Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Topological Evaluation of Certain Computer Networks by Contraharmonic-Quadratic Indices

    Ahmed M. Alghamdi1,*, Khalid Hamid2, Muhammad Waseem Iqbal3, M. Usman Ashraf4, Abdullah Alshahrani5, Adel Alshamrani6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3795-3810, 2023, DOI:10.32604/cmc.2023.033976

    Abstract In various fields, different networks are used, most of the time not of a single kind; but rather a mix of at least two networks. These kinds of networks are called bridge networks which are utilized in interconnection networks of PC, portable networks, spine of internet, networks engaged with advanced mechanics, power generation interconnection, bio-informatics and substance intensify structures. Any number that can be entirely calculated by a graph is called graph invariants. Countless mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty years. Nevertheless, no trustworthy evaluation has been embraced to pick, how… More >

  • Open Access

    ARTICLE

    A Parallel Hybrid Testing Technique for Tri-Programming Model-Based Software Systems

    Huda Basloom1,*, Mohamed Dahab1, Abdullah Saad AL-Ghamdi2, Fathy Eassa1, Ahmed Mohammed Alghamdi3, Seif Haridi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4501-4530, 2023, DOI:10.32604/cmc.2023.033928

    Abstract Recently, researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems (HPCs) to achieve exascale by applying parallelism at multiple levels. Combining different programming paradigms, such as Message Passing Interface (MPI), Open Multiple Processing (OpenMP), and Open Accelerators (OpenACC), can increase computation speed and improve performance. During the integration of multiple models, the probability of runtime errors increases, making their detection difficult, especially in the absence of testing techniques that can detect these errors. Numerous studies have been conducted to identify these errors, but no technique exists for detecting errors… More >

  • Open Access

    ARTICLE

    Detection of Omicron Caused Pneumonia from Radiology Images Using Convolution Neural Network (CNN)

    Arfat Ahmad Khan1, Malik Muhammad Ali Shahid2, Rab Nawaz Bashir2, Salman Iqbal2, Arshad Shehzad Ahmad Shahid3, Javeria Maqbool4, Chitapong Wechtaisong5,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3743-3761, 2023, DOI:10.32604/cmc.2023.033924

    Abstract COVID-19 disease caused by the SARS-CoV-2 virus has created social and economic disruption across the world. The ability of the COVID-19 virus to quickly mutate and transfer has created serious concerns across the world. It is essential to detect COVID-19 infection caused by different variants to take preventive measures accordingly. The existing method of detection of infections caused by COVID-19 and its variants is costly and time-consuming. The impacts of the COVID-19 pandemic in developing countries are very drastic due to the unavailability of medical facilities and infrastructure to handle the pandemic. Pneumonia is the major symptom of COVID-19 infection.… More >

  • Open Access

    ARTICLE

    Light-Weighted Decision Support Framework for Selecting Cloud Service Providers

    Abdulmajeed Aljuhani1,*, Abdulaziz Alhubaishy2, Mohammad Khalid Imam Rahmani2, Ahmad A. Alzahrani3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4293-4317, 2023, DOI:10.32604/cmc.2023.033893

    Abstract Multi-criteria decision making (MCDM) is a technique used to achieve better outcomes for some complex business-related problems, whereby the selection of the best alternative can be made in as many cases as possible. This paper proposes a model, the multi-criteria decision support method, that allows both service providers and consumers to maximize their profits while preserving the best matching process for resource allocation and task scheduling. The increasing number of service providers with different service provision capabilities creates an issue for consumers seeking to select the best service provider. Each consumer seeks a service provider based on various preferences, such… More >

  • Open Access

    ARTICLE

    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

    Iman Almomani1,2, Walid El-Shafai1,3,*, Aala AlKhayer1, Albandari Alsumayt4, Sumayh S. Aljameel5, Khalid Alissa6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3515-3537, 2023, DOI:10.32604/cmc.2023.033765

    Abstract Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users’ biometrics is still a hot research area to be investigated. This work presents a powerful biometric security system (BSS) to protect different biometric modalities such as faces, iris, and fingerprints. The proposed BSS model is based on hybridizing auto-encoder (AE) network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy. The employed… More >

