Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Heart Disease Risk Prediction Expending of Classification Algorithms

    Nisha Mary1, Bilal Khan1, Abdullah A. Asiri2, Fazal Muhammad3,*, Salman Khan3, Samar Alqhtani4, Khlood M. Mehdar5, Hanan Talal Halwani4, Muhammad Irfan6, Khalaf A. Alshamrani2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6595-6616, 2022, DOI:10.32604/cmc.2022.032384

    Abstract Heart disease prognosis (HDP) is a difficult undertaking that requires knowledge and expertise to predict early on. Heart failure is on the rise as a result of today’s lifestyle. The healthcare business generates a vast volume of patient records, which are challenging to manage manually. When it comes to data mining and machine learning, having a huge volume of data is crucial for getting meaningful information. Several methods for predicting HD have been used by researchers over the last few decades, but the fundamental concern remains the uncertainty factor in the output data, as well as the need to decrease… More >

  • Open Access

    ARTICLE

    Blockchain Driven Metaheuristic Route Planning in Secure Vehicular Adhoc Networks

    Siwar Ben Haj Hassine1, Saud S. Alotaibi2, Hadeel Alsolai3, Reem Alshahrani4, Lilia Kechiche5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Manar Ahmed Hamza8,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6461-6477, 2022, DOI:10.32604/cmc.2022.032353

    Abstract Nowadays, vehicular ad hoc networks (VANET) turn out to be a core portion of intelligent transportation systems (ITSs), that mainly focus on achieving continual Internet connectivity amongst vehicles on the road. The VANET was utilized to enhance driving safety and build an ITS in modern cities. Driving safety is a main portion of VANET, the privacy and security of these messages should be protected. In this aspect, this article presents a blockchain with sunflower optimization enabled route planning scheme (BCSFO-RPS) for secure VANET. The presented BCSFO-RPS model focuses on the identification of routes in such a way that vehicular communication… More >

  • Open Access

    ARTICLE

    Optimized Weighted Ensemble Using Dipper Throated Optimization Algorithm in Metamaterial Antenna

    Doaa Sami Khafaga1, El-Sayed M. El-kenawy2,3, Faten Khalid Karim1,*, Sameer Alshetewi4, Abdelhameed Ibrahim5, Abdelaziz A. Abdelhamid6,7

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5771-5788, 2022, DOI:10.32604/cmc.2022.032229

    Abstract Metamaterial Antennas are a type of antenna that uses metamaterial to enhance performance. The bandwidth restriction associated with small antennas can be solved using metamaterial antennas. Machine learning is gaining popularity as a way to improve solutions in a range of fields. Machine learning approaches are currently a big part of current research, and they’re likely to be huge in the future. The model utilized determines the accuracy of the prediction in large part. The goal of this paper is to develop an optimized ensemble model for forecasting the metamaterial antenna’s bandwidth and gain. The basic models employed in the… More >

  • Open Access

    ARTICLE

    Deep Learning Prediction Model for NiCrAlY Diffusion Barrier Thickness for Tungsten Wires

    Amal H. Alharbi, Hanan A. Hosni Mahmoud*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5755-5769, 2022, DOI:10.32604/cmc.2022.032212

    Abstract In the last decades, technology has used Copper for IC interconnect and it has been the best material used in the wire downsizing. However, Copper is now showing inefficiency as downscaling is getting deeper. Recent research starts to show Tungsten (W) as a possible replacement, for its better downsizing characteristic. The scaling-down of interconnects dimension has to be augmented with thin diffusion layers. It is crucial to subdue tungsten diffusion in the nickel-based thermal spray Flexicord (NiCrAlY) coating layers. Inappropriately, diffusion barriers with thicknesses less than 4.3 nm do not to execute well. With the introduction of two dimensional layers,… More >

  • Open Access

    ARTICLE

    Computational Stochastic Investigations for the Socio-Ecological Dynamics with Reef Ecosystems

    Thongchai Botmart1, Zulqurnain Sabir2,3, Afaf S. Alwabli4, Salem Ben Said2, Qasem Al-Mdallal2, Maria Emilia Camargo5, Wajaree Weera1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5589-5607, 2022, DOI:10.32604/cmc.2022.032087

    Abstract The motive of this work is to present a computational design using the stochastic scaled conjugate gradient (SCG) neural networks (NNs) called as SCGNNs for the socio-ecological dynamics (SED) with reef ecosystems and conservation estimation. The mathematical descriptions of the SED model are provided that is dependent upon five categories, macroalgae M(v), breathing coral C(v), algal turf T(v), the density of parrotfish P(v) and the opinion of human opinion X(v). The stochastic SCGNNs process is applied to formulate the SED model based on the sample statistics, testing, accreditation and training. Three different variations of the SED have been provided to… More >

