Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Shared Cache Based on Content Addressable Memory in a Multi-Core Architecture

    Allam Abumwais*, Mahmoud Obaid

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4951-4963, 2023, DOI:10.32604/cmc.2023.032822

    Abstract Modern shared-memory multi-core processors typically have shared Level 2 (L2) or Level 3 (L3) caches. Cache bottlenecks and replacement strategies are the main problems of such architectures, where multiple cores try to access the shared cache simultaneously. The main problem in improving memory performance is the shared cache architecture and cache replacement. This paper documents the implementation of a Dual-Port Content Addressable Memory (DPCAM) and a modified Near-Far Access Replacement Algorithm (NFRA), which was previously proposed as a shared L2 cache layer in a multi-core processor. Standard Performance Evaluation Corporation (SPEC) Central Processing Unit (CPU) 2006 benchmark workloads are used… More >

  • Open Access

    ARTICLE

    IoT Based Smart Framework Monitoring System for Power Station

    Arodh Lal Karn1, Panneer Selvam Manickam2, R. Saravanan3,*, Roobaea Alroobaea4, Jasem Almotiri4, Sudhakar Sengan5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6019-6037, 2023, DOI:10.32604/cmc.2023.032791

    Abstract Power Station (PS) monitoring systems are becoming critical, ensuring electrical safety through early warning, and in the event of a PS fault, the power supply is quickly disconnected. Traditional technologies are based on relays and don’t have a way to capture and store user data when there is a problem. The proposed framework is designed with the goal of providing smart environments for protecting electrical types of equipment. This paper proposes an Internet of Things (IoT)-based Smart Framework (SF) for monitoring the Power Devices (PD) which are being used in power substations. A Real-Time Monitoring (RTM) system is proposed, and… More >

  • Open Access

    ARTICLE

    Automated Autism Spectral Disorder Classification Using Optimal Machine Learning Model

    Hanan Abdullah Mengash1, Hamed Alqahtani2, Mohammed Maray3, Mohamed K. Nour4, Radwa Marzouk1, Mohammed Abdullah Al-Hagery5, Heba Mohsen6, Mesfer Al Duhayyim7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5251-5265, 2023, DOI:10.32604/cmc.2023.032729

    Abstract Autism Spectrum Disorder (ASD) refers to a neuro-disorder where an individual has long-lasting effects on communication and interaction with others. Advanced information technology which employs artificial intelligence (AI) model has assisted in early identify ASD by using pattern detection. Recent advances of AI models assist in the automated identification and classification of ASD, which helps to reduce the severity of the disease. This study introduces an automated ASD classification using owl search algorithm with machine learning (ASDC-OSAML) model. The proposed ASDC-OSAML model majorly focuses on the identification and classification of ASD. To attain this, the presented ASDC-OSAML model follows min-max… More >

  • Open Access

    ARTICLE

    Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment

    Fatma S. Alrayes1, Nuha Alshuqayran2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Abdullah Mohamed5, Amgad Atta Abdelmageed Mohammed6, Gouse Pasha Mohammed6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6737-6753, 2023, DOI:10.32604/cmc.2023.032591

    Abstract Recently, Internet of Things (IoT) devices have developed at a faster rate and utilization of devices gets considerably increased in day to day lives. Despite the benefits of IoT devices, security issues remain challenging owing to the fact that most devices do not include memory and computing resources essential for satisfactory security operation. Consequently, IoT devices are vulnerable to different kinds of attacks. A single attack on networking system/device could result in considerable data to data security and privacy. But the emergence of artificial intelligence (AI) techniques can be exploited for attack detection and classification in the IoT environment. In… More >

  • Open Access

    ARTICLE

    A Novel Efficient Patient Monitoring FER System Using Optimal DL-Features

    Mousa Alhajlah*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6161-6175, 2023, DOI:10.32604/cmc.2023.032505

