Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Intelligent Cloud IoMT Health Monitoring-Based System for COVID-19

    Hameed AlQaheri1,*, Manash Sarkar2, Saptarshi Gupta3, Bhavya Gaur4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 497-517, 2022, DOI:10.32604/cmc.2022.022735

    Abstract The most common alarming and dangerous disease in the world today is the coronavirus disease 2019 (COVID-19). The coronavirus is perceived as a group of coronaviruses which causes mild to severe respiratory diseases among human beings. The infection is spread by aerosols emitted from infected individuals during talking, sneezing, and coughing. Furthermore, infection can occur by touching a contaminated surface followed by transfer of the viral load to the face. Transmission may occur through aerosols that stay suspended in the air for extended periods of time in enclosed spaces. To stop the spread of the pandemic, it is crucial to… More >

  • Open Access

    ARTICLE

    Design of Machine Learning Based Smart Irrigation System for Precision Agriculture

    Khalil Ibrahim Mohammad Abuzanouneh1, Fahd N. Al-Wesabi2, Amani Abdulrahman Albraikan3, Mesfer Al Duhayyim4, M. Al-Shabi5, Anwer Mustafa Hilal6, Manar Ahmed Hamza6,*, Abu Sarwar Zamani6, K. Muthulakshmi7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 109-124, 2022, DOI:10.32604/cmc.2022.022648

    Abstract Agriculture 4.0, as the future of farming technology, comprises numerous key enabling technologies towards sustainable agriculture. The use of state-of-the-art technologies, such as the Internet of Things, transform traditional cultivation practices, like irrigation, to modern solutions of precision agriculture. To achieve effective water resource usage and automated irrigation in precision agriculture, recent technologies like machine learning (ML) can be employed. With this motivation, this paper design an IoT and ML enabled smart irrigation system (IoTML-SIS) for precision agriculture. The proposed IoTML-SIS technique allows to sense the parameters of the farmland and make appropriate decisions for irrigation. The proposed IoTML-SIS model… More >

  • Open Access

    ARTICLE

    Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks

    Saima Kauser1, Tauqeer Safdar Malik1,*, Mohd Hilmi Hasan2, Emelia Akashah P. Akhir2, Syed Muhammad Husnain Kazmi3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1251-1273, 2022, DOI:10.32604/cmc.2022.022475

    Abstract A web browser is the most basic tool for accessing the internet from any of the machines/equipment. Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors. Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack. These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment. Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and… More >

  • Open Access

    ARTICLE

    Efficient Classification of Remote Sensing Images Using Two Convolution Channels and SVM

    Khalid A. AlAfandy1, Hicham Omara2, Hala S. El-Sayed3, Mohammed Baz4,*, Mohamed Lazaar5, Osama S. Faragallah6, Mohammed Al Achhab1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 739-753, 2022, DOI:10.32604/cmc.2022.022457

    Abstract Remote sensing image processing engaged researchers’ attentiveness in recent years, especially classification. The main problem in classification is the ratio of the correct predictions after training. Feature extraction is the foremost important step to build high-performance image classifiers. The convolution neural networks can extract images’ features that significantly improve the image classifiers’ accuracy. This paper proposes two efficient approaches for remote sensing images classification that utilizes the concatenation of two convolution channels’ outputs as a features extraction using two classic convolution models; these convolution models are the ResNet 50 and the DenseNet 169. These elicited features have been used by… More >

  • Open Access

    ARTICLE

    Robust Frequency Estimation Under Additive Mixture Noise

    Yuan Chen1, Yulu Tian1, Dingfan Zhang2, Longting Huang3,*, Jingxin Xu4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1671-1684, 2022, DOI:10.32604/cmc.2022.022371

    Abstract In many applications such as multiuser radar communications and astrophysical imaging processing, the encountered noise is usually described by the finite sum of -stable variables. In this paper, a new parameter estimator is developed, in the presence of this new heavy-tailed noise. Since the closed-form PDF of the -stable variable does not exist except and , we take the sum of the Cauchy () and Gaussian () noise as an example, namely, additive Cauchy-Gaussian (ACG) noise. The probability density function (PDF) of the mixed random variable, can be calculated by the convolution of the Cauchy's PDF and Gaussian's PDF. Because… More >

