Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (90)
  • Open Access

    ARTICLE

    VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption

    M. Sundar Prakash Balaji1,*, V. R. Vijaykumar2, Kamalraj Subramaniam3, M. Kannan4, V. Ayyem Pillai5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3155-3168, 2023, DOI:10.32604/iasc.2023.028969

    Abstract The current research work proposed a novel optimization-based 2D-SIMM (Two-Dimensional Sine Iterative chaotic map with infinite collapse Modulation Map) model for image encryption. The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse (ICMIC). In this technique, scrambling effect is achieved with the help of Chaotic Shift Transform (CST). Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model. These chaotic sequences, generated using 2D-SIMM model, are sensitive to initial conditions. In… More >

  • Open Access

    ARTICLE

    Time Delay Estimation in Radar System using Fuzzy Based Iterative Unscented Kalman Filter

    T. Jagadesh1,2, B. Sheela Rani3,*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2569-2583, 2023, DOI:10.32604/csse.2023.027239

    Abstract RSs (Radar Systems) identify and trace targets and are commonly employed in applications like air traffic control and remote sensing. They are necessary for monitoring precise target trajectories. Estimations of RSs are non-linear as the parameters TDEs (time delay Estimations) and Doppler shifts are computed on receipt of echoes where EKFs (Extended Kalman Filters) and UKFs (Unscented Kalman Filters) have not been examined for computations. RSs, certain times result in poor accuracies and SNRs (low signal to noise ratios) especially, while encountering complicated environments. This work proposes IUKFs (Iterated UKFs) to track online filter performances while using optimization techniques to… More >

  • Open Access

    ARTICLE

    Chaotic Pigeon Inspired Optimization Technique for Clustered Wireless Sensor Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Sami Dhahbi3, Dalia H. Elkamchouchi4, Jaber S. Alzahrani5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6547-6561, 2022, DOI:10.32604/cmc.2022.031660

    Abstract Wireless Sensor Networks (WSN) interlink numerous Sensor Nodes (SN) to support Internet of Things (loT) services. But the data gathered from SNs can be divulged, tempered, and forged. Conventional WSN data processes manage the data in a centralized format at terminal gadgets. These devices are prone to attacks and the security of systems can get compromised. Blockchain is a distributed and decentralized technique that has the ability to handle security issues in WSN. The security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network system. This breaches the mutual trust and allows data… More >

  • Open Access

    ARTICLE

    Enhanced Heap-Based Optimizer Algorithm for Solving Team Formation Problem

    Nashwa Nageh1, Ahmed Elshamy1, Abdel Wahab Said Hassan1, Mostafa Sami2, Mustafa Abdul Salam3,4,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5245-5268, 2022, DOI:10.32604/cmc.2022.030906

    Abstract Team Formation (TF) is considered one of the most significant problems in computer science and optimization. TF is defined as forming the best team of experts in a social network to complete a task with least cost. Many real-world problems, such as task assignment, vehicle routing, nurse scheduling, resource allocation, and airline crew scheduling, are based on the TF problem. TF has been shown to be a Nondeterministic Polynomial time (NP) problem, and high-dimensional problem with several local optima that can be solved using efficient approximation algorithms. This paper proposes two improved swarm-based algorithms for solving team formation problem. The… More >

  • Open Access

    ARTICLE

    Chaotic Krill Herd with Deep Transfer Learning-Based Biometric Iris Recognition System

    Harbi Al-Mahafzah1, Tamer AbuKhalil1, Bassam A. Y. Alqaralleh2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5703-5715, 2022, DOI:10.32604/cmc.2022.030399

    Abstract Biometric verification has become essential to authenticate the individuals in public and private places. Among several biometrics, iris has peculiar features and its working mechanism is complex in nature. The recent developments in Machine Learning and Deep Learning approaches enable the development of effective iris recognition models. With this motivation, the current study introduces a novel Chaotic Krill Herd with Deep Transfer Learning Based Biometric Iris Recognition System (CKHDTL-BIRS). The presented CKHDTL-BIRS model intends to recognize and classify iris images as a part of biometric verification. To achieve this, CKHDTL-BIRS model initially performs Median Filtering (MF)-based preprocessing and segmentation for… More >

