Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    Assessment of Dependent Performance Shaping Factors in SPAR-H Based on Pearson Correlation Coefficient

    Xiaoyan Su1,*, Shuwen Shang1, Zhihui Xu2, Hong Qian1, Xiaolei Pan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1813-1826, 2024, DOI:10.32604/cmes.2023.030957

    Abstract With the improvement of equipment reliability, human factors have become the most uncertain part in the system. The standardized Plant Analysis of Risk-Human Reliability Analysis (SPAR-H) method is a reliable method in the field of human reliability analysis (HRA) to evaluate human reliability and assess risk in large complex systems. However, the classical SPAR-H method does not consider the dependencies among performance shaping factors (PSFs), which may cause overestimation or underestimation of the risk of the actual situation. To address this issue, this paper proposes a new method to deal with the dependencies among PSFs in SPAR-H based on the… More > Graphic Abstract

    Assessment of Dependent Performance Shaping Factors in SPAR-H Based on Pearson Correlation Coefficient

  • Open Access

    ARTICLE

    An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN

    Nouf Saeed Alotaibi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.039446

    Abstract Intrusion Detection System (IDS) is a network security mechanism that analyses all users’ and applications’ traffic and detects malicious activities in real-time. The existing IDS methods suffer from lower accuracy and lack the required level of security to prevent sophisticated attacks. This problem can result in the system being vulnerable to attacks, which can lead to the loss of sensitive data and potential system failure. Therefore, this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification (LTH-CNN). Here, the Correlation Coefficient based Mayfly Optimization (CC-MA) algorithm is used to extract the input characteristics for the IDS… More >

  • Open Access

    ARTICLE

    A Novel Compact Highly Isolated UWB MIMO Antenna with WLAN Notch

    Muhammad Awais1, Shahid Bashir1, Awais Khan1,2, Muhammad Asif2, Nasim Ullah3,*, Hend I. Alkhammash4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 669-681, 2023, DOI:10.32604/cmc.2022.033939

    Abstract This paper presents a compact Multiple Input Multiple Output (MIMO) antenna with WLAN band notch for Ultra-Wideband (UWB) applications. The antenna is designed on 0.8 mm thick low-cost FR-4 substrate having a compact size of 22 mm × 30 mm. The proposed antenna comprises of two monopole patches on the top layer of substrate while having a shared ground on its bottom layer. The mutual coupling between adjacent patches has been reduced by using a novel stub with shared ground structure. The stub consists of complementary rectangular slots that disturb the surface current direction and thus result in reducing mutual… More >

  • Open Access

    ARTICLE

    Isolation Enhancement in a Compact Four-Element MIMO Antenna for Ultra-Wideband Applications

    Awais Khan1,2,*, Shahid Bashir1, Salman Ghafoor3, Hatem Rmili4,5, Jawad Mirza6, Ammar Ahmad1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 911-925, 2023, DOI:10.32604/cmc.2023.033866

    Abstract Mutual coupling reduction or isolation enhancement in antenna arrays is an important area of research as it severely affects the performance of an antenna. In this paper, a new type of compact and highly isolated Multiple-Input-Multiple-Output (MIMO) antenna for ultra-wideband (UWB) applications is presented. The design consists of four radiators that are orthogonally positioned and confined to a compact 40 × 40 × 0.8 mm3 space. The final antenna design uses an inverted L shape partial ground to produce an acceptable reflection coefficient (S11 < −10 dB) in an entire UWB band (3.1–10.6) giga hertz (GHz). Moreover, the inter-element isolation… More >

  • Open Access

    ARTICLE

    The Correlation Coefficient of Hesitancy Fuzzy Graphs in Decision Making

    N. Rajagopal Reddy, S. Sharief Basha*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 579-596, 2023, DOI:10.32604/csse.2023.034527

    Abstract The hesitancy fuzzy graphs (HFGs), an extension of fuzzy graphs, are useful tools for dealing with ambiguity and uncertainty in issues involving decision-making (DM). This research implements a correlation coefficient measure (CCM) to assess the strength of the association between HFGs in this article since CCMs have a high capacity to process and interpret data. The CCM that is proposed between the HFGs has better qualities than the existing ones. It lowers restrictions on the hesitant fuzzy elements’ length and may be used to establish whether the HFGs are connected negatively or favorably. Additionally, a CCM-based attribute DM approach is… More >