    Abstract Automated Facial Expression Recognition (FER) serves as the backbone of patient monitoring systems, security, and surveillance systems. Real-time FER is a challenging task, due to the uncontrolled nature of the environment and poor quality of input frames. In this paper, a novel FER framework has been proposed for patient monitoring. Preprocessing is performed using contrast-limited adaptive enhancement and the dataset is balanced using augmentation. Two lightweight efficient Convolution Neural Network (CNN) models MobileNetV2 and Neural search Architecture Network Mobile (NasNetMobile) are trained, and feature vectors are extracted. The Whale Optimization Algorithm (WOA) is utilized to remove irrelevant features from these… More >

  • Open Access

    ARTICLE

    Process Mining Discovery Techniques for Software Architecture Lightweight Evaluation Framework

    Mahdi Sahlabadi, Ravie Chandren Muniyandi, Zarina Shukur, Faizan Qamar*, Syed Hussain Ali Kazmi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5777-5797, 2023, DOI:10.32604/cmc.2023.032504

    Abstract This research recognizes the limitation and challenges of adapting and applying Process Mining as a powerful tool and technique in the Hypothetical Software Architecture (SA) Evaluation Framework with the features and factors of lightweightness. Process mining deals with the large-scale complexity of security and performance analysis, which are the goals of SA evaluation frameworks. As a result of these conjectures, all Process Mining researches in the realm of SA are thoroughly reviewed, and nine challenges for Process Mining Adaption are recognized. Process mining is embedded in the framework and to boost the quality of the SA model for further analysis,… More >

  • Open Access

    ARTICLE

    Photovoltaic Models Parameters Estimation Based on Weighted Mean of Vectors

    Mohamed Elnagi1, Salah Kamel2, Abdelhady Ramadan2, Mohamed F. Elnaggar3,4,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5229-5250, 2023, DOI:10.32604/cmc.2023.032469

    Abstract Renewable energy sources are gaining popularity, particularly photovoltaic energy as a clean energy source. This is evident in the advancement of scientific research aimed at improving solar cell performance. Due to the non-linear nature of the photovoltaic cell, modeling solar cells and extracting their parameters is one of the most important challenges in this discipline. As a result, the use of optimization algorithms to solve this problem is expanding and evolving at a rapid rate. In this paper, a weIghted meaN oF vectOrs algorithm (INFO) that calculates the weighted mean for a set of vectors in the search space has… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom dataset crawled from hundreds of… More >

  • Open Access

    ARTICLE

    Novel Computer-Aided Diagnosis System for the Early Detection of Alzheimer’s Disease

    Meshal Alharbi, Shabana R. Ziyad*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5483-5505, 2023, DOI:10.32604/cmc.2023.032341

    Abstract Aging is a natural process that leads to debility, disease, and dependency. Alzheimer’s disease (AD) causes degeneration of the brain cells leading to cognitive decline and memory loss, as well as dependence on others to fulfill basic daily needs. AD is the major cause of dementia. Computer-aided diagnosis (CADx) tools aid medical practitioners in accurately identifying diseases such as AD in patients. This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop (IWD) algorithm and the Random Forest (RF) classifier. The IWD algorithm an efficient feature selection method, was used to… More >

  • Open Access

    ARTICLE

    Gait Image Classification Using Deep Learning Models for Medical Diagnosis

    Pavitra Vasudevan1, R. Faerie Mattins1, S. Srivarshan1, Ashvath Narayanan1, Gayatri Wadhwani1, R. Parvathi1, R. Maheswari2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6039-6063, 2023, DOI:10.32604/cmc.2023.032331

    Abstract Gait refers to a person’s particular movements and stance while moving around. Although each person’s gait is unique and made up of a variety of tiny limb orientations and body positions, they all have common characteristics that help to define normalcy. Swiftly identifying such characteristics that are difficult to spot by the naked eye, can help in monitoring the elderly who require constant care and support. Analyzing silhouettes is the easiest way to assess and make any necessary adjustments for a smooth gait. It also becomes an important aspect of decision-making while analyzing and monitoring the progress of a patient… More >

Displaying 1131-1140 on page 114 of 5350. Per Page