Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Exploiting Data Science for Measuring the Performance of Technology Stocks

    Tahir Sher1, Abdul Rehman2, Dongsun Kim2,*, Imran Ihsan1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2979-2995, 2023, DOI:10.32604/cmc.2023.036553 - 08 October 2023

    Abstract The rise or fall of the stock markets directly affects investors’ interest and loyalty. Therefore, it is necessary to measure the performance of stocks in the market in advance to prevent our assets from suffering significant losses. In our proposed study, six supervised machine learning (ML) strategies and deep learning (DL) models with long short-term memory (LSTM) of data science was deployed for thorough analysis and measurement of the performance of the technology stocks. Under discussion are Apple Inc. (AAPL), Microsoft Corporation (MSFT), Broadcom Inc., Taiwan Semiconductor Manufacturing Company Limited (TSM), NVIDIA Corporation (NVDA), and… More >

  • Open Access

    ARTICLE

    An Air Defense Weapon Target Assignment Method Based on Multi-Objective Artificial Bee Colony Algorithm

    Huaixi Xing*, Qinghua Xing

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2685-2705, 2023, DOI:10.32604/cmc.2023.036223 - 08 October 2023

    Abstract With the advancement of combat equipment technology and combat concepts, new requirements have been put forward for air defense operations during a group target attack. To achieve high-efficiency and low-loss defensive operations, a reasonable air defense weapon assignment strategy is a key step. In this paper, a multi-objective and multi-constraints weapon target assignment (WTA) model is established that aims to minimize the defensive resource loss, minimize total weapon consumption, and minimize the target residual effectiveness. An optimization framework of air defense weapon mission scheduling based on the multi-objective artificial bee colony (MOABC) algorithm is proposed.… More >

  • Open Access

    ARTICLE

    CNN Based Features Extraction and Selection Using EPO Optimizer for Cotton Leaf Diseases Classification

    Mehwish Zafar1, Javeria Amin2, Muhammad Sharif1, Muhammad Almas Anjum3, Seifedine Kadry4,5,6, Jungeun Kim7,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2779-2793, 2023, DOI:10.32604/cmc.2023.035860 - 08 October 2023

    Abstract Worldwide cotton is the most profitable cash crop. Each year the production of this crop suffers because of several diseases. At an early stage, computerized methods are used for disease detection that may reduce the loss in the production of cotton. Although several methods are proposed for the detection of cotton diseases, however, still there are limitations because of low-quality images, size, shape, variations in orientation, and complex background. Due to these factors, there is a need for novel methods for features extraction/selection for the accurate cotton disease classification. Therefore in this research, an optimized… More >

  • Open Access

    ARTICLE

    Improved Shark Smell Optimization Algorithm for Human Action Recognition

    Inzamam Mashood Nasir1,*, Mudassar Raza1, Jamal Hussain Shah1, Muhammad Attique Khan2, Yun-Cheol Nam3, Yunyoung Nam4,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2667-2684, 2023, DOI:10.32604/cmc.2023.035214 - 08 October 2023

    Abstract Human Action Recognition (HAR) in uncontrolled environments targets to recognition of different actions from a video. An effective HAR model can be employed for an application like human-computer interaction, health care, person tracking, and video surveillance. Machine Learning (ML) approaches, specifically, Convolutional Neural Network (CNN) models had been widely used and achieved impressive results through feature fusion. The accuracy and effectiveness of these models continue to be the biggest challenge in this field. In this article, a novel feature optimization algorithm, called improved Shark Smell Optimization (iSSO) is proposed to reduce the redundancy of extracted… More >

  • Open Access

    ARTICLE

    A Data Consistency Insurance Method for Smart Contract

    Jing Deng1, Xiaofei Xing1, Guoqiang Deng2,*, Ning Hu3, Shen Su3, Le Wang3, Md Zakirul Alam Bhuiyan4

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3783-3795, 2023, DOI:10.32604/cmc.2023.034116 - 08 October 2023

    Abstract As one of the major threats to the current DeFi (Decentralized Finance) ecosystem, reentrant attack induces data inconsistency of the victim smart contract, enabling attackers to steal on-chain assets from DeFi projects, which could terribly do harm to the confidence of the blockchain investors. However, protecting DeFi projects from the reentrant attack is very difficult, since generating a call loop within the highly automatic DeFi ecosystem could be very practicable. Existing researchers mainly focus on the detection of the reentrant vulnerabilities in the code testing, and no method could promise the non-existent of reentrant vulnerabilities. More >

