Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Impact of Accumulated Temperature on Wetland Vegetation Area in Poyang Lake

    Xin Yao1, Junyu Zhu1, Hong Zeng2, Wenzheng Yu1,*, Hanxiaoya Zhang3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1915-1926, 2022, DOI:10.32604/cmc.2022.026777

    Abstract Accumulated temperature, which is now widely used in agronomy, is an important ecological factor to the growth of plants, but few relative studies have been found on the vegetation area of floodplain grasslands in Poyang Lake. This research used the classification and regression tree (CART) to classify normalized vegetation area index derived from MODIS LAI (Moderate Resolution Imaging Spectroradiometer Leaf Area Index) images from 2008 to 2014, according to different climate indexes, such as mean daily air temperature (n), accumulated temperature (jw), daily maximum temperature (g), daily minimum temperature (d), accumulative precipitation (j), water level (s) and average water level… More >

  • Open Access

    ARTICLE

    A TMA-Seq2seq Network for Multi-Factor Time Series Sea Surface Temperature Prediction

    Qi He1, Wenlong Li1, Zengzhou Hao2, Guohua Liu3, Dongmei Huang1, Wei Song1,*, Huifang Xu4, Fayez Alqahtani5, Jeong-Uk Kim6

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 51-67, 2022, DOI:10.32604/cmc.2022.026771

    Abstract Sea surface temperature (SST) is closely related to global climate change, ocean ecosystem, and ocean disaster. Accurate prediction of SST is an urgent and challenging task. With a vast amount of ocean monitoring data are continually collected, data-driven methods for SST time-series prediction show promising results. However, they are limited by neglecting complex interactions between SST and other ocean environmental factors, such as air temperature and wind speed. This paper uses multi-factor time series SST data to propose a sequence-to-sequence network with two-module attention (TMA-Seq2seq) for long-term time series SST prediction. Specifically, TMA-Seq2seq is an LSTM-based encoder-decoder architecture facilitated by… More >

  • Open Access

    ARTICLE

    Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search

    Hyun Sook Rhee*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 69-85, 2022, DOI:10.32604/cmc.2022.026751

    Abstract As the use of cloud storage for various services increases, the amount of private personal information along with data stored in the cloud storage is also increasing. To remotely use the data stored on the cloud storage, the data to be stored needs to be encrypted for this reason. Since “searchable encryption” is enable to search on the encrypted data without any decryption, it is one of convenient solutions for secure data management. A public key encryption with keyword search (for short, PEKS) is one of searchable encryptions. Abdalla et al. firstly defined IND-CCA security for PEKS to enhance it’s… More >

  • Open Access

    ARTICLE

    Evolutionary Intelligence and Deep Learning Enabled Diabetic Retinopathy Classification Model

    Bassam A. Y. Alqaralleh1,*, Fahad Aldhaban1, Anas Abukaraki2, Esam A. AlQaralleh3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 87-101, 2022, DOI:10.32604/cmc.2022.026729

    Abstract Diabetic Retinopathy (DR) has become a widespread illness among diabetics across the globe. Retinal fundus images are generally used by physicians to detect and classify the stages of DR. Since manual examination of DR images is a time-consuming process with the risks of biased results, automated tools using Artificial Intelligence (AI) to diagnose the disease have become essential. In this view, the current study develops an Optimal Deep Learning-enabled Fusion-based Diabetic Retinopathy Detection and Classification (ODL-FDRDC) technique. The intention of the proposed ODL-FDRDC technique is to identify DR and categorize its different grades using retinal fundus images. In addition, ODL-FDRDC… More >

  • Open Access

    ARTICLE

    Reference Selection for Offline Hybrid Siamese Signature Verification Systems

    Tsung-Yu Lu1, Mu-En Wu2, Er-Hao Chen3, Yeong-Luh Ueng4,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 935-952, 2022, DOI:10.32604/cmc.2022.026717

    Abstract This paper presents an off-line handwritten signature verification system based on the Siamese network, where a hybrid architecture is used. The Residual neural Network (ResNet) is used to realize a powerful feature extraction model such that Writer Independent (WI) features can be effectively learned. A single-layer Siamese Neural Network (NN) is used to realize a Writer Dependent (WD) classifier such that the storage space can be minimized. For the purpose of reducing the impact of the high intraclass variability of the signature and ensuring that the Siamese network can learn more effectively, we propose a method of selecting a reference… More >

