Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    A Grey Simulation-Based Fuzzy Hierarchical Approach for Diagnosing Healthcare Service Quality

    Phi-Hung Nguyen*, Hong-Anh Pham

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3231-3248, 2023, DOI:10.32604/cmc.2023.031428 - 31 October 2022

    Abstract This study aims to assess and rank the service quality of the healthcare system utilizing a Fuzzy Analytical Hierarchical Process (Fuzzy AHP) and Grey Relational Analysis (Fuzzy GRA) technique. In this study, the six primary characteristics of healthcare service quality, comprising Tangibles (A), Healthcare Staff (B), Responsiveness (C), Relationships (D), Support Service (E), and Accessibility (F), are examined through a case study of 20 private and public hospitals in Hanoi, Vietnam. The weighting results of Fuzzy AHP technique indicated that Responsiveness (C) has the highest ranking, followed by Relationships (D) and Healthcare Staff (B). Meanwhile, More >

  • Open Access

    ARTICLE

    Fractional Order Nonlinear Bone Remodeling Dynamics Using the Supervised Neural Network

    Narongsak Yotha1, Qusain Hiader2, Zulqurnain Sabir3, Muhammad Asif Zahoor Raja4, Salem Ben Said5, Qasem Al-Mdallal5, Thongchai Botmart6, Wajaree Weera6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2415-2430, 2023, DOI:10.32604/cmc.2023.031352 - 31 October 2022

    Abstract This study aims to solve the nonlinear fractional-order mathematical model (FOMM) by using the normal and dysregulated bone remodeling of the myeloma bone disease (MBD). For the more precise performance of the model, fractional-order derivatives have been used to solve the disease model numerically. The FOMM is preliminarily designed to focus on the critical interactions between bone resorption or osteoclasts (OC) and bone formation or osteoblasts (OB). The connections of OC and OB are represented by a nonlinear differential system based on the cellular components, which depict stable fluctuation in the usual bone case and… More >

  • Open Access

    ARTICLE

    An Improved BPNN Prediction Method Based on Multi-Strategy Sparrow Search Algorithm

    Xiangyan Tang1,2, Dengfang Feng2,*, KeQiu Li1, Jingxin Liu2, Jinyang Song3, Victor S. Sheng4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2789-2802, 2023, DOI:10.32604/cmc.2023.031304 - 31 October 2022

    Abstract Data prediction can improve the science of decision-making by making predictions about what happens in daily life based on natural law trends. Back propagation (BP) neural network is a widely used prediction method. To reduce its probability of falling into local optimum and improve the prediction accuracy, we propose an improved BP neural network prediction method based on a multi-strategy sparrow search algorithm (MSSA). The weights and thresholds of the BP neural network are optimized using the sparrow search algorithm (SSA). Three strategies are designed to improve the SSA to enhance its optimization-seeking ability, leading More >

  • Open Access

    ARTICLE

    An Improved Text-Based and Image-Based CAPTCHA Based on Solving and Response Time

    Ademola Olusola Adesina1, Patrick Seun Ayobioloja2, Ibidun Christiana Obagbuwa3, Tola John Odule1, Adenrele A. Afolorunso2, Sunday Adeola Ajagbe4,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2661-2675, 2023, DOI:10.32604/cmc.2023.031245 - 31 October 2022

    Abstract CAPTCHA is an acronym that stands for Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA), it is a good example of an authentication system that can be used to determine the true identity of any user. It serves as a security measure to prevent an attack caused by web bots (automatic programs) during an online transaction. It can come as text-based or image-based depending on the project and the programmer. The usability and robustness, as well as level of security, provided each of the varies and call for the development of… More >

  • Open Access

    ARTICLE

    GA-Stacking: A New Stacking-Based Ensemble Learning Method to Forecast the COVID-19 Outbreak

    Walaa N. Ismail1,2,*, Hessah A. Alsalamah3,4, Ebtesam Mohamed2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3945-3976, 2023, DOI:10.32604/cmc.2023.031194 - 31 October 2022

    Abstract As a result of the increased number of COVID-19 cases, Ensemble Machine Learning (EML) would be an effective tool for combatting this pandemic outbreak. An ensemble of classifiers can improve the performance of single machine learning (ML) classifiers, especially stacking-based ensemble learning. Stacking utilizes heterogeneous-base learners trained in parallel and combines their predictions using a meta-model to determine the final prediction results. However, building an ensemble often causes the model performance to decrease due to the increasing number of learners that are not being properly selected. Therefore, the goal of this paper is to develop… More >

