Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    A Hybrid Model for Reliability Aware and Energy-Efficiency in Multicore Systems

    Samar Nour1,*, Sameh A. Salem1,2, Shahira M. Habashy1

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4447-4466, 2022, DOI:10.32604/cmc.2022.020775

    Abstract Recently, Multicore systems use Dynamic Voltage/Frequency Scaling (DV/FS) technology to allow the cores to operate with various voltage and/or frequencies than other cores to save power and enhance the performance. In this paper, an effective and reliable hybrid model to reduce the energy and makespan in multicore systems is proposed. The proposed hybrid model enhances and integrates the greedy approach with dynamic programming to achieve optimal Voltage/Frequency (Vmin/F) levels. Then, the allocation process is applied based on the available workloads. The hybrid model consists of three stages. The first stage gets the optimum safe voltage while the second stage sets… More >

  • Open Access

    ARTICLE

    A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System

    Bander Alzahrani1, Ahmed Barnawi1, Azeem Irshad2, Areej Alhothali1, Reem Alotaibi1, Muhammad Shafiq3,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6141-6158, 2022, DOI:10.32604/cmc.2022.020774

    Abstract Unmanned aerial vehicles (UAVs) have recently attracted widespread attention in civil and commercial applications. For example, UAVs (or drone) technology is increasingly used in crowd monitoring solutions due to its wider air footprint and the ability to capture data in real time. However, due to the open atmosphere, drones can easily be lost or captured by attackers when reporting information to the crowd management center. In addition, the attackers may initiate malicious detection to disrupt the crowd-sensing communication network. Therefore, security and privacy are one of the most significant challenges faced by drones or the Internet of Drones (IoD) that… More >

  • Open Access

    ARTICLE

    Improved Dragonfly Optimizer for Intrusion Detection Using Deep Clustering CNN-PSO Classifier

    K. S. Bhuvaneshwari1, K. Venkatachalam2, S. Hubálovský3,*, P. Trojovský4, P. Prabu5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5949-5965, 2022, DOI:10.32604/cmc.2022.020769

    Abstract With the rapid growth of internet based services and the data generated on these services are attracted by the attackers to intrude the networking services and information. Based on the characteristics of these intruders, many researchers attempted to aim to detect the intrusion with the help of automating process. Since, the large volume of data is generated and transferred through network, the security and performance are remained an issue. IDS (Intrusion Detection System) was developed to detect and prevent the intruders and secure the network systems. The performance and loss are still an issue because of the features space grows… More >

  • Open Access

    ARTICLE

    Analysis of Pneumonia Model via Efficient Computing Techniques

    Kamaledin Abodayeh1, Ali Raza2,3,*, Muhammad Rafiq4, Muhammad Shoaib Arif5, Muhammad Naveed5, Zunir Zeb3, Syed Zaheer Abbas3, Kiran Shahzadi3, Sana Sarwar3, Qasim Naveed3, Badar Ul Zaman3, Muhammad Mohsin6

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6073-6088, 2022, DOI:10.32604/cmc.2022.020732

    Abstract Pneumonia is a highly transmissible disease in children. According to the World Health Organization (WHO), the most affected regions include south Asia and sub-Saharan Africa. Worldwide, 15% of pediatric deaths can be attributed to pneumonia. Computing techniques have a significant role in science, engineering, and many other fields. In this study, we focused on the efficiency of numerical techniques via computer programs. We studied the dynamics of the pneumonia-like infections of epidemic models using numerical techniques. We discuss two types of analysis: dynamical and numerical. The dynamical analysis included positivity, boundedness, local stability, reproduction number, and equilibria of the model.… More >

  • Open Access

    ARTICLE

    Efficient Deep-Learning-Based Autoencoder Denoising Approach for Medical Image Diagnosis

    Walid El-Shafai1, Samy Abd El-Nabi1,2, El-Sayed M. El-Rabaie1, Anas M. Ali1,2, Naglaa F. Soliman3,*, Abeer D. Algarni3, Fathi E. Abd El-Samie1,3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6107-6125, 2022, DOI:10.32604/cmc.2022.020698

