Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (152)
  • Open Access

    ARTICLE

    Compact 5G Vivaldi Tapered Slot Filtering Antenna with Enhanced Bandwidth

    Sahar Saleh1,2, Mohd Haizal Jamaluddin1,*, Bader Alali3,4, Ayman A. Althuwayb4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5983-5999, 2023, DOI:10.32604/cmc.2023.035585

    Abstract Compact fifth-generation (5G) low-frequency band filtering antennas (filtennas) with stable directive radiation patterns, improved bandwidth (BW), and gain are designed, fabricated, and tested in this research. The proposed filtennas are achieved by combining the predesigned compact 5G (5.975 – 7.125 GHz) third-order uniform and non-uniform transmission line hairpin bandpass filters (UTL and NTL HPBFs) with the compact ultrawide band Vivaldi tapered slot antenna (UWB VTSA) in one module. The objective of this integration is to enhance the performance of 5.975 – 7.125 GHz filtennas which will be suitable for modern mobile communication applications by exploiting the benefits of UWB VTSA. Based on… More >

  • Open Access

    ARTICLE

    A Stochastic Framework for Solving the Prey-Predator Delay Differential Model of Holling Type-III

    Naret Ruttanaprommarin1, Zulqurnain Sabir2,3, Rafaél Artidoro Sandoval Núñez4, Emad Az-Zo’bi5, Wajaree Weera6, Thongchai Botmart6,*, Chantapish Zamart6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5915-5930, 2023, DOI:10.32604/cmc.2023.034362

    Abstract The current research aims to implement the numerical results for the Holling third kind of functional response delay differential model utilizing a stochastic framework based on Levenberg-Marquardt backpropagation neural networks (LVMBPNNs). The nonlinear model depends upon three dynamics, prey, predator, and the impact of the recent past. Three different cases based on the delay differential system with the Holling 3rd type of the functional response have been used to solve through the proposed LVMBPNNs solver. The statistic computing framework is provided by selecting 12%, 11%, and 77% for training, testing, and verification. Thirteen numbers of neurons have been used based… More >

  • Open Access

    ARTICLE

    High-Bandwidth, Low-Power CMOS Transistor Based CAB for Field Programmable Analog Array

    Ameen Bin Obadi1, Alaa El-Din Hussein2, Samir Salem Al-Bawri3,4,*, Kabir Hossain5, Abdullah Abdulhameed4, Muzammil Jusoh1,6,7, Thennarasan Sabapathy1,6, Ahmed Jamal Abdullah Al-Gburi8, Mahmoud A. Albreem9

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5885-5900, 2023, DOI:10.32604/cmc.2023.033789

    Abstract This article presents an integrated current mode configurable analog block (CAB) system for field-programmable analog array (FPAA). The proposed architecture is based on the complementary metal-oxide semiconductor (CMOS) transistor level design where MOSFET transistors operating in the saturation region are adopted. The proposed CAB architecture is designed to implement six of the widely used current mode operations in analog processing systems: addition, subtraction, integration, multiplication, division, and pass operation. The functionality of the proposed CAB is demonstrated through these six operations, where each operation is chosen based on the user’s selection in the CAB interface system. The architecture of the… More >

  • Open Access

    ARTICLE

    Indirect Vector Control of Linear Induction Motors Using Space Vector Pulse Width Modulation

    Arjmand Khaliq1, Syed Abdul Rahman Kashif1, Fahad Ahmad2, Muhammad Anwar3,*, Qaisar Shaheen4, Rizwan Akhtar5, Muhammad Arif Shah5, Abdelzahir Abdelmaboud6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6263-6287, 2023, DOI:10.32604/cmc.2023.033027

    Abstract Vector control schemes have recently been used to drive linear induction motors (LIM) in high-performance applications. This trend promotes the development of precise and efficient control schemes for individual motors. This research aims to present a novel framework for speed and thrust force control of LIM using space vector pulse width modulation (SVPWM) inverters. The framework under consideration is developed in four stages. To begin, MATLAB Simulink was used to develop a detailed mathematical and electromechanical dynamic model. The research presents a modified SVPWM inverter control scheme. By tuning the proportional-integral (PI) controller with a transfer function, optimized values for… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom dataset crawled from hundreds of… More >

  • Open Access

    ARTICLE

    Efficient Heuristic Replication Techniques for High Data Availability in Cloud

    H. L. Chandrakala1,*, R. Loganathan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3151-3164, 2023, DOI:10.32604/csse.2022.027873

    Abstract Most social networks allow connections amongst many people based on shared interests. Social networks have to offer shared data like videos, photos with minimum latency to the group, which could be challenging as the storage cost has to be minimized and hence entire data replication is not a solution. The replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response time. Though simple and adaptive replication strategies exist, the solution is non-deterministic; the replicas of the data need to be optimized to the data usability, performance, and… More >

  • Open Access

    ARTICLE

    Tricube Weighted Linear Regression and Interquartile for Cloud Infrastructural Resource Optimization

    Neema George1,*, B. K. Anoop1, Vinodh P. Vijayan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2281-2297, 2023, DOI:10.32604/csse.2023.028117

    Abstract Cloud infrastructural resource optimization is the process of precisely selecting the allocating the correct resources either to a workload or application. When workload execution, accuracy, and cost are accurately stabilized in opposition to the best possible framework in real-time, efficiency is attained. In addition, every workload or application required for the framework is characteristic and these essentials change over time. But, the existing method was failed to ensure the high Quality of Service (QoS). In order to address this issue, a Tricube Weighted Linear Regression-based Inter Quartile (TWLR-IQ) for Cloud Infrastructural Resource Optimization is introduced. A Tricube Weighted Linear Regression… More >

  • Open Access

    ARTICLE

    Control of Distributed Generation Using Non-Sinusoidal Pulse Width Modulation

    Mehrdad Ahmadi Kamarposhti1,*, Phatiphat Thounthong2, Ilhami Colak3, Kei Eguchi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4149-4164, 2023, DOI:10.32604/cmc.2023.033405

    Abstract The islanded mode is one of the connection modes of the grid distributed generation resources. In this study, a distributed generation resource is connected to linear and nonlinear loads via a three-phase inverter where a control method needing no current sensors or compensator elements is applied to the distribute generation system in the islanded mode. This control method has two main loops in each phase. The first loop controls the voltage control loops that adjust the three-phase point of common coupling, the amplitude of the non-sinusoidal reference waveform and the near-state pulse width modulation (NSPWM) method. The next loop compensatesthe… More >

  • Open Access

    ARTICLE

    An Intelligence Computational Approach for the Fractional 4D Chaotic Financial Model

    Wajaree Weera1, Thongchai Botmart1,*, Charuwat Chantawat1, Zulqurnain Sabir2,3, Waleed Adel4,5, Muhammad Asif Zahoor Raja6, Muhammad Kristiawan7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2711-2724, 2023, DOI:10.32604/cmc.2023.033233

    Abstract The main purpose of the study is to present a numerical approach to investigate the numerical performances of the fractional 4-D chaotic financial system using a stochastic procedure. The stochastic procedures mainly depend on the combination of the artificial neural network (ANNs) along with the Levenberg-Marquardt Backpropagation (LMB) i.e., ANNs-LMB technique. The fractional-order term is defined in the Caputo sense and three cases are solved using the proposed technique for different values of the fractional order α. The values of the fractional order derivatives to solve the fractional 4-D chaotic financial system are used between 0 and 1. The data… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature selection and Bengio Nesterov Momentum-based… More >

Displaying 21-30 on page 3 of 152. Per Page