Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Interpretable and Adaptable Early Warning Learning Analytics Model

    Shaleeza Sohail1, Atif Alvi2,*, Aasia Khanum3

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3211-3225, 2022, DOI:10.32604/cmc.2022.023560

    Abstract Major issues currently restricting the use of learning analytics are the lack of interpretability and adaptability of the machine learning models used in this domain. Interpretability makes it easy for the stakeholders to understand the working of these models and adaptability makes it easy to use the same model for multiple cohorts and courses in educational institutions. Recently, some models in learning analytics are constructed with the consideration of interpretability but their interpretability is not quantified. However, adaptability is not specifically considered in this domain. This paper presents a new framework based on hybrid statistical fuzzy theory to overcome these… More >

  • Open Access

    ARTICLE

    A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications

    Wael Said1, Elsayed Mostafa1,*, M. M. Hassan1, Ayman Mohamed Mostafa2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3193-3209, 2022, DOI:10.32604/cmc.2022.023554

    Abstract User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment. The data stored on the public cloud will be vulnerable to outside and inside attacks. This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud. Different access control policies are applied for verifying users on the cloud. A security mechanism is… More >

  • Open Access

    ARTICLE

    Intelligent Model for Predicting the Quality of Services Violation

    Muhammad Adnan Khan1,2, Asma Kanwal3, Sagheer Abbas3, Faheem Khan4, T. Whangbo4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3607-3619, 2022, DOI:10.32604/cmc.2022.023480

    Abstract Cloud computing is providing IT services to its customer based on Service level agreements (SLAs). It is important for cloud service providers to provide reliable Quality of service (QoS) and to maintain SLAs accountability. Cloud service providers need to predict possible service violations before the emergence of an issue to perform remedial actions for it. Cloud users’ major concerns; the factors for service reliability are based on response time, accessibility, availability, and speed. In this paper, we, therefore, experiment with the parallel mutant-Particle swarm optimization (PSO) for the detection and predictions of QoS violations in terms of response time, speed,… More >

  • Open Access

    ARTICLE

    An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks

    Idrees Sarhan Kocher*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3821-3838, 2022, DOI:10.32604/cmc.2022.023478

    Abstract Applications of Wireless Sensor devices are widely used by various monitoring sections such as environmental monitoring, industrial sensing, habitat modeling, healthcare and enemy movement detection systems. Researchers were found that 16 bytes packet size (payload) requires Media Access Control (MAC) and globally unique network addresses overheads as more as the payload itself which is not reasonable in most situations. The approach of using a unique address isn't preferable for most Wireless Sensor Networks (WSNs) applications as well. Based on the mentioned drawbacks, the current work aims to fill the existing gap in the field area by providing two strategies. First,… More >

  • Open Access

    ARTICLE

    An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET

    Safiullah Khan1, Ali Raza2,3, Seong Oun Hwang4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3703-3719, 2022, DOI:10.32604/cmc.2022.023476

    Abstract Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety and comfort for travelers on roads. However, wireless communications over open-access environments face many security and privacy issues that may affect deployment of large-scale VANETs. Researchers have proposed different protocols to address security and privacy issues in a VANET, and in this study we cryptanalyze some of the privacy preserving protocols to show that all existing protocols are vulnerable to the Sybil attack. The Sybil attack can be used by malicious actors to create fake… More >

  • Open Access

    ARTICLE

    Continuous Tracking of GPS Signals with Data Wipe-Off Method

    Dah-Jing Jwo*, Kun-Chan Lee

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3803-3820, 2022, DOI:10.32604/cmc.2022.023442

    Abstract The decentralized pre-filter based vector tracking loop (VTL) configuration with data wipe-off (DWO) method of the Global Positioning System (GPS) receiver is proposed for performance enhancement. It is a challenging task to continuously track the satellites’ signals in weak signal environment for the GPS receiver. VTL is a very attractive technique as it can provide tracking capability in signal-challenged environments. In the VTL, each channel will not form a loop independently. On the contrary, the signals in the channels of VTL are shared with each other; the navigation processor in turn predicts the code phases. Thus, the receiver can successfully… More >

  • Open Access

    ARTICLE

    An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks

    Abdelwahed Berguiga*, Ahlem Harchay

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3839-3851, 2022, DOI:10.32604/cmc.2022.023399

    Abstract The success of Internet of Things (IoT) deployment has emerged important smart applications. These applications are running independently on different platforms, almost everywhere in the world. Internet of Medical Things (IoMT), also referred as the healthcare Internet of Things, is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems. Indeed, with the impact of the COVID-19 pandemic, a large number of interconnected devices designed to create smart networks. These networks monitor patients from remote locations as well as tracking medication orders. However, IoT may be jeopardized by attacks… More >

  • Open Access

    ARTICLE

    Image Dehazing Based on Pixel Guided CNN with PAM via Graph Cut

    Fayadh Alenezi*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3425-3443, 2022, DOI:10.32604/cmc.2022.023339

    Abstract Image dehazing is still an open research topic that has been undergoing a lot of development, especially with the renewed interest in machine learning-based methods. A major challenge of the existing dehazing methods is the estimation of transmittance, which is the key element of haze-affected imaging models. Conventional methods are based on a set of assumptions that reduce the solution search space. However, the multiplication of these assumptions tends to restrict the solutions to particular cases that cannot account for the reality of the observed image. In this paper we reduce the number of simplified hypotheses in order to attain… More >

  • Open Access

    ARTICLE

    Object Detection for Cargo Unloading System Based on Fuzzy C Means

    Sunwoo Hwang1, Jaemin Park1, Jongun Won2, Yongjang Kwon3, Youngmin Kim1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4167-4181, 2022, DOI:10.32604/cmc.2022.023295

    Abstract With the recent increase in the utilization of logistics and courier services, it is time for research on logistics systems fused with the fourth industry sector. Algorithm studies related to object recognition have been actively conducted in convergence with the emerging artificial intelligence field, but so far, algorithms suitable for automatic unloading devices that need to identify a number of unstructured cargoes require further development. In this study, the object recognition algorithm of the automatic loading device for cargo was selected as the subject of the study, and a cargo object recognition algorithm applicable to the automatic loading device is… More >

  • Open Access

    ARTICLE

    Correlation Analysis of Energy Consumption of Agricultural Rotorcraft

    Lihua Zhu1,*, Zhijian Xu1, Yu Wang1, Cheire Cheng2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3179-3192, 2022, DOI:10.32604/cmc.2022.023293

    Abstract With the rapid development of unmanned aerial vehicle technology, unmanned aerial vehicles (UAVs) have been widely used in the field of agricultural plant protection. Compared with fuel-driven UAVs, electrically driven rotorcrafts have many advantages such as lower cost, simpler operation, good maneuverability and cleaner power, which them popular in the plant protection. However, electrical rotorcrafts still face battery problems in actual operation, which limits its working time and application. Aiming at this issue, this paper studied the influence of rotorcraft flight parameters on energy consumption through series of carefully designed flight experiments. First of all, the linear motion experiments have… More >

Displaying 2301-2310 on page 231 of 5350. Per Page