Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    URL Phishing Detection Using Particle Swarm Optimization and Data Mining

    Saeed M. Alshahrani1, Nayyar Ahmed Khan1,*, Jameel Almalki2, Waleed Al Shehri2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5625-5640, 2022, DOI:10.32604/cmc.2022.030982

    Abstract The continuous destruction and frauds prevailing due to phishing URLs make it an indispensable area for research. Various techniques are adopted in the detection process, including neural networks, machine learning, or hybrid techniques. A novel detection model is proposed that uses data mining with the Particle Swarm Optimization technique (PSO) to increase and empower the method of detecting phishing URLs. Feature selection based on various techniques to identify the phishing candidates from the URL is conducted. In this approach, the features mined from the URL are extracted using data mining rules. The features are selected on the basis of URL… More >

  • Open Access

    ARTICLE

    A Deep Real-Time Fire Prediction Parallel D-CNN Model on UDOO BOLT V8

    Amal H. Alharbi, Hanan A. Hosni Mahmoud*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6237-6252, 2022, DOI:10.32604/cmc.2022.030963

    Abstract Hazardous incidences have significant influences on human life, and fire is one of the foremost causes of such hazard in most nations. Fire prediction and classification model from a set of fire images can decrease the risk of losing human lives and assets. Timely promotion of fire emergency can be of great aid. Therefore, construction of these prediction models is relevant and critical. This article proposes an operative fire prediction model that depends on a prediction unit embedded in the processor UDOO BOLT V8 hardware to predict fires in real time. A fire image database is improved to enhance the… More >

  • Open Access

    ARTICLE

    K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks

    Khalid Hamid1, Muhammad Waseem Iqbal2,*, Erssa Arif1, Yasir Mahmood3,4, Ahmad Salman Khan3, Nazri Kama4, Azri Azmi4, Atif Ikram5,6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5423-5440, 2022, DOI:10.32604/cmc.2022.030927

    Abstract Any number that can be uniquely determined by a graph is called graph invariants. During the most recent twenty years’ innumerable numerical graph invariants have been described and used for correlation analysis. In the fast and advanced environment of manufacturing of networks and other products which used different networks, no dependable assessment has been embraced to choose, how much these invariants are connected with a network graph or molecular graph. In this paper, it will talk about three distinct variations of bridge networks with great capability of expectation in the field of computer science, chemistry, physics, drug industry, informatics, and… More >

  • Open Access

    ARTICLE

    Enhanced Heap-Based Optimizer Algorithm for Solving Team Formation Problem

    Nashwa Nageh1, Ahmed Elshamy1, Abdel Wahab Said Hassan1, Mostafa Sami2, Mustafa Abdul Salam3,4,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5245-5268, 2022, DOI:10.32604/cmc.2022.030906

    Abstract Team Formation (TF) is considered one of the most significant problems in computer science and optimization. TF is defined as forming the best team of experts in a social network to complete a task with least cost. Many real-world problems, such as task assignment, vehicle routing, nurse scheduling, resource allocation, and airline crew scheduling, are based on the TF problem. TF has been shown to be a Nondeterministic Polynomial time (NP) problem, and high-dimensional problem with several local optima that can be solved using efficient approximation algorithms. This paper proposes two improved swarm-based algorithms for solving team formation problem. The… More >

  • Open Access

    ARTICLE

    Wearable UWB Antenna-Based Bending and Wet Performances for Breast Cancer Detection

    Ali Hanafiah Rambe1, Muzammil Jusoh2,3, Samir Salem Al-Bawri4,5,*, Mahmoud A. Abdelghany6,7

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5575-5587, 2022, DOI:10.32604/cmc.2022.030902

    Abstract This paper proposed integrating the communication system on the garment, which can be utilized to detect breast cancer at an early stage by using an ultra-wideband (UWB) wearable antenna. Breast cancer is an abnormal cell that is located in the breast tissue. Early detection of breast cancer plays an important role, and it helps in the long term for all women. The proposed UWB wearable antenna successfully operates at 3.1–10.6 GHz under an acceptable reflection coefficient of −10 dB. The fabricated wearable antenna was made from Shieldit Super and felt both conductive and nonconductive wearable materials. Few measurement studies of… More >

  • Open Access

    ARTICLE

    Swarming Computational Efficiency to Solve a Novel Third-Order Delay Differential Emden-Fowler System

