Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    An Online Chronic Disease Prediction System Based on Incremental Deep Neural Network

    Bin Yang1,*, Lingyun Xiang2, Xianyi Chen3, Wenjing Jia4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 951-964, 2021, DOI:10.32604/cmc.2021.014839

    Abstract Many chronic disease prediction methods have been proposed to predict or evaluate diabetes through artificial neural network. However, due to the complexity of the human body, there are still many challenges to face in that process. One of them is how to make the neural network prediction model continuously adapt and learn disease data of different patients, online. This paper presents a novel chronic disease prediction system based on an incremental deep neural network. The propensity of users suffering from chronic diseases can continuously be evaluated in an incremental manner. With time, the system can predict diabetes more and more… More >

  • Open Access

    ARTICLE

    Tele-COVID: A Telemedicine SOA-Based Architectural Design for COVID-19 Patients

    Asadullah Shaikh*, Mana Saleh AlReshan, Yousef Asiri, Adel Sulaiman, Hani Alshahrani

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 549-576, 2021, DOI:10.32604/cmc.2021.014813

    Abstract In Wuhan, China, a novel Corona Virus (COVID-19) was detected in December 2019; it has changed the entire world and to date, the number of diagnosed cases is 38,756,2891 and 1,095,2161 people have died. This happened because a large number of people got affected and there is a lack of hospitals for COVID-19 patients. One of the precautionary measures for COVID-19 patients is isolation. To support this, there is an urgent need for a platform that makes treatment possible from a distance. Telemedicine systems have been drastically increasing in number and size over recent years. This increasing number intensifies the… More >

  • Open Access

    ARTICLE

    An Efficient Sound and Data Steganography Based Secure Authentication System

    Debajit Datta1, Lalit Garg2,*, Kathiravan Srinivasan3, Atsushi Inoue4, G. Thippa Reddy3, M. Praveen Kumar Reddy3, K. Ramesh5, Nidal Nasser6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 723-751, 2021, DOI:10.32604/cmc.2021.014802

    Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into… More >

  • Open Access

    ARTICLE

    High Order Block Method for Third Order ODEs

    A. I. Asnor1, S. A. M. Yatim1, Z. B. Ibrahim2, N. Zainuddin3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1253-1267, 2021, DOI:10.32604/cmc.2021.014781

    Abstract Many initial value problems are difficult to be solved using ordinary, explicit step-by-step methods because most of these problems are considered stiff. Certain implicit methods, however, are capable of solving stiff ordinary differential equations (ODEs) usually found in most applied problems. This study aims to develop a new numerical method, namely the high order variable step variable order block backward differentiation formula (VSVO-HOBBDF) for the main purpose of approximating the solutions of third order ODEs. The computational work of the VSVO-HOBBDF method was carried out using the strategy of varying the step size and order in a single code. The… More >

  • Open Access

    ARTICLE

    Hacking Anti-Shoplifting System to Hide Data within Clothes

    Al Hussien Seddik Saad1,*, E. H. Hafez2, Zubair Ahmad3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 659-674, 2021, DOI:10.32604/cmc.2021.014758

    Abstract Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The… More >

  • Open Access

    ARTICLE

    Collision Observation-Based Optimization of Low-Power and Lossy IoT Network Using Reinforcement Learning

    Arslan Musaddiq1, Rashid Ali2, Jin-Ghoo Choi1, Byung-Seo Kim3,*, Sung-Won Kim1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 799-814, 2021, DOI:10.32604/cmc.2021.014751

    Abstract The Internet of Things (IoT) has numerous applications in every domain, e.g., smart cities to provide intelligent services to sustainable cities. The next-generation of IoT networks is expected to be densely deployed in a resource-constrained and lossy environment. The densely deployed nodes producing radically heterogeneous traffic pattern causes congestion and collision in the network. At the medium access control (MAC) layer, mitigating channel collision is still one of the main challenges of future IoT networks. Similarly, the standardized network layer uses a ranking mechanism based on hop-counts and expected transmission counts (ETX), which often does not adapt to the dynamic… More >

  • Open Access

    ARTICLE

    Detecting Information on the Spread of Dengue on Twitter Using Artificial Neural Networks

    Samina Amin1,*, M. Irfan Uddin1, M. Ali Zeb1, Ala Abdulsalam Alarood2, Marwan Mahmoud3, Monagi H. Alkinani4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1317-1332, 2021, DOI:10.32604/cmc.2021.014733

    Abstract Social media platforms have lately emerged as a promising tool for predicting the outbreak of epidemics by analyzing information on them with the help of machine learning techniques. Many analytical and statistical models are available to infer a variety of user sentiments in posts on social media. The amount of data generated by social media platforms, such as Twitter, that can be used to track diseases is increasing rapidly. This paper proposes a method for the classification of tweets related to the outbreak of dengue using machine learning algorithms. An artificial neural network (ANN)-based method is developed using Global Vector… More >

  • Open Access

    ARTICLE

    COVID-19 and Unemployment: A Novel Bi-Level Optimal Control Model

    Ibrahim M. Hezam1,2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1153-1167, 2021, DOI:10.32604/cmc.2021.014710

    Abstract Since COVID-19 was declared as a pandemic in March 2020, the world’s major preoccupation has been to curb it while preserving the economy and reducing unemployment. This paper uses a novel Bi-Level Dynamic Optimal Control model (BLDOC) to coordinate control between COVID-19 and unemployment. The COVID-19 model is the upper level while the unemployment model is the lower level of the bi-level dynamic optimal control model. The BLDOC model’s main objectives are to minimize the number of individuals infected with COVID-19 and to minimize the unemployed individuals, and at the same time minimizing the cost of the containment strategies. We… More >

  • Open Access

    ARTICLE

    Detection Technique of Software-Induced Rowhammer Attacks

    Minkyung Lee1, Jin Kwak2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 349-367, 2021, DOI:10.32604/cmc.2021.014700

    Abstract Side-channel attacks have recently progressed into software-induced attacks. In particular, a rowhammer attack, which exploits the characteristics of dynamic random access memory (DRAM), can quickly and continuously access the cells as the cell density of DRAM increases, thereby generating a disturbance error affecting the neighboring cells, resulting in bit flips. Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits, it has been reported that it can be exploited on various platforms such as mobile devices, web browsers, and virtual machines. Furthermore, there have been studies on bypassing the defense measures… More >

  • Open Access

    ARTICLE

    Optimal Reordering Trace Files for Improving Software Testing Suitcase

    Yingfu Cai1, Sultan Noman Qasem2,3, Harish Garg4, Hamïd Parvïn5,6,7,*, Kim-Hung Pho8, Zulkefli Mansor9

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1225-1239, 2021, DOI:10.32604/cmc.2021.014699

    Abstract An invariant can be described as an essential relationship between program variables. The invariants are very useful in software checking and verification. The tools that are used to detect invariants are invariant detectors. There are two types of invariant detectors: dynamic invariant detectors and static invariant detectors. Daikon software is an available computer program that implements a special case of a dynamic invariant detection algorithm. Daikon proposes a dynamic invariant detection algorithm based on several runs of the tested program; then, it gathers the values of its variables, and finally, it detects relationships between the variables based on a simple… More >

Displaying 13091-13100 on page 1310 of 22248. Per Page