Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Fast Verification of Network Configuration Updates

    Jiangyuan Yao1, Zheng Jiang2, Kaiwen Zou2, Shuhua Weng1, Yaxin Li3, Deshun Li1, Yahui Li4,*, Xingcan Cao5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 293-311, 2023, DOI:10.32604/cmc.2023.031282

    Abstract With the expansion of network services, large-scale networks have progressively become common. The network status changes rapidly in response to customer needs and configuration changes, so network configuration changes are also very frequent. However, no matter what changes, the network must ensure the correct conditions, such as isolating tenants from each other or guaranteeing essential services. Once changes occur, it is necessary to verify the after-changed network. Whereas, for the verification of large-scale network configuration changes, many current verifiers show poor efficiency. In order to solve the problem of multiple global verifications caused by frequent updates of local configurations in… More >

  • Open Access

    ARTICLE

    Deep Learned Singular Residual Network for Super Resolution Reconstruction

    Gunnam Suryanarayana1,*, D. Bhavana2, P. E. S. N. Krishna Prasad3, M. M. K. Narasimha Reddy1, Md Zia Ur Rahman2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1123-1137, 2023, DOI:10.32604/cmc.2023.031227

    Abstract Single image super resolution (SISR) techniques produce images of high resolution (HR) as output from input images of low resolution (LR). Motivated by the effectiveness of deep learning methods, we provide a framework based on deep learning to achieve super resolution (SR) by utilizing deep singular-residual neural network (DSRNN) in training phase. Residuals are obtained from the difference between HR and LR images to generate LR-residual example pairs. Singular value decomposition (SVD) is applied to each LR-residual image pair to decompose into subbands of low and high frequency components. Later, DSRNN is trained on these subbands through input and output… More >

  • Open Access

    ARTICLE

    Energy-Efficient Scheduling Based on Task Migration Policy Using DPM for Homogeneous MPSoCs

    Hamayun Khan1,*, Irfan Ud din2, Arshad Ali3, Sami Alshmrany3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 965-981, 2023, DOI:10.32604/cmc.2023.031223

    Abstract Increasing the life span and efficiency of Multiprocessor System on Chip (MPSoC) by reducing power and energy utilization has become a critical chip design challenge for multiprocessor systems. With the advancement of technology, the performance management of central processing unit (CPU) is changing. Power densities and thermal effects are quickly increasing in multi-core embedded technologies due to shrinking of chip size. When energy consumption reaches a threshold that creates a delay in complementary metal oxide semiconductor (CMOS) circuits and reduces the speed by 10%–15% because excessive on-chip temperature shortens the chip’s life cycle. In this paper, we address the scheduling… More >

  • Open Access

    ARTICLE

    The Efficacy of Deep Learning-Based Mixed Model for Speech Emotion Recognition

    Mohammad Amaz Uddin1, Mohammad Salah Uddin Chowdury1, Mayeen Uddin Khandaker2,*, Nissren Tamam3, Abdelmoneim Sulieman4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1709-1722, 2023, DOI:10.32604/cmc.2023.031177

    Abstract Human speech indirectly represents the mental state or emotion of others. The use of Artificial Intelligence (AI)-based techniques may bring revolution in this modern era by recognizing emotion from speech. In this study, we introduced a robust method for emotion recognition from human speech using a well-performed preprocessing technique together with the deep learning-based mixed model consisting of Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). About 2800 audio files were extracted from the Toronto emotional speech set (TESS) database for this study. A high pass and Savitzky Golay Filter have been used to obtain noise-free as well as… More >

  • Open Access

    ARTICLE

    Generation of OAM Waves and Analysis of Mode Purity for 5G Sub-6 GHz Applications

    Shehab Khan Noor1, Arif Mawardi Ismail1, Mohd Najib Mohd Yasin1,*, Mohamed Nasrun Osman1, Nurulazlina Ramli2, Ali H. Rambe3, J. Iqbal4,5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2239-2259, 2023, DOI:10.32604/cmc.2023.031170

    Abstract This article presents the generation of Orbital Angular Momentum (OAM) vortex waves with mode 1 using Uniform Circular Array (UCA) antenna. Two different designs, namely, UCA-1 (4-element array antenna) and UCA-2 (8-element array antenna), were designed and fabricated using FR-4 substrate to generate OAM mode 1 at 3.5 GHz (5G mid-band). The proposed antenna arrays comprised rectangular microstrip patch elements with inset fed technique. The elements were excited by a carefully designed feeding phase shift network to provide similar output energy at output ports with desired phase shift value. The generated OAM waves were confirmed by measuring the null in… More >