  • Open Access

    ARTICLE

    Optimizing Optical Attocells Positioning of Indoor Visible Light Communication System

    Mohammed S. M. Gismalla1,2,3, Asrul I. Azmi1,2, Mohd R. Salim1,2, Farabi Iqbal1,2, Mohammad F. L. Abdullah4, Mosab Hamdan5,6, Muzaffar Hamzah5,*, Abu Sahmah M. Supa’at1,2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3607-3625, 2023, DOI:10.32604/cmc.2023.031192 - 31 October 2022

    Abstract Visible light communication (VLC), which is a prominent emerging solution that complements the radio frequency (RF) technology, exhibits the potential to meet the demands of fifth-generation (5G) and beyond technologies. The random movement of mobile terminals in the indoor environment is a challenge in the VLC system. The model of optical attocells has a critical role in the uniform distribution and the quality of communication links in terms of received power and signal-to-noise ratio (SNR). As such, the optical attocells positions were optimized in this study with a developed try and error (TE) algorithm. The More >

  • Open Access

    ARTICLE

    Optimal Deep Transfer Learning Based Colorectal Cancer Detection and Classification Model

    Mahmoud Ragab1,2,3,*, Maged Mostafa Mahmoud4,5,6, Amer H. Asseri2,7, Hani Choudhry2,7, Haitham A. Yacoub8

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3279-3295, 2023, DOI:10.32604/cmc.2023.031037 - 31 October 2022

    Abstract Colorectal carcinoma (CRC) is one such dispersed cancer globally and also prominent one in causing cancer-based death. Conventionally, pathologists execute CRC diagnosis through visible scrutinizing under the microscope the resected tissue samples, stained and fixed through Haematoxylin and Eosin (H&E). The advancement of graphical processing systems has resulted in high potentiality for deep learning (DL) techniques in interpretating visual anatomy from high resolution medical images. This study develops a slime mould algorithm with deep transfer learning enabled colorectal cancer detection and classification (SMADTL-CCDC) algorithm. The presented SMADTL-CCDC technique intends to appropriately recognize the occurrence of… More >

  • Open Access

    ARTICLE

    An Artificial Approach for the Fractional Order Rape and Its Control Model

    Wajaree Weera1, Zulqurnain Sabir2, Muhammad Asif Zahoor Raja3, Salem Ben Said4, Maria Emilia Camargo5, Chantapish Zamart1, Thongchai Botmart1,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3421-3438, 2023, DOI:10.32604/cmc.2023.030996 - 31 October 2022

    Abstract The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its control model using the strength of artificial neural networks (ANNs) along with the Levenberg-Marquardt backpropagation approach (LMBA), i.e., artificial neural networks-Levenberg-Marquardt backpropagation approach (ANNs-LMBA). The fractional order investigations have been presented to find more realistic results of the mathematical form of the rape and its control model. The differential mathematical form of the nonlinear fractional order mathematical rape and its control model has six classes: susceptible native girls, infected immature girls, susceptible knowledgeable girls, infected knowledgeable girls, susceptible rapist population… More >

  • Open Access

    ARTICLE

    Fuzzy-HLSTM (Hierarchical Long Short-Term Memory) for Agricultural Based Information Mining

    Ahmed Abdu Alattab1,*, Mohammed Eid Ibrahim1, Reyazur Rashid Irshad1, Anwar Ali Yahya2, Amin A. Al-Awady3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2397-2413, 2023, DOI:10.32604/cmc.2023.030924 - 31 October 2022

    Abstract This research proposes a machine learning approach using fuzzy logic to build an information retrieval system for the next crop rotation. In case-based reasoning systems, case representation is critical, and thus, researchers have thoroughly investigated textual, attribute-value pair, and ontological representations. As big databases result in slow case retrieval, this research suggests a fast case retrieval strategy based on an associated representation, so that, cases are interrelated in both either similar or dissimilar cases. As soon as a new case is recorded, it is compared to prior data to find a relative match. The proposed More >

  • Open Access

    ARTICLE

    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2625-2640, 2023, DOI:10.32604/cmc.2023.030899 - 31 October 2022

    Abstract Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud… More >

Displaying 11381-11390 on page 1139 of 31561. Per Page