Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,086)
  • Open Access

    ARTICLE

    Power Allocation in NOMA-CR for 5G Enabled IoT Networks

    Mohammed Basheri1, Mohammad Haseeb Zafar1,2,3,*, Imran Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5515-5530, 2022, DOI:10.32604/cmc.2022.027532 - 21 April 2022

    Abstract In the power domain, non-orthogonal multiple access (NOMA) supports multiple users on the same time-frequency resources, assigns different transmission powers to different users, and differentiates users by user channel gains. Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information, and multi-user detection algorithms, such as successive interference cancellation (SIC) is performed at the receiving end to demodulate the necessary user signals. In contrast to the orthogonal transmission method, the non-orthogonal method can achieve higher spectrum utilization. However, it will increase the receiver complexity. With… More >

  • Open Access

    ARTICLE

    An Efficient Stacked-LSTM Based User Clustering for 5G NOMA Systems

    S. Prabha Kumaresan1, Chee Keong Tan2,*, Yin Hoe Ng1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6119-6140, 2022, DOI:10.32604/cmc.2022.027223 - 21 April 2022

    Abstract Non-orthogonal multiple access (NOMA) has been a key enabling technology for the fifth generation (5G) cellular networks. Based on the NOMA principle, a traditional neural network has been implemented for user clustering (UC) to maximize the NOMA system’s throughput performance by considering that each sample is independent of the prior and the subsequent ones. Consequently, the prediction of UC for the future ones is based on the current clustering information, which is never used again due to the lack of memory of the network. Therefore, to relate the input features of NOMA users and capture… More >

  • Open Access

    ARTICLE

    Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet

    Muhamad Erza Aminanto1,2,*, Ibnu Rifqi Purbomukti3, Harry Chandra2, Kwangjo Kim4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5301-5314, 2022, DOI:10.32604/cmc.2022.026749 - 21 April 2022

    Abstract Internet of Things (IoT) networks leverage wireless communication protocols, which adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several examples of different attacks existing in Wi-Fi networks. Intrusion Detection System (IDS) became one solution to distinguish those attacks from benign traffic. Deep learning techniques have been intensively utilized to classify the attacks. However, the main issue of utilizing deep learning models is projecting the data, notably tabular data, into an image. This study proposes a novel projection from wireless network attacks data into a grid-based image for feeding one of the Convolutional Neural… More >

  • Open Access

    ARTICLE

    Improving Method of Anomaly Detection Performance for Industrial IoT Environment

    Junwon Kim1, Jiho Shin2, Ki-Woong Park3, Jung Taek Seo4,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5377-5394, 2022, DOI:10.32604/cmc.2022.026619 - 21 April 2022

    Abstract Industrial Control System (ICS), which is based on Industrial IoT (IIoT), has an intelligent mobile environment that supports various mobility, but there is a limit to relying only on the physical security of the ICS environment. Due to various threat factors that can disrupt the workflow of the IIoT, machine learning-based anomaly detection technologies are being presented; it is also essential to study for increasing detection performance to minimize model errors for promoting stable ICS operation. In this paper, we established the requirements for improving the anomaly detection performance in the IIoT-based ICS environment by… More >

  • Open Access

    ARTICLE

    Efficient Data Augmentation Techniques for Improved Classification in Limited Data Set of Oral Squamous Cell Carcinoma

    Wael Alosaimi1,*, M. Irfan Uddin2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1387-1401, 2022, DOI:10.32604/cmes.2022.018433 - 19 April 2022

    Abstract Deep Learning (DL) techniques as a subfield of data science are getting overwhelming attention mainly because of their ability to understand the underlying pattern of data in making classifications. These techniques require a considerable amount of data to efficiently train the DL models. Generally, when the data size is larger, the DL models perform better. However, it is not possible to have a considerable amount of data in different domains such as healthcare. In healthcare, it is impossible to have a substantial amount of data to solve medical problems using Artificial Intelligence, mainly due to… More >

  • Open Access

    ARTICLE

    A Stacked Ensemble-Based Classifier for Breast Invasive Ductal Carcinoma Detection on Histopathology Images

