Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    ARTICLE

    Entropy Bayesian Analysis for the Generalized Inverse Exponential Distribution Based on URRSS

    Amer I. Al-Omari1, Amal S. Hassan2, Heba F. Nagy2, Ayed R. A. Al-Anzi3,*, Loai Alzoubi1

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3795-3811, 2021, DOI:10.32604/cmc.2021.019061

    Abstract This paper deals with the Bayesian estimation of Shannon entropy for the generalized inverse exponential distribution. Assuming that the observed samples are taken from the upper record ranked set sampling (URRSS) and upper record values (URV) schemes. Formulas of Bayesian estimators are derived depending on a gamma prior distribution considering the squared error, linear exponential and precautionary loss functions, in addition, we obtain Bayesian credible intervals. The random-walk Metropolis-Hastings algorithm is handled to generate Markov chain Monte Carlo samples from the posterior distribution. Then, the behavior of the estimates is examined at various record values. The output of the study… More >

  • Open Access

    ARTICLE

    Intelligent IoT-Aided Early Sound Detection of Red Palm Weevils

    Mohamed Esmail Karar1,2, Omar Reyad1,3,*, Abdel-Haleem Abdel-Aty4, Saud Owyed5, Mohd F. Hassan6

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4095-4111, 2021, DOI:10.32604/cmc.2021.019059

    Abstract Smart precision agriculture utilizes modern information and wireless communication technologies to achieve challenging agricultural processes. Therefore, Internet of Things (IoT) technology can be applied to monitor and detect harmful insect pests such as red palm weevils (RPWs) in the farms of date palm trees. In this paper, we propose a new IoT-based framework for early sound detection of RPWs using fine-tuned transfer learning classifier, namely InceptionResNet-V2. The sound sensors, namely TreeVibes devices are carefully mounted on each palm trunk to setup wireless sensor networks in the farm. Palm trees are labeled based on the sensor node number to identify the… More >

  • Open Access

    ARTICLE

    An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

    Seyed Amin Hosseini Seno1, Mahdi Nikooghadam1, Rahmat Budiarto2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3495-3512, 2021, DOI:10.32604/cmc.2021.019051

    Abstract Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers. In this system, service providers consider user authentication as a critical requirement. To address this crucial requirement, various types of validation and key agreement protocols have been employed. The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws. This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication… More >

  • Open Access

    ARTICLE

    Swarming Behavior of Harris Hawks Optimizer for Arabic Opinion Mining

    Diaa Salam Abd Elminaam1,2,*, Nabil Neggaz3, Ibrahim Abdulatief Ahmed4,5, Ahmed El Sawy Abouelyazed4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4129-4149, 2021, DOI:10.32604/cmc.2021.019047

    Abstract At present, the immense development of social networks allows generating a significant amount of textual data, which has facilitated researchers to explore the field of opinion mining. In addition, the processing of textual opinions based on the term frequency-inverse document frequency method gives rise to a dimensionality problem. This study aims to detect the nature of opinions in the Arabic language employing a swarm intelligence (SI)-based algorithm, Harris hawks algorithm, to select the most relevant terms. The experimental study has been tested on two datasets: Arabic Jordanian General Tweets and Opinion Corpus for Arabic. In terms of accuracy and number… More >

  • Open Access

    ARTICLE

    SmartCrawler: A Three-Stage Ranking Based Web Crawler for Harvesting Hidden Web Sources

    Sawroop Kaur1, Aman Singh1,*, G. Geetha2, Mehedi Masud3, Mohammed A. Alzain4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2933-2948, 2021, DOI:10.32604/cmc.2021.019030

    Abstract Web crawlers have evolved from performing a meagre task of collecting statistics, security testing, web indexing and numerous other examples. The size and dynamism of the web are making crawling an interesting and challenging task. Researchers have tackled various issues and challenges related to web crawling. One such issue is efficiently discovering hidden web data. Web crawler’s inability to work with form-based data, lack of benchmarks and standards for both performance measures and datasets for evaluation of the web crawlers make it still an immature research domain. The applications like vertical portals and data integration require hidden web crawling. Most… More >

  • Open Access

    ARTICLE

    Enhanced Trust Based Access Control for Multi-Cloud Environment

    N. R. Rejin Paul1,*, D. Paul Raj2

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3079-3093, 2021, DOI:10.32604/cmc.2021.018993

