Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    High Order Block Method for Third Order ODEs

    A. I. Asnor1, S. A. M. Yatim1, Z. B. Ibrahim2, N. Zainuddin3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1253-1267, 2021, DOI:10.32604/cmc.2021.014781

    Abstract Many initial value problems are difficult to be solved using ordinary, explicit step-by-step methods because most of these problems are considered stiff. Certain implicit methods, however, are capable of solving stiff ordinary differential equations (ODEs) usually found in most applied problems. This study aims to develop a new numerical method, namely the high order variable step variable order block backward differentiation formula (VSVO-HOBBDF) for the main purpose of approximating the solutions of third order ODEs. The computational work of the VSVO-HOBBDF method was carried out using the strategy of varying the step size and order in a single code. The… More >

  • Open Access

    ARTICLE

    Hacking Anti-Shoplifting System to Hide Data within Clothes

    Al Hussien Seddik Saad1,*, E. H. Hafez2, Zubair Ahmad3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 659-674, 2021, DOI:10.32604/cmc.2021.014758

    Abstract Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The… More >

  • Open Access

    ARTICLE

    Collision Observation-Based Optimization of Low-Power and Lossy IoT Network Using Reinforcement Learning

    Arslan Musaddiq1, Rashid Ali2, Jin-Ghoo Choi1, Byung-Seo Kim3,*, Sung-Won Kim1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 799-814, 2021, DOI:10.32604/cmc.2021.014751

    Abstract The Internet of Things (IoT) has numerous applications in every domain, e.g., smart cities to provide intelligent services to sustainable cities. The next-generation of IoT networks is expected to be densely deployed in a resource-constrained and lossy environment. The densely deployed nodes producing radically heterogeneous traffic pattern causes congestion and collision in the network. At the medium access control (MAC) layer, mitigating channel collision is still one of the main challenges of future IoT networks. Similarly, the standardized network layer uses a ranking mechanism based on hop-counts and expected transmission counts (ETX), which often does not adapt to the dynamic… More >

  • Open Access

    ARTICLE

    Detecting Information on the Spread of Dengue on Twitter Using Artificial Neural Networks

    Samina Amin1,*, M. Irfan Uddin1, M. Ali Zeb1, Ala Abdulsalam Alarood2, Marwan Mahmoud3, Monagi H. Alkinani4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1317-1332, 2021, DOI:10.32604/cmc.2021.014733

    Abstract Social media platforms have lately emerged as a promising tool for predicting the outbreak of epidemics by analyzing information on them with the help of machine learning techniques. Many analytical and statistical models are available to infer a variety of user sentiments in posts on social media. The amount of data generated by social media platforms, such as Twitter, that can be used to track diseases is increasing rapidly. This paper proposes a method for the classification of tweets related to the outbreak of dengue using machine learning algorithms. An artificial neural network (ANN)-based method is developed using Global Vector… More >

  • Open Access

    ARTICLE

    COVID-19 and Unemployment: A Novel Bi-Level Optimal Control Model

    Ibrahim M. Hezam1,2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1153-1167, 2021, DOI:10.32604/cmc.2021.014710

    Abstract Since COVID-19 was declared as a pandemic in March 2020, the world’s major preoccupation has been to curb it while preserving the economy and reducing unemployment. This paper uses a novel Bi-Level Dynamic Optimal Control model (BLDOC) to coordinate control between COVID-19 and unemployment. The COVID-19 model is the upper level while the unemployment model is the lower level of the bi-level dynamic optimal control model. The BLDOC model’s main objectives are to minimize the number of individuals infected with COVID-19 and to minimize the unemployed individuals, and at the same time minimizing the cost of the containment strategies. We… More >

  • Open Access

    ARTICLE

    Detection Technique of Software-Induced Rowhammer Attacks

    Minkyung Lee1, Jin Kwak2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 349-367, 2021, DOI:10.32604/cmc.2021.014700

