Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Fault Coverage-Based Test Case Prioritization and Selection Using African Buffalo Optimization

    Shweta Singhal1, Nishtha Jatana2, Ahmad F Subahi3, Charu Gupta4,*, Osamah Ibrahim Khalaf5, Youseef Alotaibi6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6755-6774, 2023, DOI:10.32604/cmc.2023.032308

    Abstract Software needs modifications and requires revisions regularly. Owing to these revisions, retesting software becomes essential to ensure that the enhancements made, have not affected its bug-free functioning. The time and cost incurred in this process, need to be reduced by the method of test case selection and prioritization. It is observed that many nature-inspired techniques are applied in this area. African Buffalo Optimization is one such approach, applied to regression test selection and prioritization. In this paper, the proposed work explains and proves the applicability of the African Buffalo Optimization approach to test case selection and prioritization. The proposed algorithm… More >

  • Open Access

    ARTICLE

    Efficient Routing Protocol with Localization Based Priority & Congestion Control for UWSN

    S. Sandhiyaa*, C. Gomathy

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4747-4768, 2023, DOI:10.32604/cmc.2023.032298

    Abstract The nodes in the sensor network have a wide range of uses, particularly on under-sea links that are skilled for detecting, handling as well as management. The underwater wireless sensor networks support collecting pollution data, mine survey, oceanographic information collection, aided navigation, strategic surveillance, and collection of ocean samples using detectors that are submerged in water. Localization, congestion routing, and prioritizing the traffic is the major issue in an underwater sensor network. Our scheme differentiates the different types of traffic and gives every type of traffic its requirements which is considered regarding network resource. Minimization of localization error using the… More >

  • Open Access

    ARTICLE

    Efficient Gait Analysis Using Deep Learning Techniques

    K. M. Monica, R. Parvathi*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6229-6249, 2023, DOI:10.32604/cmc.2023.032273

    Abstract Human Activity Recognition (HAR) has always been a difficult task to tackle. It is mainly used in security surveillance, human-computer interaction, and health care as an assistive or diagnostic technology in combination with other technologies such as the Internet of Things (IoT). Human Activity Recognition data can be recorded with the help of sensors, images, or smartphones. Recognizing daily routine-based human activities such as walking, standing, sitting, etc., could be a difficult statistical task to classify into categories and hence 2-dimensional Convolutional Neural Network (2D CNN) MODEL, Long Short Term Memory (LSTM) Model, Bidirectional long short-term memory (Bi-LSTM) are used… More >

  • Open Access

    ARTICLE

    EsECC_SDN: Attack Detection and Classification Model for MANET

    Veera Ankalu Vuyyuru1, Youseef Alotaibi2, Neenavath Veeraiah3,*, Saleh Alghamdi4, Korimilli Sirisha5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6665-6688, 2023, DOI:10.32604/cmc.2023.032140

    Abstract Mobile Ad Hoc Networks (MANET) is the framework for social networking with a realistic framework. In the MANET environment, based on the query, information is transmitted between the sender and receiver. In the MANET network, the nodes within the communication range are involved in data transmission. Even the nodes that lie outside of the communication range are involved in the transmission of relay messages. However, due to the openness and frequent mobility of nodes, they are subjected to the vast range of security threats in MANET. Hence, it is necessary to develop an appropriate security mechanism for the data MANET… More >

  • Open Access

    ARTICLE

    DNA Computing with Water Strider Based Vector Quantization for Data Storage Systems

    A. Arokiaraj Jovith1, S. Rama Sree2, Gudikandhula Narasimha Rao3, K. Vijaya Kumar4, Woong Cho5, Gyanendra Prasad Joshi6, Sung Won Kim7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6429-6444, 2023, DOI:10.32604/cmc.2023.031817

    Abstract The exponential growth of data necessitates an effective data storage scheme, which helps to effectively manage the large quantity of data. To accomplish this, Deoxyribonucleic Acid (DNA) digital data storage process can be employed, which encodes and decodes binary data to and from synthesized strands of DNA. Vector quantization (VQ) is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency. This article introduces a new DNA Computing with Water Strider Algorithm based Vector Quantization (DNAC-WSAVQ) technique for Data Storage Systems. The proposed DNAC-WSAVQ technique enables encoding data using… More >

