Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Unconstrained Hand Dorsal Veins Image Database and Recognition System

    Mustafa M. Al Rifaee1,*, Mohammad M. Abdallah1, Mosa I. Salah2, Ayman M. Abdalla1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5063-5073, 2022, DOI:10.32604/cmc.2022.030033

    Abstract Hand veins can be used effectively in biometric recognition since they are internal organs that, in contrast to fingerprints, are robust under external environment effects such as dirt and paper cuts. Moreover, they form a complex rich shape that is unique, even in identical twins, and allows a high degree of freedom. However, most currently employed hand-based biometric systems rely on hand-touch devices to capture images with the desired quality. Since the start of the COVID-19 pandemic, most hand-based biometric systems have become undesirable due to their possible impact on the spread of the pandemic. Consequently, new contactless hand-based biometric… More >

  • Open Access

    ARTICLE

    Mutated Leader Sine-Cosine Algorithm for Secure Smart IoT-Blockchain of Industry 4.0

    Mustufa Haider Abidi*, Hisham Alkhalefah, Muneer Khan Mohammed

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5367-5383, 2022, DOI:10.32604/cmc.2022.030018

    Abstract In modern scenarios, Industry 4.0 entails invention with various advanced technology, and blockchain is one among them. Blockchains are incorporated to enhance privacy, data transparency as well as security for both large and small scale enterprises. Industry 4.0 is considered as a new synthesis fabrication technique that permits the manufacturers to attain their target effectively. However, because numerous devices and machines are involved, data security and privacy are always concerns. To achieve intelligence in Industry 4.0, blockchain technologies can overcome potential cybersecurity constraints. Nowadays, the blockchain and internet of things (IoT) are gaining more attention because of their favorable outcome… More >

  • Open Access

    ARTICLE

    Model for Generating Scale-Free Artificial Social Networks Using Small-World Networks

    Farhan Amin, Gyu Sang Choi*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6367-6391, 2022, DOI:10.32604/cmc.2022.029927

    Abstract The Internet of Things (IoT) has the potential to be applied to social networks due to innovative characteristics and sophisticated solutions that challenge traditional uses. Social network analysis (SNA) is a good example that has recently gained a lot of scientific attention. It has its roots in social and economic research, as well as the evaluation of network science, such as graph theory. Scientists in this area have subverted predefined theories, offering revolutionary ones regarding interconnected networks, and they have highlighted the mystery of six degrees of separation with confirmation of the small-world phenomenon. The motivation of this study is… More >

  • Open Access

    ARTICLE

    An Image Edge Detection Algorithm Based on Multi-Feature Fusion

    Zhenzhou Wang1, Kangyang Li1, Xiang Wang1,*, Antonio Lee2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4995-5009, 2022, DOI:10.32604/cmc.2022.029650

    Abstract Edge detection is one of the core steps of image processing and computer vision. Accurate and fine image edge will make further target detection and semantic segmentation more effective. Holistically-Nested edge detection (HED) edge detection network has been proved to be a deep-learning network with better performance for edge detection. However, it is found that when the HED network is used in overlapping complex multi-edge scenarios for automatic object identification. There will be detected edge incomplete, not smooth and other problems. To solve these problems, an image edge detection algorithm based on improved HED and feature fusion is proposed. On… More >

  • Open Access

    ARTICLE

    Clustered Single-Board Devices with Docker Container Big Stream Processing Architecture

    N. Penchalaiah1, Abeer S. Al-Humaimeedy2, Mashael Maashi3, J. Chinna Babu4,*, Osamah Ibrahim Khalaf5, Theyazn H. H. Aldhyani6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5349-5365, 2022, DOI:10.32604/cmc.2022.029639

    Abstract The expanding amounts of information created by Internet of Things (IoT) devices places a strain on cloud computing, which is often used for data analysis and storage. This paper investigates a different approach based on edge cloud applications, which involves data filtering and processing before being delivered to a backup cloud environment. This Paper suggest designing and implementing a low cost, low power cluster of Single Board Computers (SBC) for this purpose, reducing the amount of data that must be transmitted elsewhere, using Big Data ideas and technology. An Apache Hadoop and Spark Cluster that was used to run a… More >

