Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    ARTICLE

    Artificial Intelligence-Enabled Cooperative Cluster-Based Data Collection for Unmanned Aerial Vehicles

    R. Rajender1, C. S. S. Anupama2, G. Jose Moses3, E. Laxmi Lydia4, Seifedine Kadry5, Sangsoon Lim6,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3351-3365, 2022, DOI:10.32604/cmc.2022.030229

    Abstract In recent times, sixth generation (6G) communication technologies have become a hot research topic because of maximum throughput and low delay services for mobile users. It encompasses several heterogeneous resource and communication standard in ensuring incessant availability of service. At the same time, the development of 6G enables the Unmanned Aerial Vehicles (UAVs) in offering cost and time-efficient solution to several applications like healthcare, surveillance, disaster management, etc. In UAV networks, energy efficiency and data collection are considered the major process for high quality network communication. But these procedures are found to be challenging because of maximum mobility, unstable links,… More >

  • Open Access

    ARTICLE

    Fuzzy MCDM for Improving the Performance of Agricultural Supply Chain

    Le Thi Diem My1, Chia-Nan Wang1, Nguyen Van Thanh2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4003-4015, 2022, DOI:10.32604/cmc.2022.030209

    Abstract Fertilizer industry in Vietnam and globally have entered the saturation phase. With the growth rate slowing down, this poses challenges for the development impetus of the fertilizer industry in the next period. In fact, over the past few decades, Vietnam’s crop industry has abused excessive investment in chemical fertilizers, with organic fertilizers are rarely used or not at all, limiting crop productivity, increasing pests and diseases. To develop sustainable agriculture, Vietnam’s crop industry must limit the use of chemical fertilizers, increase the use of environmentally friendly organic and natural mineral fertilizers to produce clean agricultural products which is safe. Therefore,… More >

  • Open Access

    ARTICLE

    Agricultural Supply Chain Risks Evaluation with Spherical Fuzzy Analytic Hierarchy Process

    Phi-Hung Nguyen*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4211-4229, 2022, DOI:10.32604/cmc.2022.030115

    Abstract The outbreak of the COVID-19 pandemic has impacted the development of the global economy. As most developing and third world countries are heavily dependent on agriculture and agricultural imports, the agricultural supply chains (ASC) in all these countries are exposed to unprecedented risks following COVID-19. Therefore, it is vital to investigate the impact of risks and create resilient ASC organizations. In this study, critical risks associated with ASC were assessed using a novel Analytical Hierarchy Process based on spherical fuzzy sets (SF-AHP). The findings indicated that depending on the scope and scale of the organization, supply risks, demand risks, financial… More >

  • Open Access

    ARTICLE

    An Intelligent Tree Extractive Text Summarization Deep Learning

    Abeer Abdulaziz AlArfaj, Hanan Ahmed Hosni Mahmoud*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4231-4244, 2022, DOI:10.32604/cmc.2022.030090

    Abstract In recent research, deep learning algorithms have presented effective representation learning models for natural languages. The deep learning-based models create better data representation than classical models. They are capable of automated extraction of distributed representation of texts. In this research, we introduce a new tree Extractive text summarization that is characterized by fitting the text structure representation in knowledge base training module, and also addresses memory issues that were not addresses before. The proposed model employs a tree structured mechanism to generate the phrase and text embedding. The proposed architecture mimics the tree configuration of the text-texts and provide better… More >

  • Open Access

    ARTICLE

    Weather Forecasting Prediction Using Ensemble Machine Learning for Big Data Applications

    Hadil Shaiba1, Radwa Marzouk2, Mohamed K Nour3, Noha Negm4,5, Anwer Mustafa Hilal6,*, Abdullah Mohamed7, Abdelwahed Motwakel6, Ishfaq Yaseen6, Abu Sarwar Zamani6, Mohammed Rizwanullah6

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3367-3382, 2022, DOI:10.32604/cmc.2022.030067

    Abstract The agricultural sector’s day-to-day operations, such as irrigation and sowing, are impacted by the weather. Therefore, weather constitutes a key role in all regular human activities. Weather forecasting must be accurate and precise to plan our activities and safeguard ourselves as well as our property from disasters. Rainfall, wind speed, humidity, wind direction, cloud, temperature, and other weather forecasting variables are used in this work for weather prediction. Many research works have been conducted on weather forecasting. The drawbacks of existing approaches are that they are less effective, inaccurate, and time-consuming. To overcome these issues, this paper proposes an enhanced… More >

