Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

    Abdallah Elhigazi Abdallah1, Mosab Hamdan2, Shukor Abd Razak3, Fuad A. Ghalib3, Muzaffar Hamzah2,*, Suleman Khan4, Siddiq Ahmed Babikir Ali5, Mutaz H. H. Khairi1, Sayeed Salih6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5607-5623, 2023, DOI:10.32604/cmc.2023.031047

    Abstract IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed over the last decades to… More >

  • Open Access

    ARTICLE

    Salp Swarm Algorithm with Multilevel Thresholding Based Brain Tumor Segmentation Model

    Hanan T. Halawani*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6775-6788, 2023, DOI:10.32604/cmc.2023.030814

    Abstract Biomedical image processing acts as an essential part of several medical applications in supporting computer aided disease diagnosis. Magnetic Resonance Image (MRI) is a commonly utilized imaging tool used to save glioma for clinical examination. Biomedical image segmentation plays a vital role in healthcare decision making process which also helps to identify the affected regions in the MRI. Though numerous segmentation models are available in the literature, it is still needed to develop effective segmentation models for BT. This study develops a salp swarm algorithm with multi-level thresholding based brain tumor segmentation (SSAMLT-BTS) model. The presented SSAMLT-BTS model initially employs… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification

    R. Brindha1, S. Nandagopal2, H. Azath3, V. Sathana4, Gyanendra Prasad Joshi5, Sung Won Kim6,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5901-5914, 2023, DOI:10.32604/cmc.2023.030784

    Abstract Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’ sensitive data. E-mails, instant messages and phone calls are some of the common modes used in cyberattacks. Though the security models are continuously upgraded to prevent cyberattacks, hackers find innovative ways to target the victims. In this background, there is a drastic increase observed in the number of phishing emails sent to potential targets. This scenario necessitates the importance of designing an effective classification model. Though numerous conventional models are available in the literature for proficient classification of phishing emails,… More >

  • Open Access

    ARTICLE

    Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map

    K. Priyadarsini1, Arun Kumar Sivaraman2, Abdul Quadir Md2, Areej Malibari3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6703-6717, 2023, DOI:10.32604/cmc.2023.030648

    Abstract With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts of data. The major concerns in this domain are security and privacy. Therefore, attaining a reliable level of confidentiality in the fog computing environment is a pivotal task. Among different types of data stored in the fog, the 3D point and mesh fog data are increasingly popular in recent days, due to the growth of 3D modelling and 3D printing technologies. Hence, in this research, we propose a novel scheme for preserving the privacy of 3D point and mesh fog data. Chaotic… More >

  • Open Access

    ARTICLE

    Resource Management in UAV Enabled MEC Networks

    Muhammad Abrar1, Ziyad M. Almohaimeed2,*, Ushna Ajmal1, Rizwan Akram2, Rooha Masroor3, Muhammad Majid Hussain4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4847-4860, 2023, DOI:10.32604/cmc.2023.030242

    Abstract Mobile edge cloud networks can be used to offload computationally intensive tasks from Internet of Things (IoT) devices to nearby mobile edge servers, thereby lowering energy consumption and response time for ground mobile users or IoT devices. Integration of Unmanned Aerial Vehicles (UAVs) and the mobile edge computing (MEC) server will significantly benefit small, battery-powered, and energy-constrained devices in 5G and future wireless networks. We address the problem of maximising computation efficiency in U-MEC networks by optimising the user association and offloading indicator (OI), the computational capacity (CC), the power consumption, the time duration, and the optimal location planning simultaneously.… More >

  • Open Access

    ARTICLE

    An Optimized Offloaded Task Execution for Smart Cities Applications

    Ahmad Naseem Alvi1, Muhammad Awais Javed1,*, Mozaherul Hoque Abul Hasanat2, Muhammad Badruddin Khan2, Abdul Khader Jilani Saudagar2, Mohammed Alkhathami2

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6321-6334, 2023, DOI:10.32604/cmc.2023.029913

