Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,267)
  • Open Access

    ARTICLE

    Prediction of Extremist Behaviour and Suicide Bombing from Terrorism Contents Using Supervised Learning

    Nasir Mahmood*, Muhammad Usman Ghani Khan

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4411-4428, 2022, DOI:10.32604/cmc.2022.013956

    Abstract This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings. By linking ‘dots’ of police data comprising scattered information of people, groups, logistics, locations, communication, and spatiotemporal characters on different social media groups, the proposed architecture will spawn beneficial information. This useful information will, in turn, help the police both in predicting potential terrorist events and in investigating previous events. Furthermore, this architecture will aid in the identification of criminals and their associates and handlers. Terrorism is psychological warfare, which, in the broadest sense, can be defined as the utilisation of deliberate violence for… More >

  • Open Access

    ARTICLE

    Efficient Autonomous Defense System Using Machine Learning on Edge Device

    Jaehyuk Cho*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3565-3588, 2022, DOI:10.32604/cmc.2022.020826

    Abstract As a large amount of data needs to be processed and speed needs to be improved, edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm. These changes can lead to new cyber risks, and should therefore be considered for a security threat model. To this end, we constructed an edge system to study security in two directions, hardware and software. First, on the hardware side, we want to autonomically defend against hardware attacks such as side channel attacks by configuring field programmable gate array (FPGA) which is suitable for edge computing and identifying communication status to… More >

  • Open Access

    ARTICLE

    Price Prediction of Seasonal Items Using Machine Learning and Statistical Methods

    Mohamed Ali Mohamed, Ibrahim Mahmoud El-Henawy, Ahmad Salah*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3473-3489, 2022, DOI:10.32604/cmc.2022.020782

    Abstract Price prediction of goods is a vital point of research due to how common e-commerce platforms are. There are several efforts conducted to forecast the price of items using classic machine learning algorithms and statistical models. These models can predict prices of various financial instruments, e.g., gold, oil, cryptocurrencies, stocks, and second-hand items. Despite these efforts, the literature has no model for predicting the prices of seasonal goods (e.g., Christmas gifts). In this context, we framed the task of seasonal goods price prediction as a regression problem. First, we utilized a real online trailer dataset of Christmas gifts and then… More >

  • Open Access

    ARTICLE

    Energy and Bandwidth Based Link Stability Routing Algorithm for IoT

    D. Kothandaraman1, A. Balasundaram2,*, R. Dhanalakshmi3, Arun Kumar Sivaraman4, S. Ashokkumar5, Rajiv Vincent4, M. Rajesh4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3875-3890, 2022, DOI:10.32604/cmc.2022.020744

    Abstract Internet of Things (IoT) is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet links. Particularly, some of the nodes in IoT are mobile and dynamic in nature. Hence maintaining the link among the nodes, efficient bandwidth of the links among the mobile nodes with increased life time is a big challenge in IoT as it integrates mobile nodes with static nodes for data processing. In such networks, many routing-problems arise due to difficulties in energy and bandwidth based quality of service. Due to the mobility and finite nature of the… More >

  • Open Access

    ARTICLE

    An Efficient AES 32-Bit Architecture Resistant to Fault Attacks

    Hassen Mestiri1,2,3,*, Imen Barraj4,5, Abdullah Alsir Mohamed1, Mohsen Machhout3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3667-3683, 2022, DOI:10.32604/cmc.2022.020716

    Abstract The Advanced Encryption Standard cryptographic algorithm, named AES, is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information exchange. One of the most effective physical attacks against the hardware implementation of AES is fault attacks which can extract secret data. Until now, a several AES fault detection schemes against fault injection attacks have been proposed. In this paper, so as to ensure a high level of security against fault injection attacks, a new efficient fault detection scheme based on the AES architecture modification has been proposed. For this reason, the AES… More >

  • Open Access

    ARTICLE

    Optimal Deep Convolution Neural Network for Cervical Cancer Diagnosis Model

    Mohamed Ibrahim Waly1, Mohamed Yacin Sikkandar1, Mohamed Abdelkader Aboamer1, Seifedine Kadry2, Orawit Thinnukool3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3295-3309, 2022, DOI:10.32604/cmc.2022.020713

