Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    SutteARIMA: A Novel Method for Forecasting the Infant Mortality Rate in Indonesia

    Ansari Saleh Ahmar1,2,*, Eva Boj del Val3, M. A. El Safty4, Samirah AlZahrani4, Hamed El-Khawaga5,6

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6007-6022, 2022, DOI:10.32604/cmc.2022.021382

    Abstract This study focuses on the novel forecasting method (SutteARIMA) and its application in predicting Infant Mortality Rate data in Indonesia. It undertakes a comparison of the most popular and widely used four forecasting methods: ARIMA, Neural Networks Time Series (NNAR), Holt-Winters, and SutteARIMA. The data used were obtained from the website of the World Bank. The data consisted of the annual infant mortality rate (per 1000 live births) from 1991 to 2019. To determine a suitable and best method for predicting Infant Mortality rate, the forecasting results of these four methods were compared based on the mean absolute percentage error… More >

  • Open Access

    ARTICLE

    Incentive-Driven Approach for Misbehavior Avoidance in Vehicular Networks

    Shahid Sultan1, Qaisar Javaid1, Eid Rehman2,*, Ahmad Aziz Alahmadi3, Nasim Ullah3, Wakeel Khan4

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6089-6106, 2022, DOI:10.32604/cmc.2022.021374

    Abstract For efficient and robust information exchange in the vehicular ad-hoc network, a secure and trusted incentive reward is needed to avoid and reduce the intensity of misbehaving nodes and congestion especially in the case where the periodic beacons exploit the channel. In addition, we cannot be sure that all vehicular nodes eagerly share their communication assets to the system for message dissemination without any rewards. Unfortunately, there may be some misbehaving nodes and due to their selfish and greedy approach, these nodes may not help others on the network. To deal with this challenge, trust-based misbehavior avoidance schemes are generally… More >

  • Open Access

    ARTICLE

    Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

    Mohamed Ali1, Ibrahim A. Abd El-Moghith2, Mohamed N. El-Derini3, Saad M. Darwish2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6127-6140, 2022, DOI:10.32604/cmc.2022.021305

    Abstract Routing is a key function in Wireless Sensor Networks (WSNs) since it facilitates data transfer to base stations. Routing attacks have the potential to destroy and degrade the functionality of WSNs. A trustworthy routing system is essential for routing security and WSN efficiency. Numerous methods have been implemented to build trust between routing nodes, including the use of cryptographic methods and centralized routing. Nonetheless, the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities. At the moment, there is no effective way to avoid malicious node attacks. As a consequence… More >

  • Open Access

    ARTICLE

    IoT-Cloud Empowered Aerial Scene Classification for Unmanned Aerial Vehicles

    K. R. Uthayan1,*, G. Lakshmi Vara Prasad2, V. Mohan3, C. Bharatiraja4, Irina V. Pustokhina5, Denis A. Pustokhin6, Vicente García Díaz7

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5161-5177, 2022, DOI:10.32604/cmc.2022.021300

    Abstract Recent trends in communication technologies and unmanned aerial vehicles (UAVs) find its application in several areas such as healthcare, surveillance, transportation, etc. Besides, the integration of Internet of things (IoT) with cloud computing environment offers several benefits for the UAV communication. At the same time, aerial scene classification is one of the major research areas in UAV-enabled MEC systems. In UAV aerial imagery, efficient image representation is crucial for the purpose of scene classification. The existing scene classification techniques generate mid-level image features with limited representation capabilities that often end up in producing average results. Therefore, the current research work… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Enabled Apple Leaf Disease Classification for Precision Agriculture

    Fahd N. Al-Wesabi1,2,*, Amani Abdulrahman Albraikan3, Anwer Mustafa Hilal4, Majdy M. Eltahir1, Manar Ahmed Hamza4, Abu Sarwar Zamani4

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6223-6238, 2022, DOI:10.32604/cmc.2022.021299

    Abstract Precision agriculture enables the recent technological advancements in farming sector to observe, measure, and analyze the requirements of individual fields and crops. The recent developments of computer vision and artificial intelligence (AI) techniques find a way for effective detection of plants, diseases, weeds, pests, etc. On the other hand, the detection of plant diseases, particularly apple leaf diseases using AI techniques can improve productivity and reduce crop loss. Besides, earlier and precise apple leaf disease detection can minimize the spread of the disease. Earlier works make use of traditional image processing techniques which cannot assure high detection rate on apple… More >