  • Open Access

    ARTICLE

    Non-integer Order Control Scheme for Pressurized Water Reactor Core Power

    Ibrahim M. Mehedi1,2,*, Maher H. AL-Sereihy2, Asmaa Ubaid Al-Saggaf2, Ubaid M. Al-Saggaf1,2

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 651-662, 2022, DOI:10.32604/cmc.2022.022013

    Abstract Tracking load changes in a pressurized water reactor (PWR) with the help of an efficient core power control scheme in a nuclear power station is very important. The reason is that it is challenging to maintain a stable core power according to the reference value within an acceptable tolerance for the safety of PWR. To overcome the uncertainties, a non-integer-based fractional order control method is demonstrated to control the core power of PWR. The available dynamic model of the reactor core is used in this analysis. Core power is controlled using a modified state feedback approach with a non-integer integral… More >

  • Open Access

    ARTICLE

    Efficient Load Balancing with MANET Propagation of Least Common Multiple Routing and Fuzzy Logic

    V. Gayatri*, M. Senthil Kumaran

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1831-1845, 2022, DOI:10.32604/cmc.2022.021857

    Abstract Mobile Ad Hoc Network (MANET) is a group of node that would interrelate among each other through one multi-hop wireless link, wherein the nodes were able to move in response to sudden modifications. The objective of MANET routing protocol is to quantify the route and compute the best path, but there exists a major decrease in energy efficiency, difficulty in hop selection, cost estimation, and efficient load-balancing. In this paper, a novel least common multipath-based routing has been proposed. Multipath routing is used to find a multipath route from source and destination. Load balancing is of primary importance in the… More >

  • Open Access

    ARTICLE

    Nonlinear Dynamics of Nervous Stomach Model Using Supervised Neural Networks

    Zulqurnain Sabir1, Manoj Gupta2, Muhammad Asif Zahoor Raja3, N. Seshagiri Rao4, Muhammad Mubashar Hussain5, Faisal Alanazi6, Orawit Thinnukool7, Pattaraporn Khuwuthyakorn7,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1627-1644, 2022, DOI:10.32604/cmc.2022.021462

    Abstract The purpose of the current investigations is to solve the nonlinear dynamics based on the nervous stomach model (NSM) using the supervised neural networks (SNNs) along with the novel features of Levenberg-Marquardt backpropagation technique (LMBT), i.e., SNNs-LMBT. The SNNs-LMBT is implemented with three different types of sample data, authentication, testing and training. The ratios for these statistics to solve three different variants of the nonlinear dynamics of the NSM are designated 75% for training, 15% for validation and 10% for testing, respectively. For the numerical measures of the nonlinear dynamics of the NSM, the Runge-Kutta scheme is implemented to form… More >

  • Open Access

    ARTICLE

    Weighted-adaptive Inertia Strategy for Multi-objective Scheduling in Multi-clouds

    Mazen Farid1,3,*, Rohaya Latip1,2, Masnida Hussin1, Nor Asilah Wati Abdul Hamid1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1529-1560, 2022, DOI:10.32604/cmc.2022.021410

    Abstract One of the fundamental problems associated with scheduling workflows on virtual machines in a multi-cloud environment is how to find a near-optimum permutation. The workflow scheduling involves assigning independent computational jobs with conflicting objectives to a set of virtual machines. Most optimization methods for solving non-deterministic polynomial-time hardness (NP-hard) problems deploy multi-objective algorithms. As such, Pareto dominance is one of the most efficient criteria for determining the best solutions within the Pareto front. However, the main drawback of this method is that it requires a reasonably long time to provide an optimum solution. In this paper, a new multi-objective minimum… More >

  • Open Access

    ARTICLE

    Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method

    J. Stanly Jayaprakash1, Kishore Balasubramanian2, Rossilawati Sulaiman3, Mohammad Kamrul Hasan3,*, B. D. Parameshachari4, Celestine Iwendi5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269

    Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily… More >

Displaying 2161-2170 on page 217 of 5350. Per Page