Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,653)
  • Open Access

    ARTICLE

    A Learning-based Static Malware Detection System with Integrated Feature

    Zhiguo Chen1,*, Xiaorui Zhang1,2, Sungryul Kim3

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 891-908, 2021, DOI:10.32604/iasc.2021.016933 - 01 March 2021

    Abstract The rapid growth of malware poses a significant threat to the security of computer systems. Analysts now need to examine thousands of malware samples daily. It has become a challenging task to determine whether a program is a benign program or malware. Making accurate decisions about the program is crucial for anti-malware products. Precise malware detection techniques have become a popular issue in computer security. Traditional malware detection uses signature-based strategies, which are the most widespread method used in commercial anti-malware software. This method works well against known malware but cannot detect new malware. To… More >

  • Open Access

    ARTICLE

    CMMI Compliant Workflow Models to Establish Configuration Management Integrity in Software SMEs

    Islam Ali1, Musawwer Khan1, Waqar Mehmood1, Wasif Nisar1, Waqar Aslam2, Muhammad Qaiser Saleem3, Majzoob K. Omer3, Muhammad Shafiq4,*

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 605-623, 2021, DOI:10.32604/iasc.2021.014639 - 01 March 2021

    Abstract Capability Maturity Model Integration (CMMI) is a world-renowned framework for software process improvement, which specifies “What-To-Do” in terms of requirements. However, it leaves the “How-To-Do” part regarding implementation to implementers. The software industry especially software SMEs (SSMEs) faces difficulties in implementing the Specific Practices (SPs) of Various Process Areas (PAs). Configuration Management Process Area (CM-PA) is usually ignored despite its acknowledged importance in the software development process. Establishing integrity is one of the three Specific Goals (SGs) that CMMI ver. 1.3 requires for successful implementation of CM-PA. This goal is achieved through the implementation of… More >

  • Open Access

    ARTICLE

    Low Complexity Decoding Algorithm for Uplink SCMA Based on Aerial Spherical Decoding

    Xiaohong Ji1, Junjun Du1, Guoqing Jia1,*, Weidong Fang2,3

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 737-746, 2021, DOI:10.32604/iasc.2021.013009 - 01 March 2021

    Abstract As a new non-orthogonal multiple access technology for 5G massive machine type communication scenario, the sparse code multiple access (SCMA) has greatly improved the spectrum efficiency due to the high connection density. SCMA combines QAM (Quadrature Amplitude Modulation) modulation and sparse spreading into a codebook set to obtain forming gain. The user binary bit data is directly mapped into multi-dimensional codewords in the transmitter. The receiver uses the message passing algorithm (MPA) for multi-user detection to achieve efficient decoding. However, MPA is a good solution for SCMA, though its high complexity limits the application in… More >

  • Open Access

    ARTICLE

    Control Strategy for a Quadrotor Based on a Memetic Shuffled Frog Leaping Algorithm

    Nour Ben Ammar1, Hegazy Rezk2,3,*, Soufiene Bouallègue1,4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4081-4100, 2021, DOI:10.32604/cmc.2021.015681 - 01 March 2021

    Abstract This work presents a memetic Shuffled Frog Leaping Algorithm (SFLA) based tuning approach of an Integral Sliding Mode Controller (ISMC) for a quadrotor type of Unmanned Aerial Vehicles (UAV). Based on the Newton–Euler formalism, a nonlinear dynamic model of the studied quadrotor is firstly established for control design purposes. Since the main parameters of the ISMC design are the gains of the sliding surfaces and signum functions of the switching control law, which are usually selected by repetitive and time-consuming trials-errors based procedures, a constrained optimization problem is formulated for the systematically tuning of these… More >

  • Open Access

    ARTICLE

    Parallel Optimization of Program Instructions Using Genetic Algorithms

    Petre Anghelescu*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3293-3310, 2021, DOI:10.32604/cmc.2021.015495 - 01 March 2021

