Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,010)
  • Open Access

    ARTICLE

    A Hybrid Particle Swarm Optimization to Forecast Implied Volatility Risk

    Kais Tissaoui1,2,*, Sahbi Boubaker3,4, Waleed Saud Alghassab1, Taha Zaghdoudi1,5, Jamel Azibi6

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4291-4309, 2022, DOI:10.32604/cmc.2022.028830 - 16 June 2022

    Abstract The application of optimization methods to prediction issues is a continually exploring field. In line with this, this paper investigates the connectedness between the infected cases of COVID-19 and US fear index from a forecasting perspective. The complex characteristics of implied volatility risk index such as non-linearity structure, time-varying and non-stationarity motivate us to apply a nonlinear polynomial Hammerstein model with known structure and unknown parameters. We use the Hybrid Particle Swarm Optimization (HPSO) tool to identify the model parameters of nonlinear polynomial Hammerstein model. Findings indicate that, following a nonlinear polynomial behaviour cascaded to More >

  • Open Access

    ARTICLE

    A Hybrid Security Framework for Medical Image Communication

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Ashraf A. M. Khalaf3, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2713-2730, 2022, DOI:10.32604/cmc.2022.028739 - 16 June 2022

    Abstract Authentication of the digital image has much attention for the digital revolution. Digital image authentication can be verified with image watermarking and image encryption schemes. These schemes are widely used to protect images against forgery attacks, and they are useful for protecting copyright and rightful ownership. Depending on the desirable applications, several image encryption and watermarking schemes have been proposed to moderate this attention. This framework presents a new scheme that combines a Walsh Hadamard Transform (WHT)-based image watermarking scheme with an image encryption scheme based on Double Random Phase Encoding (DRPE). First, on the More >

  • Open Access

    ARTICLE

    Hybrid Segmentation Approach for Different Medical Image Modalities

    Walid El-Shafai1,2, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Naglaa F. Soliman3, Amel A. Alhussan4,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3455-3472, 2022, DOI:10.32604/cmc.2022.028722 - 16 June 2022

    Abstract The segmentation process requires separating the image region into sub-regions of similar properties. Each sub-region has a group of pixels having the same characteristics, such as texture or intensity. This paper suggests an efficient hybrid segmentation approach for different medical image modalities based on particle swarm optimization (PSO) and improved fast fuzzy C-means clustering (IFFCM) algorithms. An extensive comparative study on different medical images is presented between the proposed approach and other different previous segmentation techniques. The existing medical image segmentation techniques incorporate clustering, thresholding, graph-based, edge-based, active contour, region-based, and watershed algorithms. This paper More >

  • Open Access

    ARTICLE

    A Hybrid Duo-Deep Learning and Best Features Based Framework for Action Recognition

    Muhammad Naeem Akbar1,*, Farhan Riaz1, Ahmed Bilal Awan1, Muhammad Attique Khan2, Usman Tariq3, Saad Rehman2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2555-2576, 2022, DOI:10.32604/cmc.2022.028696 - 16 June 2022

    Abstract Human Action Recognition (HAR) is a current research topic in the field of computer vision that is based on an important application known as video surveillance. Researchers in computer vision have introduced various intelligent methods based on deep learning and machine learning, but they still face many challenges such as similarity in various actions and redundant features. We proposed a framework for accurate human action recognition (HAR) based on deep learning and an improved features optimization algorithm in this paper. From deep learning feature extraction to feature classification, the proposed framework includes several critical steps.… More >

  • Open Access

    ARTICLE

    HDLIDP: A Hybrid Deep Learning Intrusion Detection and Prevention Framework

    Magdy M. Fadel1,*, Sally M. El-Ghamrawy2, Amr M. T. Ali-Eldin1, Mohammed K. Hassan3, Ali I. El-Desoky1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2293-2312, 2022, DOI:10.32604/cmc.2022.028287 - 16 June 2022

    Abstract Distributed denial-of-service (DDoS) attacks are designed to interrupt network services such as email servers and webpages in traditional computer networks. Furthermore, the enormous number of connected devices makes it difficult to operate such a network effectively. Software defined networks (SDN) are networks that are managed through a centralized control system, according to researchers. This controller is the brain of any SDN, composing the forwarding table of all data plane network switches. Despite the advantages of SDN controllers, DDoS attacks are easier to perpetrate than on traditional networks. Because the controller is a single point of More >

  • Open Access

    ARTICLE

    Non-Negative Minimum Volume Factorization (NMVF) for Hyperspectral Images (HSI) Unmixing: A Hybrid Approach

