Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,580)
  • Open Access

    ARTICLE

    A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats

    Yussuf Ahmed1,*, A.Taufiq Asyhari1, Md Arafatur Rahman2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2497-2513, 2021, DOI:10.32604/cmc.2021.014223

    Abstract The number of cybersecurity incidents is on the rise despite significant investment in security measures. The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks. This is primarily due to the sophistication of the attacks and the availability of powerful tools. Interconnected devices such as the Internet of Things (IoT) are also increasing attack exposures due to the increase in vulnerabilities. Over the last few years, we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks. Edge technology brings processing power closer to the… More >

  • Open Access

    ARTICLE

    Intrusion Detection System Using FKNN and Improved PSO

    Raniyah Wazirali*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1429-1445, 2021, DOI:10.32604/cmc.2021.014172

    Abstract Intrusion detection system (IDS) techniques are used in cybersecurity to protect and safeguard sensitive assets. The increasing network security risks can be mitigated by implementing effective IDS methods as a defense mechanism. The proposed research presents an IDS model based on the methodology of the adaptive fuzzy k-nearest neighbor (FKNN) algorithm. Using this method, two parameters, i.e., the neighborhood size (k) and fuzzy strength parameter (m) were characterized by implementing the particle swarm optimization (PSO). In addition to being used for FKNN parametric optimization, PSO is also used for selecting the conditional feature subsets for detection. To proficiently regulate the… More >

  • Open Access

    ARTICLE

    COVID-DeepNet: Hybrid Multimodal Deep Learning System for Improving COVID-19 Pneumonia Detection in Chest X-ray Images

    A. S. Al-Waisy1, Mazin Abed Mohammed1, Shumoos Al-Fahdawi1, M. S. Maashi2, Begonya Garcia-Zapirain3, Karrar Hameed Abdulkareem4, S. A. Mostafa5, Nallapaneni Manoj Kumar6, Dac-Nhuong Le7,8,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2409-2429, 2021, DOI:10.32604/cmc.2021.012955

    Abstract Coronavirus (COVID-19) epidemic outbreak has devastating effects on daily lives and healthcare systems worldwide. This newly recognized virus is highly transmissible, and no clinically approved vaccine or antiviral medicine is currently available. Early diagnosis of infected patients through effective screening is needed to control the rapid spread of this virus. Chest radiography imaging is an effective diagnosis tool for COVID-19 virus and follow-up. Here, a novel hybrid multimodal deep learning system for identifying COVID-19 virus in chest X-ray (CX-R) images is developed and termed as the COVID-DeepNet system to aid expert radiologists in rapid and accurate image interpretation. First, Contrast-Limited… More >

  • Open Access

    ARTICLE

    Experimental Study of Effect of Temperature Variations on the Impedance Signature of PZT Sensors for Fatigue Crack Detection

    Saqlain Abbas1,2,*, Fucai Li1, Zulkarnain Abbas3,4, Taufeeq Ur Rehman Abbasi5, Xiaotong Tu6, Riffat Asim Pasha7

    Sound & Vibration, Vol.55, No.1, pp. 1-18, 2021, DOI:10.32604/sv.2021.013754

    Abstract Structural health monitoring (SHM) is recognized as an efficient tool to interpret the reliability of a wide variety of infrastructures. To identify the structural abnormality by utilizing the electromechanical coupling property of piezoelectric transducers, the electromechanical impedance (EMI) approach is preferred. However, in real-time SHM applications, the monitored structure is exposed to several varying environmental and operating conditions (EOCs). The previous study has recognized the temperature variations as one of the serious EOCs that affect the optimal performance of the damage inspection process. In this framework, an experimental setup is developed in current research to identify the presence of fatigue… More >

  • Open Access

    ARTICLE

    Efficient Anti-Glare Ceramic Decals Defect Detection by Incorporating Homomorphic Filtering

    Xin Chen1, Ying Zhang2, Lang Lin1, Junxiang Wang2,*, Jiangqun Ni3

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 551-564, 2021, DOI:10.32604/csse.2021.014495

    Abstract Nowadays the computer vision technique has widely found applications in industrial manufacturing process to improve their efficiency. However, it is hardly applied in the field of daily ceramic detection due to the following two key reasons: (1) Low detection accuracy as a result of ceramic glare, and (2) Lack of efficient detection algorithms. To tackle these problems, a homomorphic filtering based anti-glare ceramic decals defect detection technique is proposed in this paper. Considering that smooth ceramic surface usually causes glare effects and leads to low detection results, in our approach, the ceramic samples are taken in low light environment and… More >

