Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    ARTICLE

    A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System

    Saima Kanwal1, Feng Tao1,*, Ahmad Almogren2, Ateeq Ur Rehman3, Rizwan Taj1, Ayman Radwan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 201-219, 2023, DOI:10.32604/cmes.2022.020255

    Abstract The authenticity and integrity of healthcare is the primary objective. Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection. A trade-off between robustness, imperceptibility, and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability. Keeping this purpose insight, an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern. A key is generated by a random path with minimum bit… More >

  • Open Access

    REVIEW

    A Review of the Current Task Offloading Algorithms, Strategies and Approach in Edge Computing Systems

    Abednego Acheampong1, Yiwen Zhang1,*, Xiaolong Xu2, Daniel Appiah Kumah2

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 35-88, 2023, DOI:10.32604/cmes.2022.021394

    Abstract Task offloading is an important concept for edge computing and the Internet of Things (IoT) because computationintensive tasks must be offloaded to more resource-powerful remote devices. Task offloading has several advantages, including increased battery life, lower latency, and better application performance. A task offloading method determines whether sections of the full application should be run locally or offloaded for execution remotely. The offloading choice problem is influenced by several factors, including application properties, network conditions, hardware features, and mobility, influencing the offloading system’s operational environment. This study provides a thorough examination of current task offloading and resource allocation in edge… More >

  • Open Access

    ARTICLE

    Adaptive Fixed-Time Synchronization of Delayed Memristor-Based Neural Networks with Discontinuous Activations

    Tianyuan Jia1, Xiangyong Chen1,2,*, Xiurong Yao1,*, Feng Zhao1, Jianlong Qiu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 221-239, 2023, DOI:10.32604/cmes.2022.020780

    Abstract Fixed-time synchronization (FTS) of delayed memristor-based neural networks (MNNs) with discontinuous activations is studied in this paper. Both continuous and discontinuous activations are considered for MNNs. And the mixed delays which are closer to reality are taken into the system. Besides, two kinds of control schemes are proposed, including feedback and adaptive control strategies. Based on some lemmas, mathematical inequalities and the designed controllers, a few synchronization criteria are acquired. Moreover, the upper bound of settling time (ST) which is independent of the initial values is given. Finally, the feasibility of our theory is attested by simulation examples. More >

  • Open Access

    REVIEW

    Analytical Models of Concrete Fatigue: A State-of-the-Art Review

    Xiaoli Wei1, D. A. Makhloof1,2, Xiaodan Ren1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 9-34, 2023, DOI:10.32604/cmes.2022.020160

    Abstract Fatigue failure phenomena of the concrete structures under long-term low amplitude loading have attracted more attention. Some structures, such as wind power towers, offshore platforms, and high-speed railways, may resist millions of cycles loading during their intended lives. Over the past century, analytical methods for concrete fatigue are emerging. It is concluded that models for the concrete fatigue calculation can fall into four categories: the empirical model relying on fatigue tests, fatigue crack growth model in fracture mechanics, fatigue damage evolution model based on damage mechanics and advanced machine learning model. In this paper, a detailed review of fatigue computing… More >

  • Open Access

    ARTICLE

    Cooperative Angles-Only Relative Navigation Algorithm for Multi-Spacecraft Formation in Close-Range

    Sha Wang1,2, Chenglong He1, Baichun Gong2,*, Xin Ding2, Yanhua Yuan3

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 121-134, 2023, DOI:10.32604/cmes.2022.017470

    Abstract As to solve the collaborative relative navigation problem for near-circular orbiting small satellites in close-range under GNSS denied environment, a novel consensus constrained relative navigation algorithm based on the lever arm effect of the sensor offset from the spacecraft center of mass is proposed. Firstly, the orbital propagation model for the relative motion of multi-spacecraft is established based on Hill-Clohessy-Wiltshire dynamics and the line-of-sight measurement under sensor offset condition is modeled in Local Vertical Local Horizontal frame. Secondly, the consensus constraint model for the relative orbit state is constructed by introducing the geometry constraint between the spacecraft, based on which… More >

