Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications

    Wael Said1, Elsayed Mostafa1,*, M. M. Hassan1, Ayman Mohamed Mostafa2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3193-3209, 2022, DOI:10.32604/cmc.2022.023554

    Abstract User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment. The data stored on the public cloud will be vulnerable to outside and inside attacks. This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud. Different access control policies are applied for verifying users on the cloud. A security mechanism is… More >

  • Open Access

    ARTICLE

    An XBi-CFAO Method for the Optimization of Multi-Layered Variable Stiffness Composites Using Isogeometric Analysis

    Chao Mei1,2, Qifu Wang1,*, Chen Yu1, Zhaohui Xia1

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 627-659, 2021, DOI:10.32604/cmes.2021.017704

    Abstract This paper presents an effective fiber angle optimization method for two and multi-layered variable stiffness composites. A gradient-based fiber angle optimization method is developed based on isogeometric analysis (IGA). Firstly, the element densities and fiber angles for two and multi-layered composites are synchronously optimized using an extended Bi-layered continuous fiber angle optimization method (XBi-CFAO). The densities and fiber angles in the base layer are attached to the control points. The structure response and sensitivity analysis are accomplished using the non-uniform rational B-spline (NURBS) based IGA. By the benefit of the B-spline space, this method is free from checkerboards, and no… More >

  • Open Access

    ARTICLE

    Training Multi-Layer Perceptron with Enhanced Brain Storm Optimization Metaheuristics

    Nebojsa Bacanin1, Khaled Alhazmi2,*, Miodrag Zivkovic1, K. Venkatachalam3, Timea Bezdan1, Jamel Nebhen4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4199-4215, 2022, DOI:10.32604/cmc.2022.020449

    Abstract In the domain of artificial neural networks, the learning process represents one of the most challenging tasks. Since the classification accuracy highly depends on the weights and biases, it is crucial to find its optimal or suboptimal values for the problem at hand. However, to a very large search space, it is very difficult to find the proper values of connection weights and biases. Employing traditional optimization algorithms for this issue leads to slow convergence and it is prone to get stuck in the local optima. Most commonly, back-propagation is used for multi-layer-perceptron training and it can lead to vanishing… More >

  • Open Access

    ARTICLE

    Cross Intelligence Evaluation for Effective Emotional Intelligence Estimation

    Ibrahim Alsukayti1, Aman Singh2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2489-2505, 2022, DOI:10.32604/cmc.2022.020264

    Abstract A famous psychologist or researcher, Daniel Goleman, gave a theory on the importance of Emotional Intelligence for the success of an individual’s life. Daniel Goleman quoted in the research that “The contribution of an individual’s Intelligence Quotient (IQ) is only 20% for their success, the remaining 80% is due to Emotional Intelligence (EQ)”. However, in the absence of a reliable technique for EQ evaluation, this factor of overall intelligence is ignored in most of the intelligence evaluation mechanisms. This research presented an analysis based on basic statistical tools along with more sophisticated deep learning tools. The proposed cross intelligence evaluation… More >

  • Open Access

    ARTICLE

    Medical Image Compression Method Using Lightweight Multi-Layer Perceptron for Mobile Healthcare Applications

    Taesik Lee1, Dongsan Jun1,*, Sang-hyo Park2, Byung-Gyu Kim3, Jungil Yun4, Kugjin Yun4, Won-Sik Cheong4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 2013-2029, 2022, DOI:10.32604/cmc.2022.019604

    Abstract As video compression is one of the core technologies required to enable seamless medical data streaming in mobile healthcare applications, there is a need to develop powerful media codecs that can achieve minimum bitrates while maintaining high perceptual quality. Versatile Video Coding (VVC) is the latest video coding standard that can provide powerful coding performance with a similar visual quality compared to the previously developed method that is High Efficiency Video Coding (HEVC). In order to achieve this improved coding performance, VVC adopted various advanced coding tools, such as flexible Multi-type Tree (MTT) block structure which uses Binary Tree (BT)… More >

  • Open Access

    ARTICLE

    A Compact Size 5G Hairpin Bandpass Filter with Multilayer Coupled Line

    Qazwan Abdullah1,2,*, Ömer Aydoĝdu2, Adeeb Salh3, Nabil Farah4, Md Hairul Nizam Talib4, Taha Sadeq5, Mohammed A. A. Al-Mekhalfi3, Abdu Saif6