  • Open Access

    ARTICLE

    Using Capsule Networks for Android Malware Detection Through Orientation-Based Features

    Sohail Khan1,*, Mohammad Nauman2, Suleiman Ali Alsaif1, Toqeer Ali Syed3, Hassan Ahmad Eleraky1

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5345-5362, 2022, DOI:10.32604/cmc.2022.021271

    Abstract Mobile phones are an essential part of modern life. The two popular mobile phone platforms, Android and iPhone Operating System (iOS), have an immense impact on the lives of millions of people. Among these two, Android currently boasts more than 84% market share. Thus, any personal data put on it are at great risk if not properly protected. On the other hand, more than a million pieces of malware have been reported on Android in just 2021 till date. Detecting and mitigating all this malware is extremely difficult for any set of human experts. Due to this reason, machine learning–and… More >

  • Open Access

    ARTICLE

    Forecasting E-Commerce Adoption Based on Bidirectional Recurrent Neural Networks

    Abdullah Ali Salamai1,*, Ather Abdulrahman Ageeli1, El-Sayed M. El-kenawy2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5091-5106, 2022, DOI:10.32604/cmc.2022.021268

    Abstract E-commerce refers to a system that allows individuals to purchase and sell things online. The primary goal of e-commerce is to offer customers the convenience of not going to a physical store to make a purchase. They will purchase the item online and have it delivered to their home within a few days. The goal of this research was to develop machine learning algorithms that might predict e-commerce platform sales. A case study has been designed in this paper based on a proposed continuous Stochastic Fractal Search (SFS) based on a Guided Whale Optimization Algorithm (WOA) to optimize the parameter… More >

  • Open Access

    ARTICLE

    Deep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks

    Mesfer Al Duhayyim1, Haya Mesfer Alshahrani2, Fahd N. Al-Wesabi3, Mohammed Alamgeer4, Anwer Mustafa Hilal5,*, Mohammed Rizwanullah5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6257-6270, 2022, DOI:10.32604/cmc.2022.021212

    Abstract Cybersecurity encompasses various elements such as strategies, policies, processes, and techniques to accomplish availability, confidentiality, and integrity of resource processing, network, software, and data from attacks. In this scenario, the rising popularity of Online Social Networks (OSN) is under threat from spammers for which effective spam bot detection approaches should be developed. Earlier studies have developed different approaches for the detection of spam bots in OSN. But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning (DL) models needs to be explored. With this motivation, the current research article… More >

  • Open Access

    ARTICLE

    Machine Learning Based Depression, Anxiety, and Stress Predictive Model During COVID-19 Crisis

    Fahd N. Al-Wesabi1,2,*, Hadeel Alsolai3, Anwer Mustafa Hilal4, Manar Ahmed Hamza4, Mesfer Al Duhayyim5, Noha Negm6,7

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5803-5820, 2022, DOI:10.32604/cmc.2022.021195

    Abstract Corona Virus Disease-2019 (COVID-19) was reported at first in Wuhan city, China by December 2019. World Health Organization (WHO) declared COVID-19 as a pandemic i.e., global health crisis on March 11, 2020. The outbreak of COVID-19 pandemic and subsequent lockdowns to curb the spread, not only affected the economic status of a number of countries, but it also resulted in increased levels of Depression, Anxiety, and Stress (DAS) among people. Therefore, there is a need exists to comprehend the relationship among psycho-social factors in a country that is hypothetically affected by high levels of stress and fear; with tremendously-limiting measures… More >

  • Open Access

    ARTICLE

    Graph Transformer for Communities Detection in Social Networks

    G. Naga Chandrika1, Khalid Alnowibet2, K. Sandeep Kautish3, E. Sreenivasa Reddy4, Adel F. Alrasheedi2, Ali Wagdy Mohamed5,6,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5707-5720, 2022, DOI:10.32604/cmc.2022.021186

    Abstract Graphs are used in various disciplines such as telecommunication, biological networks, as well as social networks. In large-scale networks, it is challenging to detect the communities by learning the distinct properties of the graph. As deep learning has made contributions in a variety of domains, we try to use deep learning techniques to mine the knowledge from large-scale graph networks. In this paper, we aim to provide a strategy for detecting communities using deep autoencoders and obtain generic neural attention to graphs. The advantages of neural attention are widely seen in the field of NLP and computer vision, which has… More >

Displaying 2631-2640 on page 264 of 5427. Per Page