Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing

    Ahmed M. Ayoup1,*, Ashraf A. M. Khalaf1, Walid El-Shafai2,3, Fathi E. Abd El-Samie2, Fahad Alraddady4, Salwa M. Serag Eldin4,5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3687-3703, 2022, DOI:10.32604/cmc.2022.025902

    Abstract The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data. This paper presents a cancellable multi-biometric identification scheme that includes four stages: biometric data collection and processing, Arnold's Cat Map encryption, decimation process to reduce the size, and final merging of the four biometrics in a single generated template. First, a 2D matrix of size 128 × 128 is created based on Arnold's Cat Map (ACM). The purpose of this rearrangement is to break the correlation between pixels to hide the biometric patterns and merge these patterns together for more security. The decimation is performed to… More >

  • Open Access

    ARTICLE

    Grasshopper KUWAHARA and Gradient Boosting Tree for Optimal Features Classifications

    Rabab Hamed M. Aly1,*, Aziza I. Hussein2, Kamel H. Rahouma3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3985-3997, 2022, DOI:10.32604/cmc.2022.025862

    Abstract This paper aims to design an optimizer followed by a Kawahara filter for optimal classification and prediction of employees’ performance. The algorithm starts by processing data by a modified K-means technique as a hierarchical clustering method to quickly obtain the best features of employees to reach their best performance. The work of this paper consists of two parts. The first part is based on collecting data of employees to calculate and illustrate the performance of each employee. The second part is based on the classification and prediction techniques of the employee performance. This model is designed to help companies in… More >

  • Open Access

    ARTICLE

    Bio-Inspired Numerical Analysis of COVID-19 with Fuzzy Parameters

    F. M. Allehiany1, Fazal Dayan2,3,*, F. F. Al-Harbi4, Nesreen Althobaiti5, Nauman Ahmed2, Muhammad Rafiq6, Ali Raza7, Mawahib Elamin8

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3213-3229, 2022, DOI:10.32604/cmc.2022.025811

    Abstract Fuzziness or uncertainties arise due to insufficient knowledge, experimental errors, operating conditions and parameters that provide inaccurate information. The concepts of susceptible, infectious and recovered are uncertain due to the different degrees in susceptibility, infectivity and recovery among the individuals of the population. The differences can arise, when the population groups under the consideration having distinct habits, customs and different age groups have different degrees of resistance, etc. More realistic models are needed which consider these different degrees of susceptibility infectivity and recovery of the individuals. In this paper, a Susceptible, Infected and Recovered (SIR) epidemic model with fuzzy parameters… More >

  • Open Access

    ARTICLE

    Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem

    Ramadhan J. Mstafa1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3349-3368, 2022, DOI:10.32604/cmc.2022.025791

    Abstract The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have resulted in breaches of privacy and data security. When it comes to protecting private information in today's Internet era, digital steganography is vital. Many academics are interested in digital video because it has a great capability for concealing important data. There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data. The visual imperceptibility, robustness, and embedding capacity of these approaches are all… More >

  • Open Access

    ARTICLE

    EACR-LEACH: Energy-Aware Cluster-based Routing Protocol for WSN Based IoT

    Sankar Sennan1, Kirubasri1, Youseef Alotaibi2, Digvijay Pandey3,*, Saleh Alghamdi4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2159-2174, 2022, DOI:10.32604/cmc.2022.025773

    Abstract Internet of Things (IoT) is a recent paradigm to improve human lifestyle. Nowadays, number devices are connected to the Internet drastically. Thus, the people can control and monitor the physical things in real-time without delay. The IoT plays a vital role in all kind of fields in our world such as agriculture, livestock, transport, and healthcare, grid system, connected home, elderly people carrying system, cypher physical system, retail, and intelligent systems. In IoT energy conservation is a challenging task, as the devices are made up of low-cost and low-power sensing devices and local processing. IoT networks have significant challenges in… More >

  • Open Access

    ARTICLE

    Metaheuristic Lightweight Cryptography for Security Enhancement inInternet of Things

