Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    An Efficient Impersonation Attack Detection Method in Fog Computing

    Jialin Wan1, Muhammad Waqas1,2, Shanshan Tu1,*, Syed Mudassir Hussain3, Ahsan Shah2, Sadaqat Ur Rehman4, Muhammad Hanif2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 267-281, 2021, DOI:10.32604/cmc.2021.016260

    Abstract Fog computing paradigm extends computing, communication, storage, and network resources to the network’s edge. As the fog layer is located between cloud and end-users, it can provide more convenience and timely services to end-users. However, in fog computing (FC), attackers can behave as real fog nodes or end-users to provide malicious services in the network. The attacker acts as an impersonator to impersonate other legitimate users. Therefore, in this work, we present a detection technique to secure the FC environment. First, we model a physical layer key generation based on wireless channel characteristics. To generate the secret keys between the… More >

  • Open Access

    ARTICLE

    Automatic Surveillance of Pandemics Using Big Data and Text Mining

    Abdullah Alharbi1,*, Wael Alosaimi1, M. Irfan Uddin2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 303-317, 2021, DOI:10.32604/cmc.2021.016230

    Abstract COVID-19 disease is spreading exponentially due to the rapid transmission of the virus between humans. Different countries have tried different solutions to control the spread of the disease, including lockdowns of countries or cities, quarantines, isolation, sanitization, and masks. Patients with symptoms of COVID-19 are tested using medical testing kits; these tests must be conducted by healthcare professionals. However, the testing process is expensive and time-consuming. There is no surveillance system that can be used as surveillance framework to identify regions of infected individuals and determine the rate of spread so that precautions can be taken. This paper introduces a… More >

  • Open Access

    ARTICLE

    Fractional-Order Control of a Wind Turbine Using Manta Ray Foraging Optimization

    Hegazy Rezk1,2,*, Mohammed Mazen Alhato3, Mohemmed Alhaider1, Soufiene Bouallègue3,4

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 185-199, 2021, DOI:10.32604/cmc.2021.016175

    Abstract In this research paper, an improved strategy to enhance the performance of the DC-link voltage loop regulation in a Doubly Fed Induction Generator (DFIG) based wind energy system has been proposed. The proposed strategy used the robust Fractional-Order (FO) Proportional-Integral (PI) control technique. The FOPI control contains a non-integer order which is preferred over the integer-order control owing to its benefits. It offers extra flexibility in design and demonstrates superior outcomes such as high robustness and effectiveness. The optimal gains of the FOPI controller have been determined using a recent Manta Ray Foraging Optimization (MRFO) algorithm. During the optimization process,… More >

  • Open Access

    ARTICLE

    A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images

    Ahmed S. Salama1,2,3, Mohamed Amr Mokhtar3, Mazhar B. Tayel3, Esraa Eldesouky4,6, Ahmed Ali5,6,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 431-446, 2021, DOI:10.32604/cmc.2021.016165

    Abstract Assuring medical images protection and robustness is a compulsory necessity nowadays. In this paper, a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform (DWT) with the energy compaction of the Discrete Wavelet Transform (DCT). The multi-level Encryption-based Hybrid Fusion Technique (EbhFT) aims to achieve great advances in terms of imperceptibility and security of medical images. A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform. Afterwards, a 64-bit hex key is employed to encrypt the host image as well as participate in the second key creation process to… More >

  • Open Access

    ARTICLE

    Dynamic Multi-Attribute Decision-Making Method with Double Reference Points and Its Application

    Haoran Huang1, Qinyong Lin2, Weitong Chen3, Kai Fang4, Huazhou Chen5, Ken Cai2,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1303-1320, 2021, DOI:10.32604/cmc.2021.016163

    Abstract To better reflect the psychological behavior characteristics of loss aversion, this paper builds a double reference point decision making method for dynamic multi-attribute decision-making (DMADM) problem, taking bottom-line and target as reference pints. First, the gain/loss function is given, and the state is divided according to the relationship between the gain/loss value and the reference point. Second, the attitude function is constructed based on the results of state division to establish the utility function. Third, the comprehensive utility value is calculated as the basis for alternatives classification and ranking. Finally, the new method is used to evaluate the development level… More >

