Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Selective Mapping Scheme for Universal Filtered Multicarrier

    Akku Madhusudhan*, Sudhir Kumar Sharma

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1273-1282, 2023, DOI:10.32604/iasc.2023.030765 - 05 January 2023

    Abstract The next step in mobile communication technology, known as 5G, is set to go live in a number of countries in the near future. New wireless applications have high data rates and mobility requirements, which have posed a challenge to mobile communication technology researchers and designers. 5G systems could benefit from the Universal Filtered Multicarrier (UFMC). UFMC is an alternate waveform to orthogonal frequency-division multiplexing (OFDM), in filtering process is performed for a sub-band of subcarriers rather than the entire band of subcarriers Inter Carrier Interference (ICI) between neighbouring users is reduced via the sub-band More >

  • Open Access

    ARTICLE

    Al-Biruni Based Optimization of Rainfall Forecasting in Ethiopia

    El-Sayed M. El-kenawy1, Abdelaziz A. Abdelhamid2,3, Fadwa Alrowais4,*, Mostafa Abotaleb5, Abdelhameed Ibrahim6, Doaa Sami Khafaga4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2885-2899, 2023, DOI:10.32604/csse.2023.034206 - 21 December 2022

    Abstract Rainfall plays a significant role in managing the water level in the reservoir. The unpredictable amount of rainfall due to the climate change can cause either overflow or dry in the reservoir. Many individuals, especially those in the agricultural sector, rely on rain forecasts. Forecasting rainfall is challenging because of the changing nature of the weather. The area of Jimma in southwest Oromia, Ethiopia is the subject of this research, which aims to develop a rainfall forecasting model. To estimate Jimma’s daily rainfall, we propose a novel approach based on optimizing the parameters of long… More >

  • Open Access

    ARTICLE

    Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

    Doaa Sami Khafaga1, Faten Khalid Karim1,*, Abdelaziz A. Abdelhamid2,3, El-Sayed M. El-kenawy4, Hend K. Alkahtani1, Nima Khodadadi5, Mohammed Hadwan6, Abdelhameed Ibrahim7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3183-3198, 2023, DOI:10.32604/cmc.2023.033513 - 31 October 2022

    Abstract Managing physical objects in the network’s periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems’ effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization

    Reem Alkanhel1, El-Sayed M. El-kenawy2, Abdelaziz A. Abdelhamid3,4, Abdelhameed Ibrahim5, Manal Abdullah Alohali6, Mostafa Abotaleb7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2677-2693, 2023, DOI:10.32604/cmc.2023.033273 - 31 October 2022

    Abstract Applications of internet-of-things (IoT) are increasingly being used in many facets of our daily life, which results in an enormous volume of data. Cloud computing and fog computing, two of the most common technologies used in IoT applications, have led to major security concerns. Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient. Several artificial intelligence (AI) based security solutions, such as intrusion detection systems (IDS), have been proposed in recent years. Intelligent technologies that require data preprocessing and machine learning algorithm-performance augmentation require… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization Through Deep Learning Classification of COVID-19 in Chest X-Ray Images

    Nagwan Abdel Samee1, El-Sayed M. El-Kenawy2,3, Ghada Atteia1,*, Mona M. Jamjoom4, Abdelhameed Ibrahim5, Abdelaziz A. Abdelhamid6,7, Noha E. El-Attar8, Tarek Gaber9,10, Adam Slowik11, Mahmoud Y. Shams12

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4193-4210, 2022, DOI:10.32604/cmc.2022.031147 - 16 June 2022

    Abstract As corona virus disease (COVID-19) is still an ongoing global outbreak, countries around the world continue to take precautions and measures to control the spread of the pandemic. Because of the excessive number of infected patients and the resulting deficiency of testing kits in hospitals, a rapid, reliable, and automatic detection of COVID-19 is in extreme need to curb the number of infections. By analyzing the COVID-19 chest X-ray images, a novel metaheuristic approach is proposed based on hybrid dipper throated and particle swarm optimizers. The lung region was segmented from the original chest X-ray… More >

