Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1899-1918, 2021, DOI:10.32604/cmc.2021.015762 - 13 April 2021

    Abstract This paper proposes a method for improving the data security of wireless sensor networks based on blockchain technology. Blockchain technology is applied to data transfer to build a highly secure wireless sensor network. In this network, the relay stations use microcontrollers and embedded devices, and the microcontrollers, such as Raspberry Pi and Arduino Yun, represents mobile databases. The proposed system uses microcontrollers to facilitate the connection of various sensor devices. By adopting blockchain encryption, the security of sensing data can be effectively improved. A blockchain is a concatenated transaction record that is protected by cryptography.… More >

  • Open Access

    ARTICLE

    Enhancement of Sentiment Analysis Using Clause and Discourse Connectives

    Kumari Sheeja Saraswathy, Sobha Lalitha Devi*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1983-1999, 2021, DOI:10.32604/cmc.2021.015661 - 13 April 2021

    Abstract The sentiment of a text depends on the clausal structure of the sentence and the connectives’ discourse arguments. In this work, the clause boundary, discourse argument, and syntactic and semantic information of the sentence are used to assign the text’s sentiment. The clause boundaries identify the span of the text, and the discourse connectives identify the arguments. Since the lexicon-based analysis of traditional sentiment analysis gives the wrong sentiment of the sentence, a deeper-level semantic analysis is required for the correct analysis of sentiments. Hence, in this study, explicit connectives in Malayalam are considered to More >

  • Open Access

    ARTICLE

    Code Smell Detection Using Whale Optimization Algorithm

    Moatasem M. Draz1, Marwa S. Farhan2,3,*, Sarah N. Abdulkader4,5, M. G. Gafar6,7

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1919-1935, 2021, DOI:10.32604/cmc.2021.015586 - 13 April 2021

    Abstract Software systems have been employed in many fields as a means to reduce human efforts; consequently, stakeholders are interested in more updates of their capabilities. Code smells arise as one of the obstacles in the software industry. They are characteristics of software source code that indicate a deeper problem in design. These smells appear not only in the design but also in software implementation. Code smells introduce bugs, affect software maintainability, and lead to higher maintenance costs. Uncovering code smells can be formulated as an optimization problem of finding the best detection rules. Although researchers… More >

  • Open Access

    ARTICLE

    Quranic Script Optical Text Recognition Using Deep Learning in IoT Systems

    Mahmoud Badry1,*, Mohammed Hassanin1,2, Asghar Chandio2,3, Nour Moustafa2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1847-1858, 2021, DOI:10.32604/cmc.2021.015489 - 13 April 2021

    Abstract Since the worldwide spread of internet-connected devices and rapid advances made in Internet of Things (IoT) systems, much research has been done in using machine learning methods to recognize IoT sensors data. This is particularly the case for optical character recognition of handwritten scripts. Recognizing text in images has several useful applications, including content-based image retrieval, searching and document archiving. The Arabic language is one of the mostly used tongues in the world. However, Arabic text recognition in imagery is still very much in the nascent stage, especially handwritten text. This is mainly due to… More >

  • Open Access

    ARTICLE

    Eye Gaze Detection Based on Computational Visual Perception and Facial Landmarks

    Debajit Datta1, Pramod Kumar Maurya1, Kathiravan Srinivasan2, Chuan-Yu Chang3,*, Rishav Agarwal1, Ishita Tuteja1, V. Bhavyashri Vedula1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2545-2561, 2021, DOI:10.32604/cmc.2021.015478 - 13 April 2021

    Abstract The pandemic situation in 2020 brought about a ‘digitized new normal’ and created various issues within the current education systems. One of the issues is the monitoring of students during online examination situations. A system to determine the student’s eye gazes during an examination can help to eradicate malpractices. In this work, we track the users’ eye gazes by incorporating twelve facial landmarks around both eyes in conjunction with computer vision and the HAAR classifier. We aim to implement eye gaze detection by considering facial landmarks with two different Convolutional Neural Network (CNN) models, namely More >

  • Open Access

    ARTICLE

    Black Hole and Sink Hole Attack Detection in Wireless Body Area Networks

    Rajesh Kumar Dhanaraj1, Lalitha Krishnasamy2, Oana Geman3,*, Diana Roxana Izdrui4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1949-1965, 2021, DOI:10.32604/cmc.2021.015363 - 13 April 2021

    Abstract In Wireless Body Area Networks (WBANs) with respect to health care, sensors are positioned inside the body of an individual to transfer sensed data to a central station periodically. The great challenges posed to healthcare WBANs are the black hole and sink hole attacks. Data from deployed sensor nodes are attracted by sink hole or black hole nodes while grabbing the shortest path. Identifying this issue is quite a challenging task as a small variation in medicine intake may result in a severe illness. This work proposes a hybrid detection framework for attacks by applying… More >

  • Open Access

    ARTICLE

    Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records

    Mueen Uddin1,*, M. S. Memon2, Irfana Memon2, Imtiaz Ali2, Jamshed Memon3, Maha Abdelhaq4, Raed Alsaqour5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2377-2397, 2021, DOI:10.32604/cmc.2021.015354 - 13 April 2021

    Abstract Background: Electronic Health Record (EHR) systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally. However, the existing EHR systems mostly lack in providing appropriate security, entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures. Objective: To solve this delicate problem, we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems. Methodology: In our EHR blockchain system, Peer nodes from various organizations (stakeholders)… More >

  • Open Access

    ARTICLE

    Machine Learning Techniques Applied to Electronic Healthcare Records to Predict Cancer Patient Survivability

    Ornela Bardhi1,2,*, Begonya Garcia Zapirain1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1595-1613, 2021, DOI:10.32604/cmc.2021.015326 - 13 April 2021

    Abstract Breast cancer (BCa) and prostate cancer (PCa) are the two most common types of cancer. Various factors play a role in these cancers, and discovering the most important ones might help patients live longer, better lives. This study aims to determine the variables that most affect patient survivability, and how the use of different machine learning algorithms can assist in such predictions. The AURIA database was used, which contains electronic healthcare records (EHRs) of 20,006 individual patients diagnosed with either breast or prostate cancer in a particular region in Finland. In total, there were 178… More >

  • Open Access

    ARTICLE

    Using Semantic Web Technologies to Improve the Extract Transform Load Model

    Amena Mahmoud1,*, Mahmoud Y. Shams2, O. M. Elzeki3, Nancy Awadallah Awad4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2711-2726, 2021, DOI:10.32604/cmc.2021.015293 - 13 April 2021

    Abstract Semantic Web (SW) provides new opportunities for the study and application of big data, massive ranges of data sets in varied formats from multiple sources. Related studies focus on potential SW technologies for resolving big data problems, such as structurally and semantically heterogeneous data that result from the variety of data formats (structured, semi-structured, numeric, unstructured text data, email, video, audio, stock ticker). SW offers information semantically both for people and machines to retain the vast volume of data and provide a meaningful output of unstructured data. In the current research, we implement a new… More >

  • Open Access

    ARTICLE

    Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks

    Hafsa Shahid1, Humaira Ashraf1, Hafsa Javed1, Mamoona Humayun2, Nz Jhanjhi3,*, Mohammed A. AlZain4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1967-1981, 2021, DOI:10.32604/cmc.2021.015259 - 13 April 2021

    Abstract An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the… More >

Displaying 18211-18220 on page 1822 of 31589. Per Page