Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (557)
  • Open Access

    ARTICLE

    Pancreatic Cancer Data Classification with Quantum Machine Learning

    Amit Saxena1, Smita Saxena2,*

    Journal of Quantum Computing, Vol.5, pp. 1-13, 2023, DOI:10.32604/jqc.2023.044555

    Abstract Quantum computing is a promising new approach to tackle the complex real-world computational problems by harnessing the power of quantum mechanics principles. The inherent parallelism and exponential computational power of quantum systems hold the potential to outpace classical counterparts in solving complex optimization problems, which are pervasive in machine learning. Quantum Support Vector Machine (QSVM) is a quantum machine learning algorithm inspired by classical Support Vector Machine (SVM) that exploits quantum parallelism to efficiently classify data points in high-dimensional feature spaces. We provide a comprehensive overview of the underlying principles of QSVM, elucidating how different quantum feature maps and quantum… More >

  • Open Access

    ARTICLE

    Exercise Recommendation with Preferences and Expectations Based on Ability Computation

    Mengjuan Li, Lei Niu*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 263-284, 2023, DOI:10.32604/cmc.2023.041193

    Abstract In the era of artificial intelligence, cognitive computing, based on cognitive science; and supported by machine learning and big data, brings personalization into every corner of our social life. Recommendation systems are essential applications of cognitive computing in educational scenarios. They help learners personalize their learning better by computing student and exercise characteristics using data generated from relevant learning progress. The paper introduces a Learning and Forgetting Convolutional Knowledge Tracking Exercise Recommendation model (LFCKT-ER). First, the model computes studentsʼ ability to understand each knowledge concept, and the learning progress of each knowledge concept, and the model consider their forgetting behavior… More >

  • Open Access

    ARTICLE

    Multi-Agent Deep Reinforcement Learning for Efficient Computation Offloading in Mobile Edge Computing

    Tianzhe Jiao, Xiaoyue Feng, Chaopeng Guo, Dongqi Wang, Jie Song*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3585-3603, 2023, DOI:10.32604/cmc.2023.040068

    Abstract Mobile-edge computing (MEC) is a promising technology for the fifth-generation (5G) and sixth-generation (6G) architectures, which provides resourceful computing capabilities for Internet of Things (IoT) devices, such as virtual reality, mobile devices, and smart cities. In general, these IoT applications always bring higher energy consumption than traditional applications, which are usually energy-constrained. To provide persistent energy, many references have studied the offloading problem to save energy consumption. However, the dynamic environment dramatically increases the optimization difficulty of the offloading decision. In this paper, we aim to minimize the energy consumption of the entire MEC system under the latency constraint by… More >

  • Open Access

    ARTICLE

    A Smart Obfuscation Approach to Protect Software in Cloud

    Lei Yu1, Yucong Duan2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3949-3965, 2023, DOI:10.32604/cmc.2023.038970

    Abstract Cloud computing and edge computing brought more software, which also brought a new danger of malicious software attacks. Data synchronization mechanisms of software can further help reverse data modifications. Based on the mechanisms, attackers can cover themselves behind the network and modify data undetected. Related knowledge of software reverse engineering can be organized as rules to accelerate the attacks, when attackers intrude cloud server to access the source or binary codes. Therefore, we proposed a novel method to resist this kind of reverse engineering by breaking these rules. Our method is based on software obfuscations and encryptions to enhance the… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Information Authentication Scheme for E-Healthcare System

    Naveed Khan1, Jianbiao Zhang1,*, Ghulam Ali Mallah2, Shehzad Ashraf Chaudhry3

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3877-3896, 2023, DOI:10.32604/cmc.2023.032553

    Abstract The mobile cellular network provides internet connectivity for heterogeneous Internet of Things (IoT) devices. The cellular network consists of several towers installed at appropriate locations within a smart city. These cellular towers can be utilized for various tasks, such as e-healthcare systems, smart city surveillance, traffic monitoring, infrastructure surveillance, or sidewalk checking. Security is a primary concern in data broadcasting, particularly authentication, because the strength of a cellular network’s signal is much higher frequency than the associated one, and their frequencies can sometimes be aligned, posing a significant challenge. As a result, that requires attention, and without information authentication, such… More >

