Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Modified Bat Algorithm for Optimal VM's in Cloud Computing

    Amit Sundas1, Sumit Badotra1,*, Youseef Alotaibi2, Saleh Alghamdi3, Osamah Ibrahim Khalaf4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2877-2894, 2022, DOI:10.32604/cmc.2022.025658

    Abstract All task scheduling applications need to ensure that resources are optimally used, performance is enhanced, and costs are minimized. The purpose of this paper is to discuss how to Fitness Calculate Values (FCVs) to provide application software with a reliable solution during the initial stages of load balancing. The cloud computing environment is the subject of this study. It consists of both physical and logical components (most notably cloud infrastructure and cloud storage) (in particular cloud services and cloud platforms). This intricate structure is interconnected to provide services to users and improve the overall system's performance. This case study is… More >

  • Open Access

    ARTICLE

    Linearly Polarized Millimeter Wave Reflectarray with Mutual Coupling Optimization

    M. Inam1, M. H. Dahri2, M. R. Kamarudin3, A. Y. I. Ashyap3, M. H. Jamaluddin4, N. H. Sulaiman5, M. A. Khan6, Z. A. Shamsan7,*, K. Almuhanna7, F. Alorifi7

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2397-2410, 2022, DOI:10.32604/cmc.2022.025650

    Abstract This work provides the design and analysis of a single layer, linearly polarized millimeter wave reflectarray antenna with mutual coupling optimization. Detailed analysis was carried out at 26 GHz design frequency using the simulations of the reflectarray unit cells as well as the periodic reflectarray antenna. The simulated results were verified by the scattering parameter and far-field measurements of the unit cell and periodic arrays, respectively. A close agreement between the simulated and measured results was observed in all the cases. Apart from the unit cells and reflectarray, the waveguide and horn antenna were also fabricated to be used in the… More >

  • Open Access

    ARTICLE

    Intelligent Satin Bowerbird Optimizer Based Compression Technique for Remote Sensing Images

    M. Saravanan1, J. Jayanthi2, U. Sakthi3, R. Rajkumar4, Gyanendra Prasad Joshi5, L. Minh Dang5, Hyeonjoon Moon5,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2683-2696, 2022, DOI:10.32604/cmc.2022.025642

    Abstract Due to latest advancements in the field of remote sensing, it becomes easier to acquire high quality images by the use of various satellites along with the sensing components. But the massive quantity of data poses a challenging issue to store and effectively transmit the remote sensing images. Therefore, image compression techniques can be utilized to process remote sensing images. In this aspect, vector quantization (VQ) can be employed for image compression and the widely applied VQ approach is Linde–Buzo–Gray (LBG) which creates a local optimum codebook for image construction. The process of constructing the codebook can be treated as… More >

  • Open Access

    ARTICLE

    Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts

    Tarig Mohamed Ahmed*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3849-3862, 2022, DOI:10.32604/cmc.2022.025582

    Abstract Mobile Agent has many benefits over traditional distributed systems such as reducing latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security problems. This paper focuses on mobile agent protection against malicious hosts. A new security mechanism called Checkpoints has been proposed. Checkpoint Mechanism (CPM) aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks. CPM assumes using a free-roaming mobility mechanism by Mobile agent systems. The main idea behind CPM is to generate multiple versions of Mobile Agent. The multiple version is used to recover Mobile Agent from Capturing and… More >

  • Open Access

    ARTICLE

    5G Antenna Gain Enhancement Using a Novel Metasurface

    Mubashir Ashfaq1, Shahid Bashir1,*, Syed Imran Hussain Shah2, Nisar Ahmad Abbasi3, Hatem Rmili4,5, Muhammad Abbas Khan6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3601-3611, 2022, DOI:10.32604/cmc.2022.025558

    Abstract This article presents a Sub-6 GHz microstrip patch antenna (MPA) with enhanced gain using metamaterial (MTM) superstrate. The source MPA operates at 4.8 GHz and has a peak gain of 5.3 dBi at the resonance frequency. A window-shaped unit cell is designed and investigated through the material wave propagation technique. The unit cell shows an Epsilon Near Zero (ENZ)-Mu Very Large (MVL) behavior around 4.8 GHz. The unit cell has a fourfold geometry which makes it a polarization independent metamaterial. A double layer antenna is designed by placing a 4 × 4 MTM slab as a superstrate above the MPA at a… More >

