Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    Muhammad Adil1, Jehad Ali2, Muhammad Sajjad Khan3, Junsu Kim3, Ryan Alturki4, Mohammad Zakarya4, Mukhtaj Khan4, Rahim Khan4, Su Min Kim3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967

    Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and round-trip time (RTT) information to… More >

  • Open Access

    ARTICLE

    Down to Zero Size of VoIP Packet Payload

    Mosleh M. Abualhaj*, Qusai Y. Shambour, Abdelrahman H. Hussein, Qasem M. Kharma

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1271-1283, 2021, DOI:10.32604/cmc.2021.014928

    Abstract Voice over Internet Protocol (VoIP) is widely used by companies, schools, universities, and other institutions. However, VoIP faces many issues that slow down its propagation. An important issue is poor utilization of the VoIP service network bandwidth, which results from the large header of the VoIP packet. The objective of this study is to handle this poor utilization of the network bandwidth. Therefore, this study proposes a novel method to address this large header overhead problem. The proposed method is called zero size payload (ZSP), which aims to reemploy and use the header information (fields) of the VoIP packet that… More >

  • Open Access

    ARTICLE

    A Machine Learning Based Algorithm to Process Partial Shading Effects in PV Arrays

    Kamran Sadiq Awan1, Tahir Mahmood1, Mohammad Shorfuzzaman2, Rashid Ali3, Raja Majid Mehmood4,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 29-43, 2021, DOI:10.32604/cmc.2021.014824

    Abstract Solar energy is a widely used type of renewable energy. Photovoltaic arrays are used to harvest solar energy. The major goal, in harvesting the maximum possible power, is to operate the system at its maximum power point (MPP). If the irradiation conditions are uniform, the P-V curve of the PV array has only one peak that is called its MPP. But when the irradiation conditions are non-uniform, the P-V curve has multiple peaks. Each peak represents an MPP for a specific irradiation condition. The highest of all the peaks is called Global Maximum Power Point (GMPP). Under uniform irradiation conditions,… More >

  • Open Access

    ARTICLE

    Blockchain-as-a-Utility for Next-Generation Healthcare Internet of Things

    Alaa Omran Almagrabi1, Rashid Ali2, Daniyal Alghazzawi1, Abdullah AlBarakati1, Tahir Khurshaid3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 359-376, 2021, DOI:10.32604/cmc.2021.014753

    Abstract The scope of the Internet of Things (IoT) applications varies from strategic applications, such as smart grids, smart transportation, smart security, and smart healthcare, to industrial applications such as smart manufacturing, smart logistics, smart banking, and smart insurance. In the advancement of the IoT, connected devices become smart and intelligent with the help of sensors and actuators. However, issues and challenges need to be addressed regarding the data reliability and protection for significant next-generation IoT applications like smart healthcare. For these next-generation applications, there is a requirement for far-reaching privacy and security in the IoT. Recently, blockchain systems have emerged… More >

  • Open Access

    ARTICLE

    COVID-19 and Learning Styles: GCET as Case Study

    Mazhar Hussain Malik1,*, Amjed Sid Ahmed1, Sulaiman Al Hasani2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 103-115, 2021, DOI:10.32604/cmc.2021.014562

    Abstract The COVID-19 pandemic has caused higher educational institutions around the world to close campus-based activities and move to online delivery. The aim of this paper is to present the case of Global College of Engineering and Technology (GCET) and how its practices including teaching, students/staff support, assessments, and exam policies were affected. The paper investigates the mediating role of no detriment policy impact on students’ result along with the challenges faced by the higher educational institution, recommendations and suggestions. The investigation concludes that the strategies adopted for online delivery, student support, assessments and exam policies have helped students to effectively… More >

  • Open Access

    ARTICLE

    Nature-Inspired Level Set Segmentation Model for 3D-MRI Brain Tumor Detection

    Oday Ali Hassen1, Sarmad Omar Abter2, Ansam A. Abdulhussein3, Saad M. Darwish4,*, Yasmine M. Ibrahim4, Walaa Sheta5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 961-981, 2021, DOI:10.32604/cmc.2021.014404