  • Open Access

    ARTICLE

    IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks

    Ying Zhang1,*, Weiming Niu2, Leibing Yan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 885-902, 2024, DOI:10.32604/cmes.2023.029234

    Abstract In this paper, we consider mobile edge computing (MEC) networks against proactive eavesdropping. To maximize the transmission rate, IRS assisted UAV communications are applied. We take the joint design of the trajectory of UAV, the transmitting beamforming of users, and the phase shift matrix of IRS. The original problem is strong non-convex and difficult to solve. We first propose two basic modes of the proactive eavesdropper, and obtain the closed-form solution for the boundary conditions of the two modes. Then we transform the original problem into an equivalent one and propose an alternating optimization (AO) based method to obtain a… More >

  • Open Access

    ARTICLE

    A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism

    Jian Shang1,2,*, Runmin Guan2, Wei Wang2

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2609-2626, 2023, DOI:10.32604/iasc.2023.037694

    Abstract The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years. In real-world scenarios, microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks. To meet the high hardware resource requirements, address the vulnerability to network attacks and poor reliability in the traditional centralized data storage schemes, this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph (DAG) consensus mechanism. Firstly, the microgrid data storage model is designed based on the edge computing technology. The blockchain, deployed on… More >

  • Open Access

    ARTICLE

    A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model

    Jawad Ahmad1,*, Mimonah Al Qathrady2, Mohammed S. Alshehri3, Yazeed Yasin Ghadi4, Mujeeb Ur Rehman5, Syed Aziz Shah6

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1325-1341, 2023, DOI:10.32604/cmc.2023.040858

    Abstract Due to the inherent insecure nature of the Internet, it is crucial to ensure the secure transmission of image data over this network. Additionally, given the limitations of computers, it becomes even more important to employ efficient and fast image encryption techniques. While 1D chaotic maps offer a practical approach to real-time image encryption, their limited flexibility and increased vulnerability restrict their practical application. In this research, we have utilized a 3D Hindmarsh-Rose model to construct a secure cryptosystem. The randomness of the chaotic map is assessed through standard analysis. The proposed system enhances security by incorporating an increased number… More >

  • Open Access

    ARTICLE

    A Hybrid Heuristic Service Caching and Task Offloading Method for Mobile Edge Computing

    Yongxuan Sang, Jiangpo Wei*, Zhifeng Zhang, Bo Wang

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2483-2502, 2023, DOI:10.32604/cmc.2023.040485

    Abstract Computing-intensive and latency-sensitive user requests pose significant challenges to traditional cloud computing. In response to these challenges, mobile edge computing (MEC) has emerged as a new paradigm that extends the computational, caching, and communication capabilities of cloud computing. By caching certain services on edge nodes, computational support can be provided for requests that are offloaded to the edges. However, previous studies on task offloading have generally not considered the impact of caching mechanisms and the cache space occupied by services. This oversight can lead to problems, such as high delays in task executions and invalidation of offloading decisions. To optimize… More >

  • Open Access

    ARTICLE

    Priority Detector and Classifier Techniques Based on ML for the IoMT

    Rayan A. Alsemmeari1,*, Mohamed Yehia Dahab2, Badraddin Alturki1, Abdulaziz A. Alsulami3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1853-1870, 2023, DOI:10.32604/cmc.2023.038589

    Abstract Emerging telemedicine trends, such as the Internet of Medical Things (IoMT), facilitate regular and efficient interactions between medical devices and computing devices. The importance of IoMT comes from the need to continuously monitor patients’ health conditions in real-time during normal daily activities, which is realized with the help of various wearable devices and sensors. One major health problem is workplace stress, which can lead to cardiovascular disease or psychiatric disorders. Therefore, real-time monitoring of employees’ stress in the workplace is essential. Stress levels and the source of stress could be detected early in the fog layer so that the negative… More >

Displaying 41-50 on page 5 of 557. Per Page