    Kriti Mahajan1, Urvashi Garg1, Nitin Mittal2, Yunyoung Nam3, Byeong-Gwon Kang4,*, Mohamed Abouhawwash5,6

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3705-3720, 2022, DOI:10.32604/cmc.2022.027936 - 16 June 2022

    Abstract Spectral unmixing is essential for exploitation of remotely sensed data of Hyperspectral Images (HSI). It amounts to the identification of a position of spectral signatures that are pure and therefore called end members and their matching fractional, draft rules abundances for every pixel in HSI. This paper aims to unmix hyperspectral data using the minimal volume method of elementary scrutiny. Moreover, the problem of optimization is solved by the implementation of the sequence of small problems that are constrained quadratically. The hard constraint in the final step for the abundance fraction is then replaced with… More >

  • Open Access

    ARTICLE

    EEG Emotion Recognition Using an Attention Mechanism Based on an Optimized Hybrid Model

    Huiping Jiang1,*, Demeng Wu1, Xingqun Tang1, Zhongjie Li1, Wenbo Wu2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2697-2712, 2022, DOI:10.32604/cmc.2022.027856 - 16 June 2022

    Abstract Emotions serve various functions. The traditional emotion recognition methods are based primarily on readily accessible facial expressions, gestures, and voice signals. However, it is often challenging to ensure that these non-physical signals are valid and reliable in practical applications. Electroencephalogram (EEG) signals are more successful than other signal recognition methods in recognizing these characteristics in real-time since they are difficult to camouflage. Although EEG signals are commonly used in current emotional recognition research, the accuracy is low when using traditional methods. Therefore, this study presented an optimized hybrid pattern with an attention mechanism (FFT_CLA) for… More >

  • Open Access

    ARTICLE

    Email Filtering Using Hybrid Feature Selection Model

    Adel Hamdan Mohammad1,* , Sami Smadi2, Tariq Alwada’n3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.2, pp. 435-450, 2022, DOI:10.32604/cmes.2022.020088 - 15 June 2022

    Abstract Undoubtedly, spam is a serious problem, and the number of spam emails is increased rapidly. Besides, the massive number of spam emails prompts the need for spam detection techniques. Several methods and algorithms are used for spam filtering. Also, some emergent spam detection techniques use machine learning methods and feature extraction. Some methods and algorithms have been introduced for spam detecting and filtering. This research proposes two models for spam detection and feature selection. The first model is evaluated with the email spam classification dataset, which is based on reducing the number of keywords to… More >

  • Open Access

    ARTICLE

    Research on Distributed Cooperative Control Strategy of Microgrid Hybrid Energy Storage Based on Adaptive Event Triggering

    Wenqian Zhang1, Jingwen Chen1,*, Saleem Riaz3, Naiwen Zheng1, Li Li2

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.2, pp. 585-604, 2022, DOI:10.32604/cmes.2022.020523 - 15 June 2022

    Abstract Distributed collaborative control strategies for microgrids often use periodic time to trigger communication, which is likely to enhance the burden of communication and increase the frequency of controller updates, leading to greater waste of communication resources. In response to this problem, a distributed cooperative control strategy triggered by an adaptive event is proposed. By introducing an adaptive event triggering mechanism in the distributed controller, the triggering parameters are dynamically adjusted so that the distributed controller can communicate only at a certain time, the communication pressure is reduced, and the DC bus voltage deviation is effectively More >

  • Open Access

    ARTICLE

    Effective Channel Allocation for Hybrid Network Usage Between Wi-Fi and Cellular Network

    M. Vanitha1,*, C. T. Kalaivani1, J. Kirubakaran2, R. Praveena2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1617-1627, 2022, DOI:10.32604/iasc.2022.026154 - 25 May 2022

    Abstract Hybrid networks are a rising innovation for maximizing wireless network coverage without any extra need for resources. This research paper focuses on effective channel allocation for Wireless Fidelity (Wi-Fi) and cellular networks. As a novel work in this area, the Beyond Access Point Coverage (BAPC) has been presented for adequately installing cellular networks on the unlicensed Wi-Fi spectrum. Networks can straightforwardly exploit Wi-Fi distributed coordination. Our BAPC commits and permits a combat-free period to cellular network subscribers and customary Wi-Fi subscribers to encourage concurrence. This research focuses on the maximization of combined subscriber affiliation and More >

Displaying 571-580 on page 58 of 1010. Per Page