Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    ARTICLE

    Metaheuristic Lightweight Cryptography for Security Enhancement inInternet of Things

    Mahmoud Ragab1,2,3,*, Ehab Bahaudien Ashary4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3009-3023, 2022, DOI:10.32604/cmc.2022.025763

    Abstract The advancements made in Internet of Things (IoT) is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications. However, data security and private are challenging tasks to accomplish in IoT and necessary measures to be taken to ensure secure operation. With this background, the current paper proposes a novel lightweight cryptography method for enhance the security in IoT. The proposed encryption algorithm is a blend of Cross Correlation Coefficient (CCC) and Black Widow Optimization (BWO) algorithm. In the presented encryption technique, CCC operation is utilized to optimize the encryption process of cryptography method.… More >

  • Open Access

    ARTICLE

    Hybrid Chaotic Salp Swarm with Crossover Algorithm for Underground Wireless Sensor Networks

    Mariem Ayedi1,2,*, Walaa H. ElAshmawi3,4, Esraa Eldesouky1,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2963-2980, 2022, DOI:10.32604/cmc.2022.025741

    Abstract Resource management in Underground Wireless Sensor Networks (UWSNs) is one of the pillars to extend the network lifetime. An intriguing design goal for such networks is to achieve balanced energy and spectral resource utilization. This paper focuses on optimizing the resource efficiency in UWSNs where underground relay nodes amplify and forward sensed data, received from the buried source nodes through a lossy soil medium, to the aboveground base station. A new algorithm called the Hybrid Chaotic Salp Swarm and Crossover (HCSSC) algorithm is proposed to obtain the optimal source and relay transmission powers to maximize the network resource efficiency. The… More >

  • Open Access

    ARTICLE

    Robust Prediction of the Bandwidth of Metamaterial Antenna Using Deep Learning

    Abdelaziz A. Abdelhamid1,3,*, Sultan R. Alotaibi2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2305-2321, 2022, DOI:10.32604/cmc.2022.025739

    Abstract The design of microstrip antennas is a complex and time-consuming process, especially the step of searching for the best design parameters. Meanwhile, the performance of microstrip antennas can be improved using metamaterial, which results in a new class of antennas called metamaterial antenna. Several parameters affect the radiation loss and quality factor of this class of antennas, such as the antenna size. Recently, the optimal values of the design parameters of metamaterial antennas can be predicted using machine learning, which presents a better alternative to simulation tools and trial-and-error processes. However, the prediction accuracy depends heavily on the quality of… More >

  • Open Access

    ARTICLE

    LAME: Layout-Aware Metadata Extraction Approach for Research Articles

    Jongyun Choi1, Hyesoo Kong2, Hwamook Yoon2, Heungseon Oh3, Yuchul Jung1,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4019-4037, 2022, DOI:10.32604/cmc.2022.025711

    Abstract The volume of academic literature, such as academic conference papers and journals, has increased rapidly worldwide, and research on metadata extraction is ongoing. However, high-performing metadata extraction is still challenging due to diverse layout formats according to journal publishers. To accommodate the diversity of the layouts of academic journals, we propose a novel LAyout-aware Metadata Extraction (LAME) framework equipped with the three characteristics (e.g., design of automatic layout analysis, construction of a large meta-data training set, and implementation of metadata extractor). In the framework, we designed an automatic layout analysis using PDFMiner. Based on the layout analysis, a large volume… More >

  • Open Access

    ARTICLE

    Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home

    Anusha Vangala1, Ashok Kumar Das1, YoungHo Park2,*, Sajjad Shaukat Jamal3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3549-3570, 2022, DOI:10.32604/cmc.2022.025660

    Abstract The recent surge in development of smart homes and smart cities can be observed in many developed countries. While the idea to control devices that are in home (embedded with the Internet of Things (IoT) smart devices) by the user who is outside the home might sound fancy, but it comes with a lot of potential threats. There can be many attackers who will be trying to take advantage of this. So, there is a need for designing a secure scheme which will be able to distinguish among genuine/authorized users of the system and attackers. And knowing about the details… More >

  • Open Access

    ARTICLE

    Modified Bat Algorithm for Optimal VM's in Cloud Computing

    Amit Sundas1, Sumit Badotra1,*, Youseef Alotaibi2, Saleh Alghamdi3, Osamah Ibrahim Khalaf4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2877-2894, 2022, DOI:10.32604/cmc.2022.025658

