Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

    Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1373-1389, 2022, DOI:10.32604/cmc.2022.024996 - 24 February 2022

    Abstract The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of More >

  • Open Access

    ARTICLE

    Efficient Computer Aided Diagnosis System for Hepatic Tumors Using Computed Tomography Scans

    Yasmeen Al-Saeed1,2, Wael A. Gab-Allah1, Hassan Soliman1, Maysoon F. Abulkhair3, Wafaa M. Shalash4, Mohammed Elmogy1,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4871-4894, 2022, DOI:10.32604/cmc.2022.023638 - 14 January 2022

    Abstract One of the leading causes of mortality worldwide is liver cancer. The earlier the detection of hepatic tumors, the lower the mortality rate. This paper introduces a computer-aided diagnosis system to extract hepatic tumors from computed tomography scans and classify them into malignant or benign tumors. Segmenting hepatic tumors from computed tomography scans is considered a challenging task due to the fuzziness in the liver pixel range, intensity values overlap between the liver and neighboring organs, high noise from computed tomography scanner, and large variance in tumors shapes. The proposed method consists of three main More >

  • Open Access

    ARTICLE

    Medical Data Clustering and Classification Using TLBO and Machine Learning Algorithms

    Ashutosh Kumar Dubey1,*, Umesh Gupta2, Sonal Jain2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4523-4543, 2022, DOI:10.32604/cmc.2022.021148 - 11 October 2021

    Abstract This study aims to empirically analyze teaching-learning-based optimization (TLBO) and machine learning algorithms using k-means and fuzzy c-means (FCM) algorithms for their individual performance evaluation in terms of clustering and classification. In the first phase, the clustering (k-means and FCM) algorithms were employed independently and the clustering accuracy was evaluated using different computational measures. During the second phase, the non-clustered data obtained from the first phase were preprocessed with TLBO. TLBO was performed using k-means (TLBO-KM) and FCM (TLBO-FCM) (TLBO-KM/FCM) algorithms. The objective function was determined by considering both minimization and maximization criteria. Non-clustered data… More >

  • Open Access

    ARTICLE

    A Shadowed Rough-fuzzy Clustering Algorithm Based on Mahalanobis Distance for Intrusion Detection

    Lina Wang1,2,*, Jie Wang3, Yongjun Ren4, Zimeng Xing1, Tao Li1, Jinyue Xia5

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 31-47, 2021, DOI:10.32604/iasc.2021.018577 - 26 July 2021

    Abstract Intrusion detection has been widely used in many application domains; thus, it has caught significant attention in academic fields these years. Assembled with more and more sub-systems, the network is more vulnerable to multiple attacks aiming at the network security. Compared with the other issues such as complex environment and resources-constrained devices, network security has been the biggest challenge for Internet construction. To deal with this problem, a fundamental measure for safeguarding network security is to select an intrusion detection algorithm. As is known, it is less effective to determine the abnormal behavior as an… More >

  • Open Access

    ARTICLE

    Determination of Cup to Disc Ratio Using Unsupervised Machine Learning Techniques for Glaucoma Detection

    R. Praveena*, T. R. GaneshBabu

    Molecular & Cellular Biomechanics, Vol.18, No.2, pp. 69-86, 2021, DOI:10.32604/mcb.2021.014622 - 09 April 2021

    Abstract The cup nerve head, optic cup, optic disc ratio and neural rim configuration are observed as important for detecting glaucoma at an early stage in clinical practice. The main clinical indicator of glaucoma optic cup to disc ratio is currently determined manually by limiting the mass screening was potential. This paper proposes the following methods for an automatic cup to disc ratio determination. In the first part of the work, fundus image of the optic disc region is considered. Clustering means K is used automatically to extract the optic disc whereas K-value is automatically selected… More >

  • Open Access

    ARTICLE

    Application of FCM Algorithm Combined with Articial Neural Network in TBM Operation Data

    Jingyi Fang1, Xueguan Song2, Nianmin Yao3, Maolin Shi2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 397-417, 2021, DOI:10.32604/cmes.2021.012895 - 22 December 2020