  • Open Access

    ARTICLE

    Methods and Means for Small Dynamic Objects Recognition and Tracking

    Dmytro Kushnir*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3649-3665, 2022, DOI:10.32604/cmc.2022.030016

    Abstract A literature analysis has shown that object search, recognition, and tracking systems are becoming increasingly popular. However, such systems do not achieve high practical results in analyzing small moving living objects ranging from 8 to 14 mm. This article examines methods and tools for recognizing and tracking the class of small moving objects, such as ants. To fulfill those aims, a customized You Only Look Once Ants Recognition (YOLO_AR) Convolutional Neural Network (CNN) has been trained to recognize Messor Structor ants in the laboratory using the LabelImg object marker tool. The proposed model is an extension of the You Only… More >

  • Open Access

    ARTICLE

    Automatic Botnet Attack Identification Based on Machine Learning

    Peng Hui Li1, Jie Xu1,*, Zhong Yi Xu1, Su Chen1, Bo Wei Niu2, Jie Yin1, Xiao Feng Sun1, Hao Liang Lan1, Lu Lu Chen3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3847-3860, 2022, DOI:10.32604/cmc.2022.029969

    Abstract At present, the severe network security situation has put forward high requirements for network security defense technology. In order to automate botnet threat warning, this paper researches the types and characteristics of Botnet. Botnet has special characteristics in attributes such as packets, attack time interval, and packet size. In this paper, the attack data is annotated by means of string recognition and expert screening. The attack features are extracted from the labeled attack data, and then use K-means for cluster analysis. The clustering results show that the same attack data has its unique characteristics, and the automatic identification of network… More >

  • Open Access

    ARTICLE

    Multi-Mode Frequency Reconfigurable Conformal Antenna for Modern Electronic Systems

    Abir Zaidi1, Esraa Mousa Ali2, Abdullah G. Alharbi3, Salah Ud-Din Khan4, Mohammad Alsharef5, Mohammed S. Alzaidi5, Sherif S. M. Ghoneim5,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3861-3877, 2022, DOI:10.32604/cmc.2022.029889

    Abstract The article presents a miniaturized monopole antenna dedicated to modern flexible electronic systems. The antenna combines three fundamental properties in a single structure. Firstly, it is characterized by a compact size compared to the state-of-the-art literature with an overall size of 18 × 18 × 0.254 mm3, secondly, the proposed antenna integrates the reconfigurability function of frequency, produced by means of a Positive-Intrinsic-Negative (PIN) diode introduced into the radiating element. Thus, the antenna is able to switch between different frequencies and different modes, making it suitable to meet the ever-changing demands of communication systems. third, the antenna is equipped by the property of flexibility.… More >

  • Open Access

    ARTICLE

    Eighteen-Element Antenna for Metal-Rimmed Smartphone Sub-6 GHz LTE42 Band Applications

    Saqer S. Alja’Afreh1,*, Mallak H. Alshamaileh1, Eqab Almajali2, Jawad Yousaf3, Amir Altaf4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3181-3198, 2022, DOI:10.32604/cmc.2022.029863

    Abstract Due to the limited space and large mutual coupling levels, the design of sub-6 GHz massive Multi-Input Multi-Output (m-MIMO) smartphone antenna system attracts antennas’ designers and engineers worldwide. Therefore, this paper presents 18-element m-MIMO antenna system that covers the long-term evolution 42 (LTE42) frequency band (3.4–3.6 GHz) for the fifth generation (5G) applications in metallic frame smartphones. The proposed array system is etched on the long sides of a metal rim of the mobile chassis symmetrically, which is electrically connected to the system ground plane with zero ground clearance. A low-profile frame of height 7 mm (λ/12.3) is symmetrically placed… More >

  • Open Access

    ARTICLE

    Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems

    Muhammad Shahzad Haroon*, Husnain Mansoor Ali

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3513-3527, 2022, DOI:10.32604/cmc.2022.029858

    Abstract Intrusion detection system plays an important role in defending networks from security breaches. End-to-end machine learning-based intrusion detection systems are being used to achieve high detection accuracy. However, in case of adversarial attacks, that cause misclassification by introducing imperceptible perturbation on input samples, performance of machine learning-based intrusion detection systems is greatly affected. Though such problems have widely been discussed in image processing domain, very few studies have investigated network intrusion detection systems and proposed corresponding defence. In this paper, we attempt to fill this gap by using adversarial attacks on standard intrusion detection datasets and then using adversarial samples… More >

Displaying 7581-7590 on page 759 of 22360. Per Page