Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Whale Optimization Algorithm-Based Deep Learning Model for Driver Identification in Intelligent Transport Systems

    Yuzhou Li*, Chuanxia Sun, Yinglei Hu

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3497-3515, 2023, DOI:10.32604/cmc.2023.035878 - 31 March 2023

    Abstract Driver identification in intelligent transport systems has immense demand, considering the safety and convenience of traveling in a vehicle. The rapid growth of driver assistance systems (DAS) and driver identification system propels the need for understanding the root causes of automobile accidents. Also, in the case of insurance, it is necessary to track the number of drivers who commonly drive a car in terms of insurance pricing. It is observed that drivers with frequent records of paying “fines” are compelled to pay higher insurance payments than drivers without any penalty records. Thus driver identification act… More >

  • Open Access

    ARTICLE

    Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing

    Jihyeon Yu1, Juhwan Kim1, Youngwoo Lee1, Fayozbek Rustamov2, Joobeom Yun1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3291-3315, 2023, DOI:10.32604/cmc.2023.035835 - 31 March 2023

    Abstract Internet of things (IoT) devices are being increasingly used in numerous areas. However, the low priority on security and various IoT types have made these devices vulnerable to attacks. To prevent this, recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments. However, these studies focused only on major firmware architectures and rarely considered exotic firmware. In addition, because of the diversity of firmware, the emulation success rate is not high in terms of large-scale analyses. In this study, we propose the adaptive emulation… More >

  • Open Access

    ARTICLE

    Neural Machine Translation Models with Attention-Based Dropout Layer

    Huma Israr1,*, Safdar Abbas Khan1, Muhammad Ali Tahir1, Muhammad Khuram Shahzad1, Muneer Ahmad1, Jasni Mohamad Zain2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2981-3009, 2023, DOI:10.32604/cmc.2023.035814 - 31 March 2023

    Abstract In bilingual translation, attention-based Neural Machine Translation (NMT) models are used to achieve synchrony between input and output sequences and the notion of alignment. NMT model has obtained state-of-the-art performance for several language pairs. However, there has been little work exploring useful architectures for Urdu-to-English machine translation. We conducted extensive Urdu-to-English translation experiments using Long short-term memory (LSTM)/Bidirectional recurrent neural networks (Bi-RNN)/Statistical recurrent unit (SRU)/Gated recurrent unit (GRU)/Convolutional neural network (CNN) and Transformer. Experimental results show that Bi-RNN and LSTM with attention mechanism trained iteratively, with a scalable data set, make precise predictions on unseen… More >

  • Open Access

    ARTICLE

    An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher

    Ghofran Kh. Shraida1, Hameed A. Younis1, Taief Alaa Al-Amiedy2, Mohammed Anbar2,*, Hussain A. Younis3,4, Iznan H. Hasbullah2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2641-2654, 2023, DOI:10.32604/cmc.2023.035793 - 31 March 2023

    Abstract Nowadays, high-resolution images pose several challenges in the context of image encryption. The encryption of huge images’ file sizes requires high computational resources. Traditional encryption techniques like, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) are not only inefficient, but also less secure. Due to characteristics of chaos theory, such as periodicity, sensitivity to initial conditions and control parameters, and unpredictability. Hence, the characteristics of deoxyribonucleic acid (DNA), such as vast parallelism and large storage capacity, make it a promising field. This paper presents an efficient color image encryption method utilizing DNA encoding with… More >

  • Open Access

    ARTICLE

    A Robust Tuned Random Forest Classifier Using Randomized Grid Search to Predict Coronary Artery Diseases

    Sameh Abd El-Ghany1,2, A. A. Abd El-Aziz1,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4633-4648, 2023, DOI:10.32604/cmc.2023.035779 - 31 March 2023

    Abstract Coronary artery disease (CAD) is one of the most authentic cardiovascular afflictions because it is an uncommonly overwhelming heart issue. The breakdown of coronary cardiovascular disease is one of the principal sources of death all over the world. Cardiovascular deterioration is a challenge, especially in youthful and rural countries where there is an absence of human-trained professionals. Since heart diseases happen without apparent signs, high-level detection is desirable. This paper proposed a robust and tuned random forest model using the randomized grid search technique to predict CAD. The proposed framework increases the ability of CAD… More >

