Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (117)
  • Open Access

    ARTICLE

    Fuzzy Aggregator Based Energy Aware RPL Routing for IoT Enabled Forest Environment

    S. Srividhya1, Suresh Sankaranarayanan2,*, Sergei A. Kozlov3, Joel J. P. C. Rodrigues3,4,5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4039-4055, 2022, DOI:10.32604/cmc.2022.026306 - 29 March 2022

    Abstract Forested areas are extremely vulnerable to disasters leading to environmental destruction. Forest Fire is one among them which requires immediate attention. There are lot of works done by authors where Wireless Sensors and IoT have been used for forest fire monitoring. So, towards monitoring the forest fire and managing the energy efficiently in IoT, Energy Efficient Routing Protocol for Low power lossy networks (E-RPL) was developed. There were challenges about the scalability of the network resulting in a large end-to-end delay and less packet delivery which led to the development of Aggregator-based Energy Efficient RPL… More >

  • Open Access

    ARTICLE

    Coyote Optimization Using Fuzzy System for Energy Efficiency in WSN

    Ahmed S. Almasoud1, Taiseer Abdalla Elfadil Eisa2, Marwa Obayya3, Abdelzahir Abdelmaboud4, Mesfer Al Duhayyim5, Ishfaq Yaseen6, Manar Ahmed Hamza6,*, Abdelwahed Motwakel6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3269-3281, 2022, DOI:10.32604/cmc.2022.024584 - 29 March 2022

    Abstract In recent days, internet of things is widely implemented in Wireless Sensor Network (WSN). It comprises of sensor hubs associated together through the WSNs. The WSN is generally affected by the power in battery due to the linked sensor nodes. In order to extend the lifespan of WSN, clustering techniques are used for the improvement of energy consumption. Clustering methods divide the nodes in WSN and form a cluster. Moreover, it consists of unique Cluster Head (CH) in each cluster. In the existing system, Soft-K means clustering techniques are used in energy consumption in WSN. More >

  • Open Access

    ARTICLE

    Image Masking and Enhancement System for Melanoma Early Stage Detection

    Fikret Yalcinkaya*, Ali Erbas

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1961-1977, 2022, DOI:10.32604/iasc.2022.024961 - 24 March 2022

    Abstract Early stage melanoma detection (ESMD) is crucial as late detection kills. Computer aided diagnosis systems (CADS) integrated with high level algorithms are major tools capable of ESMD with high degree of accuracy, specificity, and sensitivity. CADS use the image and the information within the pixels of the image. Pixels’ characteristics and orientations determine the colour and shapes of the images as the pixels and associated environment are closely interrelated with the lesion. CADS integrated with Convolutional Neural Networks (CNN) specifically play a major role for ESMD with high degree of accuracy. The proposed system has… More >

  • Open Access

    ARTICLE

    Fuzzy-Based Secure Clustering with Routing Technique for VANETs

    T. S. Balaji1,2, S. Srinivasan3,*, S. Prasanna Bharathi4, B. Ramesh5

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 291-304, 2022, DOI:10.32604/csse.2022.023269 - 23 March 2022

    Abstract Due to the advanced developments in communication technologies, Internet of vehicles and vehicular adhoc networks (VANET) offers numerous opportunities for effectively managing transportation problems. On the other, the cloud environment needs to disseminate the emergency message to the vehicles which are consistently distributed on the roadway so that every vehicle gets the messages from closer vehicles in a straightforward way. To resolve this issue, clustering and routing techniques can be designed using computational intelligence approaches. With this motivation, this paper presents a new type-2 fuzzy sets based clustering with metaheuristic optimization based routing (T2FSC-MOR) technique… More >

  • Open Access

    ARTICLE

    Cyber Security Analysis and Evaluation for Intrusion Detection Systems

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1765-1783, 2022, DOI:10.32604/cmc.2022.025604 - 24 February 2022

    Abstract Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching… More >

  • Open Access

    ARTICLE

    Efficient Load Balancing with MANET Propagation of Least Common Multiple Routing and Fuzzy Logic

    V. Gayatri*, M. Senthil Kumaran

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1831-1845, 2022, DOI:10.32604/cmc.2022.021857 - 24 February 2022

