Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (356)
  • Open Access

    ARTICLE

    Unmanned Aerial Vehicle Multi-Access Edge Computing as Security Enabler for Next-Gen 5G Security Frameworks

    Jaime Ortiz Córdoba, Alejandro Molina Zarca*, Antonio Skármeta

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2307-2333, 2023, DOI:10.32604/iasc.2023.039607

    Abstract 5G/Beyond 5G (B5G) networks provide connectivity to many heterogeneous devices, raising significant security and operational issues and making traditional infrastructure management increasingly complex. In this regard, new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures, especially regarding policy-based security, abstraction, flexibility, and extensibility. This paper presents the design, workflow, and implementation of a security solution based on Unmanned Aerial Vehicles (UAVs), able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic areas. The proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic… More >

  • Open Access

    ARTICLE

    Novel Framework for Generating Criminals Images Based on Textual Data Using Identity GANs

    Mohamed Fathallah1,*, Mohamed Sakr2, Sherif Eletriby2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 383-396, 2023, DOI:10.32604/cmc.2023.039824

    Abstract Text-to-image generation is a vital task in different fields, such as combating crime and terrorism and quickly arresting lawbreakers. For several years, due to a lack of deep learning and machine learning resources, police officials required artists to draw the face of a criminal. Traditional methods of identifying criminals are inefficient and time-consuming. This paper presented a new proposed hybrid model for converting the text into the nearest images, then ranking the produced images according to the available data. The framework contains two main steps: generation of the image using an Identity Generative Adversarial Network (IGAN) and ranking of the… More >

  • Open Access

    ARTICLE

    Comparative Analysis of COVID-19 Detection Methods Based on Neural Network

    Inès Hilali-Jaghdam1,*, Azhari A Elhag2, Anis Ben Ishak3, Bushra M. Elamin Elnaim4, Omer Eltag Mohammed Elhag5, Feda Muhammed Abuhaimed1, S. Abdel-Khalek2,6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1127-1150, 2023, DOI:10.32604/cmc.2023.038915

    Abstract In 2019, the novel coronavirus disease 2019 (COVID-19) ravaged the world. As of July 2021, there are about 192 million infected people worldwide and 4.1365 million deaths. At present, the new coronavirus is still spreading and circulating in many places around the world, especially since the emergence of Delta variant strains has increased the risk of the COVID-19 pandemic again. The symptoms of COVID-19 are diverse, and most patients have mild symptoms, with fever, dry cough, and fatigue as the main manifestations, and about 15.7% to 32.0% of patients will develop severe symptoms. Patients are screened in hospitals or primary… More >

  • Open Access

    ARTICLE

    An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT

    N. Anand Kumar1,*, A. Grace Selvarani2, P. Vivekanandan3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1077-1090, 2023, DOI:10.32604/csse.2023.034115

    Abstract The purpose of this research is to deal with effective block chain framework for secure transactions. The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue, Cross-Chain based Transaction (CCT) is introduced. Traditional industries have been restructured by the introduction of Internet of Things (IoT) to become smart industries through the feature of data-driven decision-making. Still, there are a few limitations, like decentralization, security vulnerabilities, poor interoperability, as well as privacy concerns in IoTs. To overcome this limitation, Blockchain has been employed to assure a… More >

  • Open Access

    ARTICLE

    Customer Churn Prediction Framework of Inclusive Finance Based on Blockchain Smart Contract

    Fang Yu1, Wenbin Bi2, Ning Cao3,4,*, Hongjun Li1, Russell Higgs5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1-17, 2023, DOI:10.32604/csse.2023.018349

    Abstract In view of the fact that the prediction effect of influential financial customer churn in the Internet of Things environment is difficult to achieve the expectation, at the smart contract level of the blockchain, a customer churn prediction framework based on situational awareness and integrating customer attributes, the impact of project hotspots on customer interests, and customer satisfaction with the project has been built. This framework introduces the background factors in the financial customer environment, and further discusses the relationship between customers, the background of customers and the characteristics of pre-lost customers. The improved Singular Value Decomposition (SVD) algorithm and… More >

  • Open Access

    ARTICLE

    A Cross Language Code Security Audit Framework Based on Normalized Representation

    Yong Chen1,*, Chao Xu1, Jing Selena He2, Sheng Xiao3

    Journal of Quantum Computing, Vol.4, No.2, pp. 75-84, 2022, DOI:10.32604/jqc.2022.031312

