Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29,271)
  • Open Access

    ARTICLE

    Integrity Assessment of Medical Devices for Improving Hospital Services

    Fahad A. Alzahrani1, Masood Ahmad2, Mohd Nadeem2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3619-3633, 2021, DOI:10.32604/cmc.2021.014869 - 01 March 2021

    Abstract The present study examines the various techniques being used to maintain the integrity of the medical devices, and develops a quantitative framework to list these in the sequence of priority. To achieve the intended objective, the study employs the combined procedure of Fuzzy Analytic Network Process (ANP) and Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS). We selected fuzzy based decision making techniques for assessing the integrity of medical devices. The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices. Different techniques or… More >

  • Open Access

    ARTICLE

    Smart Dynamic Traffic Monitoring and Enforcement System

    Youssef El-Hansali1, Fatma Outay2,*, Ansar Yasar1, Siham Farrag1,3, Muhammad Shoaib4, Muhammad Imran4, Hammad Hussain Awan5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2797-2806, 2021, DOI:10.32604/cmc.2021.014812 - 01 March 2021

    Abstract Enforcement of traffic rules and regulations involves a wide range of complex tasks, many of which demand the use of modern technologies. variable speed limits (VSL) control is to change the current speed limit according to the current traffic situation based on the observed traffic conditions. The aim of this study is to provide a simulation-based methodological framework to evaluate (VSL) as an effective Intelligent Transportation System (ITS) enforcement system. The focus of the study is on measuring the effectiveness of the dynamic traffic control strategy on traffic performance and safety considering various performance indicators… More >

  • Open Access

    ARTICLE

    Windowing Techniques, the Welch Method for Improvement of Power Spectrum Estimation

    Dah-Jing Jwo1,*, Wei-Yeh Chang1, I-Hua Wu2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3983-4003, 2021, DOI:10.32604/cmc.2021.014752 - 01 March 2021

    Abstract This paper revisits the characteristics of windowing techniques with various window functions involved, and successively investigates spectral leakage mitigation utilizing the Welch method. The discrete Fourier transform (DFT) is ubiquitous in digital signal processing (DSP) for the spectrum analysis and can be efficiently realized by the fast Fourier transform (FFT). The sampling signal will result in distortion and thus may cause unpredictable spectral leakage in discrete spectrum when the DFT is employed. Windowing is implemented by multiplying the input signal with a window function and windowing amplitude modulates the input signal so that the spectral… More >

  • Open Access

    ARTICLE

    Energy-Efficient Low-Complexity Algorithm in 5G Massive MIMO Systems

    Adeeb Salh1, Lukman Audah1,*, Qazwan Abdullah1, Nor Shahida M. Shah2, Shipun A. Hamzah1, Shahilah Nordin3, Nabil Farah2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3189-3214, 2021, DOI:10.32604/cmc.2021.014746 - 01 March 2021

    Abstract Energy efficiency (EE) is a critical design when taking into account circuit power consumption (CPC) in fifth-generation cellular networks. These problems arise because of the increasing number of antennas in massive multiple-input multiple-output (MIMO) systems, attributable to inter-cell interference for channel state information. Apart from that, a higher number of radio frequency (RF) chains at the base station and active users consume more power due to the processing activities in digital-to-analogue converters and power amplifiers. Therefore, antenna selection, user selection, optimal transmission power, and pilot reuse power are important aspects in improving energy efficiency in… More >

  • Open Access

    ARTICLE

    Web Application Commercial Design for Financial Entities Based on Business Intelligence

    Carlos Andrés Tavera Romero1,*, Jesus Hamilton Ortiz2, Osamah Ibrahim Khalaf3, Andrea Ríos Prado4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3177-3188, 2021, DOI:10.32604/cmc.2021.014738 - 01 March 2021

