Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (151)
  • Open Access

    ARTICLE

    Computational Approximations for Real-World Application of Epidemic Model

    Shami A. M. Alsallami1, Ali Raza2,*, Mona Elmahi3, Muhammad Rafiq4, Shamas Bilal5, Nauman Ahmed6, Emad E. Mahmoud7

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1923-1939, 2022, DOI:10.32604/iasc.2022.024993 - 24 March 2022

    Abstract The real-world applications and analysis have a significant role in the scientific literature. For instance, mathematical modeling, computer graphics, camera, operating system, Java, disk encryption, web, streaming, and many more are the applications of real-world problems. In this case, we consider disease modeling and its computational treatment. Computational approximations have a significant role in different sciences such as behavioral, social, physical, and biological sciences. But the well-known techniques that are widely used in the literature have many problems. These methods are not consistent with the physical nature and even violate the actual behavior of the… More >

  • Open Access

    ARTICLE

    SSABA: Search Step Adjustment Based Algorithm

    Fatemeh Ahmadi Zeidabadi1, Ali Dehghani2, Mohammad Dehghani3, Zeinab Montazeri4, Štěpán Hubálovský5, Pavel Trojovský3,*, Gaurav Dhiman6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4237-4256, 2022, DOI:10.32604/cmc.2022.023682 - 14 January 2022

    Abstract Finding the suitable solution to optimization problems is a fundamental challenge in various sciences. Optimization algorithms are one of the effective stochastic methods in solving optimization problems. In this paper, a new stochastic optimization algorithm called Search Step Adjustment Based Algorithm (SSABA) is presented to provide quasi-optimal solutions to various optimization problems. In the initial iterations of the algorithm, the step index is set to the highest value for a comprehensive search of the search space. Then, with increasing repetitions in order to focus the search of the algorithm in achieving the optimal solution closer… More >

  • Open Access

    ARTICLE

    A Cloud-Based Secure Emergency Message Dissemination Scheme in Vehicular Adhoc Networks

    R. Rajasekar1,*, P. Sivakumar2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 117-131, 2022, DOI:10.32604/iasc.2022.023372 - 05 January 2022

    Abstract The Internet of vehicles and vehicular ad-hoc networks (VANET) offers numerous opportunities for managing the transportation problems effectively. The high mobility and wireless communication in VANET lead to adequate network topology modifications, resulting in network instability and insecure data communication. With an unsteady flow of traffic, vehicles are unevenly distributed in the geographical areas in practice. A new type 2 fuzzy logic-based secure clustering (T2FLSC) with cloud-based data dissemination scheme called the T2FLSC-CDD model for the VANET has been introduced for resolving this issue. The vehicles are dynamically clustered by the use of the T2FLSC… More >

  • Open Access

    ARTICLE

    SSA-HIAST: A Novel Framework for Code Clone Detection

    Neha Saini*, Sukhdip Singh

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2999-3017, 2022, DOI:10.32604/cmc.2022.022659 - 07 December 2021

    Abstract In the recent era of software development, reusing software is one of the major activities that is widely used to save time. To reuse software, the copy and paste method is used and this whole process is known as code cloning. This activity leads to problems like difficulty in debugging, increase in time to debug and manage software code. In the literature, various algorithms have been developed to find out the clones but it takes too much time as well as more space to figure out the clones. Unfortunately, most of them are not scalable.… More >

  • Open Access

    ARTICLE

    ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector

    Tengfei Tu1,2, Wei Yin3, Hua Zhang1,2,*, Xingyu Zeng1, Xiaoxiang Deng1, Yuchen Zhou1, Xu Liu4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2315-2331, 2022, DOI:10.32604/cmc.2022.022540 - 07 December 2021

    Abstract The Internet Control Message Protocol (ICMP) covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission. Its concealment is stronger and it is not easy to be discovered. Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions. In this paper, we propose an ICMP covert tunnel attack intent detection framework ICMPTend, which includes five steps: data collection, feature dictionary construction, data preprocessing, model construction, and attack intent prediction. ICMPTend can detect a variety of attack intentions, such as… More >

  • Open Access

    ARTICLE

    Unsupervised Binary Protocol Clustering Based on Maximum Sequential Patterns

    Jiaxin Shi1, Lin Ye1,2,*, Zhongwei Li3, Dongyang Zhan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 483-498, 2022, DOI:10.32604/cmes.2022.017467 - 29 November 2021

    Abstract With the rapid development of the Internet, a large number of private protocols emerge on the network. However, some of them are constructed by attackers to avoid being analyzed, posing a threat to computer network security. The blockchain uses the P2P protocol to implement various functions across the network. Furthermore, the P2P protocol format of blockchain may differ from the standard format specification, which leads to sniffing tools such as Wireshark and Fiddler not being able to recognize them. Therefore, the ability to distinguish different types of unknown network protocols is vital for network security.… More >

  • Open Access

    ARTICLE

    Course Evaluation Based on Deep Learning and SSA Hyperparameters Optimization

    Alaa A. El-Demerdash, Sherif E. Hussein, John FW Zaki*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 941-959, 2022, DOI:10.32604/cmc.2022.021839 - 03 November 2021

    Abstract Sentiment analysis attracts the attention of Egyptian Decision-makers in the education sector. It offers a viable method to assess education quality services based on the students’ feedback as well as that provides an understanding of their needs. As machine learning techniques offer automated strategies to process big data derived from social media and other digital channels, this research uses a dataset for tweets' sentiments to assess a few machine learning techniques. After dataset preprocessing to remove symbols, necessary stemming and lemmatization is performed for features extraction. This is followed by several machine learning techniques and… More >

  • Open Access

    ARTICLE

    Cluster-Based Stable BSM Dissemination System for Safe Autonomous Platooning

    Jaehwan Lee, Suhwan Kwak, Seungwoo Park, Sangoh Park*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 321-338, 2022, DOI:10.32604/cmc.2022.021237 - 03 November 2021

    Abstract Recently, the importance of vehicle safety supporting system has been highlighted as autonomous driving and platooning has attracted the researchers. To ensure driving safety, each vehicle must broadcast a basic safety message (BSM) every 100 ms. However, stable BSM exchange is difficult because of the changing environment and limited bandwidth of vehicular wireless communication. The increasing number of vehicles on the road increases the competition to access wireless networks for BSM exchange; this increases the packet collision rate. An increased packet collision rate impairs the transmission and reception of BSM information, which can easily cause… More >

  • Open Access

    ARTICLE

    Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

    S. Gladson Oliver1,*, T. Purusothaman2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 767-780, 2022, DOI:10.32604/csse.2022.020888 - 25 October 2021

    Abstract Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol… More >

  • Open Access

    ARTICLE

    Dual-Port Content Addressable Memory for Cache Memory Applications

    Allam Abumwais1,*, Adil Amirjanov1, Kaan Uyar1, Mujahed Eleyat2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4583-4597, 2022, DOI:10.32604/cmc.2022.020529 - 11 October 2021

    Abstract Multicore systems oftentimes use multiple levels of cache to bridge the gap between processor and memory speed. This paper presents a new design of a dedicated pipeline cache memory for multicore processors called dual port content addressable memory (DPCAM). In addition, it proposes a new replacement algorithm based on hardware which is called a near-far access replacement algorithm (NFRA) to reduce the cost overhead of the cache controller and improve the cache access latency. The experimental results indicated that the latency for write and read operations are significantly less in comparison with a set-associative cache More >

Displaying 71-80 on page 8 of 151. Per Page