    Abstract Side-channel attacks have recently progressed into software-induced attacks. In particular, a rowhammer attack, which exploits the characteristics of dynamic random access memory (DRAM), can quickly and continuously access the cells as the cell density of DRAM increases, thereby generating a disturbance error affecting the neighboring cells, resulting in bit flips. Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits, it has been reported that it can be exploited on various platforms such as mobile devices, web browsers, and virtual machines. Furthermore, there have been studies on bypassing the defense measures… More >

  • Open Access

    ARTICLE

    Optimal Reordering Trace Files for Improving Software Testing Suitcase

    Yingfu Cai1, Sultan Noman Qasem2,3, Harish Garg4, Hamïd Parvïn5,6,7,*, Kim-Hung Pho8, Zulkefli Mansor9

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1225-1239, 2021, DOI:10.32604/cmc.2021.014699

    Abstract An invariant can be described as an essential relationship between program variables. The invariants are very useful in software checking and verification. The tools that are used to detect invariants are invariant detectors. There are two types of invariant detectors: dynamic invariant detectors and static invariant detectors. Daikon software is an available computer program that implements a special case of a dynamic invariant detection algorithm. Daikon proposes a dynamic invariant detection algorithm based on several runs of the tested program; then, it gathers the values of its variables, and finally, it detects relationships between the variables based on a simple… More >

  • Open Access

    ARTICLE

    The Interaction between Microcapsules with Different Sizes and Propagating Cracks

    Xiaoying Zhuang2,3, Hung Nguyen-Xuan4,5, Shuai Zhou1,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 577-593, 2021, DOI:10.32604/cmc.2021.014688

    Abstract The microcapsule-contained self-healing materials are appealing since they can heal the cracks automatically and be effective for a long time. Although many experiments have been carried out, the influence of the size of microcapsules on the self-healing effect is still not well investigated. This study uses the two-dimensional discrete element method (DEM) to investigate the interaction between one microcapsule and one microcrack. The influence of the size of microcapsules is considered. The potential healing time and the influence of the initial damage are studied. The results indicate that the coalescence crack is affected by the size of holes. The elastic… More >

  • Open Access

    ARTICLE

    Adaptive Expanding Ring Search Based Per Hop Behavior Rendition of Routing in MANETs

    Durr-e-Nayab1,*, Mohammad Haseeb Zafar1,2, Mohammed Basheri2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1137-1152, 2021, DOI:10.32604/cmc.2021.014687

    Abstract Routing protocols in Mobile Ad Hoc Networks (MANETs) operate with Expanding Ring Search (ERS) mechanism to avoid flooding in the network while tracing step. ERS mechanism searches the network with discerning Time to Live (TTL) values described by respective routing protocol that save both energy and time. This work exploits the relation between the TTL value of a packet, traffic on a node and ERS mechanism for routing in MANETs and achieves an Adaptive ERS based Per Hop Behavior (AERSPHB) rendition of requests handling. Each search request is classified based on ERS attributes and then processed for routing while monitoring… More >

  • Open Access

    ARTICLE

    An Ontology Based Test Case Prioritization Approach in Regression Testing

    Muhammad Hasnain1, Seung Ryul Jeong2,*, Muhammad Fermi Pasha1, Imran Ghani3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1051-1068, 2021, DOI:10.32604/cmc.2021.014686

    Abstract Regression testing is a widely studied research area, with the aim of meeting the quality challenges of software systems. To achieve a software system of good quality, we face high consumption of resources during testing. To overcome this challenge, test case prioritization (TCP) as a sub-type of regression testing is continuously investigated to achieve the testing objectives. This study provides an insight into proposing the ontology-based TCP (OTCP) approach, aimed at reducing the consumption of resources for the quality improvement and maintenance of software systems. The proposed approach uses software metrics to examine the behavior of classes of software systems.… More >

Displaying 13071-13080 on page 1308 of 22225. Per Page