  • Open Access

    ARTICLE

    Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data

    Taek-Young Youn1, Nam-Su Jho2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 151-164, 2022, DOI:10.32604/cmc.2022.026653

    Abstract

    Due to the development of 5G communication, many aspects of information technology (IT) services are changing. With the development of communication technologies such as 5G, it has become possible to provide IT services that were difficult to provide in the past. One of the services made possible through this change is cloud-based collaboration. In order to support secure collaboration over cloud, encryption technology to securely manage dynamic data is essential. However, since the existing encryption technology is not suitable for encryption of dynamic data, a new technology that can provide encryption for dynamic data is required for secure cloud-based collaboration.… More >

  • Open Access

    ARTICLE

    Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment

    Kun-Lin Tsai1,2,*, Li-Woei Chen3, Fang-Yie Leu4,5, Chuan-Tian Wu1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 547-562, 2022, DOI:10.32604/cmc.2022.026557

    Abstract Secure data communication is an essential requirement for an Internet of Things (IoT) system. Especially in Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) systems, when important data are hacked, it may induce property loss or life hazard. Even though many IoT-related communication protocols are equipped with secure policies, they still have some security weaknesses in their IoT systems. LoRaWAN is one of the low power wide-area network protocols, and it adopts Advanced Encryption Standard (AES) to provide message integrity and confidentiality. However, LoRaWAN's encryption key update scheme can be further improved. In this paper, a Two-stage… More >

  • Open Access

    ARTICLE

    Comprehensive DDoS Attack Classification Using Machine Learning Algorithms

    Olga Ussatova1,2, Aidana Zhumabekova1,*, Yenlik Begimbayeva2,3, Eric T. Matson4, Nikita Ussatov5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 577-594, 2022, DOI:10.32604/cmc.2022.026552

    Abstract The fast development of Internet technologies ignited the growth of techniques for information security that protect data, networks, systems, and applications from various threats. There are many types of threats. The dedicated denial of service attack (DDoS) is one of the most serious and widespread attacks on Internet resources. This attack is intended to paralyze the victim's system and cause the service to fail. This work is devoted to the classification of DDoS attacks in the special network environment called Software-Defined Networking (SDN) using machine learning algorithms. The analyzed dataset included instances of two classes: benign and malicious. As the… More >

  • Open Access

    ARTICLE

    Feature Extraction and Classification of Plant Leaf Diseases Using Deep Learning Techniques

    K. Anitha1, S. Srinivasan2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 233-247, 2022, DOI:10.32604/cmc.2022.026542

    Abstract In India’s economy, agriculture has been the most significant contributor. Despite the fact that agriculture’s contribution is decreasing as the world’s population grows, it continues to be the most important source of employment with a little margin of difference. As a result, there is a pressing need to pick up the pace in order to achieve competitive, productive, diverse, and long-term agriculture. Plant disease misinterpretations can result in the incorrect application of pesticides, causing crop harm. As a result, early detection of infections is critical as well as cost-effective for farmers. To diagnose the disease at an earlier stage, appropriate… More >

  • Open Access

    ARTICLE

    Quantum Artificial Intelligence Based Node Localization Technique for Wireless Networks

    Hanan Abdullah Mengash1, Radwa Marzouk1, Siwar Ben Haj Hassine2, Anwer Mustafa Hilal3,*, Ishfaq Yaseen3, Abdelwahed Motwakel3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 327-342, 2022, DOI:10.32604/cmc.2022.026464

    Abstract Artificial intelligence (AI) techniques have received significant attention among research communities in the field of networking, image processing, natural language processing, robotics, etc. At the same time, a major problem in wireless sensor networks (WSN) is node localization, which aims to identify the exact position of the sensor nodes (SN) using the known position of several anchor nodes. WSN comprises a massive number of SNs and records the position of the nodes, which becomes a tedious process. Besides, the SNs might be subjected to node mobility and the position alters with time. So, a precise node localization (NL) manner is… More >

Displaying 1851-1860 on page 186 of 5427. Per Page