  • Open Access

    ARTICLE

    Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications

    Muhammad Waqas1,3,*, Shehr Bano2, Fatima Hassan2, Shanshan Tu1, Ghulam Abbas2, Ziaul Haq Abbas4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4489-4499, 2022, DOI:10.32604/cmc.2022.029539

    Abstract Cyber-physical wireless systems have surfaced as an important data communication and networking research area. It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies. Due to their high reliability, sensitivity and connectivity, their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping, spoofing, botnets, man-in-the-middle attack, denial of service (DoS) and distributed denial of service (DDoS) and impersonation. Existing methods use physical layer authentication (PLA), the most promising solution to detect… More >

  • Open Access

    ARTICLE

    Enhancing Blockchain Security Using Ripple Consensus Algorithm

    A. Baseera1, Abeer Abdullah Alsadhan2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4713-4726, 2022, DOI:10.32604/cmc.2022.029538

    Abstract In the development of technology in various fields like big data analysis, data mining, big data, cloud computing, and blockchain technology, security become more constrained. Blockchain is used in providing security by encrypting the sharing of information. Blockchain is applied in the peer-to-peer (P2P) network and it has a decentralized ledger. Providing security against unauthorized breaches in the distributed network is required. To detect unauthorized breaches, there are numerous techniques were developed and those techniques are inefficient and have poor data integrity. Hence, a novel technique needs to be implemented to tackle the new breaches in the distributed network. This… More >

  • Open Access

    ARTICLE

    Optimum Design for the Magnification Mechanisms Employing Fuzzy Logic–ANFIS

    Ngoc Thai Huynh1, Tien V. T. Nguyen2, Quoc Manh Nguyen3,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5961-5983, 2022, DOI:10.32604/cmc.2022.029484

    Abstract To achieve high work performance for compliant mechanisms of motion scope, continuous work condition, and high frequency, we propose a new hybrid algorithm that could be applied to multi-objective optimum design. In this investigation, we use the tools of finite element analysis (FEA) for a magnification mechanism to find out the effects of design variables on the magnification ratio of the mechanism and then select an optimal mechanism that could meet design requirements. A poly-algorithm including the Grey-Taguchi method, fuzzy logic system, and adaptive neuro-fuzzy inference system (ANFIS) algorithm, was utilized mainly in this study. The FEA outcomes indicated that… More >

  • Open Access

    ARTICLE

    NOMA-Based Cooperative Relaying Transmission for the Industrial Internet of Things

    Yinghua Zhang1,*, Rui Cao1, Lixin Tian1, Rong Dai2, Zhennan Cao2, Jim Feng3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6513-6534, 2022, DOI:10.32604/cmc.2022.029467

    Abstract With the continuous maturity of the fifth generation (5G) communications, industrial Internet of Things (IIoT) technology has been widely applied in fields such as smart factories. In smart factories, 5G-based production line monitoring can improve production efficiency and reduce costs, but there are problems with limited monitoring coverage and insufficient wireless spectrum resources, which restricts the application of IIoT in the construction of smart factories. In response to these problems, we propose a hybrid spectrum access mechanism based on Non-Orthogonal Multiple Access (NOMA) cooperative relaying transmission to improve the monitoring coverage and spectrum efficiency. As there are a large number… More >

  • Open Access

    ARTICLE

    Swarming Computational Techniques for the Influenza Disease System

    Sakda Noinang1, Zulqurnain Sabir2, Gilder Cieza Altamirano3, Muhammad Asif Zahoor Raja4, Manuel Jesús Sànchez-Chero5, María-Verónica Seminario-Morales5, Wajaree Weera6,*, Thongchai Botmart6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4851-4868, 2022, DOI:10.32604/cmc.2022.029437

    Abstract The current study relates to designing a swarming computational paradigm to solve the influenza disease system (IDS). The nonlinear system’s mathematical form depends upon four classes: susceptible individuals, infected people, recovered individuals and cross-immune people. The solutions of the IDS are provided by using the artificial neural networks (ANNs) together with the swarming computational paradigm-based particle swarm optimization (PSO) and interior-point scheme (IPA) that are the global and local search approaches. The ANNs-PSO-IPA has never been applied to solve the IDS. Instead a merit function in the sense of mean square error is constructed using the differential form of each… More >

Displaying 6811-6820 on page 682 of 22212. Per Page