    Abstract With the rapid development of information technology, audit objects and audit itself are more and more inseparable from software. As an important means of software security audit, code security audit will become an important aspect of future audit that cannot be ignored. However, the existing code security audit is mainly based on source code, which is difficult to meet the audit needs of more and more programming languages and binary commercial software. Based on the idea of normalized transformation, this paper constructs a cross language code security audit framework (CLCSA). CLCSA first uses compile/decompile technology to convert different high-level programming… More >

  • Open Access

    ARTICLE

    Explorer les processus de mobilité passée
    Raisonnement ontologique fondé sur la connaissance des pratiques socioculturelles et des vestiges archéologiques

    Laure Nuninger1 , Thérèse Libourel2, Xavier Rodier3, Rachel Opitz4, Philip Verhagen5, Catherine Fruchart1, Clément Laplaige3, Samuel Leturcq3, Nathanael Levoguer3

    Revue Internationale de Géomatique, Vol.31, No.1, pp. 81-110, 2022, DOI:10.3166/RIG31.81-110

    Abstract Dans cet article, nous proposons une nouvelle piste de raisonnement élaborée en interdisciplinarité avec des archéologues, conçue pour des études liées à la notion de mobilité. À l’aide d’études de cas, nous analysons comment les chercheurs ont identifié, conceptualisé et relié les traces matérielles décrivant divers processus de mobilité dans une région donnée. Nous élaborons ensuite la construction d’ontologies qui nous permettent de relier explicitement les éléments matériels, identifiés dans le paysage observé, aux connaissances ou à la théorie qui explique leur rôle et leurs relations au sein du processus de mobilité. En combinant les systèmes de parcours formels, dits… More >

  • Open Access

    ARTICLE

    An Optimal Framework for Alzheimer’s Disease Diagnosis

    Amer Alsaraira1,*, Samer Alabed1, Eyad Hamad1, Omar Saraereh2

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 165-177, 2023, DOI:10.32604/iasc.2023.036950

    Abstract Alzheimer’s disease (AD) is a kind of progressive dementia that is frequently accompanied by brain shrinkage. With the use of the morphological characteristics of MRI brain scans, this paper proposed a method for diagnosing moderate cognitive impairment (MCI) and AD. The anatomical features of 818 subjects were calculated using the FreeSurfer software, and the data were taken from the ADNI dataset. These features were first removed from the dataset after being preprocessed with an age correction algorithm using linear regression to estimate the effects of normal aging. With these preprocessed characteristics, the extreme learning machine served as a classifier for… More >

  • Open Access

    ARTICLE

    Auto-Scaling Framework for Enhancing the Quality of Service in the Mobile Cloud Environments

    Yogesh Kumar1,*, Jitender Kumar1, Poonam Sheoran2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5785-5800, 2023, DOI:10.32604/cmc.2023.039276

    Abstract On-demand availability and resource elasticity features of Cloud computing have attracted the focus of various research domains. Mobile cloud computing is one of these domains where complex computation tasks are offloaded to the cloud resources to augment mobile devices’ cognitive capacity. However, the flexible provisioning of cloud resources is hindered by uncertain offloading workloads and significant setup time of cloud virtual machines (VMs). Furthermore, any delays at the cloud end would further aggravate the miseries of real-time tasks. To resolve these issues, this paper proposes an auto-scaling framework (ACF) that strives to maintain the quality of service (QoS) for the… More >

  • Open Access

    ARTICLE

    A Progressive Approach to Generic Object Detection: A Two-Stage Framework for Image Recognition

    Muhammad Aamir1, Ziaur Rahman1,*, Waheed Ahmed Abro2, Uzair Aslam Bhatti3, Zaheer Ahmed Dayo1, Muhammad Ishfaq1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6351-6373, 2023, DOI:10.32604/cmc.2023.038173

    Abstract Object detection in images has been identified as a critical area of research in computer vision image processing. Research has developed several novel methods for determining an object’s location and category from an image. However, there is still room for improvement in terms of detection efficiency. This study aims to develop a technique for detecting objects in images. To enhance overall detection performance, we considered object detection a two-fold problem, including localization and classification. The proposed method generates class-independent, high-quality, and precise proposals using an agglomerative clustering technique. We then combine these proposals with the relevant input image to train… More >

Displaying 61-70 on page 7 of 356. Per Page