    Abstract Effective medical diagnosis is dramatically expensive, especially in third-world countries. One of the common diseases is pneumonia, and because of the remarkable similarity between its types and the limited number of medical images for recent diseases related to pneumonia, the medical diagnosis of these diseases is a significant challenge. Hence, transfer learning represents a promising solution in transferring knowledge from generic tasks to specific tasks. Unfortunately, experimentation and utilization of different models of transfer learning do not achieve satisfactory results. In this study, we suggest the implementation of an automatic detection model, namely CADTra, to efficiently diagnose pneumonia-related diseases. This… More >

  • Open Access

    ARTICLE

    Accurate Multi-Site Daily-Ahead Multi-Step PM2.5 Concentrations Forecasting Using Space-Shared CNN-LSTM

    Xiaorui Shao, Chang Soo Kim*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5143-5160, 2022, DOI:10.32604/cmc.2022.020689

    Abstract

    Accurate multi-step PM2.5 (particulate matter with diameters 2.5um) concentration prediction is critical for humankinds’ health and air population management because it could provide strong evidence for decision-making. However, it is very challenging due to its randomness and variability. This paper proposed a novel method based on convolutional neural network (CNN) and long-short-term memory (LSTM) with a space-shared mechanism, named space-shared CNN-LSTM (SCNN-LSTM) for multi-site daily-ahead multi-step PM2.5 forecasting with self-historical series. The proposed SCNN-LSTM contains multi-channel inputs, each channel corresponding to one-site historical PM2.5 concentration series. In which, CNN and LSTM are used to extract each… More >

  • Open Access

    ARTICLE

    A Novel Binary Emperor Penguin Optimizer for Feature Selection Tasks

    Minakshi Kalra1, Vijay Kumar2, Manjit Kaur3, Sahar Ahmed Idris4, Şaban Öztürk5, Hammam Alshazly6,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6239-6255, 2022, DOI:10.32604/cmc.2022.020682

    Abstract Nowadays, due to the increase in information resources, the number of parameters and complexity of feature vectors increases. Optimization methods offer more practical solutions instead of exact solutions for the solution of this problem. The Emperor Penguin Optimizer (EPO) is one of the highest performing meta-heuristic algorithms of recent times that imposed the gathering behavior of emperor penguins. It shows the superiority of its performance over a wide range of optimization problems thanks to its equal chance to each penguin and its fast convergence features. Although traditional EPO overcomes the optimization problems in continuous search space, many problems today shift… More >

  • Open Access

    ARTICLE

    Distributed Secure Storage Scheme Based on Sharding Blockchain

    Jin Wang1,2, Chenchen Han1, Xiaofeng Yu3,*, Yongjun Ren4, R. Simon Sherratt5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4485-4502, 2022, DOI:10.32604/cmc.2022.020648

    Abstract Distributed storage can store data in multiple devices or servers to improve data security. However, in today's explosive growth of network data, traditional distributed storage scheme is faced with some severe challenges such as insufficient performance, data tampering, and data lose. A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed storage. Under this scheme, the following improvements have been made in this paper. This paper first analyzes the problems faced by distributed storage. Then proposed to build a new distributed storage blockchain scheme with sharding blockchain. The proposed scheme realizes the… More >

  • Open Access

    ARTICLE

    Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks

    Abrar M. Alajlan*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4241-4259, 2022, DOI:10.32604/cmc.2022.020585

    Abstract Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over the wireless sensor networks (WSNs). Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs. The distributed passive nature of these attacks makes them enormously challenging to detect. The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment. And further to detect the serious routing-disruption attack “Wormhole Attack” step by step through the different network mechanisms. In this paper, a… More >

  • Open Access

    ARTICLE

    Swarm-Based Extreme Learning Machine Models for Global Optimization

    Mustafa Abdul Salam1,*, Ahmad Taher Azar2, Rana Hussien2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6339-6363, 2022, DOI:10.32604/cmc.2022.020583

    Abstract Extreme Learning Machine (ELM) is popular in batch learning, sequential learning, and progressive learning, due to its speed, easy integration, and generalization ability. While, Traditional ELM cannot train massive data rapidly and efficiently due to its memory residence, high time and space complexity. In ELM, the hidden layer typically necessitates a huge number of nodes. Furthermore, there is no certainty that the arrangement of weights and biases within the hidden layer is optimal. To solve this problem, the traditional ELM has been hybridized with swarm intelligence optimization techniques. This paper displays five proposed hybrid Algorithms “Salp Swarm Algorithm (SSA-ELM), Grasshopper… More >

Displaying 2591-2600 on page 260 of 5350. Per Page