    Mahmoud Ragab1,2,3,*, Ehab Bahaudien Ashary4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3009-3023, 2022, DOI:10.32604/cmc.2022.025763

    Abstract The advancements made in Internet of Things (IoT) is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications. However, data security and private are challenging tasks to accomplish in IoT and necessary measures to be taken to ensure secure operation. With this background, the current paper proposes a novel lightweight cryptography method for enhance the security in IoT. The proposed encryption algorithm is a blend of Cross Correlation Coefficient (CCC) and Black Widow Optimization (BWO) algorithm. In the presented encryption technique, CCC operation is utilized to optimize the encryption process of cryptography method.… More >

  • Open Access

    ARTICLE

    Hybrid Chaotic Salp Swarm with Crossover Algorithm for Underground Wireless Sensor Networks

    Mariem Ayedi1,2,*, Walaa H. ElAshmawi3,4, Esraa Eldesouky1,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2963-2980, 2022, DOI:10.32604/cmc.2022.025741

    Abstract Resource management in Underground Wireless Sensor Networks (UWSNs) is one of the pillars to extend the network lifetime. An intriguing design goal for such networks is to achieve balanced energy and spectral resource utilization. This paper focuses on optimizing the resource efficiency in UWSNs where underground relay nodes amplify and forward sensed data, received from the buried source nodes through a lossy soil medium, to the aboveground base station. A new algorithm called the Hybrid Chaotic Salp Swarm and Crossover (HCSSC) algorithm is proposed to obtain the optimal source and relay transmission powers to maximize the network resource efficiency. The… More >

  • Open Access

    ARTICLE

    Robust Prediction of the Bandwidth of Metamaterial Antenna Using Deep Learning

    Abdelaziz A. Abdelhamid1,3,*, Sultan R. Alotaibi2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2305-2321, 2022, DOI:10.32604/cmc.2022.025739

    Abstract The design of microstrip antennas is a complex and time-consuming process, especially the step of searching for the best design parameters. Meanwhile, the performance of microstrip antennas can be improved using metamaterial, which results in a new class of antennas called metamaterial antenna. Several parameters affect the radiation loss and quality factor of this class of antennas, such as the antenna size. Recently, the optimal values of the design parameters of metamaterial antennas can be predicted using machine learning, which presents a better alternative to simulation tools and trial-and-error processes. However, the prediction accuracy depends heavily on the quality of… More >

  • Open Access

    ARTICLE

    LAME: Layout-Aware Metadata Extraction Approach for Research Articles

    Jongyun Choi1, Hyesoo Kong2, Hwamook Yoon2, Heungseon Oh3, Yuchul Jung1,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4019-4037, 2022, DOI:10.32604/cmc.2022.025711

    Abstract The volume of academic literature, such as academic conference papers and journals, has increased rapidly worldwide, and research on metadata extraction is ongoing. However, high-performing metadata extraction is still challenging due to diverse layout formats according to journal publishers. To accommodate the diversity of the layouts of academic journals, we propose a novel LAyout-aware Metadata Extraction (LAME) framework equipped with the three characteristics (e.g., design of automatic layout analysis, construction of a large meta-data training set, and implementation of metadata extractor). In the framework, we designed an automatic layout analysis using PDFMiner. Based on the layout analysis, a large volume… More >

  • Open Access

    ARTICLE

    Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home

    Anusha Vangala1, Ashok Kumar Das1, YoungHo Park2,*, Sajjad Shaukat Jamal3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3549-3570, 2022, DOI:10.32604/cmc.2022.025660

    Abstract The recent surge in development of smart homes and smart cities can be observed in many developed countries. While the idea to control devices that are in home (embedded with the Internet of Things (IoT) smart devices) by the user who is outside the home might sound fancy, but it comes with a lot of potential threats. There can be many attackers who will be trying to take advantage of this. So, there is a need for designing a secure scheme which will be able to distinguish among genuine/authorized users of the system and attackers. And knowing about the details… More >

Displaying 8651-8660 on page 866 of 22225. Per Page