Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Assessing the Performance of Some Ranked Set Sampling Designs Using HybridApproach

    Mohamed. A. H. Sabry1,*, Ehab M. Almetwally2, Hisham M. Almongy3, Gamal M. Ibrahim4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3737-3753, 2021, DOI:10.32604/cmc.2021.017510

    Abstract In this paper, a joint analysis consisting of goodness-of-fit tests and Markov chain Monte Carlo simulations are used to assess the performance of some ranked set sampling designs. The Markov chain Monte Carlo simulations are conducted when Bayesian methods with Jeffery’s priors of the unknown parameters of Weibull distribution are used, while the goodness of fit analysis is conducted when the likelihood estimators are used and the corresponding empirical distributions are obtained. The ranked set sampling designs considered in this research are the usual ranked set sampling, extreme ranked set sampling, median ranked set sampling, and neoteric ranked set sampling… More >

  • Open Access

    ARTICLE

    Unknown Attack Detection: Combining Relabeling and Hybrid Intrusion Detection

    Gun-Yoon Shin1, Dong-Wook Kim1, Sang-Soo Kim2, Myung-Mook Han3,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3289-3303, 2021, DOI:10.32604/cmc.2021.017502

    Abstract Detection of unknown attacks like a zero-day attack is a research field that has long been studied. Recently, advances in Machine Learning (ML) and Artificial Intelligence (AI) have led to the emergence of many kinds of attack-generation tools developed using these technologies to evade detection skillfully. Anomaly detection and misuse detection are the most commonly used techniques for detecting intrusion by unknown attacks. Although anomaly detection is adequate for detecting unknown attacks, its disadvantage is the possibility of high false alarms. Misuse detection has low false alarms; its limitation is that it can detect only known attacks. To overcome such… More >

  • Open Access

    ARTICLE

    A Hybrid Approach for Performance and Energy-Based Cost Prediction in Clouds

    Mohammad Aldossary*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3531-3562, 2021, DOI:10.32604/cmc.2021.017477

    Abstract With the striking rise in penetration of Cloud Computing, energy consumption is considered as one of the key cost factors that need to be managed within cloud providers’ infrastructures. Subsequently, recent approaches and strategies based on reactive and proactive methods have been developed for managing cloud computing resources, where the energy consumption and the operational costs are minimized. However, to make better cost decisions in these strategies, the performance and energy awareness should be supported at both Physical Machine (PM) and Virtual Machine (VM) levels. Therefore, in this paper, a novel hybrid approach is proposed, which jointly considered the prediction… More >

  • Open Access

    ARTICLE

    Q-Learning Based Routing Protocol for Congestion Avoidance

    Daniel Godfrey1, Beom-Su Kim1, Haoran Miao1, Babar Shah2, Bashir Hayat3, Imran Khan4, Tae-Eung Sung5, Ki-Il Kim1,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3671-3692, 2021, DOI:10.32604/cmc.2021.017475

    Abstract The end-to-end delay in a wired network is strongly dependent on congestion on intermediate nodes. Among lots of feasible approaches to avoid congestion efficiently, congestion-aware routing protocols tend to search for an uncongested path toward the destination through rule-based approaches in reactive/incident-driven and distributed methods. However, these previous approaches have a problem accommodating the changing network environments in autonomous and self-adaptive operations dynamically. To overcome this drawback, we present a new congestion-aware routing protocol based on a Q-learning algorithm in software-defined networks where logically centralized network operation enables intelligent control and management of network resources. In a proposed routing protocol,… More >

  • Open Access

    ARTICLE

    Impact Assessment of COVID-19 Pandemic Through Machine Learning Models

    Fawaz Jaber Alsolami1, Abdullah Saad Al-Malaise ALGhamdi2, Asif Irshad Khan1,*, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Farrukh Saleem2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2895-2912, 2021, DOI:10.32604/cmc.2021.017469

    Abstract Ever since its outbreak in the Wuhan city of China, COVID-19 pandemic has engulfed more than 211 countries in the world, leaving a trail of unprecedented fatalities. Even more debilitating than the infection itself, were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus. Such enforced alienation affected both the mental and social condition of people significantly. Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement. However, COVID-19 brought all such communication to a grinding halt. Digital interactions have failed to enthuse the fervor… More >

