Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Cross-Layer Hidden Markov Analysis for Intrusion Detection

    K. Venkatachalam1, P. Prabu2, B. Saravana Balaji3, Byeong-Gwon Kang4, Yunyoung Nam4,*, Mohamed Abouhawwash5,6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3685-3700, 2022, DOI:10.32604/cmc.2022.019502 - 27 September 2021

    Abstract Ad hoc mobile cloud computing networks are affected by various issues, like delay, energy consumption, flexibility, infrastructure, network lifetime, security, stability, data transition, and link accomplishment. Given the issues above, route failure is prevalent in ad hoc mobile cloud computing networks, which increases energy consumption and delay and reduces stability. These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network. To address these weaknesses, which raise many concerns about privacy and security, this study formulated clustering-based storage and search optimization approaches using cross-layer analysis. The proposed approaches were formed by cross-layer analysis based… More >

  • Open Access

    ARTICLE

    An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques

    Fahd N. Al-Wesabi1,2,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1519-1536, 2021, DOI:10.32604/cmc.2021.018202 - 21 July 2021

    Abstract In this paper, the text analysis-based approach RTADZWA (Reliable Text Analysis and Digital Zero-Watermarking Approach) has been proposed for transferring and receiving authentic English text via the internet. Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it. Text analysis and text zero-watermarking… More >

  • Open Access

    ARTICLE

    Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack

    Fahd N. Al-Wesabi1,2,*, Huda G. Iskandar2,3, Saleh Alzahrani4, Abdelzahir Abdelmaboud4, Mohammed Abdul4, Nadhem Nemri4, Mohammad Medani4, Mohammed Y. Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3789-3806, 2021, DOI:10.32604/cmc.2021.017674 - 06 May 2021

    Abstract In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing. The HFDATAI solution technically integrates and senses the watermark without modifying the original text. The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated, null-watermarking approach to enhance the proposed approach’s efficiency, accuracy, and intensity. The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing… More >

  • Open Access

    ARTICLE

    Text Analysis-Based Watermarking Approach for Tampering Detection of English Text

    Fahd N. Al-Wesabi1,2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3701-3719, 2021, DOI:10.32604/cmc.2021.015785 - 01 March 2021

    Abstract Due to the rapid increase in the exchange of text information via internet networks, the security and the reliability of digital content have become a major research issue. The main challenges faced by researchers are authentication, integrity verification, and tampering detection of the digital contents. In this paper, text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents. The proposed approach embeds and detects the watermark logically without altering the original English text document. Based on hidden Markov model (HMM), the fourth level order of the word… More >

  • Open Access

    ARTICLE

    Improving Language Translation Using the Hidden Markov Model

    Yunpeng Chang1, Xiaoliang Wang1,*, Meihua Xue1, Yuzhen Liu1, Frank Jiang2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3921-3931, 2021, DOI:10.32604/cmc.2021.012304 - 01 March 2021

    Abstract Translation software has become an important tool for communication between different languages. People’s requirements for translation are higher and higher, mainly reflected in people’s desire for barrier free cultural exchange. With a large corpus, the performance of statistical machine translation based on words and phrases is limited due to the small size of modeling units. Previous statistical methods rely primarily on the size of corpus and number of its statistical results to avoid ambiguity in translation, ignoring context. To support the ongoing improvement of translation methods built upon deep learning, we propose a translation algorithm… More >

  • Open Access

    ARTICLE

    An Accurate Persian Part-of-Speech Tagger

    Morteza Okhovvat1,∗, Mohsen Sharifi2,†, Behrouz Minaei Bidgoli2,‡

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 423-430, 2020, DOI:10.32604/csse.2020.35.423

    Abstract The processing of any natural language requires that the grammatical properties of every word in that language are tagged by a part of speech (POS) tagger. To present a more accurate POS tagger for the Persian language, we propose an improved and accurate tagger called IAoM that supports properties of text to speech systems such as Lexical Stress Search, Homograph words Disambiguation, Break Phrase Detection, and main aspects of Persian morphology. IAoM uses Maximum Likelihood Estimation (MLE) to determine the tags of unknown words. In addition, it uses a few defined rules for the sake More >

  • Open Access

    ARTICLE

    Intelligent Speech Communication Using Double Humanoid Robots

    Li-Hong Juang1,*, Yi-Hua Zhao2

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 291-301, 2020, DOI:10.31209/2020.100000164

    Abstract Speech recognition is one of the most convenient forms of human beings engaging in the exchanging of information. In this research, we want to make robots understand human language and communicate with each other through the human language, and to realize man–machine interactive and humanoid– robot interactive. Therefore, this research mainly studies NAO robots’ speech recognition and humanoid communication between double -humanoid robots. This paper introduces the future direction and application prospect of speech recognition as well as its basic method and knowledge of speech recognition fields. This research also proposes the application of the… More >

  • Open Access

    ARTICLE

    A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model

    Fahd N. Al-Wesabi1, 2, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1137-1156, 2020, DOI:10.32604/cmc.2020.011151 - 20 August 2020

    Abstract Text information is principally dependent on the natural languages. Therefore, improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter. Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet. In this paper, an intelligent text Zero-Watermarking approach SETZWMWMM (Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model) has been proposed for the content authentication and tampering detection of English text contents. The SETZWMWMM approach… More >

  • Open Access

    ARTICLE

    Automatic Sleep Staging Algorithm Based on Random Forest and Hidden Markov Model

    Junbiao Liu1, 6, Duanpo Wu2, 3, Zimeng Wang2, Xinyu Jin1, *, Fang Dong4, Lurong Jiang5, Chenyi Cai6

    CMES-Computer Modeling in Engineering & Sciences, Vol.123, No.1, pp. 401-426, 2020, DOI:10.32604/cmes.2020.08731 - 01 April 2020

    Abstract In the field of medical informatics, sleep staging is a challenging and timeconsuming task undertaken by sleep experts. According to the new standard of the American Academy of Sleep Medicine (AASM), the stages of sleep are divided into wakefulness (W), rapid eye movement (REM) and non-rapid eye movement (NREM) which includes three sleep stages (N1, N2 and N3) that describe the depth of sleep. This study aims to establish an automatic sleep staging algorithm based on the improved weighted random forest (WRF) and Hidden Markov Model (HMM) using only the features extracted from double-channel EEG… More >

  • Open Access

    ARTICLE

    Accurate Location Prediction of Social‐Users Using mHMM

    Ahsan Hussain, Bettahally N. Keshavamurthy, Ravi Prasad K. Jagannath

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 473-486, 2019, DOI:10.31209/2018.11007092

    Abstract Prediction space of distinct check-in locations in Location-Based Social Networks is a challenge. In this paper, a thorough analysis of Foursquare Check-ins is done. Based on previous check-in sequences, next location of social-users is accurately predicted using multinomial-Hidden Markov Model (mHMM) with Steady-State probabilities. This information benefits security-agencies in tracking suspects and restaurant-owners to predict their customers’ arrivals at different venues on given days. Higher accuracy and Steady-State venuepopularities obtained for location-prediction using the proposed method, outperform various other baseline methods. More >

Displaying 11-20 on page 2 of 22. Per Page