    Ali G. Alkhathami*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 235-247, 2022, DOI:10.32604/iasc.2022.024952 - 15 April 2022

    Abstract Breast cancer is one of the main causes of death in women. When body tissues start behaves abnormally and the ratio of tissues growth becomes asymmetrical then this stage is called cancer. Invasive ductal carcinoma (IDC) is the early stage of breast cancer. The early detection and diagnosis of invasive ductal carcinoma is a significant step for the cure of IDC breast cancer. This paper presents a convolutional neural network (CNN) approach to detect and visualize the IDC tissues in breast on histological images dataset. The dataset consists of 90 thousand histopathological images containing two… More >

  • Open Access

    ARTICLE

    Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos

    M. Murugesan*, S. Thilagamani

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 389-405, 2022, DOI:10.32604/iasc.2022.024641 - 15 April 2022

    Abstract Automatic anomaly activity detection is difficult in video surveillance applications due to variations in size, type, shape, and objects’ location. The traditional anomaly detection and classification methods may affect the overall segmentation accuracy. It requires the working groups to judge their constant attention if the captured activities are anomalous or suspicious. Therefore, this defect creates the need to automate this process with high accuracy. In addition to being extraordinary or questionable, the display does not contain the necessary recording frame and activity standard to help the quick judgment of the parts’ specialized action. Therefore, to… More >

  • Open Access

    ARTICLE

    Exploration of Combinational Therapeutic Strategies for HCC Based on TCGA HCC Database

    Dong Yan1,#, Chunxiao Li2,#, Yantong Zhou2, Xue Yan1, Weihua Zhi1, Haili Qian2,*, Yue Han1,*

    Oncologie, Vol.24, No.1, pp. 101-111, 2022, DOI:10.32604/oncologie.2022.020357 - 31 March 2022

    Abstract Hepatocellular carcinoma (HCC) is one of the most deadly types of cancer. Sorafenib is currently the only available first-line molecular targeted drug approved by the FDA for HCC. However, primary and secondary resistance is often encountered with treatment with sorafenib. Genomic alterations found in HCC represent potential targets to develop new drugs or new combinational strategies against this type of cancer. Here we analyzed genomic alterations from the TCGA database of HCC samples and the corresponding targeted drugs available to the clinic to identify candidate drugs that might hold promise when used in combination with… More >

  • Open Access

    CASE REPORT

    A Primary Sacral Melanoma of Unknown Origin: A Case Report

    Ismail Bozkurt1,*, Baris Yasar1, Mehmet Baran Uslu2, Nazan Bozdogan3

    Oncologie, Vol.24, No.1, pp. 163-171, 2022, DOI:10.32604/oncologie.2022.019263 - 31 March 2022

    Abstract Malignant melanoma caused by malignant transformation of melanocytes is associated with high mortality and is difficult to manage. Metastasis is not uncommon (up to 31% of all cases) and is closely associated with a poor prognosis. Although rare (4–5%), extracutaneous melanoma has been reported; however, primary malignant melanoma of the sacrum is extremely rare (only three case reports to date). Here, we present a 51-year-old patient who underwent surgical treatment for a lesion of the spinal canal and associated bony structures; extensive aggressive resection was required. She underwent partial sacrectomy and lumbo-iliac fixation (to maintain More >

  • Open Access

    ARTICLE

    An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

    Ghalib H. Alshammri1,2, Amani K. Samha3, Ezz El-Din Hemdan4, Mohammed Amoon1,4, Walid El-Shafai5,6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3529-3548, 2022, DOI:10.32604/cmc.2022.025262 - 29 March 2022

    Abstract Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process. In recent times, the most complex task in Software Defined Network (SDN) is security, which is based on a centralized, programmable controller. Therefore, monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment. Consequently, this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms: K-means, Farthest First, Canopy, Density-based algorithm, and Exception-maximization (EM), using the Waikato Environment for Knowledge Analysis (WEKA) software to compare… More >

Displaying 471-480 on page 48 of 1086. Per Page