  • Open Access

    ARTICLE

    Smart Home IoT Privacy and Security Preservation via Machine Learning Techniques

    Mubarak Almutairi*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1959-1983, 2023, DOI:10.32604/cmc.2023.031155

    Abstract The development and use of Internet of Things (IoT) devices have grown significantly in recent years. Advanced IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved with IoT devices. Corporations have begun to embrace the IoT concept. Identifying true and suitable devices, security faults that might be used for bad reasons, and administration of such devices are only a few of the issues that IoT, a new concept in technological progress, provides. In some ways, IoT device traffic differs from regular device traffic. Devices with particular features can be classified into… More >

  • Open Access

    ARTICLE

    Combing Type-Aware Attention and Graph Convolutional Networks for Event Detection

    Kun Ding1, Lu Xu2, Ming Liu1, Xiaoxiong Zhang1, Liu Liu1, Daojian Zeng2,*, Yuting Liu1,3, Chen Jin4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 641-654, 2023, DOI:10.32604/cmc.2023.031052

    Abstract Event detection (ED) is aimed at detecting event occurrences and categorizing them. This task has been previously solved via recognition and classification of event triggers (ETs), which are defined as the phrase or word most clearly expressing event occurrence. Thus, current approaches require both annotated triggers as well as event types in training data. Nevertheless, triggers are non-essential in ED, and it is time-wasting for annotators to identify the “most clearly” word from a sentence, particularly in longer sentences. To decrease manual effort, we evaluate event detection without triggers. We propose a novel framework that combines Type-aware Attention and Graph… More >

  • Open Access

    ARTICLE

    Distortion Evaluation of EMP Sensors Using Associated-Hermite Functions

    Rupo Ma1,2,*, Siping Gao3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1093-1105, 2023, DOI:10.32604/cmc.2023.030979

    Abstract Electromagnetic pulse (EMP) is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum, which usually disrupts communications and damages electronic equipment and system. It is challenging for an EMP sensor to measure a wideband electromagnetic pulse without distortion for the whole spectrum. Therefore, analyzing the distortion of EMP measurement is crucial to evaluating the sensor distortion characteristics and correcting the measurement results. Waveform fidelity is usually employed to evaluate the distortion of an antenna. However, this metric depends on specific signal waveforms, thus is unsuitable for evaluating and analyzing the distortion of… More >

  • Open Access

    ARTICLE

    Intelligent Machine Learning Enabled Retinal Blood Vessel Segmentation and Classification

    Nora Abdullah Alkhaldi1,*, Hanan T. Halawani2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 399-414, 2023, DOI:10.32604/cmc.2023.030872

    Abstract Automated segmentation of blood vessels in retinal fundus images is essential for medical image analysis. The segmentation of retinal vessels is assumed to be essential to the progress of the decision support system for initial analysis and treatment of retinal disease. This article develops a new Grasshopper Optimization with Fuzzy Edge Detection based Retinal Blood Vessel Segmentation and Classification (GOFED-RBVSC) model. The proposed GOFED-RBVSC model initially employs contrast enhancement process. Besides, GOAFED approach is employed to detect the edges in the retinal fundus images in which the use of GOA adjusts the membership functions. The ORB (Oriented FAST and Rotated… More >

  • Open Access

    ARTICLE

    Augmenting IoT Intrusion Detection System Performance Using Deep Neural Network

    Nasir Sayed1, Muhammad Shoaib2,*, Waqas Ahmed3, Sultan Noman Qasem4, Abdullah M. Albarrak4, Faisal Saeed5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1351-1374, 2023, DOI:10.32604/cmc.2023.030831

    Abstract Due to their low power consumption and limited computing power, Internet of Things (IoT) devices are difficult to secure. Moreover, the rapid growth of IoT devices in homes increases the risk of cyber-attacks. Intrusion detection systems (IDS) are commonly employed to prevent cyberattacks. These systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate countermeasures. Attempts have been made in the past to detect new attacks using machine learning and deep learning techniques, however, these efforts have been unsuccessful. In this paper, we propose two deep learning models to automatically detect various types of intrusion… More >

Displaying 1451-1460 on page 146 of 5427. Per Page