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4025-4042, 2021, DOI:10.32604/cmc.2021.018798

    Abstract The multilayer structure is a promising technique used to minimize the size of planar microstrip filters. In the flexible design and incorporation of other microwave components, multilayer band-pass filter results in better and enhanced dimensions. This paper introduces a microstrip fifth-generation (5G) low-frequency band of 2.52–2.65 GHz using a parallel-coupled line (PCL) Bandpass filter and multilayer (ML) hairpin Bandpass filter. The targeted four-pole resonator has a center frequency of 2.585 GHz with a bandwidth of 130 MHz. The filters are designed with a 0.1 dB passband ripple with a Chebyshev response. The hairpin-line offers compact filter design structures. Theoretically, they… More >

  • Open Access

    ARTICLE

    YOLOv2PD: An Efficient Pedestrian Detection Algorithm Using Improved YOLOv2 Model

    Chintakindi Balaram Murthy1, Mohammad Farukh Hashmi1, Ghulam Muhammad2,3,*, Salman A. AlQahtani2,3

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3015-3031, 2021, DOI:10.32604/cmc.2021.018781

    Abstract Real-time pedestrian detection is an important task for unmanned driving systems and video surveillance. The existing pedestrian detection methods often work at low speed and also fail to detect smaller and densely distributed pedestrians by losing some of their detection accuracy in such cases. Therefore, the proposed algorithm YOLOv2 (“YOU ONLY LOOK ONCE Version 2”)-based pedestrian detection (referred to as YOLOv2PD) would be more suitable for detecting smaller and densely distributed pedestrians in real-time complex road scenes. The proposed YOLOv2PD algorithm adopts a Multi-layer Feature Fusion (MLFF) strategy, which helps to improve the model’s feature extraction ability. In addition, one… More >

  • Open Access

    ARTICLE

    Multi-Layered Deep Learning Features Fusion for Human Action Recognition

    Sadia Kiran1, Muhammad Attique Khan1, Muhammad Younus Javed1, Majed Alhaisoni2, Usman Tariq3, Yunyoung Nam4,*, Robertas Damaševičius5, Muhammad Sharif6

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4061-4075, 2021, DOI:10.32604/cmc.2021.017800

    Abstract Human Action Recognition (HAR) is an active research topic in machine learning for the last few decades. Visual surveillance, robotics, and pedestrian detection are the main applications for action recognition. Computer vision researchers have introduced many HAR techniques, but they still face challenges such as redundant features and the cost of computing. In this article, we proposed a new method for the use of deep learning for HAR. In the proposed method, video frames are initially pre-processed using a global contrast approach and later used to train a deep learning model using domain transfer learning. The Resnet-50 Pre-Trained Model is… More >

  • Open Access

    ARTICLE

    Multi-Layer Reconstruction Errors Autoencoding and Density Estimate for Network Anomaly Detection

    Ruikun Li1,*, Yun Li2, Wen He1,3, Lirong Chen1, Jianchao Luo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 381-398, 2021, DOI:10.32604/cmes.2021.016264

    Abstract Anomaly detection is an important method for intrusion detection. In recent years, unsupervised methods have been widely researched because they do not require labeling. For example, a nonlinear autoencoder can use reconstruction errors to attain the discrimination threshold. This method is not effective when the model complexity is high or the data contains noise. The method for detecting the density of compressed features in a hidden layer can be used to reduce the influence of noise on the selection of the threshold because the density of abnormal data in hidden layers is smaller than normal data. However, compressed features may… More >

  • Open Access

    ARTICLE

    Adaptive Multi-Layer Selective Ensemble Least Square Support Vector Machines with Applications

    Gang Yu1,4,5, Jian Tang2,*, Jian Zhang3, Zhonghui Wang6

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 273-290, 2021, DOI:10.32604/iasc.2021.016981

    Abstract Kernel learning based on structure risk minimum can be employed to build a soft measuring model for analyzing small samples. However, it is difficult to select learning parameters, such as kernel parameter (KP) and regularization parameter (RP). In this paper, a soft measuring method is investigated to select learning parameters, which is based on adaptive multi-layer selective ensemble (AMLSEN) and least-square support vector machine (LSSVM). First, candidate kernels and RPs with K and R numbers are preset based on prior knowledge, and candidate sub-sub-models with K*R numbers are constructed through utilizing LSSVM. Second, the candidate sub-sub-models with same KPs and… More >

Displaying 21-30 on page 3 of 51. Per Page