    Abstract Biomedical imaging is an effective way of examining the internal organ of the human body and its diseases. An important kind of biomedical image is Pap smear image that is widely employed for cervical cancer diagnosis. Cervical cancer is a vital reason for increased women’s mortality rate. Proper screening of pap smear images is essential to assist the earlier identification and diagnostic process of cervical cancer. Computer-aided systems for cancerous cell detection need to be developed using deep learning (DL) approaches. This study introduces an intelligent deep convolutional neural network for cervical cancer detection and classification (IDCNN-CDC) model using biomedical… More >

  • Open Access

    ARTICLE

    Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS

    Inam Ullah Khan1, Muhammad Abul Hassan2, Muhammad Fayaz3, Jeonghwan Gwak4,5,6,7,*, Muhammad Adnan Aziz1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3653-3666, 2022, DOI:10.32604/cmc.2022.020697

    Abstract Most interesting area is the growing demand of flying-IoT mergers with smart cities. However, aerial vehicles, especially unmanned aerial vehicles (UAVs), have limited capabilities for maintaining node energy efficiency. In order to communicate effectively, IoT is a key element for smart cities. While improving network performance, routing protocols can be deployed in flying-IoT to improve latency, packet drop rate, packet delivery, power utilization, and average-end-to-end delay. Furthermore, in literature, proposed techniques are very much complex which cannot be easily implemented in real-world applications. This issue leads to the development of lightweight energy-efficient routing in flying-IoT networks. This paper addresses the… More >

  • Open Access

    ARTICLE

    A Compact Tri-Band Antenna Based on Inverted-L Stubs for Smart Devices

    Niamat Hussain1, Anees Abbas1, Sang-Myeong Park1, Seong Gyoon Park2, Nam Kim1,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3321-3331, 2022, DOI:10.32604/cmc.2022.020688

    Abstract We designed and constructed a novel, compact tri-band monopole antenna for intelligent devices. Multiband behavior was achieved by placing inverted-L shaped stubs of various lengths in a triangular monopole antenna fed by a coplanar waveguide. The resonance frequency of each band can be controlled by varying the length of the corresponding stub. Three bands, at 2.4 (2.37–2.51), 3.5 (3.34–3.71), and 5.5 (4.6–6.4) GHz, were easily obtained using three stubs of different lengths. For miniaturization, a portion of the longest stub (at 2.4 GHz) was printed on the opposite side of the substrate, and connected to the main stub via a… More >

  • Open Access

    ARTICLE

    A Dynamic Resource-Aware Routing Protocol in Resource-Constrained Opportunistic Networks

    Aref Hassan Kurd Ali1,*, Halikul Lenando1, Slim Chaoui2,3, Mohamad Alrfaay1,4, Medhat A. Tawfeek5,6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4147-4167, 2022, DOI:10.32604/cmc.2022.020659

    Abstract Recently, Opportunistic Networks (OppNets) are considered to be one of the most attractive developments of Mobile Ad Hoc Networks that have arisen thanks to the development of intelligent devices. OppNets are characterized by a rough and dynamic topology as well as unpredictable contacts and contact times. Data is forwarded and stored in intermediate nodes until the next opportunity occurs. Therefore, achieving a high delivery ratio in OppNets is a challenging issue. It is imperative that any routing protocol use network resources, as far as they are available, in order to achieve higher network performance. In this article, we introduce the… More >

  • Open Access

    ARTICLE

    HARTIV: Human Activity Recognition Using Temporal Information in Videos

    Disha Deotale1, Madhushi Verma2, P. Suresh3, Sunil Kumar Jangir4, Manjit Kaur2, Sahar Ahmed Idris5, Hammam Alshazly6,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3919-3938, 2022, DOI:10.32604/cmc.2022.020655

    Abstract Nowadays, the most challenging and important problem of computer vision is to detect human activities and recognize the same with temporal information from video data. The video datasets are generated using cameras available in various devices that can be in a static or dynamic position and are referred to as untrimmed videos. Smarter monitoring is a historical necessity in which commonly occurring, regular, and out-of-the-ordinary activities can be automatically identified using intelligence systems and computer vision technology. In a long video, human activity may be present anywhere in the video. There can be a single or multiple human activities present… More >

Displaying 2571-2580 on page 258 of 5267. Per Page