    Wajaree Weera1, Zulqurnain Sabir2, Muhammad Asif Zahoor Raja3, Sakda Noinang4, Thongchai Botmart1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4833-4849, 2022, DOI:10.32604/cmc.2022.030888

    Abstract The purpose of this research is to construct an integrated neuro swarming scheme using the procedures of the artificial neural networks (ANNs) with the use of global search particle swarm optimization (PSO) along with the competent local search interior-point programming (IPP) called as ANN-PSOIPP. The proposed computational scheme is implemented for the numerical simulations of the third order nonlinear delay differential Emden-Fowler model (TON-DD-EFM). The TON-DD-EFM is based on two types along with the particulars of shape factor, delayed terms, and singular points. A merit function is performed using the optimization of PSOIPP to find the solutions to the TON-DD-EFM.… More >

  • Open Access

    ARTICLE

    Association Rule Analysis-Based Identification of Influential Users in the Social Media

    Saqib Iqbal1, Rehan Khan2, Hikmat Ullah Khan2,*, Fawaz Khaled Alarfaj4, Abdullah Mohammed Alomair3, Muzamil Ahmed2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6479-6493, 2022, DOI:10.32604/cmc.2022.030881

    Abstract The exchange of information is an innate and natural process that assist in content dispersal. Social networking sites emerge to enrich their users by providing the facility for sharing information and social interaction. The extensive adoption of social networking sites also resulted in user content generation. There are diverse research areas explored by the researchers to investigate the influence of social media on users and confirmed that social media sites have a significant impact on markets, politics and social life. Facebook is extensively used platform to share information, thoughts and opinions through posts and comments. The identification of influential users… More >

  • Open Access

    ARTICLE

    Swarm Optimization and Machine Learning for Android Malware Detection

    K. Santosh Jhansi1,2,*, P. Ravi Kiran Varma2, Sujata Chakravarty3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6327-6345, 2022, DOI:10.32604/cmc.2022.030878

    Abstract Malware Security Intelligence constitutes the analysis of applications and their associated metadata for possible security threats. Application Programming Interfaces (API) calls contain valuable information that can help with malware identification. The malware analysis with reduced feature space helps for the efficient identification of malware. The goal of this research is to find the most informative features of API calls to improve the android malware detection accuracy. Three swarm optimization methods, viz., Ant Lion Optimization (ALO), Cuckoo Search Optimization (CSO), and Firefly Optimization (FO) are applied to API calls using auto-encoders for identification of most influential features. The nature-inspired wrapper-based algorithms… More >

  • Open Access

    ARTICLE

    A Novel Multiple Dependent State Sampling Plan Based on Time Truncated Life Tests Using Mean Lifetime

    Pramote Charongrattanasakul1, Wimonmas Bamrungsetthapong2,*, Poom Kumam3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4611-4626, 2022, DOI:10.32604/cmc.2022.030856

    Abstract The design of a new adaptive version of the multiple dependent state (AMDS) sampling plan is presented based on the time truncated life test under the Weibull distribution. We achieved the proposed sampling plan by applying the concept of the double sampling plan and existing multiple dependent state sampling plans. A warning sign for acceptance number was proposed to increase the probability of current lot acceptance. The optimal plan parameters were determined simultaneously with nonlinear optimization problems under the producer’s risk and consumer’s risk. A simulation study was presented to support the proposed sampling plan. A comparison between the proposed… More >

  • Open Access

    ARTICLE

    A Decision-Based Hybrid Proxy Mobile IPv6 Scheme for Better Resources Utilization

    Habib Ullah Khan1,*, Anwar Hussain2, Shah Nazir2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5151-5167, 2022, DOI:10.32604/cmc.2022.030837

    Abstract Seamless mobility is always one of the major requirements of modern-day communication. In a heterogeneous and massive IoT environment, efficient network-based mobility protocol such as proxy mobile IPv6 (PMIPv6), is potentially a good candidate for efficient mobility as well as resource utilization efficiency. Several extensions are devised for performance in the research domain. However, a multi-criterion decision-based resource-efficient PMIPv6 extension is required to achieve efficiency when network resources are overloaded. In this research, a multi-criterion decision-based PMIPv6 scheme is devised that provides better performance when the Local Mobility Anchor (LMA) or Mobile Access Gateway (MAG) is overloaded. The objective is… More >

Displaying 6781-6790 on page 679 of 22212. Per Page