Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (159)
  • Open Access

    ARTICLE

    Outlier Behavior Detection for Indoor Environment Based on t-SNE Clustering

    Shinjin Kang1, Soo Kyun Kim2,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3725-3736, 2021, DOI:10.32604/cmc.2021.016828

    Abstract In this study, we propose a low-cost system that can detect the space outlier utilization of residents in an indoor environment. We focus on the users’ app usage to analyze unusual behavior, especially in indoor spaces. This is reflected in the behavioral analysis in that the frequency of using smartphones in personal spaces has recently increased. Our system facilitates autonomous data collection from mobile app logs and Google app servers and generates a high-dimensional dataset that can detect outlier behaviors. The density-based spatial clustering of applications with noise (DBSCAN) algorithm was applied for effective singular movement analysis. To analyze high-level… More >

  • Open Access

    ARTICLE

    Ergodic Capacity Evaluation of Multi-Hop Decode-and-Forward MIMO-OFDM Relaying Network

    Latif Jan1, Mohammad Haseeb Zafar1, Abdul Waheed2, Mahdi Zareei3, Faisal Alanazi4,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3133-3145, 2021, DOI:10.32604/cmc.2021.014857

    Abstract Spatial diversity plays a significant role in wireless communication systems, including the Fourth Generation (4G) and Fifth Generation (5G) systems, and it is expected to be a fundamental part of the future wireless communication systems as well. The Multiple-Input Multiple-Output (MIMO) technology, which is included in the IEEE 802.16j standard, still holds the most crucial position in the 4G spectrum as it promises to improve the throughput, capacity, spectral, and energy efficiency of wireless communication systems in the 2020s. This makes MIMO a viable technology for delay constrained medical and health care facilities. This paper presents an approximate closed-form expression… More >

  • Open Access

    ARTICLE

    Multi Sensor-Based Implicit User Identification

    Muhammad Ahmad1,*, Rana Aamir Raza2, Manuel Mazzara3, Salvatore Distefano4, Ali Kashif Bashir5, Adil Khan3, Muhammad Shahzad Sarfraz1, Muhammad Umar Aftab1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1673-1692, 2021, DOI:10.32604/cmc.2021.016232

    Abstract Smartphones have ubiquitously integrated into our home and work environments, however, users normally rely on explicit but inefficient identification processes in a controlled environment. Therefore, when a device is stolen, a thief can have access to the owner’s personal information and services against the stored passwords. As a result of this potential scenario, this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors. A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features, then further optimized… More >

  • Open Access

    ARTICLE

    Ensembling Neural Networks for User’s Indoor Localization Using Magnetic Field Data from Smartphones

    Imran Ashraf, Soojung Hur, Yousaf Bin Zikria, Yongwan Park*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2597-2620, 2021, DOI:10.32604/cmc.2021.016214

    Abstract Predominantly the localization accuracy of the magnetic field-based localization approaches is severed by two limiting factors: Smartphone heterogeneity and smaller data lengths. The use of multifarious smartphones cripples the performance of such approaches owing to the variability of the magnetic field data. In the same vein, smaller lengths of magnetic field data decrease the localization accuracy substantially. The current study proposes the use of multiple neural networks like deep neural network (DNN), long short term memory network (LSTM), and gated recurrent unit network (GRN) to perform indoor localization based on the embedded magnetic sensor of the smartphone. A voting scheme… More >

  • Open Access

    ARTICLE

    Synthesis and Characterization of Thermoplastic Poly(Ester Amide)s Elastomer (TPEaE) Obtained from Recycled PET

    Zhi-Yu Yang, Yi-Ling Chou, Hao-Chun Yang, Chin-Wen Chen*, Syang-Peng Rwei*

    Journal of Renewable Materials, Vol.9, No.5, pp. 867-880, 2021, DOI:10.32604/jrm.2021.014476

    Abstract A series of thermoplastic polyester elastomer (TPEE) and thermoplastic poly(ester amide)s elastomer (TPEaE) copolymers were obtained by depolymerizing PET (polyethylene terephthalate) by which the waste PET can be efficiently recovered and recycled into value-added products from a practical and economical point of view. The structure of TPEE and TPEaE was identified using nuclear magnetic resonance (NMR) and Fourier transform infrared spectroscopy (FT-IR). Differential scanning calorimetry (DSC) data showed that the melting temperature (Tm) decreased with the amide content increased. The glass transition temperature (Tg) was increased as introducing the amide group, and the formation of amide-ester and amide-amide hydrogen bonds… More >