    Abstract Fuzzy clustering theory is widely used in data mining of full-face tunnel boring machine. However, the traditional fuzzy clustering algorithm based on objective function is difficult to effectively cluster functional data. We propose a new Fuzzy clustering algorithm, namely FCM–ANN algorithm. The algorithm replaces the clustering prototype of the FCM algorithm with the predicted value of the articial neural network. This makes the algorithm not only satisfy the clustering based on the traditional similarity criterion, but also can effectively cluster the functional data. In this paper, we rst use the t-test as an evaluation index… More >

  • Open Access

    ARTICLE

    RAIM Algorithm Based on Fuzzy Clustering Analysis

    Shouzhou Gu1,*, Jinzhong Bei1, Chuang Shi2, Yaming Dang1, Zuoya Zheng4, Congcong Cui5

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.2, pp. 281-293, 2019, DOI:10.32604/cmes.2019.04421

    Abstract With the development of various navigation systems (such as GLONASS, Galileo, BDS), there is a sharp increase in the number of visible satellites. Accordingly, the probability of multiply gross measurements will increase. However, the conventional RAIM methods are difficult to meet the demands of the navigation system. In order to solve the problem of checking and identify multiple gross errors of receiver autonomous integrity monitoring (RAIM), this paper designed full matrix of single point positioning by QR decomposition, and proposed a new RAIM algorithm based on fuzzy clustering analysis with fuzzy c-means (FCM). And on More >

  • Open Access

    ARTICLE

    An Energy-Efficient Protocol Using an Objective Function & Random Search with Jumps for WSN

    Mohammed Kaddi1,3,*, Khelifa Benahmed2, Mohammed Omari3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 603-624, 2019, DOI:10.32604/cmc.2019.05341

    Abstract Wireless Sensor Networks (WSNs) have hardware and software limitations and are deployed in hostile environments. The problem of energy consumption in WSNs has become a very important axis of research. To obtain good performance in terms of the network lifetime, several routing protocols have been proposed in the literature. Hierarchical routing is considered to be the most favorable approach in terms of energy efficiency. It is based on the concept parent-child hierarchy where the child nodes forward their messages to their parent, and then the parent node forwards them, directly or via other parent nodes,… More >

  • Open Access

    ARTICLE

    A Method of Identifying Thunderstorm Clouds in Satellite Cloud Image Based on Clustering

    Lili He1,2, Dantong Ouyang1,2, Meng Wang1,2, Hongtao Bai1,2, Qianlong Yang1,2, Yaqing Liu3,4, Yu Jiang1,2,*

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 549-570, 2018, DOI:10.32604/cmc.2018.03840

    Abstract In this paper, the clustering analysis is applied to the satellite image segmentation, and a cloud-based thunderstorm cloud recognition method is proposed in combination with the strong cloud computing power. The method firstly adopts the fuzzy C-means clustering (FCM) to obtain the satellite cloud image segmentation. Secondly, in the cloud image, we dispose the ‘high-density connected’ pixels in the same cloud clusters and the ‘low-density connected’ pixels in different cloud clusters. Therefore, we apply the DBSCAN algorithm to the cloud image obtained in the first step to realize cloud cluster knowledge. Finally, using the method More >

  • Open Access

    ARTICLE

    A Comparative Study of Global and Local Meshless Methods for Diffusion-Reaction Equation

    Guangming Yao1, Siraj-ul-Islam2, Božidar Šarler2

    CMES-Computer Modeling in Engineering & Sciences, Vol.59, No.2, pp. 127-154, 2010, DOI:10.3970/cmes.2010.059.127

    Abstract This paper focuses on the comparative study of global and local meshless methods based on collocation with radial basis functions for solving two dimensional initial boundary value diffusion-reaction problem with Dirichlet and Neumann boundary conditions. A similar study was performed for the boundary value problem with Laplace equation by Lee, Liu, and Fan (2003). In both global and local methods discussed, the time discretization is performed in explicit and implicit way and the multiquadric radial basis functions (RBFs) are used to interpolate diffusion-reaction variable and its spatial derivatives. Five and nine nodded sub-domains are used… More >

Displaying 11-20 on page 2 of 20. Per Page