  • Open Access

    ARTICLE

    An Image Localization System Based on Single Photon

    Yanyi Wu1, Xiaoyu Li2, Qinsheng Zhu1,*, Xiaolei Liu2, Hao Wu1, Shan Yang3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6139-6149, 2022, DOI:10.32604/cmc.2022.032086

    Abstract As an essential part of artificial intelligence, many works focus on image processing which is the branch of computer vision. Nevertheless, image localization faces complex challenges in image processing with image data increases. At the same time, quantum computing has the unique advantages of improving computing power and reducing energy consumption. So, combining the advantage of quantum computing is necessary for studying the quantum image localization algorithms. At present, many quantum image localization algorithms have been proposed, and their efficiency is theoretically higher than the corresponding classical algorithms. But, in quantum computing experiments, quantum gates in quantum computing hardware need… More >

  • Open Access

    ARTICLE

    Blockchain Assisted Intrusion Detection System Using Differential Flower Pollination Model

    Mohammed Altaf Ahmed1, Sara A Althubiti2, Dronamraju Nageswara Rao3, E. Laxmi Lydia4, Woong Cho5, Gyanendra Prasad Joshi6, Sung Won Kim7,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4695-4711, 2022, DOI:10.32604/cmc.2022.032083

    Abstract Cyberattacks are developing gradually sophisticated, requiring effective intrusion detection systems (IDSs) for monitoring computer resources and creating reports on anomalous or suspicious actions. With the popularity of Internet of Things (IoT) technology, the security of IoT networks is developing a vital problem. Because of the huge number and varied kinds of IoT devices, it can be challenging task for protecting the IoT framework utilizing a typical IDS. The typical IDSs have their restrictions once executed to IoT networks because of resource constraints and complexity. Therefore, this paper presents a new Blockchain Assisted Intrusion Detection System using Differential Flower Pollination with… More >

  • Open Access

    ARTICLE

    Metaheuristic with Deep Learning Enabled Biomedical Bone Age Assessment and Classification Model

    Mesfer Al Duhayyim1,*, Areej A. Malibari2, Marwa Obayya3, Mohamed K. Nour4, Ahmed S. Salama5, Mohamed I. Eldesouki6, Abu Sarwar Zamani7, Mohammed Rizwanullah7

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5473-5489, 2022, DOI:10.32604/cmc.2022.031976

    Abstract The skeletal bone age assessment (BAA) was extremely implemented in development prediction and auxiliary analysis of medicinal issues. X-ray images of hands were detected from the estimation of bone age, whereas the ossification centers of epiphysis and carpal bones are important regions. The typical skeletal BAA approaches remove these regions for predicting the bone age, however, few of them attain suitable efficacy or accuracy. Automatic BAA techniques with deep learning (DL) methods are reached the leading efficiency on manual and typical approaches. Therefore, this study introduces an intellectual skeletal bone age assessment and classification with the use of metaheuristic with… More >

  • Open Access

    ARTICLE

    The Kemeny’s Constant and Spanning Trees of Hexagonal Ring Network

    Shahid Zaman1, Ali N. A. Koam2, Ali Al Khabyah2, Ali Ahmad3,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6347-6365, 2022, DOI:10.32604/cmc.2022.031958

    Abstract Spanning tree () has an enormous application in computer science and chemistry to determine the geometric and dynamics analysis of compact polymers. In the field of medicines, it is helpful to recognize the epidemiology of hepatitis C virus (HCV) infection. On the other hand, Kemeny’s constant () is a beneficial quantifier characterizing the universal average activities of a Markov chain. This network invariant infers the expressions of the expected number of time-steps required to trace a randomly selected terminus state since a fixed beginning state . Levene and Loizou determined that the Kemeny’s constant can also be obtained through eigenvalues.… More >

  • Open Access

    ARTICLE

    Intelligent Optimization-Based Clustering with Encryption Technique for Internet of Drones Environment

    Dalia H. Elkamchouchi1, Jaber S. Alzahrani2, Hany Mahgoub3,4, Amal S. Mehanna5, Anwer Mustafa Hilal6,*, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6617-6634, 2022, DOI:10.32604/cmc.2022.031909

    Abstract The recent technological developments have revolutionized the functioning of Wireless Sensor Network (WSN)-based industries with the development of Internet of Things (IoT). Internet of Drones (IoD) is a division under IoT and is utilized for communication amongst drones. While drones are naturally mobile, it undergoes frequent topological changes. Such alterations in the topology cause route election, stability, and scalability problems in IoD. Encryption is considered as an effective method to transmit the images in IoD environment. The current study introduces an Atom Search Optimization based Clustering with Encryption Technique for Secure Internet of Drones (ASOCE-SIoD) environment. The key objective of… More >

Displaying 6731-6740 on page 674 of 22212. Per Page