  • Open Access

    ARTICLE

    A Metaheuristic Technique for Cluster-Based Feature Selection of DNA Methylation Data for Cancer

    Noureldin Eissa1,2,*, Uswah Khairuddin1,3, Rubiyah Yusof1, Ahmed Madani2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2817-2838, 2023, DOI:10.32604/cmc.2023.033632

    Abstract Epigenetics is the study of phenotypic variations that do not alter DNA sequences. Cancer epigenetics has grown rapidly over the past few years as epigenetic alterations exist in all human cancers. One of these alterations is DNA methylation; an epigenetic process that regulates gene expression and often occurs at tumor suppressor gene loci in cancer. Therefore, studying this methylation process may shed light on different gene functions that cannot otherwise be interpreted using the changes that occur in DNA sequences. Currently, microarray technologies; such as Illumina Infinium BeadChip assays; are used to study DNA methylation at an extremely large number… More >

  • Open Access

    ARTICLE

    Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

    Doaa Sami Khafaga1, Faten Khalid Karim1,*, Abdelaziz A. Abdelhamid2,3, El-Sayed M. El-kenawy4, Hend K. Alkahtani1, Nima Khodadadi5, Mohammed Hadwan6, Abdelhameed Ibrahim7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3183-3198, 2023, DOI:10.32604/cmc.2023.033513

    Abstract Managing physical objects in the network’s periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems’ effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper throated optimizer (DTO) to improve… More >

  • Open Access

    ARTICLE

    Enhanced Coyote Optimization with Deep Learning Based Cloud-Intrusion Detection System

    Abdullah M. Basahel1, Mohammad Yamin1, Sulafah M. Basahel2, E. Laxmi Lydia3,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4319-4336, 2023, DOI:10.32604/cmc.2023.033497

    Abstract Cloud Computing (CC) is the preference of all information technology (IT) organizations as it offers pay-per-use based and flexible services to its users. But the privacy and security become the main hindrances in its achievement due to distributed and open architecture that is prone to intruders. Intrusion Detection System (IDS) refers to one of the commonly utilized system for detecting attacks on cloud. IDS proves to be an effective and promising technique, that identifies malicious activities and known threats by observing traffic data in computers, and warnings are given when such threats were identified. The current mainstream IDS are assisted… More >

  • Open Access

    ARTICLE

    Non-Negative Adaptive Mechanism-Based Sliding Mode Control for Parallel Manipulators with Uncertainties

    Van-Truong Nguyen*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2771-2787, 2023, DOI:10.32604/cmc.2023.033460

    Abstract In this paper, a non-negative adaptive mechanism based on an adaptive nonsingular fast terminal sliding mode control strategy is proposed to have finite time and high-speed trajectory tracking for parallel manipulators with the existence of unknown bounded complex uncertainties and external disturbances. The proposed approach is a hybrid scheme of the online non-negative adaptive mechanism, tracking differentiator, and nonsingular fast terminal sliding mode control (NFTSMC). Based on the online non-negative adaptive mechanism, the proposed control can remove the assumption that the uncertainties and disturbances must be bounded for the NFTSMC controllers. The proposed controller has several advantages such as simple… More >

  • Open Access

    ARTICLE

    An End-to-End Transformer-Based Automatic Speech Recognition for Qur’an Reciters

    Mohammed Hadwan1,2,*, Hamzah A. Alsayadi3,4, Salah AL-Hagree5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3471-3487, 2023, DOI:10.32604/cmc.2023.033457

    Abstract The attention-based encoder-decoder technique, known as the trans-former, is used to enhance the performance of end-to-end automatic speech recognition (ASR). This research focuses on applying ASR end-to-end transformer-based models for the Arabic language, as the researchers’ community pays little attention to it. The Muslims Holy Qur’an book is written using Arabic diacritized text. In this paper, an end-to-end transformer model to building a robust Qur’an vs. recognition is proposed. The acoustic model was built using the transformer-based model as deep learning by the PyTorch framework. A multi-head attention mechanism is utilized to represent the encoder and decoder in the acoustic… More >

Displaying 1171-1180 on page 118 of 5350. Per Page