Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Test Case Prioritization in Unit and Integration Testing: A Shuffled-Frog-Leaping Approach

    Atulya Gupta*, Rajendra Prasad Mahapatra

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5369-5387, 2023, DOI:10.32604/cmc.2023.031261 - 28 December 2022

    Abstract Both unit and integration testing are incredibly crucial for almost any software application because each of them operates a distinct process to examine the product. Due to resource constraints, when software is subjected to modifications, the drastic increase in the count of test cases forces the testers to opt for a test optimization strategy. One such strategy is test case prioritization (TCP). Existing works have propounded various methodologies that re-order the system-level test cases intending to boost either the fault detection capabilities or the coverage efficacy at the earliest. Nonetheless, singularity in objective functions and… More >

  • Open Access

    ARTICLE

    Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

    Abdallah Elhigazi Abdallah1, Mosab Hamdan2, Shukor Abd Razak3, Fuad A. Ghalib3, Muzaffar Hamzah2,*, Suleman Khan4, Siddiq Ahmed Babikir Ali5, Mutaz H. H. Khairi1, Sayeed Salih6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5607-5623, 2023, DOI:10.32604/cmc.2023.031047 - 28 December 2022

    Abstract IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed… More >

  • Open Access

    ARTICLE

    Salp Swarm Algorithm with Multilevel Thresholding Based Brain Tumor Segmentation Model

    Hanan T. Halawani*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6775-6788, 2023, DOI:10.32604/cmc.2023.030814 - 28 December 2022

    Abstract Biomedical image processing acts as an essential part of several medical applications in supporting computer aided disease diagnosis. Magnetic Resonance Image (MRI) is a commonly utilized imaging tool used to save glioma for clinical examination. Biomedical image segmentation plays a vital role in healthcare decision making process which also helps to identify the affected regions in the MRI. Though numerous segmentation models are available in the literature, it is still needed to develop effective segmentation models for BT. This study develops a salp swarm algorithm with multi-level thresholding based brain tumor segmentation (SSAMLT-BTS) model. The… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification

    R. Brindha1, S. Nandagopal2, H. Azath3, V. Sathana4, Gyanendra Prasad Joshi5, Sung Won Kim6,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5901-5914, 2023, DOI:10.32604/cmc.2023.030784 - 28 December 2022

    Abstract Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’ sensitive data. E-mails, instant messages and phone calls are some of the common modes used in cyberattacks. Though the security models are continuously upgraded to prevent cyberattacks, hackers find innovative ways to target the victims. In this background, there is a drastic increase observed in the number of phishing emails sent to potential targets. This scenario necessitates the importance of designing an effective classification model. Though numerous conventional models are available in the literature for… More >

  • Open Access

    ARTICLE

    Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map

    K. Priyadarsini1, Arun Kumar Sivaraman2, Abdul Quadir Md2, Areej Malibari3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6703-6717, 2023, DOI:10.32604/cmc.2023.030648 - 28 December 2022

    Abstract With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts of data. The major concerns in this domain are security and privacy. Therefore, attaining a reliable level of confidentiality in the fog computing environment is a pivotal task. Among different types of data stored in the fog, the 3D point and mesh fog data are increasingly popular in recent days, due to the growth of 3D modelling and 3D printing technologies. Hence, in this research, we propose a novel scheme for preserving the privacy of 3D point… More >

  • Open Access

    ARTICLE

    Resource Management in UAV Enabled MEC Networks

    Muhammad Abrar1, Ziyad M. Almohaimeed2,*, Ushna Ajmal1, Rizwan Akram2, Rooha Masroor3, Muhammad Majid Hussain4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4847-4860, 2023, DOI:10.32604/cmc.2023.030242 - 28 December 2022