  • Open Access

    ARTICLE

    Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

    Ali Arshad1,*, Muhammad Nadeem2, Saman Riaz1, Syeda Wajiha Zahra2, Ashit Kumar Dutta3, Zaid Alzaid4, Rana Alabdan5, Badr Almutairi6, Sultan Almotairi4,7

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3065-3089, 2023, DOI:10.32604/cmc.2023.035695 - 31 March 2023

    Abstract There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker… More >

  • Open Access

    ARTICLE

    Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning

    Zibo Wang1,3, Chaobin Huo2, Yaofang Zhang1,3, Shengtao Cheng1,3, Yilu Chen1,3, Xiaojie Wei5, Chao Li4, Bailing Wang1,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2957-2979, 2023, DOI:10.32604/cmc.2023.035694 - 31 March 2023

    Abstract With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific… More >

  • Open Access

    ARTICLE

    Optimal Management of Energy Storage Systems for Peak Shaving in a Smart Grid

    Firas M. Makahleh1, Ayman Amer2, Ahmad A. Manasrah1, Hani Attar2, Ahmed A. A. Solyman3, Mehrdad Ahmadi Kamarposhti4,*, Phatiphat Thounthong5

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3317-3337, 2023, DOI:10.32604/cmc.2023.035690 - 31 March 2023

    Abstract In this paper, the installation of energy storage systems (EES) and their role in grid peak load shaving in two echelons, their distribution and generation are investigated. First, the optimal placement and capacity of the energy storage is taken into consideration, then, the charge-discharge strategy for this equipment is determined. Here, Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) are used to calculate the minimum and maximum load in the network with the presence of energy storage systems. The energy storage systems were utilized in a distribution system with the aid of a peak load More >

  • Open Access

    ARTICLE

    Artificial Intelligence and Internet of Things Enabled Intelligent Framework for Active and Healthy Living

    Saeed Ali Alsareii1, Mohsin Raza2, Abdulrahman Manaa Alamri1, Mansour Yousef AlAsmari1, Muhammad Irfan3, Hasan Raza4, Muhammad Awais2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3833-3848, 2023, DOI:10.32604/cmc.2023.035686 - 31 March 2023

    Abstract Obesity poses several challenges to healthcare and the well-being of individuals. It can be linked to several life-threatening diseases. Surgery is a viable option in some instances to reduce obesity-related risks and enable weight loss. State-of-the-art technologies have the potential for long-term benefits in post-surgery living. In this work, an Internet of Things (IoT) framework is proposed to effectively communicate the daily living data and exercise routine of surgery patients and patients with excessive weight. The proposed IoT framework aims to enable seamless communications from wearable sensors and body networks to the cloud to create More >

  • Open Access

    ARTICLE

    Type 2 Diabetes Risk Prediction Using Deep Convolutional Neural Network Based-Bayesian Optimization

    Alawi Alqushaibi1,2,*, Mohd Hilmi Hasan1,2, Said Jadid Abdulkadir1,2, Amgad Muneer1,2, Mohammed Gamal1,2, Qasem Al-Tashi3, Shakirah Mohd Taib1,2, Hitham Alhussian1,2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3223-3238, 2023, DOI:10.32604/cmc.2023.035655 - 31 March 2023

    Abstract Diabetes mellitus is a long-term condition characterized by hyperglycemia. It could lead to plenty of difficulties. According to rising morbidity in recent years, the world’s diabetic patients will exceed 642 million by 2040, implying that one out of every ten persons will be diabetic. There is no doubt that this startling figure requires immediate attention from industry and academia to promote innovation and growth in diabetes risk prediction to save individuals’ lives. Due to its rapid development, deep learning (DL) was used to predict numerous diseases. However, DL methods still suffer from their limited prediction… More >

Displaying 9921-9930 on page 993 of 31589. Per Page