  • Open Access

    ARTICLE

    Deep Learning and Machine Learning-Based Model for Conversational Sentiment Classification

    Sami Ullah1, Muhammad Ramzan Talib1,*, Toqir A. Rana2,3, Muhammad Kashif Hanif1, Muhammad Awais4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2323-2339, 2022, DOI:10.32604/cmc.2022.025543

    Abstract In the current era of the internet, people use online media for conversation, discussion, chatting, and other similar purposes. Analysis of such material where more than one person is involved has a spate challenge as compared to other text analysis tasks. There are several approaches to identify users’ emotions from the conversational text for the English language, however regional or low resource languages have been neglected. The Urdu language is one of them and despite being used by millions of users across the globe, with the best of our knowledge there exists no work on dialogue analysis in the Urdu… More >

  • Open Access

    ARTICLE

    Supplier Selection Fuzzy Model in Supply Chain Management: Vietnamese Cafe Industry Case

    Chia-Nan Wang1, Hoang Tuyet Nhi Thai1,*, Nguyen Van Thanh2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2291-2304, 2022, DOI:10.32604/cmc.2022.025477

    Abstract Supplier selection is a vital part of the supply chain and is also a current issue that concerns businesses today as supplier quality directly affects the operations of the organization. Choosing the right supplier can help businesses increase productivity, competitiveness in the market, and profits without having to lower the quality of the products. However, choosing a supplier is not a simple matter, it requires businesses to consider many aspects about their suppliers. Therefore, the goal of this study is to propose an integrated model consisting of two models: Fuzzy Analytics Network Process (Fuzzy-ANP) model and Weighted Aggregated Sum Product… More >

  • Open Access

    ARTICLE

    Effective Classification of Synovial Sarcoma Cancer Using Structure Features and Support Vectors

    P. Arunachalam1, N. Janakiraman1, Junaid Rashid2, Jungeun Kim2,*, Sovan Samanta3, Usman Naseem4, Arun Kumar Sivaraman5, A. Balasundaram6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2521-2543, 2022, DOI:10.32604/cmc.2022.025339

    Abstract In this research work, we proposed a medical image analysis framework with two separate releases whether or not Synovial Sarcoma (SS) is the cell structure for cancer. Within this framework the histopathology images are decomposed into a third-level sub-band using a two-dimensional Discrete Wavelet Transform. Subsequently, the structure features (SFs) such as Principal Components Analysis (PCA), Independent Components Analysis (ICA) and Linear Discriminant Analysis (LDA) were extracted from this sub-band image representation with the distribution of wavelet coefficients. These SFs are used as inputs of the Support Vector Machine (SVM) classifier. Also, classification of PCA + SVM, ICA + SVM,… More >

  • Open Access

    ARTICLE

    An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

    Ghalib H. Alshammri1,2, Amani K. Samha3, Ezz El-Din Hemdan4, Mohammed Amoon1,4, Walid El-Shafai5,6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3529-3548, 2022, DOI:10.32604/cmc.2022.025262

    Abstract Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process. In recent times, the most complex task in Software Defined Network (SDN) is security, which is based on a centralized, programmable controller. Therefore, monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment. Consequently, this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms: K-means, Farthest First, Canopy, Density-based algorithm, and Exception-maximization (EM), using the Waikato Environment for Knowledge Analysis (WEKA) software to compare extensively between these five algorithms.… More >

  • Open Access

    ARTICLE

    Design of Energy Efficient WSN Using a Noble SMOWA Algorithm

    Avishek Banerjee1, Deepak Garg1, Victor Das2, Laxminarayan Sahoo3, Ira Nath4, Vijayakumar Varadarajan5, Ketan Kotecha6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3585-3600, 2022, DOI:10.32604/cmc.2022.025233

    Abstract In this paper, the establishment of efficient Wireless Sensor Network (WSN) networks has been projected to minimize the consumption of energy using a new Self-adaptive Multi-Objective Weighted Approach (SMOWA) algorithm for solving a multi-objective problem. The Different WSN nodes deployment policies have been proposed and applied in this paper to design an efficient Wireless Sensor Network to minimize energy consumption. After that, the cluster head for each cluster has been selected with the help of the duty cycle. After configuring the WSN networks, the SMOWA algorithms have been developed to obtain the minimum energy consumption for the networks. Energy minimization,… More >

Displaying 8661-8670 on page 867 of 22225. Per Page