  • Open Access

    ARTICLE

    TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators

    Zhengqiu Weng1,2, Timing Chen1,*, Tiantian Zhu1, Hang Dong1, Dan Zhou1, Osama Alfarraj3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 105-119, 2021, DOI:10.32604/csse.2021.015074

    Abstract Internet traffic encryption is a very common traffic protection method. Most internet traffic is protected by the encryption protocol called transport layer security (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected. At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, such as high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved. In this paper, we present TLSmell,… More >

  • Open Access

    ARTICLE

    Green5G: Enhancing Capacity and Coverage in Device-to-Device Communication

    Abdul Rehman Javed1,*, Rabia Abid2, Bakhtawar Aslam2, Hafiza Ammara Khalid2, Mohammad Zubair Khan3, Omar H. Alhazmi3, Muhammad Rizwan2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1933-1950, 2021, DOI:10.32604/cmc.2021.015272

    Abstract With the popularity of green computing and the huge usage of networks, there is an acute need for expansion of the 5G network. 5G is used where energy efficiency is the highest priority, and it can play a pinnacle role in helping every industry to hit sustainability. While in the 5G network, conventional performance guides, such as network capacity and coverage are still major issues and need improvements. Device to Device communication (D2D) communication technology plays an important role to improve the capacity and coverage of 5G technology using different techniques. The issue of energy utilization in the IoT based… More >

  • Open Access

    ARTICLE

    A Novel Semi-Quantum Private Comparison Scheme Using Bell Entangle States

    Yuhua Sun1, Lili Yan1,*, Zhibin Sun2, Shibin Zhang1, Jiazhong Lu1

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2385-2395, 2021, DOI:10.32604/cmc.2021.012696

    Abstract

    Private comparison is the basis of many encryption technologies, and several related Quantum Private Comparison (QPC) protocols have been published in recent years. In these existing protocols, secret information is encoded by using conjugate coding or orthogonal states, and all users are quantum participants. In this paper, a novel semi-quantum private comparison scheme is proposed, which employs Bell entangled states as quantum resources. Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party (TP). Compared with the previous classical protocols, these two semi-quantum users can only make some particular action, such as… More >

  • Open Access

    ARTICLE

    Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm

    Mohammed Alshehri1,*, Purushottam Sharma2, Richa Sharma2, Osama Alfarraj3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2525-2538, 2021, DOI:10.32604/cmc.2021.012469

    Abstract Sensors and physical activity evaluation are quite limited for motion-based commercial devices. Sometimes the accelerometer of the smartwatch is utilized; walking is investigated. The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones, i.e., accelerometer and gyroscope. For biometric efficiency, some of the diverse activities of daily routine have been evaluated, also with biometric authentication. The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities. This indicates that the high feasibility and results… More >

  • Open Access

    ARTICLE

    Comparative Effectiveness of Mind-Body Exercise Versus Cognitive Behavioral Therapy for College Students with Problematic Smartphone Use: A Randomized Controlled Trial

    Chunping Lu1,#, Liye Zou2,#, Benjamin Becker3, Mark D. Griffiths4, Qian Yu2, Si-Tong Chen5, Zsolt Demetrovics6, Can Jiao7, Xinli Chi7, Aiguo Chen8, Albert Yeung9, Shijie Liu10, Yanjie Zhang2,11,*

    International Journal of Mental Health Promotion, Vol.22, No.4, pp. 271-282, 2020, DOI:10.32604/IJMHP.2020.014419

    Abstract Purpose: The purpose of the present study was to compare the effectiveness of mind-body exercise (ME) and cognitive behavioral therapy (CBT) on addiction level and psychological well-being among college students with problematic smartphone use (PSU). Methods: A 12-week randomized controlled study was carried out at a university in central China. A total of 95 PSU college students who met the inclusion criteria were randomly assigned to a ME group (ME, n = 31), CBT group (CBT, n = 30), or control group (CG, n = 34). Both ME intervention and CBT, twice per week for 90 min per session, lasting… More >

Displaying 101-110 on page 11 of 159. Per Page