    Abstract Mobile Ad Hoc Network (MANET) is a group of node that would interrelate among each other through one multi-hop wireless link, wherein the nodes were able to move in response to sudden modifications. The objective of MANET routing protocol is to quantify the route and compute the best path, but there exists a major decrease in energy efficiency, difficulty in hop selection, cost estimation, and efficient load-balancing. In this paper, a novel least common multipath-based routing has been proposed. Multipath routing is used to find a multipath route from source and destination. Load balancing is of… More >

  • Open Access

    ARTICLE

    Sustainable-Security Assessment Through a Multi Perspective Benchmarking Framework

    Ahmed Saeed Alfakeeh1, Abdulmohsen Almalawi2, Fawaz Jaber Alsolami2, Yoosef B. Abushark2, Asif Irshad Khan2,*, Adel Aboud S. Bahaddad1, Md Mottahir Alam3, Alka Agrawal4, Rajeev Kumar5, Raees Ahmad Khan4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6011-6037, 2022, DOI:10.32604/cmc.2022.024903 - 14 January 2022

    Abstract The current cyber-attack environment has put even the most protected systems at risk as the hackers are now modifying technologies to exploit even the tiniest of weaknesses and infiltrate networks. In this situation, it's critical to design and construct software that is both secure and long-lasting. While security is the most well-defined aspect of health information software systems, it is equally significant to prioritise sustainability because any health information software system will be more effective if it provides both security and sustainability to the customers at the same time. In this league, it is crucial… More >

  • Open Access

    ARTICLE

    5G Smart Mobility Management Based Fuzzy Logic Controller Unit

    Chafaa Hamrouni1,*, Slim Chaoui2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4941-4953, 2022, DOI:10.32604/cmc.2022.023732 - 14 January 2022

    Abstract In the paper, we propose a fuzzy logic controller system to be implemented for smart mobility management in the 5G wireless communication network. Mobility management is considered as a main issue for all-IP mobile networks future generation. As a network-based mobility management protocol, Internet Engineering Task Force developed the Proxy Mobile IPv6 (PMIPv6) in order to support the mobility of IP devices, and many other results were presented to reduce latency handover and the amount of PMIPv6 signaling, but it is not enough for the application needs in real-time. The present paper describes an approach More >

  • Open Access

    ARTICLE

    Adaptive Fuzzy Logic Controller for Harmonics Mitigation Using Particle Swarm Optimization

    Waleed Rafique1, Ayesha Khan2, Ahmad Almogren3, Jehangir Arshad1, Adnan Yousaf4, Mujtaba Hussain Jaffery1, Ateeq Ur Rehman5, Muhammad Shafiq6,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4275-4293, 2022, DOI:10.32604/cmc.2022.023588 - 14 January 2022

    Abstract An excessive use of non-linear devices in industry results in current harmonics that degrades the power quality with an unfavorable effect on power system performance. In this research, a novel control technique-based Hybrid-Active Power-Filter (HAPF) is implemented for reactive power compensation and harmonic current component for balanced load by improving the Power-Factor (PF) and Total–Hormonic Distortion (THD) and the performance of a system. This work proposed a soft-computing technique based on Particle Swarm-Optimization (PSO) and Adaptive Fuzzy technique to avoid the phase delays caused by conventional control methods. Moreover, the control algorithms are implemented for… More >

  • Open Access

    ARTICLE

    Fruit Image Classification Using Deep Learning

    Harmandeep Singh Gill1,*, Osamah Ibrahim Khalaf2, Youseef Alotaibi3, Saleh Alghamdi4, Fawaz Alassery5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5135-5150, 2022, DOI:10.32604/cmc.2022.022809 - 14 January 2022

    Abstract Fruit classification is found to be one of the rising fields in computer and machine vision. Many deep learning-based procedures worked out so far to classify images may have some ill-posed issues. The performance of the classification scheme depends on the range of captured images, the volume of features, types of characters, choice of features from extracted features, and type of classifiers used. This paper aims to propose a novel deep learning approach consisting of Convolution Neural Network (CNN), Recurrent Neural Network (RNN), and Long Short-Term Memory (LSTM) application to classify the fruit images. Classification… More >

Displaying 61-70 on page 7 of 117. Per Page