  • Open Access

    ARTICLE

    Rice (Oryza sativa L.) Breeding among Hassawi Landrace and Egyptian Genotypes for Stem Borer (Chilo agamemnon Bles.) Resistance and Related Quantitative Traits

    Mohammed I. Al-Daej1, Mohamed M. El-Malky2, Muhammad N. Sattar3, Adel A. Rezk1,4, Muhammad N. Naqqash5, Jameel M. Al-Khayri1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.9, pp. 1905-1922, 2022, DOI:10.32604/phyton.2022.020629

    Abstract Rice stem borer (Chilo agamemnon Bles.) is a primary insect pest of rice and is a major limiting factor to rice production. Breeding for insect-resistant crop varieties has been an economic way of integrated pest management (IPM) as it offers a viable and ecologically acceptable approach. This study was aimed to evaluate rice genotypes for their resistance against rice stem borer. Seven parental genotypes with twenty one F1 crosses were evaluated for genotypic variation in field experiments. Analysis of variance revealed significant differences for the studied traits in almost all crosses and parents. In addition, the mean squares of parents… More >

  • Open Access

    ARTICLE

    Improving Method of Anomaly Detection Performance for Industrial IoT Environment

    Junwon Kim1, Jiho Shin2, Ki-Woong Park3, Jung Taek Seo4,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5377-5394, 2022, DOI:10.32604/cmc.2022.026619

    Abstract Industrial Control System (ICS), which is based on Industrial IoT (IIoT), has an intelligent mobile environment that supports various mobility, but there is a limit to relying only on the physical security of the ICS environment. Due to various threat factors that can disrupt the workflow of the IIoT, machine learning-based anomaly detection technologies are being presented; it is also essential to study for increasing detection performance to minimize model errors for promoting stable ICS operation. In this paper, we established the requirements for improving the anomaly detection performance in the IIoT-based ICS environment by analyzing the related cases. After… More >

  • Open Access

    ARTICLE

    Metaheuristic Lightweight Cryptography for Security Enhancement inInternet of Things

    Mahmoud Ragab1,2,3,*, Ehab Bahaudien Ashary4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3009-3023, 2022, DOI:10.32604/cmc.2022.025763

    Abstract The advancements made in Internet of Things (IoT) is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications. However, data security and private are challenging tasks to accomplish in IoT and necessary measures to be taken to ensure secure operation. With this background, the current paper proposes a novel lightweight cryptography method for enhance the security in IoT. The proposed encryption algorithm is a blend of Cross Correlation Coefficient (CCC) and Black Widow Optimization (BWO) algorithm. In the presented encryption technique, CCC operation is utilized to optimize the encryption process of cryptography method.… More >

  • Open Access

    ARTICLE

    Simulation of Rock Complex Resistivity Using an Inversion Method

    Yu Tang1, Jingcun Yu1, Benyu Su1,3,*, Zhixiong Li2

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.3, pp. 679-688, 2022, DOI:10.32604/fdmp.2022.019609

    Abstract The complex resistivity of coal and related rocks contains abundant physical property information, which can be indirectly used to study the lithology and microstructure of these materials. These aspects are closely related to the fluids inside the considered coal rocks, such as gas, water and coalbed methane. In the present analysis, considering different lithological structures, and using the Cole-Cole model, a forward simulation method is used to study different physical parameters such as the zero-frequency resistivity, the polarizability, the relaxation time, and the frequency correlation coefficient. Moreover, using a least square technique, a complex resistivity “inversion” algorithm is written. The… More >

  • Open Access

    ARTICLE

    ILipo-PseAAC: Identification of Lipoylation Sites Using Statistical Moments and General PseAAC

    Talha Imtiaz Baig1,*, Yaser Daanial Khan1, Talha Mahboob Alam2, Bharat Biswal3, Hanan Aljuaid4, Durdana Qaiser Gillani5

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 215-230, 2022, DOI:10.32604/cmc.2022.021849

    Abstract Lysine Lipoylation is a protective and conserved Post Translational Modification (PTM) in proteomics research like prokaryotes and eukaryotes. It is connected with many biological processes and closely linked with many metabolic diseases. To develop a perfect and accurate classification model for identifying lipoylation sites at the protein level, the computational methods and several other factors play a key role in this purpose. Usually, most of the techniques and different traditional experimental models have a very high cost. They are time-consuming; so, it is required to construct a predictor model to extract lysine lipoylation sites. This study proposes a model that… More >

Displaying 1-10 on page 1 of 20. Per Page