  • Open Access

    ARTICLE

    A Novel Secure Scan Design Based on Delayed Physical Unclonable Function

    Weizheng Wang1,2, Xingxing Gong1, Xiangqi Wang3, Gwang-jun Kim4,*, Fayez Alqahtani5, Amr Tolba6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6605-6622, 2023, DOI:10.32604/cmc.2023.031617

    Abstract The advanced integrated circuits have been widely used in various situations including the Internet of Things, wireless communication, etc. But its manufacturing process exists unreliability, so cryptographic chips must be rigorously tested. Due to scan testing provides high test coverage, it is applied to the testing of cryptographic integrated circuits. However, while providing good controllability and observability, it also provides attackers with a backdoor to steal keys. In the text, a novel protection scheme is put forward to resist scan-based attacks, in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuse-antifuse structures… More >

  • Open Access

    ARTICLE

    Smart Contract to Traceability of Food Social Selling

    Cristian Valencia-Payan*, José Fernando Grass-Ramírez, Gustavo Ramirez-Gonzalez, Juan Carlos Corrales

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4703-4728, 2023, DOI:10.32604/cmc.2023.031554

    Abstract Traditionally, food sustainability has been considered solely in the stage of agricultural production. However, globalization, the expansion of the food production industry, and the emergence of supermarket chains that control the retail food market require specific significant changes in supply chains in the food sector and, therefore, we need to address the economic, social, and environmental impacts of these events. On the other hand, social selling has increased rapidly in recent years, with a further boom, following current events related to the coronavirus disease (COVID-19). This explosion of social sales, where there are usually no control and regulation entities, can… More >

  • Open Access

    ARTICLE

    Measuring Reliability of A Web Portal Based on Testing Profile

    Malik Muhammad Ali Shahid1, Shahida Sulaiman2, Mohammed Al-Sarem3,4, Aqeel Ur Rahman1, Salman Iqbal1, Rab Nawaz Bashir1, Arfat Ahmad Khan5,6, Momen M. Alrawi7, Rashiq R. Marie8, Settawit Poochaya5,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6641-6663, 2023, DOI:10.32604/cmc.2023.031459

    Abstract

    Conventionally, the reliability of a web portal is validated with generalized conventional methods, but they fail to provide the desired results. Therefore, we need to include other quality factors that affect reliability such as usability for improving the reliability in addition to the conventional reliability testing. Actually, the primary objectives of web portals are to provide interactive integration of multiple functions confirming diverse requirements in an efficient way. In this paper, we employ testing profiles to measure the reliability through software operational profile, input space profile and usability profile along with qualitative measures of reliability and usability. Moreover, the case… More >

  • Open Access

    ARTICLE

    CLGA Net: Cross Layer Gated Attention Network for Image Dehazing

    Shengchun Wang1, Baoxuan Huang1, Tsz Ho Wong2, Jingui Huang1,*, Hong Deng1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4667-4684, 2023, DOI:10.32604/cmc.2023.031444

    Abstract In this paper, we propose an end-to-end cross-layer gated attention network (CLGA-Net) to directly restore fog-free images. Compared with the previous dehazing network, the dehazing model presented in this paper uses the smooth cavity convolution and local residual module as the feature extractor, combined with the channel attention mechanism, to better extract the restored features. A large amount of experimental data proves that the defogging model proposed in this paper is superior to previous defogging technologies in terms of structure similarity index (SSIM), peak signal to noise ratio (PSNR) and subjective visual quality. In order to improve the efficiency of… More >

  • Open Access

    ARTICLE

    Test Case Prioritization in Unit and Integration Testing: A Shuffled-Frog-Leaping Approach

    Atulya Gupta*, Rajendra Prasad Mahapatra

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5369-5387, 2023, DOI:10.32604/cmc.2023.031261

    Abstract Both unit and integration testing are incredibly crucial for almost any software application because each of them operates a distinct process to examine the product. Due to resource constraints, when software is subjected to modifications, the drastic increase in the count of test cases forces the testers to opt for a test optimization strategy. One such strategy is test case prioritization (TCP). Existing works have propounded various methodologies that re-order the system-level test cases intending to boost either the fault detection capabilities or the coverage efficacy at the earliest. Nonetheless, singularity in objective functions and the lack of dissimilitude among… More >

Displaying 1141-1150 on page 115 of 5350. Per Page