  • Open Access

    ARTICLE

    Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

    Muhammad Fahad Khan1,2,*, Khalid Saleem1, Mohammed Alotaibi3, Mohammad Mazyad Hazzazi4, Eid Rehman2, Aaqif Afzaal Abbasi2, Muhammad Asif Gondal5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2679-2696, 2022, DOI:10.32604/cmc.2022.027655 - 16 June 2022

    Abstract Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization for Mobile Robot Navigation Based on Path Planning

    El-Sayed M. El-kenawy1,2, Zeeshan Shafi Khan3,*, Abdelhameed Ibrahim4, Bandar Abdullah Aloyaydi5, Hesham Arafat Ali2,4, Ali E. Takieldeen2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2241-2255, 2022, DOI:10.32604/cmc.2022.026672 - 16 June 2022

    Abstract Recently, the path planning problem may be considered one of the most interesting researched topics in autonomous robotics. That is why finding a safe path in a cluttered environment for a mobile robot is a significant requisite. A promising route planning for mobile robots on one side saves time and, on the other side, reduces the wear and tear on the robot, saving the capital investment. Numerous route planning methods for the mobile robot have been developed and applied. According to our best knowledge, no method offers an optimum solution among the existing methods. Particle… More >

  • Open Access

    ARTICLE

    Modeling Metaheuristic Optimization with Deep Learning Software Bug Prediction Model

    M. Sangeetha1,*, S. Malathi2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1587-1601, 2022, DOI:10.32604/iasc.2022.025192 - 25 May 2022

    Abstract Software testing is an effective means of verifying software stability and trustworthiness. It is essential in the software development process and needs a huge quantity of resources such as labor, money, and time. Automated software testing can be used to save manual work, shorten testing times, and improve testing performance. Recently, Software Bug Prediction (SBP) models have been developed to improve the software quality assurance (SQA) process through the prediction of bug parts. Advanced deep learning (DL) models can be used to classify faults in software parts. Because hyperparameters have a significant impact on the… More >

  • Open Access

    ARTICLE

    Dipper Throated Optimization Algorithm for Unconstrained Function and Feature Selection

    Ali E. Takieldeen1, El-Sayed M. El-kenawy1,2, Mohammed Hadwan3,4,5,*, Rokaia M. Zaki6,7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1465-1481, 2022, DOI:10.32604/cmc.2022.026026 - 24 February 2022

    Abstract Dipper throated optimization (DTO) algorithm is a novel with a very efficient metaheuristic inspired by the dipper throated bird. DTO has its unique hunting technique by performing rapid bowing movements. To show the efficiency of the proposed algorithm, DTO is tested and compared to the algorithms of Particle Swarm Optimization (PSO), Whale Optimization Algorithm (WOA), Grey Wolf Optimizer (GWO), and Genetic Algorithm (GA) based on the seven unimodal benchmark functions. Then, ANOVA and Wilcoxon rank-sum tests are performed to confirm the effectiveness of the DTO compared to other optimization techniques. Additionally, to demonstrate the proposed More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization Algorithm for Signals Classification of Electroencephalography Channels

    Marwa M. Eid1,*, Fawaz Alassery2, Abdelhameed Ibrahim3, Mohamed Saber4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4627-4641, 2022, DOI:10.32604/cmc.2022.024043 - 14 January 2022

    Abstract Digital signal processing of electroencephalography (EEG) data is now widely utilized in various applications, including motor imagery classification, seizure detection and prediction, emotion classification, mental task classification, drug impact identification and sleep state classification. With the increasing number of recorded EEG channels, it has become clear that effective channel selection algorithms are required for various applications. Guided Whale Optimization Method (Guided WOA), a suggested feature selection algorithm based on Stochastic Fractal Search (SFS) technique, evaluates the chosen subset of channels. This may be used to select the optimum EEG channels for use in Brain-Computer Interfaces More >

Displaying 11-20 on page 2 of 26. Per Page