Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner. Recent… More >

  • Open Access

    ARTICLE

    Evaluation of Natural Language Software Interfaces to Databases

    Fiaz Majeed1, Muhammad Shoaib2, Monagi H. Alkinani3, Wazir Zada Khan4, Shahzada Khurram5, Akber Abid Gardezi6, Muhammad Shafiq7,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 285-299, 2022, DOI:10.32604/iasc.2022.015488

    Abstract Relational databases are still important in modern times due to their many advantages, such as ease of interaction, simplicity and data integrity. In this regard, structured query language (SQL) and technical knowledge about database schemas are the basic building blocks for retrieving information from relational databases. Generally, non-expert users cannot skillfully write technical queries on the target database. To this end, many database natural language interfaces (NLIDB) have been developed to greatly facilitate users. However, each system provides a different interface for new users, so beginners can use different interactive modes to enter keyword-based queries. For users, migrating from one… More >

  • Open Access

    ARTICLE

    Characteristics of In-Hospital Patients with Congenital Heart Disease Requiring Rapid Response System Activations: A Japanese Database Study

    Taiki Haga1,*, Tomoyuki Masuyama2, Yoshiro Hayashi3, Takahiro Atsumi4, Kenzo Ishii5, Shinsuke Fujiwara6

    Congenital Heart Disease, Vol.17, No.1, pp. 31-43, 2022, DOI:10.32604/CHD.2022.017407

    Abstract Objectives: This study aimed to study the characteristics of in-hospital deterioration in patients with congenital heart disease who required rapid response system activation and identify risk factors associated with 1-month mortality. Methods: We retrospectively analysed data from a Japanese rapid response system registry with 35 participating hospitals. We included consecutive patients with congenital heart disease who required rapid response system activation between January 2014 and March 2018. Logistic regression analyses were performed to examine the associations between 1-month mortality and other patient-specific variables. Results: Among 9,607 patients for whom the rapid response system was activated, only 82 (0.9%) had congenital… More >

  • Open Access

    ARTICLE

    An OWL-Based Specification of Database Management Systems

    Sabin C. Buraga1,*, Daniel Amariei1, Octavian Dospinescu2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5537-5550, 2022, DOI:10.32604/cmc.2022.021714

    Abstract In the context of a proliferation of Database Management Systems (DBMSs), we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain. This conceptualization aims to facilitate a proper execution of various software engineering processes and database-focused administration tasks. Also, it can be used to improve the decision-making process for determining/selecting the appropriate DBMS, subject to specific requirements. The proposed model describes the most important features and aspects regarding the DBMS domain, including the support for various paradigms (relational, graph-based, key-value, tree-like, etc.), query languages, platforms (servers), plus running environments (desktop,… More >

  • Open Access

    ARTICLE

    Optimal Deep Convolution Neural Network for Cervical Cancer Diagnosis Model

    Mohamed Ibrahim Waly1, Mohamed Yacin Sikkandar1, Mohamed Abdelkader Aboamer1, Seifedine Kadry2, Orawit Thinnukool3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3295-3309, 2022, DOI:10.32604/cmc.2022.020713

    Abstract Biomedical imaging is an effective way of examining the internal organ of the human body and its diseases. An important kind of biomedical image is Pap smear image that is widely employed for cervical cancer diagnosis. Cervical cancer is a vital reason for increased women’s mortality rate. Proper screening of pap smear images is essential to assist the earlier identification and diagnostic process of cervical cancer. Computer-aided systems for cancerous cell detection need to be developed using deep learning (DL) approaches. This study introduces an intelligent deep convolutional neural network for cervical cancer detection and classification (IDCNN-CDC) model using biomedical… More >

  • Open Access

    ARTICLE

    Database Recovery Technique for Mobile Computing: A Game Theory Approach

    Magda M. Madbouly1, Yasser F. Mokhtar2, Saad M. Darwish1,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3205-3219, 2022, DOI:10.32604/cmc.2022.019440