    Abstract Security is an essential part of the cloud environment. For ensuring the security of the data being communicated to and from the cloud server, a significant parameter called trust was introduced. Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic. In most cloud-based data distribution environments, emphasis is placed on accepting trusted client users’ requests, but the cloud servers’ integrity is seldom verified. This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue. The proposed methodology… More >

  • Open Access

    ARTICLE

    Augmented Node Placement Model in -WSN Through Multiobjective Approach

    Kalaipriyan Thirugnansambandam1, Debnath Bhattacharyya2, Jaroslav Frnda3, Dinesh Kumar Anguraj2, Jan Nedoma4,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3629-3644, 2021, DOI:10.32604/cmc.2021.018939

    Abstract In Wireless Sensor Network (WSN), coverage and connectivity are the vital challenges in the target-based region. The linear objective is to find the positions to cover the complete target nodes and connectivity between each sensor for data forwarding towards the base station given a grid with target points and a potential sensor placement position. In this paper, a multiobjective problem on target-based WSN (t-WSN) is derived, which minimizes the number of deployed nodes, and maximizes the cost of coverage and sensing range. An Evolutionary-based Non-Dominated Sorting Genetic Algorithm-II (NSGA-II) is incorporated to tackle this multiobjective problem efficiently. Multiobjective problems are… More >

  • Open Access

    ARTICLE

    TBDDoSA-MD: Trust-Based DDoS Misbehave Detection Approach in Software-defined Vehicular Network (SDVN)

    Rajendra Prasad Nayak1, Srinivas Sethi2, Sourav Kumar Bhoi3, Kshira Sagar Sahoo4, Nz Jhanjhi5, Thamer A. Tabbakh6, Zahrah A. Almusaylim7,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3513-3529, 2021, DOI:10.32604/cmc.2021.018930

    Abstract Reliable vehicles are essential in vehicular networks for effective communication. Since vehicles in the network are dynamic, even a short span of misbehavior by a vehicle can disrupt the whole network which may lead to catastrophic consequences. In this paper, a Trust-Based Distributed DoS Misbehave Detection Approach (TBDDoSA-MD) is proposed to secure the Software-Defined Vehicular Network (SDVN). A malicious vehicle in this network performs DDoS misbehavior by attacking other vehicles in its neighborhood. It uses the jamming technique by sending unnecessary signals in the network, as a result, the network performance degrades. Attacked vehicles in that network will no longer… More >

  • Open Access

    ARTICLE

    Fake News Detection on Social Media: A Temporal-Based Approach

    Yonghun Jang, Chang-Hyeon Park, Dong-Gun Lee, Yeong-Seok Seo*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3563-3579, 2021, DOI:10.32604/cmc.2021.018901

    Abstract Following the development of communication techniques and smart devices, the era of Artificial Intelligence (AI) and big data has arrived. The increased connectivity, referred to as hyper-connectivity, has led to the development of smart cities. People in these smart cities can access numerous online contents and are always connected. These developments, however, also lead to a lack of standardization and consistency in the propagation of information throughout communities due to the consumption of information through social media channels. Information cannot often be verified, which can confuse the users. The increasing influence of social media has thus led to the emergence… More >

  • Open Access

    ARTICLE

    Modeling CO2 Emission of Middle Eastern Countries Using Intelligent Methods

    Mamdouh El Haj Assad1, Ibrahim Mahariq2,*, Zaher Al Barakeh2, Mahmoud Khasawneh2, Mohammad Ali Amooie3

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3767-3781, 2021, DOI:10.32604/cmc.2021.018872

    Abstract CO2 emission is considerably dependent on energy consumption and on share of energy sources as well as on the extent of economic activities. Consequently, these factors must be considered for CO2 emission prediction for seven middle eastern countries including Iran, Kuwait, United Arab Emirates, Turkey, Saudi Arabia, Iraq and Qatar. In order to propose a predictive model, a Multilayer Perceptron Artificial Neural Network (MLP ANN) is applied. Three transfer functions including logsig, tansig and radial basis functions are utilized in the hidden layer of the network. Moreover, various numbers of neurons are applied in the structure of the models. It… More >

Displaying 11311-11320 on page 1132 of 22360. Per Page