Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment

    Fatma S. Alrayes1, Nuha Alshuqayran2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Abdullah Mohamed5, Amgad Atta Abdelmageed Mohammed6, Gouse Pasha Mohammed6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6737-6753, 2023, DOI:10.32604/cmc.2023.032591

    Abstract Recently, Internet of Things (IoT) devices have developed at a faster rate and utilization of devices gets considerably increased in day to day lives. Despite the benefits of IoT devices, security issues remain challenging owing to the fact that most devices do not include memory and computing resources essential for satisfactory security operation. Consequently, IoT devices are vulnerable to different kinds of attacks. A single attack on networking system/device could result in considerable data to data security and privacy. But the emergence of artificial intelligence (AI) techniques can be exploited for attack detection and classification in the IoT environment. In… More >

  • Open Access

    ARTICLE

    A Novel Efficient Patient Monitoring FER System Using Optimal DL-Features

    Mousa Alhajlah*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6161-6175, 2023, DOI:10.32604/cmc.2023.032505

    Abstract Automated Facial Expression Recognition (FER) serves as the backbone of patient monitoring systems, security, and surveillance systems. Real-time FER is a challenging task, due to the uncontrolled nature of the environment and poor quality of input frames. In this paper, a novel FER framework has been proposed for patient monitoring. Preprocessing is performed using contrast-limited adaptive enhancement and the dataset is balanced using augmentation. Two lightweight efficient Convolution Neural Network (CNN) models MobileNetV2 and Neural search Architecture Network Mobile (NasNetMobile) are trained, and feature vectors are extracted. The Whale Optimization Algorithm (WOA) is utilized to remove irrelevant features from these… More >

  • Open Access

    ARTICLE

    Process Mining Discovery Techniques for Software Architecture Lightweight Evaluation Framework

    Mahdi Sahlabadi, Ravie Chandren Muniyandi, Zarina Shukur, Faizan Qamar*, Syed Hussain Ali Kazmi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5777-5797, 2023, DOI:10.32604/cmc.2023.032504

    Abstract This research recognizes the limitation and challenges of adapting and applying Process Mining as a powerful tool and technique in the Hypothetical Software Architecture (SA) Evaluation Framework with the features and factors of lightweightness. Process mining deals with the large-scale complexity of security and performance analysis, which are the goals of SA evaluation frameworks. As a result of these conjectures, all Process Mining researches in the realm of SA are thoroughly reviewed, and nine challenges for Process Mining Adaption are recognized. Process mining is embedded in the framework and to boost the quality of the SA model for further analysis,… More >

  • Open Access

    ARTICLE

    Photovoltaic Models Parameters Estimation Based on Weighted Mean of Vectors

    Mohamed Elnagi1, Salah Kamel2, Abdelhady Ramadan2, Mohamed F. Elnaggar3,4,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5229-5250, 2023, DOI:10.32604/cmc.2023.032469

    Abstract Renewable energy sources are gaining popularity, particularly photovoltaic energy as a clean energy source. This is evident in the advancement of scientific research aimed at improving solar cell performance. Due to the non-linear nature of the photovoltaic cell, modeling solar cells and extracting their parameters is one of the most important challenges in this discipline. As a result, the use of optimization algorithms to solve this problem is expanding and evolving at a rapid rate. In this paper, a weIghted meaN oF vectOrs algorithm (INFO) that calculates the weighted mean for a set of vectors in the search space has… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom dataset crawled from hundreds of… More >

  • Open Access

    ARTICLE

    Novel Computer-Aided Diagnosis System for the Early Detection of Alzheimer’s Disease

    Meshal Alharbi, Shabana R. Ziyad*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5483-5505, 2023, DOI:10.32604/cmc.2023.032341

    Abstract Aging is a natural process that leads to debility, disease, and dependency. Alzheimer’s disease (AD) causes degeneration of the brain cells leading to cognitive decline and memory loss, as well as dependence on others to fulfill basic daily needs. AD is the major cause of dementia. Computer-aided diagnosis (CADx) tools aid medical practitioners in accurately identifying diseases such as AD in patients. This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop (IWD) algorithm and the Random Forest (RF) classifier. The IWD algorithm an efficient feature selection method, was used to… More >

  • Open Access

    ARTICLE

    Gait Image Classification Using Deep Learning Models for Medical Diagnosis

    Pavitra Vasudevan1, R. Faerie Mattins1, S. Srivarshan1, Ashvath Narayanan1, Gayatri Wadhwani1, R. Parvathi1, R. Maheswari2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6039-6063, 2023, DOI:10.32604/cmc.2023.032331

    Abstract Gait refers to a person’s particular movements and stance while moving around. Although each person’s gait is unique and made up of a variety of tiny limb orientations and body positions, they all have common characteristics that help to define normalcy. Swiftly identifying such characteristics that are difficult to spot by the naked eye, can help in monitoring the elderly who require constant care and support. Analyzing silhouettes is the easiest way to assess and make any necessary adjustments for a smooth gait. It also becomes an important aspect of decision-making while analyzing and monitoring the progress of a patient… More >

  • Open Access

    ARTICLE

    Fault Coverage-Based Test Case Prioritization and Selection Using African Buffalo Optimization

    Shweta Singhal1, Nishtha Jatana2, Ahmad F Subahi3, Charu Gupta4,*, Osamah Ibrahim Khalaf5, Youseef Alotaibi6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6755-6774, 2023, DOI:10.32604/cmc.2023.032308

    Abstract Software needs modifications and requires revisions regularly. Owing to these revisions, retesting software becomes essential to ensure that the enhancements made, have not affected its bug-free functioning. The time and cost incurred in this process, need to be reduced by the method of test case selection and prioritization. It is observed that many nature-inspired techniques are applied in this area. African Buffalo Optimization is one such approach, applied to regression test selection and prioritization. In this paper, the proposed work explains and proves the applicability of the African Buffalo Optimization approach to test case selection and prioritization. The proposed algorithm… More >

  • Open Access

    ARTICLE

    Efficient Routing Protocol with Localization Based Priority & Congestion Control for UWSN

    S. Sandhiyaa*, C. Gomathy

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4747-4768, 2023, DOI:10.32604/cmc.2023.032298

    Abstract The nodes in the sensor network have a wide range of uses, particularly on under-sea links that are skilled for detecting, handling as well as management. The underwater wireless sensor networks support collecting pollution data, mine survey, oceanographic information collection, aided navigation, strategic surveillance, and collection of ocean samples using detectors that are submerged in water. Localization, congestion routing, and prioritizing the traffic is the major issue in an underwater sensor network. Our scheme differentiates the different types of traffic and gives every type of traffic its requirements which is considered regarding network resource. Minimization of localization error using the… More >

  • Open Access

    ARTICLE

    Efficient Gait Analysis Using Deep Learning Techniques

    K. M. Monica, R. Parvathi*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6229-6249, 2023, DOI:10.32604/cmc.2023.032273

    Abstract Human Activity Recognition (HAR) has always been a difficult task to tackle. It is mainly used in security surveillance, human-computer interaction, and health care as an assistive or diagnostic technology in combination with other technologies such as the Internet of Things (IoT). Human Activity Recognition data can be recorded with the help of sensors, images, or smartphones. Recognizing daily routine-based human activities such as walking, standing, sitting, etc., could be a difficult statistical task to classify into categories and hence 2-dimensional Convolutional Neural Network (2D CNN) MODEL, Long Short Term Memory (LSTM) Model, Bidirectional long short-term memory (Bi-LSTM) are used… More >

Displaying 1211-1220 on page 122 of 5427. Per Page