    Abstract Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS). It is harmed by a variety of causes, including handoff, inadequate capacity, frequent transaction updates, and repeated failures, both of which contribute to serious issues with the information system’s consistency. However, error tolerance technicality allows devices to continue performing their functions in the event of a failure. The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory. Several of the presented recovery protocols are chosen and evaluated in order to… More >

  • Open Access

    ARTICLE

    Multiclass Cucumber Leaf Diseases Recognition Using Best Feature Selection

    Nazar Hussain1, Muhammad Attique Khan1, Usman Tariq2, Seifedine Kadry3,*, MuhammadAsfand E. Yar4, Almetwally M. Mostafa5, Abeer Ali Alnuaim6, Shafiq Ahmad7

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3281-3294, 2022, DOI:10.32604/cmc.2022.019036

    Abstract Agriculture is an important research area in the field of visual recognition by computers. Plant diseases affect the quality and yields of agriculture. Early-stage identification of crop disease decreases financial losses and positively impacts crop quality. The manual identification of crop diseases, which are mostly visible on leaves, is a very time-consuming and costly process. In this work, we propose a new framework for the recognition of cucumber leaf diseases. The proposed framework is based on deep learning and involves the fusion and selection of the best features. In the feature extraction phase, VGG (Visual Geometry Group) and Inception V3… More >

  • Open Access

    ARTICLE

    A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party

    Ahmed S. Alghamdi1, Surayya Naz2, Ammar Saeed3, Eesa Al Solami1, Muhammad Kamran1,*, Mohammed Saeed Alkatheiri1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1585-1601, 2022, DOI:10.32604/cmc.2022.019936

    Abstract With widespread use of relational database in various real-life applications, maintaining integrity and providing copyright protection is gaining keen interest of the researchers. For this purpose, watermarking has been used for quite a long time. Watermarking requires the role of trusted third party and a mechanism to extract digital signatures (watermark) to prove the ownership of the data under dispute. This is often inefficient as lots of processing is required. Moreover, certain malicious attacks, like additive attacks, can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting… More >

  • Open Access

    ARTICLE

    Load Balancing Framework for Cross-Region Tasks in Cloud Computing

    Jaleel Nazir1,2, Muhammad Waseem Iqbal1, Tahir Alyas2, Muhammad Hamid3, Muhammad Saleem4, Saadia Malik5, Nadia Tabassum6,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1479-1490, 2022, DOI:10.32604/cmc.2022.019344

    Abstract Load balancing is a technique for identifying overloaded and underloaded nodes and balancing the load between them. To maximize various performance parameters in cloud computing, researchers suggested various load balancing approaches. To store and access data and services provided by the different service providers through the network over different regions, cloud computing is one of the latest technology systems for both end-users and service providers. The volume of data is increasing due to the pandemic and a significant increase in usage of the internet has also been experienced. Users of the cloud are looking for services that are intelligent, and,… More >

  • Open Access

    ARTICLE

    Evolution-Based Performance Prediction of Star Cricketers

    Haseeb Ahmad1, Shahbaz Ahmad1, Muhammad Asif1, Mobashar Rehman2,*, Abdullah Alharbi3, Zahid Ullah4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1215-1232, 2021, DOI:10.32604/cmc.2021.016659

    Abstract Cricket databases contain rich and useful information to examine and forecasting patterns and trends. This paper predicts Star Cricketers (SCs) from batting and bowling domains by employing supervised machine learning models. With this aim, each player’s performance evolution is retrieved by using effective features that incorporate the standard performance measures of each player and their peers. Prediction is performed by applying Bayesian-rule, function and decision-tree-based models. Experimental evaluations are performed to validate the applicability of the proposed approach. In particular, the impact of the individual features on the prediction of SCs are analyzed. Moreover, the category and model-wise feature evaluations… More >

Displaying 31-40 on page 4 of 65. Per Page