  • Open Access

    ARTICLE

    A New Enhanced Arabic Light Stemmer for IR in Medical Documents

    Ra’ed M. Al-Khatib1,*, Taha Zerrouki2, Mohammed M. Abu Shquier3, Amar Balla4, Asef Al-Khateeb5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1255-1269, 2021, DOI:10.32604/cmc.2021.016155

    Abstract This paper introduces a new enhanced Arabic stemming algorithm for solving the information retrieval problem, especially in medical documents. Our proposed algorithm is a light stemming algorithm for extracting stems and roots from the input data. One of the main challenges facing the light stemming algorithm is cutting off the input word, to extract the initial segments. When initiating the light stemmer with strong initial segments, the final extracting stems and roots will be more accurate. Therefore, a new enhanced segmentation based on deploying the Direct Acyclic Graph (DAG) model is utilized. In addition to extracting the powerful initial segments,… More >

  • Open Access

    ARTICLE

    Rasch Model Assessment for Bloom Digital Taxonomy Applications

    Mohd Effendi Ewan Mohd Matore*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1235-1253, 2021, DOI:10.32604/cmc.2021.016143

    Abstract Assessment using Bloom’s taxonomy levels has evolved in a variety of contexts and uses. In the era of the COVID-19 pandemic, which necessitates use of online assessment, the need for teachers to use digital-based taxonomy skills or Bloom’s Digital Taxonomy (BDT) has increased even more. However, the existing studies on validity and reliability of BDT items are limited. To overcome this limitation, this study aims to test whether BDT has good psychometric characteristics as a teacher’s self-assessment tool using the Rasch model analysis and to investigate the pattern of BDT usage in teaching and learning. By using a quantitative online… More >

  • Open Access

    ARTICLE

    A Compact Dual-Port Multi-Band Rectifier Circuit for RF Energy Harvesting

    Surajo Muhammad1,*, Jun Jiat Tiang1, Sew Kin Wong1, Amjad Iqbal1, Amor Smida2, Mohamed Karim Azizi3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 167-184, 2021, DOI:10.32604/cmc.2021.016133

    Abstract This paper presents a compact multi-band rectifier with an improved impedance matching bandwidth. It uses a combination of п–matching network (MN) at Port-1, with a parallel connection of three cell branch MN at Port-2. The proposed impedance matching network (IMN) is adopted to reduce circuit complexity, to improve circuit performance, and power conversion efficiency (PCE) of the rectifier at low input power. The fabricated rectifier prototype operates at 0.92, 1.82, 2.1, 2.46 and 2.65 GHz covering GSM/900, GSM/1800, UMTS2100, and Wi-Fi/2.45–LTE2600. The size of the compact rectifier on the PCB board is 0.13λg × 0.1λg. The fabricated rectifier achieved an… More >

  • Open Access

    ARTICLE

    Multimodal Medical Image Registration and Fusion for Quality Enhancement

    Muhammad Adeel Azam1, Khan Bahadar Khan2,*, Muhammad Ahmad3, Manuel Mazzara4

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 821-840, 2021, DOI:10.32604/cmc.2021.016131

    Abstract For the last two decades, physicians and clinical experts have used a single imaging modality to identify the normal and abnormal structure of the human body. However, most of the time, medical experts are unable to accurately analyze and examine the information from a single imaging modality due to the limited information. To overcome this problem, a multimodal approach is adopted to increase the qualitative and quantitative medical information which helps the doctors to easily diagnose diseases in their early stages. In the proposed method, a Multi-resolution Rigid Registration (MRR) technique is used for multimodal image registration while Discrete Wavelet… More >

  • Open Access

    ARTICLE

    A Fault-Handling Method for the Hamiltonian Cycle in the Hypercube Topology

    Adnan A. Hnaif*, Abdelfatah A. Tamimi, Ayman M. Abdalla, Iqbal Jebril

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 505-519, 2021, DOI:10.32604/cmc.2021.016123

    Abstract Many routing protocols, such as distance vector and link-state protocols are used for finding the best paths in a network. To find the path between the source and destination nodes where every node is visited once with no repeats, Hamiltonian and Hypercube routing protocols are often used. Nonetheless, these algorithms are not designed to solve the problem of a node failure, where one or more nodes become faulty. This paper proposes an efficient modified Fault-free Hamiltonian Cycle based on the Hypercube Topology (FHCHT) to perform a connection between nodes when one or more nodes become faulty. FHCHT can be applied… More >

Displaying 12491-12500 on page 1250 of 22233. Per Page