  • Open Access

    ARTICLE

    Tampering Detection Approach of Arabic-Text Based on Contents Interrelationship

    Fahd N. Al-Wesabi1, Abdelzahir Abdelmaboud2,*, Adnan A. Zain3, Mohammed M. Almazah4, Ammar Zahary5

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 483-498, 2021, DOI:10.32604/iasc.2021.014322

    Abstract Text information depends primarily on natural languages processing. Improving the security and usability of text information shared through the public internet has therefore been the most demanding problem facing researchers. In contact and knowledge sharing through the Internet, the authentication of content and the identification of digital content are becoming a key problem. Therefore, in this paper, a fragile approach of zero-watermarking based on natural language processing has been developed for authentication of content and prevention of misuse of Arabic texts distributed over the Internet. According to the proposed approach, watermark embedding, and identification was technically carried out such that… More >

  • Open Access

    ARTICLE

    Automated Meter Reading Detection Using Inception with Single Shot Multi-Box Detector

    Arif Iqbal*, Abdul Basit, Imran Ali, Junaid Babar, Ihsan Ullah

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 299-309, 2021, DOI:10.32604/iasc.2021.014250

    Abstract Automated meter reading has recently been adopted by utility service providers for improving the reading and billing process. Images captured during meter reading are incorporated in consumer bills to prevent reporting false reading and ensure transparency. The availability of images captured during the meter reading process presents the potential of completely automating the meter reading process. This paper proposes a convolutional network-based multi-box model for the automatic meter reading. The proposed research leverages the inception model with a single shot detector to achieve high accuracy and efficiency compared to the existing state-of-the-art machine learning methods. We tested the multi-box detector… More >

  • Open Access

    ARTICLE

    Detection Technique of Software-Induced Rowhammer Attacks

    Minkyung Lee1, Jin Kwak2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 349-367, 2021, DOI:10.32604/cmc.2021.014700

    Abstract Side-channel attacks have recently progressed into software-induced attacks. In particular, a rowhammer attack, which exploits the characteristics of dynamic random access memory (DRAM), can quickly and continuously access the cells as the cell density of DRAM increases, thereby generating a disturbance error affecting the neighboring cells, resulting in bit flips. Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits, it has been reported that it can be exploited on various platforms such as mobile devices, web browsers, and virtual machines. Furthermore, there have been studies on bypassing the defense measures… More >

  • Open Access

    ARTICLE

    Optimal Reordering Trace Files for Improving Software Testing Suitcase

    Yingfu Cai1, Sultan Noman Qasem2,3, Harish Garg4, Hamïd Parvïn5,6,7,*, Kim-Hung Pho8, Zulkefli Mansor9

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1225-1239, 2021, DOI:10.32604/cmc.2021.014699

    Abstract An invariant can be described as an essential relationship between program variables. The invariants are very useful in software checking and verification. The tools that are used to detect invariants are invariant detectors. There are two types of invariant detectors: dynamic invariant detectors and static invariant detectors. Daikon software is an available computer program that implements a special case of a dynamic invariant detection algorithm. Daikon proposes a dynamic invariant detection algorithm based on several runs of the tested program; then, it gathers the values of its variables, and finally, it detects relationships between the variables based on a simple… More >

  • Open Access

    ARTICLE

    An Ontology Based Test Case Prioritization Approach in Regression Testing

    Muhammad Hasnain1, Seung Ryul Jeong2,*, Muhammad Fermi Pasha1, Imran Ghani3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1051-1068, 2021, DOI:10.32604/cmc.2021.014686

    Abstract Regression testing is a widely studied research area, with the aim of meeting the quality challenges of software systems. To achieve a software system of good quality, we face high consumption of resources during testing. To overcome this challenge, test case prioritization (TCP) as a sub-type of regression testing is continuously investigated to achieve the testing objectives. This study provides an insight into proposing the ontology-based TCP (OTCP) approach, aimed at reducing the consumption of resources for the quality improvement and maintenance of software systems. The proposed approach uses software metrics to examine the behavior of classes of software systems.… More >

Displaying 1291-1300 on page 130 of 1580. Per Page