Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Reconfigurable Sensing Time in Cooperative Cognitive Network Using Machine Learning

    Noor Gul1,2, Saeed Ahmed1,3, Su Min Kim1, Muhammad Sajjad Khan4, Junsu Kim1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5209-5227, 2023, DOI:10.32604/cmc.2023.026945

    Abstract A cognitive radio network (CRN) intelligently utilizes the available spectral resources by sensing and learning from the radio environment to maximize spectrum utilization. In CRNs, the secondary users (SUs) opportunistically access the primary users (PUs) spectrum. Therefore, unambiguous detection of the PU channel occupancy is the most critical aspect of the operations of CRNs. Cooperative spectrum sensing (CSS) is rated as the best choice for making reliable sensing decisions. This paper employs machine-learning tools to sense the PU channels reliably in CSS. The sensing parameters are reconfigured to maximize the spectrum utilization while reducing sensing error and cost with improved… More >

  • Open Access

    ARTICLE

    Six Generation Load Cells Solution Based Congestion Management Control Purpose

    Chafaa Hamrouni1,2,*, Aarif Alutaybi1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6445-6460, 2023, DOI:10.32604/cmc.2023.026441

    Abstract Several assessing efforts are approved making both communication and information technologies available. In addition to being a part of universal access and service, we aim at assessing the impact of radio access technologies on universal access indicators. The proposed work demonstrates the possibility of inter-working of all existing Radio Access Technologies (RATs), in a limited area presented in the Six Generation Radio Resources Allocation (6 G-A) network. We propose a solution for the Vertical hand Over (VHO) in 6 G-A heterogeneous system, that adopts Media Independent Handover (MIH) protocol to benefit between different used technologies in a direct communication firstly… More >

  • Open Access

    ARTICLE

    Transparent Access to Heterogeneous IoT Based on Virtual Resources

    Wenquan Jin1, Sunhwan Lim2, Young-Ho Suh2, Chanwon Park2, Dohyeun Kim3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4983-4999, 2023, DOI:10.32604/cmc.2023.020851

    Abstract The Internet of Things (IoT) inspires industries to deploy a massive number of connected devices to provide smart and ubiquitous services to influence our daily life. Edge computing leverages sufficient computation and storage at the edge of the network to enable deploying complex functions closer to the environment using Internet-connected devices. According to the purpose of the environment including privacy level, domain functionality, network scale and service quality, various environment-specific services can be provided through heterogeneous applications with sensors and actuators based on edge computing. However, for providing user-friendly service scenarios based on the transparent access to heterogeneous devices in… More >

  • Open Access

    ARTICLE

    Throughput Analysis of HARQ Scheme Based on Full-Duplex Two-Way AF SWIPT Relay

    Xiaoye Shi1,*, Fei Ding1,2, Haiting Zhu1, Zhaowei Zhang1, Lei Zhang1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4819-4830, 2023, DOI:10.32604/cmc.2023.018637

    Abstract The simultaneous wireless information and power transfer (SWIPT) relay system is one of the emerging technologies. Xiaomi Corporation and Motorola Inc. recently launched indoor wireless power transfer equipment is one of the most promising applications. To tap the potential of the system, hybrid automatic repeat request (HARQ) is introduced into the SWIPT relay system. Firstly, the time slot structure of HARQ scheme based on full duplex two-way amplify and forward (AF) SWIPT relay is given, and its retransmission status is analyzed. Secondly, the equivalent signal-to-noise ratio and outage probability of various states are calculated by approximate simplification. Thirdly, the energy… More >

  • Open Access

    ARTICLE

    Partially Deep-Learning Encryption Technique

    Hamdy M. Mousa*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4277-4291, 2023, DOI:10.32604/cmc.2023.034593

    Abstract The biggest problem facing the world is information security in the digital era. Information protection and integrity are hot topics at all times, so many techniques have been introduced to transmit and store data securely. The increase in computing power is increasing the number of security breaches and attacks at a higher rate than before on average. Thus, a number of existing security systems are at risk of hacking. This paper proposes an encryption technique called Partial Deep-Learning Encryption Technique (PD-LET) to achieve data security. PD-LET includes several stages for encoding and decoding digital data. Data preprocessing, convolution layer of… More >