  • Open Access

    ARTICLE

    Cuckoo Optimized Convolution Support Vector Machine for Big Health Data Processing

    Eatedal Alabdulkreem1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Abdullah Mohamed4, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5, Mohamed I. Eldesouki6, Mohammed Rizwanullah5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3039-3055, 2022, DOI:10.32604/cmc.2022.029835

    Abstract Big health data collection and storing for further analysis is a challenging task because this knowledge is big and has many features. Several cloud-based IoT health providers have been described in the literature previously. Furthermore, there are a number of issues related to time consumed and overall network performance when it comes to big data information. In the existing method, less performed optimization algorithms were used for optimizing the data. In the proposed method, the Chaotic Cuckoo Optimization algorithm was used for feature selection, and Convolutional Support Vector Machine (CSVM) was used. The research presents a method for analyzing healthcare… More >

  • Open Access

    ARTICLE

    Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance

    Atif Ikram1,2,*, Masita Abdul Jalil1, Amir Bin Ngah1, Nadeem Iqbal2, Nazri Kama4, Azri Azmi4, Ahmad Salman Khan3, Yasir Mahmood3,4, Assad Alzayed5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3827-3845, 2022, DOI:10.32604/cmc.2022.029609

    Abstract Properly created and securely communicated, non-disclosure agreement (NDA) can resolve most of the common disputes related to outsourcing of offshore software maintenance (OSMO). Occasionally, these NDAs are in the form of images. Since the work is done offshore, these agreements or images must be shared through the Internet or stored over the cloud. The breach of privacy, on the other hand, is a potential threat for the image owners as both the Internet and cloud servers are not void of danger. This article proposes a novel algorithm for securing the NDAs in the form of images. As an agreement is… More >

  • Open Access

    ARTICLE

    Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems

    P. Ramadevi1,*, T. Jayasankar1, V. Dinesh2, M. Dhamodaran3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1373-1385, 2023, DOI:10.32604/csse.2023.026603

    Abstract Recently, with the growth of cyber physical systems (CPS), several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively. Besides, the cloud computing (CC) enabled CPS offers huge processing and storage resources for CPS that finds helpful for a range of application areas. At the same time, with the massive development of applications that exist in the CPS environment, the energy utilization of the cloud enabled CPS has gained significant interest. For improving the energy effectiveness of the CC platform, virtualization technologies have been employed for resource management and the applications… More >

  • Open Access

    ARTICLE

    Secured ECG Signal Transmission Using Optimized EGC with Chaotic Neural Network in WBSN

    Ishani Mishra1,*, Sanjay Jain2, Vivek Maik3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.025999

    Abstract In wireless body sensor network (WBSN), the set of electrocardiogram (ECG) data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient. While transmitting these collected data some adversaries may capture and misuse it due to the compromise of security. So, the major aim of this work is to enhance secure transmission of ECG signal in WBSN. To attain this goal, we present Pity Beetle Swarm Optimization Algorithm (PBOA) based Elliptic Galois Cryptography (EGC) with Chaotic Neural Network. To optimize the key generation process in Elliptic Curve Cryptography… More >

  • Open Access

    ARTICLE

    Image Encryption Algorithm Based on New Fractional Beta Chaotic Maps

    Rabha W. Ibrahim1,*, Hayder Natiq2, Ahmed Alkhayyat3, Alaa Kadhim Farhan4, Nadia M. G. Al-Saidi5, Dumitru Baleanu6,7,8

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 119-131, 2022, DOI:10.32604/cmes.2022.018343

    Abstract In this study, a new algorithm of fractional beta chaotic maps is proposed to generate chaotic sequences for image encryption. The proposed technique generates multi random sequences by shuffling the image pixel position. This technique is used to blur the pixels connecting the input and encrypted images and to increase the attack resistance. The proposed algorithm makes the encryption process sophisticated by using fractional chaotic maps, which hold the properties of pseudo-randomness. The fractional beta sequences are utilized to alter the image pixels to decryption attacks. The experimental results proved that the proposed image encryption algorithm successfully encrypted and decrypted… More >

Displaying 41-50 on page 5 of 90. Per Page