    Abstract All task scheduling applications need to ensure that resources are optimally used, performance is enhanced, and costs are minimized. The purpose of this paper is to discuss how to Fitness Calculate Values (FCVs) to provide application software with a reliable solution during the initial stages of load balancing. The cloud computing environment is the subject of this study. It consists of both physical and logical components (most notably cloud infrastructure and cloud storage) (in particular cloud services and cloud platforms). This intricate structure is interconnected to provide services to users and improve the overall system's performance. This case study is… More >

  • Open Access

    ARTICLE

    Linearly Polarized Millimeter Wave Reflectarray with Mutual Coupling Optimization

    M. Inam1, M. H. Dahri2, M. R. Kamarudin3, A. Y. I. Ashyap3, M. H. Jamaluddin4, N. H. Sulaiman5, M. A. Khan6, Z. A. Shamsan7,*, K. Almuhanna7, F. Alorifi7

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2397-2410, 2022, DOI:10.32604/cmc.2022.025650

    Abstract This work provides the design and analysis of a single layer, linearly polarized millimeter wave reflectarray antenna with mutual coupling optimization. Detailed analysis was carried out at 26 GHz design frequency using the simulations of the reflectarray unit cells as well as the periodic reflectarray antenna. The simulated results were verified by the scattering parameter and far-field measurements of the unit cell and periodic arrays, respectively. A close agreement between the simulated and measured results was observed in all the cases. Apart from the unit cells and reflectarray, the waveguide and horn antenna were also fabricated to be used in the… More >

  • Open Access

    ARTICLE

    Intelligent Satin Bowerbird Optimizer Based Compression Technique for Remote Sensing Images

    M. Saravanan1, J. Jayanthi2, U. Sakthi3, R. Rajkumar4, Gyanendra Prasad Joshi5, L. Minh Dang5, Hyeonjoon Moon5,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2683-2696, 2022, DOI:10.32604/cmc.2022.025642

    Abstract Due to latest advancements in the field of remote sensing, it becomes easier to acquire high quality images by the use of various satellites along with the sensing components. But the massive quantity of data poses a challenging issue to store and effectively transmit the remote sensing images. Therefore, image compression techniques can be utilized to process remote sensing images. In this aspect, vector quantization (VQ) can be employed for image compression and the widely applied VQ approach is Linde–Buzo–Gray (LBG) which creates a local optimum codebook for image construction. The process of constructing the codebook can be treated as… More >

  • Open Access

    ARTICLE

    Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts

    Tarig Mohamed Ahmed*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3849-3862, 2022, DOI:10.32604/cmc.2022.025582

    Abstract Mobile Agent has many benefits over traditional distributed systems such as reducing latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security problems. This paper focuses on mobile agent protection against malicious hosts. A new security mechanism called Checkpoints has been proposed. Checkpoint Mechanism (CPM) aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks. CPM assumes using a free-roaming mobility mechanism by Mobile agent systems. The main idea behind CPM is to generate multiple versions of Mobile Agent. The multiple version is used to recover Mobile Agent from Capturing and… More >

  • Open Access

    ARTICLE

    5G Antenna Gain Enhancement Using a Novel Metasurface

    Mubashir Ashfaq1, Shahid Bashir1,*, Syed Imran Hussain Shah2, Nisar Ahmad Abbasi3, Hatem Rmili4,5, Muhammad Abbas Khan6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3601-3611, 2022, DOI:10.32604/cmc.2022.025558

    Abstract This article presents a Sub-6 GHz microstrip patch antenna (MPA) with enhanced gain using metamaterial (MTM) superstrate. The source MPA operates at 4.8 GHz and has a peak gain of 5.3 dBi at the resonance frequency. A window-shaped unit cell is designed and investigated through the material wave propagation technique. The unit cell shows an Epsilon Near Zero (ENZ)-Mu Very Large (MVL) behavior around 4.8 GHz. The unit cell has a fourfold geometry which makes it a polarization independent metamaterial. A double layer antenna is designed by placing a 4 × 4 MTM slab as a superstrate above the MPA at a… More >

Displaying 8791-8800 on page 880 of 22360. Per Page