Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Real-Time Network Intrusion Prevention System Using Incremental Feature Generation

    Yeongje Uhm1, Wooguil Pak2,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1631-1648, 2022, DOI:10.32604/cmc.2022.019667

    Abstract Security measures are urgently required to mitigate the recent rapid increase in network security attacks. Although methods employing machine learning have been researched and developed to detect various network attacks effectively, these are passive approaches that cannot protect the network from attacks, but detect them after the end of the session. Since such passive approaches cannot provide fundamental security solutions, we propose an active approach that can prevent further damage by detecting and blocking attacks in real time before the session ends. The proposed technology uses a two-level classifier structure: the first-stage classifier supports real-time classification, and the second-stage classifier… More >

  • Open Access

    ARTICLE

    Towards Prevention of Sportsmen Burnout: Formal Analysis of Sub-Optimal Tournament Scheduling

    Syed Rameez Naqvi1, Adnan Ahmad1, S. M. Riazul Islam2,*, Tallha Akram1, M. Abdullah-Al-Wadud3, Atif Alamri4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1509-1526, 2022, DOI:10.32604/cmc.2022.019653

    Abstract Scheduling a sports tournament is a complex optimization problem, which requires a large number of hard constraints to satisfy. Despite the availability of several such constraints in the literature, there remains a gap since most of the new sports events pose their own unique set of requirements, and demand novel constraints. Specifically talking of the strictly time bound events, ensuring fairness between the different teams in terms of their rest days, traveling, and the number of successive games they play, becomes a difficult task to resolve, and demands attention. In this work, we present a similar situation with a recently… More >

  • Open Access

    ARTICLE

    Analysis and Assessment of Wind Energy Potential of Socotra Archipelago in Yemen

    Murad A. A. Almekhlaf1, Fahd N. Al-Wesabi2,3,*, Imran Khan4, Nadhem Nemri5, Khalid Mahmood5, Hany Mahgoub6, Noha Negm7, Amin M. El-Kustaban8, Ammar Zahary9

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1177-1193, 2022, DOI:10.32604/cmc.2022.019626

    Abstract The increasing use of fossil fuels has a significant impact on the environment and ecosystem, which increases the rate of pollution. Given the high potential of renewable energy sources in Yemen and the absence of similar studies in the region, this study aims to examine the potential of wind energy in Socotra Island. This was done by analyzing and evaluating wind properties, determining available energy density, calculating wind energy extracted at different altitudes, and then computing the capacity factor for a number of wind turbines and determining the best. The average wind speed in Socotra Island was obtained from the… More >

  • Open Access

    ARTICLE

    Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain

    Hani Mohammed Alshahrani*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 739-766, 2022, DOI:10.32604/cmc.2022.019623

    Abstract One of the most rapidly growing areas in the last few years is the Internet of Things (IoT), which has been used in widespread fields such as healthcare, smart homes, and industries. Android is one of the most popular operating systems (OS) used by IoT devices for communication and data exchange. Android OS captured more than 70 percent of the market share in 2021. Because of the popularity of the Android OS, it has been targeted by cybercriminals who have introduced a number of issues, such as stealing private information. As reported by one of the recent studies Android malware… More >

  • Open Access

    ARTICLE

    IoT Information Status Using Data Fusion and Feature Extraction Method

    S. S. Saranya*, N. Sabiyath Fatima

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1857-1874, 2022, DOI:10.32604/cmc.2022.019621

    Abstract The Internet of Things (IoT) role is instrumental in the technological advancement of the healthcare industry. Both the hardware and the core level of software platforms are the progress resulted from the accompaniment of Medicine 4.0. Healthcare IoT systems are the emergence of this foresight. The communication systems between the sensing nodes and the processors; and the processing algorithms to produce output obtained from the data collected by the sensors are the major empowering technologies. At present, many new technologies supplement these empowering technologies. So, in this research work, a practical feature extraction and classification technique is suggested for handling… More >

  • Open Access

    ARTICLE

    BHGSO: Binary Hunger Games Search Optimization Algorithm for Feature Selection Problem

    R. Manjula Devi1, M. Premkumar2, Pradeep Jangir3, B. Santhosh Kumar4, Dalal Alrowaili5, Kottakkaran Sooppy Nisar6,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 557-579, 2022, DOI:10.32604/cmc.2022.019611

    Abstract In machine learning and data mining, feature selection (FS) is a traditional and complicated optimization problem. Since the run time increases exponentially, FS is treated as an NP-hard problem. The researcher’s effort to build a new FS solution was inspired by the ongoing need for an efficient FS framework and the success rates of swarming outcomes in different optimization scenarios. This paper presents two binary variants of a Hunger Games Search Optimization (HGSO) algorithm based on V- and S-shaped transfer functions within a wrapper FS model for choosing the best features from a large dataset. The proposed technique transforms the… More >

  • Open Access

    ARTICLE

    Medical Image Compression Method Using Lightweight Multi-Layer Perceptron for Mobile Healthcare Applications

    Taesik Lee1, Dongsan Jun1,*, Sang-hyo Park2, Byung-Gyu Kim3, Jungil Yun4, Kugjin Yun4, Won-Sik Cheong4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 2013-2029, 2022, DOI:10.32604/cmc.2022.019604

    Abstract As video compression is one of the core technologies required to enable seamless medical data streaming in mobile healthcare applications, there is a need to develop powerful media codecs that can achieve minimum bitrates while maintaining high perceptual quality. Versatile Video Coding (VVC) is the latest video coding standard that can provide powerful coding performance with a similar visual quality compared to the previously developed method that is High Efficiency Video Coding (HEVC). In order to achieve this improved coding performance, VVC adopted various advanced coding tools, such as flexible Multi-type Tree (MTT) block structure which uses Binary Tree (BT)… More >

  • Open Access

    ARTICLE

    Hybrid Computational Modeling for Web Application Security Assessment

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Md Tarique Jamal Ansari1, Rajeev Kumar4,*, Mohammad Ubaidullah Bokhari5, Raees Ahmad Khan1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 469-489, 2022, DOI:10.32604/cmc.2022.019593

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the… More >

  • Open Access

    ARTICLE

    Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment

    D. Prabakaran1,*, Shyamala Ramachandran2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1781-1798, 2022, DOI:10.32604/cmc.2022.019591

    Abstract The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019, and many more cloud server… More >

  • Open Access

    ARTICLE

    Power Domain Multiplexing Waveform for 5G Wireless Networks

    Korhan Cengiz1, Imran Baig2, Sumit Chakravarty3, Arun Kumar4, Mahmoud A. Albreem5, Mohammed H. Alsharif6, Peerapong Uthansakul7,*, Jamel Nebhen8, Ayman A. Aly9

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 2083-2095, 2022, DOI:10.32604/cmc.2022.019578

    Abstract Power domain non-orthogonal multiple access combined with a universal filtered multi-carrier (NOMA-UFMC) has the potential to cope with fifth generation (5G) unprecedented challenges. NOMA employs power-domain multiplexing to support several users, whereas UFMC is robust to timing and frequency misalignments. Unfortunately, NOMA-UFMC waveform has a high peak-to-average power (PAPR) issue that creates a negative affect due to multicarrier modulations, rendering it is inefficient for the impending 5G mobile and wireless networks. Therefore, this article seeks to presents a discrete Hartley transform (DHT) pre-coding-based NOMA enabled universal filter multicarrier (UFMC) (DHT-NOMA-UFMC) waveform design for lowering the high PAPR. Additionally, DHT precoding… More >

Displaying 2791-2800 on page 280 of 5350. Per Page