  • Open Access

    REVIEW

    Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions

    Gulshan Kumar1,*, Hamed Alqahtani2

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 89-119, 2023, DOI:10.32604/cmes.2022.020724

    Abstract Software-Defined Networking (SDN) enables flexibility in developing security tools that can effectively and efficiently analyze and detect malicious network traffic for detecting intrusions. Recently Machine Learning (ML) techniques have attracted lots of attention from researchers and industry for developing intrusion detection systems (IDSs) considering logically centralized control and global view of the network provided by SDN. Many IDSs have developed using advances in machine learning and deep learning. This study presents a comprehensive review of recent work of ML-based IDS in context to SDN. It presents a comprehensive study of the existing review papers in the field. It is followed… More >

  • Open Access

    ARTICLE

    An Improved Hyperplane Assisted Multiobjective Optimization for Distributed Hybrid Flow Shop Scheduling Problem in Glass Manufacturing Systems

    Yadian Geng1, Junqing Li1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 241-266, 2023, DOI:10.32604/cmes.2022.020307

    Abstract To solve the distributed hybrid flow shop scheduling problem (DHFS) in raw glass manufacturing systems, we investigated an improved hyperplane assisted evolutionary algorithm (IhpaEA). Two objectives are simultaneously considered, namely, the maximum completion time and the total energy consumptions. Firstly, each solution is encoded by a three-dimensional vector, i.e., factory assignment, scheduling, and machine assignment. Subsequently, an efficient initialization strategy embeds two heuristics are developed, which can increase the diversity of the population. Then, to improve the global search abilities, a Pareto-based crossover operator is designed to take more advantage of non-dominated solutions. Furthermore, a local search heuristic based on… More >

  • Open Access

    ARTICLE

    A Novel SE-CNN Attention Architecture for sEMG-Based Hand Gesture Recognition

    Zhengyuan Xu1,2,#, Junxiao Yu1,#, Wentao Xiang1, Songsheng Zhu1, Mubashir Hussain3, Bin Liu1,*, Jianqing Li1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 157-177, 2023, DOI: 10.32604/cmes.2022.020035

    Abstract In this article, to reduce the complexity and improve the generalization ability of current gesture recognition systems, we propose a novel SE-CNN attention architecture for sEMG-based hand gesture recognition. The proposed algorithm introduces a temporal squeeze-and-excite block into a simple CNN architecture and then utilizes it to recalibrate the weights of the feature outputs from the convolutional layer. By enhancing important features while suppressing useless ones, the model realizes gesture recognition efficiently. The last procedure of the proposed algorithm is utilizing a simple attention mechanism to enhance the learned representations of sEMG signals to perform multi-channel sEMG-based gesture recognition tasks.… More >

  • Open Access

    ARTICLE

    Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3801-3813, 2023, DOI:10.32604/iasc.2023.032267

    Abstract Due to the mobility of users in an organization, inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption (CP-ABE). By considering this challenge; we focus to present dynamic time and location information in CP-ABE with multi-authorization. At first, along with the set of attributes of the users, their corresponding location is also embedded. Geohash is used to encode the latitude and longitude of the user’s position. Then, decrypt time period and access time period of users are defined using the new time tree (NTT) structure. The NTT sets the encrypted duration of… More >

  • Open Access

    ARTICLE

    An IoT-Based Energy Conservation Smart Classroom System

    Talal H. Noor1,*, El-Sayed Atlam2, Abdulqader M. Almars1, Ayman Noor3, Amer S. Malki1

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3785-3799, 2023, DOI:10.32604/iasc.2023.032250

    Abstract With the increase of energy consumption worldwide in several domains such as industry, education, and transportation, several technologies played an influential role in energy conservation such as the Internet of Things (IoT). In this article, we describe the design and implementation of an IoT-based energy conservation smart classroom system that contributes to energy conservation in the education domain. The proposed system not only allows the user to access and control IoT devices (e.g., lights, projectors, and air conditions) in real-time, it also has the capability to aggregate the estimated energy consumption of an IoT device, the smart classroom, and the… More >

Displaying 6571-6580 on page 658 of 22360. Per Page