  • Open Access

    ARTICLE

    Reducing Dataset Specificity for Deepfakes Using Ensemble Learning

    Qaiser Abbas1, Turki Alghamdi1, Yazed Alsaawy1, Tahir Alyas2,*, Ali Alzahrani1, Khawar Iqbal Malik3, Saira Bibi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4261-4276, 2023, DOI:10.32604/cmc.2023.034482

    Abstract The emergence of deep fake videos in recent years has made image falsification a real danger. A person’s face and emotions are deep-faked in a video or speech and are substituted with a different face or voice employing deep learning to analyze speech or emotional content. Because of how clever these videos are frequently, Manipulation is challenging to spot. Social media are the most frequent and dangerous targets since they are weak outlets that are open to extortion or slander a human. In earlier times, it was not so easy to alter the videos, which required expertise in the domain… More >

  • Open Access

    ARTICLE

    Intelligent Systems and Photovoltaic Cells Empowered Topologically by Sudoku Networks

    Khalid Hamid1, Muhammad Waseem Iqbal2, M. Usman Ashraf3, Akber Abid Gardezi4, Shafiq Ahmad5, Mejdal Alqahtani5, Muhammad Shafiq6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4221-4238, 2023, DOI:10.32604/cmc.2023.034320

    Abstract A graph invariant is a number that can be easily and uniquely calculated through a graph. Recently, part of mathematical graph invariants has been portrayed and utilized for relationship examination. Nevertheless, no reliable appraisal has been embraced to pick, how much these invariants are associated with a network graph in interconnection networks of various fields of computer science, physics, and chemistry. In this paper, the study talks about sudoku networks will be networks of fractal nature having some applications in computer science like sudoku puzzle game, intelligent systems, Local area network (LAN) development and parallel processors interconnections, music composition creation,… More >

  • Open Access

    ARTICLE

    View Types and Visual Communication Cues for Remote Collaboration

    Seungwon Kim1, Weidong Huang2, Chi-Min Oh3, Gun Lee4, Mark Billinghurst4, Sang-Joon Lee5,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4363-4379, 2023, DOI:10.32604/cmc.2023.034209

    Abstract Over the last several years, remote collaboration has been getting more attention in the research community because of the COVID-19 pandemic. In previous studies, researchers have investigated the effect of adding visual communication cues or shared views in collaboration, but there has not been any previous study exploring the influence between them. In this paper, we investigate the influence of view types on the use of visual communication cues. We compared the use of the three visual cues (hand gesture, a pointer with hand gesture, and sketches with hand gesture) across two view types (dependent and independent views), respectively. We… More >

  • Open Access

    ARTICLE

    Crime Prediction Methods Based on Machine Learning: A Survey

    Junxiang Yin*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4601-4629, 2023, DOI:10.32604/cmc.2023.034190

    Abstract The objective of crime prediction, one of the most important technologies in social computing, is to extract useful information from many existing criminal records to predict the next process-related crime. It can aid the police in obtaining criminal information and warn the public to be vigilant in certain areas. With the rapid growth of big data, the Internet of Things, and other technologies, as well as the increasing use of artificial intelligence in forecasting models, crime prediction models based on deep learning techniques are accelerating. Therefore, it is necessary to classify the existing crime prediction algorithms and compare in depth… More >

  • Open Access

    ARTICLE

    Modeling and Simulation of DVR and D-STATCOM in Presence of Wind Energy System

    Mehrdad Ahmadi Kamarposhti1,*, Ilhami Colak2, Phatiphat Thounthong3, Kei Eguchi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4547-4570, 2023, DOI:10.32604/cmc.2023.034082

    Abstract The present study suggests that series voltage injection is more effective than parallel current injection to improve voltage quality on the load side. The line voltage can be accurately symmetrized at the connection point by creating and controlling a series voltage component in each phase. This is more reliable and effective than parallel current injection. A dynamic voltage restorer (DVR) and a distribution static synchronous compensator (DSTATCOM) were utilized to provide the required power. The DVR is an effective and modern device utilized in parallel within the grid and can protect sensitive loads from voltage problems in the grid by… More >

Displaying 1161-1170 on page 117 of 5350. Per Page