    Abstract Mobile edge cloud networks can be used to offload computationally intensive tasks from Internet of Things (IoT) devices to nearby mobile edge servers, thereby lowering energy consumption and response time for ground mobile users or IoT devices. Integration of Unmanned Aerial Vehicles (UAVs) and the mobile edge computing (MEC) server will significantly benefit small, battery-powered, and energy-constrained devices in 5G and future wireless networks. We address the problem of maximising computation efficiency in U-MEC networks by optimising the user association and offloading indicator (OI), the computational capacity (CC), the power consumption, the time duration, and More >

  • Open Access

    ARTICLE

    An Optimized Offloaded Task Execution for Smart Cities Applications

    Ahmad Naseem Alvi1, Muhammad Awais Javed1,*, Mozaherul Hoque Abul Hasanat2, Muhammad Badruddin Khan2, Abdul Khader Jilani Saudagar2, Mohammed Alkhathami2

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6321-6334, 2023, DOI:10.32604/cmc.2023.029913 - 28 December 2022

    Abstract Wireless nodes are one of the main components in different applications that are offered in a smart city. These wireless nodes are responsible to execute multiple tasks with different priority levels. As the wireless nodes have limited processing capacity, they offload their tasks to cloud servers if the number of tasks exceeds their task processing capacity. Executing these tasks from remotely placed cloud servers causes a significant delay which is not required in sensitive task applications. This execution delay is reduced by placing fog computing nodes near these application nodes. A fog node has limited… More >

  • Open Access

    ARTICLE

    Two-Stream Deep Learning Architecture-Based Human Action Recognition

    Faheem Shehzad1, Muhammad Attique Khan2, Muhammad Asfand E. Yar3, Muhammad Sharif1, Majed Alhaisoni4, Usman Tariq5, Arnab Majumdar6, Orawit Thinnukool7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5931-5949, 2023, DOI:10.32604/cmc.2023.028743 - 28 December 2022

    Abstract Human action recognition (HAR) based on Artificial intelligence reasoning is the most important research area in computer vision. Big breakthroughs in this field have been observed in the last few years; additionally, the interest in research in this field is evolving, such as understanding of actions and scenes, studying human joints, and human posture recognition. Many HAR techniques are introduced in the literature. Nonetheless, the challenge of redundant and irrelevant features reduces recognition accuracy. They also faced a few other challenges, such as differing perspectives, environmental conditions, and temporal variations, among others. In this work,… More >

  • Open Access

    ARTICLE

    An Optimized Test Case Minimization Technique Using Genetic Algorithm for Regression Testing

    Rubab Sheikh1, Muhammad Imran Babar2,*, Rawish Butt3, Abdelzahir Abdelmaboud4, Taiseer Abdalla Elfadil Eisa4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6789-6806, 2023, DOI:10.32604/cmc.2023.028625 - 28 December 2022

    Abstract Regression testing is a widely used approach to confirm the correct functionality of the software in incremental development. The use of test cases makes it easier to test the ripple effect of changed requirements. Rigorous testing may help in meeting the quality criteria that is based on the conformance to the requirements as given by the intended stakeholders. However, a minimized and prioritized set of test cases may reduce the efforts and time required for testing while focusing on the timely delivery of the software application. In this research, a technique named TestReduce has been presented More >

  • Open Access

    ARTICLE

    A Novel Design of Antenna Array with Two K-Band Circularly Polarized Antenna

    Xiao Liu1,2, Anqi Li1,*, Zhongjun Yu1,2, Ting Lv3, Meng Li4, Zhen Zhang5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6411-6427, 2023, DOI:10.32604/cmc.2023.027124 - 28 December 2022

    Abstract As an important part of phased array system, the research on phased array antenna is very necessary. The phased array antenna achieves the scanning beam adaptively by regulating the phase difference between each array element. In this paper, a dual K-band circularly polarized antenna with high broadband, broadband beam, wide axial ratio bandwidth and high radiation efficiency is designed. We combine with the advantages of slot antenna and aperture antenna, use multimode waveguide cavity structure to design an aperture antenna, which is fed to waveguide circular polarizer by slot coupling in order to realize circular… More >

Displaying 10931-10940 on page 1094 of 31561. Per Page