    Abstract This paper describes an efficient solution to parallelize software program instructions, regardless of the programming language in which they are written. We solve the problem of the optimal distribution of a set of instructions on available processors. We propose a genetic algorithm to parallelize computations, using evolution to search the solution space. The stages of our proposed genetic algorithm are: The choice of the initial population and its representation in chromosomes, the crossover, and the mutation operations customized to the problem being dealt with. In this paper, genetic algorithms are applied to the entire search… More >

  • Open Access

    ARTICLE

    An Energy-Efficient Mobile-Sink Path-Finding Strategy for UAV WSNs

    Lyk Yin Tan*, Hock Guan Goh, Soung-Yue Liew, Shen Khang Teoh

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3419-3432, 2021, DOI:10.32604/cmc.2021.015402 - 01 March 2021

    Abstract Data collection using a mobile sink in a Wireless Sensor Network (WSN) has received much attention in recent years owing to its potential to reduce the energy consumption of sensor nodes and thus enhancing the lifetime of the WSN. However, a critical issue of this approach is the latency of data to reach the base station. Although many data collection algorithms have been introduced in the literature to reduce delays in data delivery, their performances are affected by the flight trajectory taken by the mobile sink, which might not be optimized yet. This paper proposes… More >

  • Open Access

    ARTICLE

    Prediction Models for COVID-19 Integrating Age Groups, Gender, and Underlying Conditions

    Imran Ashraf1, Waleed S. Alnumay2, Rashid Ali3, Soojung Hur1, Ali Kashif Bashir4, Yousaf Bin Zikria1,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3009-3044, 2021, DOI:10.32604/cmc.2021.015140 - 01 March 2021

    Abstract The COVID-19 pandemic has caused hundreds of thousands of deaths, millions of infections worldwide, and the loss of trillions of dollars for many large economies. It poses a grave threat to the human population with an excessive number of patients constituting an unprecedented challenge with which health systems have to cope. Researchers from many domains have devised diverse approaches for the timely diagnosis of COVID-19 to facilitate medical responses. In the same vein, a wide variety of research studies have investigated underlying medical conditions for indicators suggesting the severity and mortality of, and role of… More >

  • Open Access

    ARTICLE

    Integrity Assessment of Medical Devices for Improving Hospital Services

    Fahad A. Alzahrani1, Masood Ahmad2, Mohd Nadeem2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3619-3633, 2021, DOI:10.32604/cmc.2021.014869 - 01 March 2021

    Abstract The present study examines the various techniques being used to maintain the integrity of the medical devices, and develops a quantitative framework to list these in the sequence of priority. To achieve the intended objective, the study employs the combined procedure of Fuzzy Analytic Network Process (ANP) and Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS). We selected fuzzy based decision making techniques for assessing the integrity of medical devices. The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices. Different techniques or… More >

  • Open Access

    ARTICLE

    Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

    V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4005-4018, 2021, DOI:10.32604/cmc.2021.014643 - 01 March 2021

    Abstract Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need… More >

  • Open Access

    REVIEW

    Visualization of integrin molecules by fluorescence imaging and techniques

    CHEN CAI1, HAO SUN2, LIANG HU3, ZHICHAO FAN1,*

    BIOCELL, Vol.45, No.2, pp. 229-257, 2021, DOI:10.32604/biocell.2021.014338 - 19 February 2021

    Abstract Integrin molecules are transmembrane αβ heterodimers involved in cell adhesion, trafficking, and signaling. Upon activation, integrins undergo dynamic conformational changes that regulate their affinity to ligands. The physiological functions and activation mechanisms of integrins have been heavily discussed in previous studies and reviews, but the fluorescence imaging techniques –which are powerful tools for biological studies– have not. Here we review the fluorescence labeling methods, imaging techniques, as well as Förster resonance energy transfer assays used to study integrin expression, localization, activation, and functions. More >

Displaying 1021-1030 on page 103 of 1653. Per Page