowded area (OCA). Two criteria were considered for this purpose. The first is related to the CMA initial investment, while the second is to guarantee the quality of service (QoS). The existing works focus on very specified assumptions that are highly… More >