    Abstract Wireless nodes are one of the main components in different applications that are offered in a smart city. These wireless nodes are responsible to execute multiple tasks with different priority levels. As the wireless nodes have limited processing capacity, they offload their tasks to cloud servers if the number of tasks exceeds their task processing capacity. Executing these tasks from remotely placed cloud servers causes a significant delay which is not required in sensitive task applications. This execution delay is reduced by placing fog computing nodes near these application nodes. A fog node has limited processing capacity and is sometimes… More >

  • Open Access

    ARTICLE

    Two-Stream Deep Learning Architecture-Based Human Action Recognition

    Faheem Shehzad1, Muhammad Attique Khan2, Muhammad Asfand E. Yar3, Muhammad Sharif1, Majed Alhaisoni4, Usman Tariq5, Arnab Majumdar6, Orawit Thinnukool7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5931-5949, 2023, DOI:10.32604/cmc.2023.028743

    Abstract Human action recognition (HAR) based on Artificial intelligence reasoning is the most important research area in computer vision. Big breakthroughs in this field have been observed in the last few years; additionally, the interest in research in this field is evolving, such as understanding of actions and scenes, studying human joints, and human posture recognition. Many HAR techniques are introduced in the literature. Nonetheless, the challenge of redundant and irrelevant features reduces recognition accuracy. They also faced a few other challenges, such as differing perspectives, environmental conditions, and temporal variations, among others. In this work, a deep learning and improved… More >

  • Open Access

    ARTICLE

    An Optimized Test Case Minimization Technique Using Genetic Algorithm for Regression Testing

    Rubab Sheikh1, Muhammad Imran Babar2,*, Rawish Butt3, Abdelzahir Abdelmaboud4, Taiseer Abdalla Elfadil Eisa4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6789-6806, 2023, DOI:10.32604/cmc.2023.028625

    Abstract Regression testing is a widely used approach to confirm the correct functionality of the software in incremental development. The use of test cases makes it easier to test the ripple effect of changed requirements. Rigorous testing may help in meeting the quality criteria that is based on the conformance to the requirements as given by the intended stakeholders. However, a minimized and prioritized set of test cases may reduce the efforts and time required for testing while focusing on the timely delivery of the software application. In this research, a technique named TestReduce has been presented to get a minimal… More >

  • Open Access

    ARTICLE

    A Novel Design of Antenna Array with Two K-Band Circularly Polarized Antenna

    Xiao Liu1,2, Anqi Li1,*, Zhongjun Yu1,2, Ting Lv3, Meng Li4, Zhen Zhang5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6411-6427, 2023, DOI:10.32604/cmc.2023.027124

    Abstract As an important part of phased array system, the research on phased array antenna is very necessary. The phased array antenna achieves the scanning beam adaptively by regulating the phase difference between each array element. In this paper, a dual K-band circularly polarized antenna with high broadband, broadband beam, wide axial ratio bandwidth and high radiation efficiency is designed. We combine with the advantages of slot antenna and aperture antenna, use multimode waveguide cavity structure to design an aperture antenna, which is fed to waveguide circular polarizer by slot coupling in order to realize circular polarization radiation. Meanwhile, it has… More >

  • Open Access

    ARTICLE

    Design of Ka-Band Phased Array Antenna with Calibration Function

    Xiao Liu1,2, Xingyao Zeng1,*, Chengxiang Hao1, Haibo Zhang1, Zhongjun Yu1,2, Ting Lv3, Meng Li4, Zhen Zhang5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6251-6261, 2023, DOI:10.32604/cmc.2023.027114

    Abstract In this paper, we have proposed a novel structure of Ka-band based phased array antenna with calibration function. In the design of Ka-band antenna, the active phased array system is adopted and the antenna would work in the dual polarization separation mode. We have given out the schematic diagram for the proposed Ka-band antenna, where the Ka-band antenna is in the form of waveguide slot array antenna, with 96 units in azimuth and 1 unit in distance. Each group of units is driven by a single-channel Transmitter/Receiver (T/R) component, and the whole array contains 192 T/R components in total. The… More >

Displaying 1151-1160 on page 116 of 5350. Per Page