Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (660)
  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This means that while attempting to… More >

  • Open Access

    ARTICLE

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    Naglaa F. Soliman1, Fatma E. Fadl-Allah2, Walid El-Shafai3,4,*, Mahmoud I. Aly2, Maali Alabdulhafith1, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 201-241, 2024, DOI:10.32604/cmc.2024.046757

    Abstract The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away from unauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and encryption. This paper is mainly… More >

  • Open Access

    ARTICLE

    Synthesis and Characterization of Epoxy Resin of (2E, 6E) - Bis (4-hydroxybenzylidene) -4-methylcyclohexanone

    JALPA V. CHOPDA, DHARMESH B. SANKHAVARA, JIGNESH P. PATEL, P. H. PARSANIA*

    Journal of Polymer Materials, Vol.36, No.1, pp. 101-109, 2019, DOI:10.32381/JPM.2019.36.01.8

    Abstract The epoxy resin (EMBHBC) of (2E,6E)-bis (4-hydroxybenzylidene)-4-methyl cyclohexanone (MBHBC) was synthesized by condensing 0.5 mol MBHBC and 2.5 mol epichlorohydrin in 500 mL isopropyl alcohol as a solvent and 1.0 mol NaOH in 50 mL water as a catalyst at 80°C for 3 h. The structure of EMBHBC was supported by UV-Vis, FTIR, 1 HNMR and 13CNMR spectroscopic techniques. Molecular weights and molecular weight distribution of EMBHBC were determined by gel permeation chromatography. DSC thermogram of EMBHC showed one endothermic transition (95.9°C) and two exothermic transitions (317.7°C and 382.2°C) due to melting and decomposition transitions, respectively. EMBHBC is thermally stable… More >

  • Open Access

    ARTICLE

    Preparation of Chitin-Glucan Microsphere via SprayDrying Technique and their Antibacterial Activity

    ANU SINGH AND P.K. DUTTA*

    Journal of Polymer Materials, Vol.38, No.1-2, pp. 63-69, 2021, DOI:10.32381/JPM.2021.38.1-2.6

    Abstract The experiment was designed to examine the microsphere of the chitin-glucan complex. We formed a chitin-glucan microsphere (ChGMS) from the spray dryer technique. SEM images observed that shape of ChGMS was spherical. From particle size analyzer and SEM analysis both showed that the size of particles was in the range of 1.5 to 3.5 µm. It showed amorphous nature after the formation of microsphere particles of chitin-glucan. The effect of chitin-glucan complex and ciprofloxacin loaded chitin-glucan microsphere on Bacillus subtilis and Escherichia coli were also tested. Antibacterial analysis was indicating that the ciprofloxacin loaded chitinglucan microsphere strongly inhibited the growth… More >

  • Open Access

    ARTICLE

    A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

    Shaha Al-Otaibi1, Rahim Khan2,*, Hashim Ali2, Aftab Ahmed Khan2, Amir Saeed3, Jehad Ali4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3805-3823, 2024, DOI:10.32604/cmc.2024.049017

    Abstract The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device’s authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field-proven methodologies were presented to streamline the verification process of the communicating devices; however, location-aware authentication has not been reported as per our knowledge, which is a crucial metric, especially in scenarios where… More >

  • Open Access

    ARTICLE

    Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction

    Sureka Sivavelu, Venkatesh Palanisamy*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3469-3487, 2024, DOI:10.32604/cmc.2024.047407

    Abstract The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software with defects negatively impacts operational costs and finally affects customer satisfaction. Numerous approaches exist to predict software defects. However, the timely and accurate software bugs are the major challenging issues. To improve the timely and accurate software defect prediction, a novel technique called Nonparametric Statistical feature scaled QuAdratic regressive convolution Deep nEural Network (SQADEN) is introduced. The proposed SQADEN technique mainly includes two major processes namely metric… More >

  • Open Access

    ARTICLE

    Prediction of Bandwidth of Metamaterial Antenna Using Pearson Kernel-Based Techniques

    Sherly Alphonse1,*, S. Abinaya1, Sourabh Paul2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3449-3467, 2024, DOI:10.32604/cmc.2024.046403

    Abstract The use of metamaterial enhances the performance of a specific class of antennas known as metamaterial antennas. The radiation cost and quality factor of the antenna are influenced by the size of the antenna. Metamaterial antennas allow for the circumvention of the bandwidth restriction for small antennas. Antenna parameters have recently been predicted using machine learning algorithms in existing literature. Machine learning can take the place of the manual process of experimenting to find the ideal simulated antenna parameters. The accuracy of the prediction will be primarily dependent on the model that is used. In this paper, a novel method… More >

  • Open Access

    REVIEW

    A Review on the Recent Trends of Image Steganography for VANET Applications

    Arshiya S. Ansari*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2865-2892, 2024, DOI:10.32604/cmc.2024.045908

    Abstract Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look. Whereas vehicular ad hoc networks (VANETs), which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services, as they are an essential component of modern smart transportation systems. VANETs steganography has been suggested by many authors for secure, reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection. This paper aims to determine whether using steganography is possible to improve data security… More >

  • Open Access

    ARTICLE

    A Deep Reinforcement Learning-Based Technique for Optimal Power Allocation in Multiple Access Communications

    Sepehr Soltani1, Ehsan Ghafourian2, Reza Salehi3, Diego Martín3,*, Milad Vahidi4

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 93-108, 2024, DOI:10.32604/iasc.2024.042693

    Abstract For many years, researchers have explored power allocation (PA) algorithms driven by models in wireless networks where multiple-user communications with interference are present. Nowadays, data-driven machine learning methods have become quite popular in analyzing wireless communication systems, which among them deep reinforcement learning (DRL) has a significant role in solving optimization issues under certain constraints. To this purpose, in this paper, we investigate the PA problem in a -user multiple access channels (MAC), where transmitters (e.g., mobile users) aim to send an independent message to a common receiver (e.g., base station) through wireless channels. To this end, we first train… More >

  • Open Access

    ARTICLE

    Energy and Exergy Analysis of Pyramid-Type Solar Still Coupled with Magnetic and Electrical Effects by Using Matlab Simulation

    Karrar A. Hammoodi1,*, Hayder A. Dhahad2, Wissam H. Alawee3, Z. M. Omara4

    Frontiers in Heat and Mass Transfer, Vol.22, No.1, pp. 217-262, 2024, DOI:10.32604/fhmt.2024.047329

    Abstract In the face of an escalating global water crisis, countries worldwide grapple with the crippling effects of scarcity, jeopardizing economic progress and hindering societal advancement. Solar energy emerges as a beacon of hope, offering a sustainable and environmentally friendly solution to desalination. Solar distillation technology, harnessing the power of the sun, transforms seawater into freshwater, expanding the availability of this precious resource. Optimizing solar still performance under specific climatic conditions and evaluating different configurations is crucial for practical implementation and widespread adoption of solar energy. In this study, we conducted theoretical investigations on three distinct solar still configurations to evaluate… More > Graphic Abstract

    Energy and Exergy Analysis of Pyramid-Type Solar Still Coupled with Magnetic and Electrical Effects by Using Matlab Simulation

Displaying 1-10 on page 1 of 660. Per Page