    Abstract Multiple customer data management has become a focus of attention in big organizations. Although much information is available, it does not translate into significant profitable value-added services. We present a design of a commercial web application based on business intelligence that generates information on social and financial behavior of clients in an organization; with the purpose of obtain additional information that allows to get more profits. This app will provide a broader perspective for making strategic decisions to increase profits and reduce internal investment costs. A case in point is the financial sector, a group… More >

  • Open Access

    ARTICLE

    Prediction of Cloud Ranking in a Hyperconverged Cloud Ecosystem Using Machine Learning

    Nadia Tabassum1, Allah Ditta2, Tahir Alyas3, Sagheer Abbas4, Hani Alquhayz5, Natash Ali Mian6, Muhammad Adnan Khan7,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3129-3141, 2021, DOI:10.32604/cmc.2021.014729 - 01 March 2021

    Abstract Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet. The design of reliable and high-quality cloud applications requires a strong Quality of Service QoS parameter metric. In a hyperconverged cloud ecosystem environment, building high-reliability cloud applications is a challenging job. The selection of cloud services is based on the QoS parameters that play essential roles in optimizing and improving cloud rankings. The emergence of cloud computing is significantly reshaping the digital ecosystem, and the numerous services offered by cloud service providers are playing a vital… More >

  • Open Access

    ARTICLE

    Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

    V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4005-4018, 2021, DOI:10.32604/cmc.2021.014643 - 01 March 2021

    Abstract Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need… More >

  • Open Access

    ARTICLE

    Epidemic Spreading–Information Dissemination Coupling Mechanism in Heterogeneous Areas

    Yang Yang, Haiyan Liu*, Jianlin Zhou

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3311-3327, 2021, DOI:10.32604/cmc.2021.014628 - 01 March 2021

    Abstract With COVID-19 continuing to rage around the world, there is a spread of epidemic-related information on social networking platforms. This phenomenon may inhibit or promote the scale of epidemic transmission. This study constructed a double-layer epidemic spreading–information dissemination network based on the movements of individuals across regions to analyze the dynamic evolution and coupling mechanism of information dissemination and epidemic transmission. We also proposed measures to control the spread of the epidemic by analyzing the factors affecting dynamic transmission. We constructed a state probability equation based on Markov chain theory and performed Monte Carlo simulations… More >

  • Open Access

    ARTICLE

    Novel Adaptive Binarization Method for Degraded Document Images

    Siti Norul Huda Sheikh Abdullah1, Saad M. Ismail1,2, Mohammad Kamrul Hasan1,*, Palaiahnakote Shivakumara3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3815-3832, 2021, DOI:10.32604/cmc.2021.014610 - 01 March 2021

    Abstract Achieving a good recognition rate for degraded document images is difficult as degraded document images suffer from low contrast, bleed-through, and nonuniform illumination effects. Unlike the existing baseline thresholding techniques that use fixed thresholds and windows, the proposed method introduces a concept for obtaining dynamic windows according to the image content to achieve better binarization. To enhance a low-contrast image, we proposed a new mean histogram stretching method for suppressing noisy pixels in the background and, simultaneously, increasing pixel contrast at edges or near edges, which results in an enhanced image. For the enhanced image, More >

  • Open Access

    ARTICLE

    ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing

    Ayesha Riaz1, Naveed Riaz1, Awais Mahmood2,*, Sajid Ali Khan3, Imran Mahmood1, Omar Almutiry2, Habib Dhahri2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2747-2764, 2021, DOI:10.32604/cmc.2021.014418 - 01 March 2021

    Abstract The COVID-19 outbreak and its medical distancing phenomenon have effectively turned the global healthcare challenge into an opportunity for Telecare Medical Information Systems. Such systems employ the latest mobile and digital technologies and provide several advantages like minimal physical contact between patient and healthcare provider, easy mobility, easy access, consistent patient engagement, and cost-effectiveness. Any leakage or unauthorized access to users’ medical data can have serious consequences for any medical information system. The majority of such systems thus rely on biometrics for authenticated access but biometric systems are also prone to a variety of attacks… More >

Displaying 17481-17490 on page 1749 of 29271. Per Page