    Abstract Medical image segmentation has consistently been a significant topic of research and a prominent goal, particularly in computer vision. Brain tumor research plays a major role in medical imaging applications by providing a tremendous amount of anatomical and functional knowledge that enhances and allows easy diagnosis and disease therapy preparation. To prevent or minimize manual segmentation error, automated tumor segmentation, and detection became the most demanding process for radiologists and physicians as the tumor often has complex structures. Many methods for detection and segmentation presently exist, but all lack high accuracy. This paper’s key contribution focuses on evaluating machine learning… More >

  • Open Access

    ARTICLE

    Second Law Analysis of Magneto Radiative GO-MoS2/H2O–(CH2OH)2 Hybrid Nanofluid

    Adnan1, Umar Khan2, Naveed Ahmed3, Syed Tauseef Mohyud-Din4, Dumitru Baleanu5,6,7, Kottakkaran Sooppy Nisar8, Ilyas Khan9,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 213-228, 2021, DOI:10.32604/cmc.2021.014383

    Abstract Entropy Generation Optimization (EGO) attained huge interest of scientists and researchers due to its numerous applications comprised in mechanical engineering, air conditioners, heat engines, thermal machines, heat exchange, refrigerators, heat pumps and substance mixing etc. Therefore, the study of radiative hybrid nanofluid (GO-MoS2/C2H6O2–H2O) and the conventional nanofluid (MoS2/C2H6O2–H2O) is conducted in the presence of Lorentz forces. The flow configuration is modeled between the parallel rotating plates in which the lower plate is permeable. The models which govern the flow in rotating system are solved numerically over the domain of interest and furnished the results for the temperature, entropy generation and… More >

  • Open Access

    ARTICLE

    IPv6 Cryptographically Generated Address: Analysis, Optimization and Protection

    Amjed Sid Ahmed1,*, Rosilah Hassan2, Faizan Qamar3, Mazhar Malik1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 247-265, 2021, DOI:10.32604/cmc.2021.014233

    Abstract In networking, one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers. To resolve this issue, the use of self-certifying addresses have become a highly popular and standardized method, of which Cryptographically Generated Addresses (CGA) is a prime example. CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership. Even though the CGA technique is highly effective, this method is still subject to several vulnerabilities with respect to… More >

  • Open Access

    ARTICLE

    Spatio-Temporal Dynamics and Structure Preserving Algorithm for Computer Virus Model

    Nauman Ahmed1,2, Umbreen Fatima1, Shahzaib Iqbal1, Ali Raza3, Muhammad Rafiq4,*, Muhammad Aziz-ur-Rehman2, Shehla Saeed1, Ilyas Khan5, Kottakkaran Sooppy Nisar6

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 201-212, 2021, DOI:10.32604/cmc.2021.014171

    Abstract The present work is related to the numerical investigation of the spatio-temporal susceptible-latent-breaking out-recovered (SLBR) epidemic model. It describes the computer virus dynamics with vertical transmission via the internet. In these types of dynamics models, the absolute values of the state variables are the fundamental requirement that must be fulfilled by the numerical design. By taking into account this key property, the positivity preserving algorithm is designed to solve the underlying SLBR system. Since, the state variables associated with the phenomenon, represent the computer nodes, so they must take in absolute. Moreover, the continuous system (SLBR) acquires two steady states… More >

  • Open Access

    ARTICLE

    Kumaraswamy Inverted Topp–Leone Distribution with Applications to COVID-19 Data

    Amal S. Hassan1, Ehab M. Almetwally2,*, Gamal M. Ibrahim3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 337-358, 2021, DOI:10.32604/cmc.2021.013971

    Abstract In this paper, an attempt is made to discover the distribution of COVID-19 spread in different countries such as; Saudi Arabia, Italy, Argentina and Angola by specifying an optimal statistical distribution for analyzing the mortality rate of COVID-19. A new generalization of the recently inverted Topp Leone distribution, called Kumaraswamy inverted Topp–Leone distribution, is proposed by combining the Kumaraswamy-G family and the inverted Topp–Leone distribution. We initially provide a linear representation of its density function. We give some of its structure properties, such as quantile function, median, moments, incomplete moments, Lorenz and Bonferroni curves, entropies measures and stress-strength reliability. Then,… More >

Displaying 12531-12540 on page 1254 of 22225. Per Page