  • Open Access

    ARTICLE

    Optimal Sprint Length Determination for Agile-Based Software Development

    Adarsh Anand1, Jasmine Kaur1, Ompal Singh1, Omar H. Alhazmi2,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3693-3712, 2021, DOI:10.32604/cmc.2021.017461

    Abstract A carefully planned software development process helps in maintaining the quality of the software. In today’s scenario the primitive software development models have been replaced by the Agile based models like SCRUM, KANBAN, LEAN, etc. Although, every framework has its own boon, the reason for widespread acceptance of the agile-based approach is its evolutionary nature that permits change in the path of software development. The development process occurs in iterative and incremental cycles called sprints. In SCRUM, which is one of the most widely used agile-based software development modeling framework; the sprint length is fixed throughout the process wherein; it… More >

  • Open Access

    ARTICLE

    Visibility Enhancement of Scene Images Degraded by Foggy Weather Condition: An Application to Video Surveillance

    Ghulfam Zahra1, Muhammad Imran1, Abdulrahman M. Qahtani2,*, Abdulmajeed Alsufyani2, Omar Almutiry3, Awais Mahmood3, Fayez Eid Alazemi4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3465-3481, 2021, DOI:10.32604/cmc.2021.017454

    Abstract In recent years, video surveillance application played a significant role in our daily lives. Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence reduces the visibility. The reason behind visibility enhancement of foggy and haze images is to help numerous computer and machine vision applications such as satellite imagery, object detection, target killing, and surveillance. To remove fog and enhance visibility, a number of visibility enhancement algorithms and methods have been proposed in the past. However, these techniques suffer from several limitations that place strong obstacles to the real world outdoor computer… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Two-Stage Data Selection Scheme for Long-Term Influenza Forecasting

    Jaeuk Moon, Seungwon Jung, Sungwoo Park, Eenjun Hwang*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2945-2959, 2021, DOI:10.32604/cmc.2021.017435

    Abstract One popular strategy to reduce the enormous number of illnesses and deaths from a seasonal influenza pandemic is to obtain the influenza vaccine on time. Usually, vaccine production preparation must be done at least six months in advance, and accurate long-term influenza forecasting is essential for this. Although diverse machine learning models have been proposed for influenza forecasting, they focus on short-term forecasting, and their performance is too dependent on input variables. For a country’s long-term influenza forecasting, typical surveillance data are known to be more effective than diverse external data on the Internet. We propose a two-stage data selection… More >

  • Open Access

    ARTICLE

    Real-Time Dense Reconstruction of Indoor Scene

    Jinxing Niu1,*, Qingsheng Hu1, Yi Niu1, Tao Zhang1, Sunil Kumar Jha2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3713-3724, 2021, DOI:10.32604/cmc.2021.017418

    Abstract Real-time dense reconstruction of indoor scenes is of great research value for the application and development of service robots, augmented reality, cultural relics conservation and other fields. ORB-SLAM2 method is one of the excellent open source algorithms in visual SLAM system, which is often used in indoor scene reconstruction. However, it is time-consuming and can only build sparse scene map by using ORB features to solve camera pose. In view of the shortcomings of ORB-SLAM2 method, this article proposes an improved ORB-SLAM2 solution, which uses a direct method based on light intensity to solve the camera pose. It can greatly… More >

  • Open Access

    ARTICLE

    Development of Social Media Analytics System for Emergency Event Detection and Crisis Management

    Shaheen Khatoon1,*, Majed A. Alshamari1, Amna Asif1, Md Maruf Hasan1, Sherif Abdou2, Khaled Mostafa Elsayed3, Mohsen Rashwan4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3079-3100, 2021, DOI:10.32604/cmc.2021.017371

    Abstract Social media platforms have proven to be effective for information gathering during emergency events caused by natural or human-made disasters. Emergency response authorities, law enforcement agencies, and the public can use this information to gain situational awareness and improve disaster response. In case of emergencies, rapid responses are needed to address victims’ requests for help. The research community has developed many social media platforms and used them effectively for emergency response and coordination in the past. However, most of the present deployments of platforms in crisis management are not automated, and their operational success largely depends on experts who analyze… More >

Displaying 11981-11990 on page 1199 of 22248. Per Page