  • Open Access

    ARTICLE

    A Secure and Efficient Information Authentication Scheme for E-Healthcare System

    Naveed Khan1, Jianbiao Zhang1,*, Ghulam Ali Mallah2, Shehzad Ashraf Chaudhry3

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3877-3896, 2023, DOI:10.32604/cmc.2023.032553 - 08 October 2023

    Abstract The mobile cellular network provides internet connectivity for heterogeneous Internet of Things (IoT) devices. The cellular network consists of several towers installed at appropriate locations within a smart city. These cellular towers can be utilized for various tasks, such as e-healthcare systems, smart city surveillance, traffic monitoring, infrastructure surveillance, or sidewalk checking. Security is a primary concern in data broadcasting, particularly authentication, because the strength of a cellular network’s signal is much higher frequency than the associated one, and their frequencies can sometimes be aligned, posing a significant challenge. As a result, that requires attention, More >

  • Open Access

    ARTICLE

    3-D Gait Identification Utilizing Latent Canonical Covariates Consisting of Gait Features

    Ramiz Gorkem Birdal*, Ahmet Sertbas

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2727-2744, 2023, DOI:10.32604/cmc.2023.032069 - 08 October 2023

    Abstract Biometric gait recognition is a lesser-known but emerging and effective biometric recognition method which enables subjects’ walking patterns to be recognized. Existing research in this area has primarily focused on feature analysis through the extraction of individual features, which captures most of the information but fails to capture subtle variations in gait dynamics. Therefore, a novel feature taxonomy and an approach for deriving a relationship between a function of one set of gait features with another set are introduced. The gait features extracted from body halves divided by anatomical planes on vertical, horizontal, and diagonal… More >

  • Open Access

    ARTICLE

    Research on Multi-Blockchain Electronic Archives Sharing Model

    Fang Yu1, Wenbin Bi2, Ning Cao3,*, Jun Luo4, Diantang An5, Liqiang Ding4, Russell Higgs6

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3921-3931, 2023, DOI:10.32604/cmc.2023.028330 - 08 October 2023

    Abstract The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption. Aiming at the problem of dynamic permission management in common access control methods, a new access control method based on smart contract under blockchain is proposed, which improves the intelligence level under blockchain technology. Firstly, the Internet attribute access control model based on smart contract is established. For the dynamic access of heterogeneous devices, the management contract, permission judgment contract and access… More >

  • Open Access

    ARTICLE

    A New Strategy for Dynamic Channel Allocation in CR-WMN Based on RCA

    Kaleem Arshid1,*, Jianbiao Zhang1, Muhammad Yaqub1, Mohammad Daud Awan2, Habiba Ijaz3, Imran Shabir Chuhan4

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2631-2647, 2023, DOI:10.32604/cmc.2023.035735 - 08 October 2023

    Abstract Channel assignment has emerged as an essential study subject in Cognitive Radio-based Wireless Mesh Networks (CR-WMN). In an era of alarming increase in Multi-Radio Multi-Channel (MRMC) network expansion interference is decreased and network throughput is significantly increased when non-overlapping or partially overlapping channels are correctly integrated. Because of its ad hoc behavior, dynamic channel assignment outperforms static channel assignment. Interference reduces network throughput in the CR-WMN. As a result, there is an extensive research gap for an algorithm that dynamically distributes channels while accounting for all types of interference. This work presents a method for More >

  • Open Access

    ARTICLE

    A Credit Card Fraud Detection Model Based on Multi-Feature Fusion and Generative Adversarial Network

    Yalong Xie1, Aiping Li1,*, Biyin Hu2, Liqun Gao1, Hongkui Tu1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2707-2726, 2023, DOI:10.32604/cmc.2023.037039 - 08 October 2023

    Abstract Credit Card Fraud Detection (CCFD) is an essential technology for banking institutions to control fraud risks and safeguard their reputation. Class imbalance and insufficient representation of feature data relating to credit card transactions are two prevalent issues in the current study field of CCFD, which significantly impact classification models’ performance. To address these issues, this research proposes a novel CCFD model based on Multifeature Fusion and Generative Adversarial Networks (MFGAN). The MFGAN model consists of two modules: a multi-feature fusion module for integrating static and dynamic behavior data of cardholders into a unified highdimensional feature… More >

Displaying 8321-8330 on page 833 of 31589. Per Page