Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    A Time-Domain Comparator Based Skipping-Window SAR ADC

    Liangbo Xie1, Yan Ren1, Mu Zhou1, Xiaolong Yang1,*, Zhengwen Huang2

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1597-1609, 2021, DOI:10.32604/cmc.2021.018502

    Abstract This paper presents an energy efficient successive-approximation register (SAR) analog-to-digital converter (ADC) for low-power applications. To improve the overall energy-efficiency, a skipping-window technique is used to bypass corresponding conversion steps when the input falls in a window indicated by a time-domain comparator, which can provide not only the polarity of the input, but also the amount information of the input. The time-domain comparator, which is based on the edge pursing principle, consists of delay cells, two NAND gates, two D-flip-flop register-based phase detectors and a counter. The digital characteristic of the comparator makes the design more flexible, and the comparator… More >

  • Open Access

    ARTICLE

    Towards Machine Learning Based Intrusion Detection in IoT Networks

    Nahida Islam1, Fahiba Farhin1, Ishrat Sultana1, M. Shamim Kaiser1, Md. Sazzadur Rahman1, Mufti Mahmud2, A. S. M. Sanwar Hosen3, Gi Hwan Cho3,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1801-1821, 2021, DOI:10.32604/cmc.2021.018466

    Abstract The Internet of Things (IoT) integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience in many applications including healthcare, agriculture, supply chain, education, transportation and traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one of the most complicated issues on the IoT. Implementing security measures, including encryption, access control, and authentication for the IoT devices are ineffective in achieving security. In this paper, we identified various types of IoT threats and shallow (such as decision… More >

  • Open Access

    ARTICLE

    Energy Optimization in Multi-UAV-Assisted Edge Data Collection System

    Bin Xu1,2,3, Lu Zhang1, Zipeng Xu1, Yichuan Liu1, Jinming Chai1, Sichong Qin4, Yanfei Sun1,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1671-1686, 2021, DOI:10.32604/cmc.2021.018395

    Abstract In the IoT (Internet of Things) system, the introduction of UAV (Unmanned Aerial Vehicle) as a new data collection platform can solve the problem that IoT devices are unable to transmit data over long distances due to the limitation of their battery energy. However, the unreasonable distribution of UAVs will still lead to the problem of the high total energy consumption of the system. In this work, to deal with the problem, a deployment model of a mobile edge computing (MEC) system based on multi-UAV is proposed. The goal of the model is to minimize the energy consumption of the… More >

  • Open Access

    ARTICLE

    An Optimized Design of Antenna Arrays for the Smart Antenna Systems

    Fahd N. Al-Wesabi1,2,*, Murad A. A. Almekhlafi3, Huda G. Iskandar2,4, Adnan Zain5, Saleh Alzahrani6, Mohammed Alamgeer6, Nadhem Nemri6, Sami Dhabi6, Mohammad Medani6, Ali. M. Al-Sharafi2,7

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1979-1994, 2021, DOI:10.32604/cmc.2021.018390

    Abstract In recent years, there has been an increasing demand to improve cellular communication services in several aspects. The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas. this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation (MATLAB) which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides, ordinary End-fire, and increasing directivity End-fire which is typically used in smart antennas. The method of analysis… More >

  • Open Access

    ARTICLE

    ECC: Edge Collaborative Caching Strategy for Differentiated Services Load-Balancing

    Fang Liu1,*, Zhenyuan Zhang2, Zunfu Wang1, Yuting Xing3

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2045-2060, 2021, DOI:10.32604/cmc.2021.018303

    Abstract Due to the explosion of network data traffic and IoT devices, edge servers are overloaded and slow to respond to the massive volume of online requests. A large number of studies have shown that edge caching can solve this problem effectively. This paper proposes a distributed edge collaborative caching mechanism for Internet online request services scenario. It solves the problem of large average access delay caused by unbalanced load of edge servers, meets users’ differentiated service demands and improves user experience. In particular, the edge cache node selection algorithm is optimized, and a novel edge cache replacement strategy considering the… More >

  • Open Access

    ARTICLE

    Multi-Criteria Prediction Mechanism for Vehicular Wi-Fi Offloading

    Mahmoud Alawi1, Raed Alsaqour2, Abdi Abdalla3, Maha Abdelhaq4,*, Mueen Uddin5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2313-2337, 2021, DOI:10.32604/cmc.2021.018282

    Abstract The growing demands of vehicular network applications, which have diverse networking and multimedia capabilities that passengers use while traveling, cause an overload of cellular networks. This scenario affects the quality of service (QoS) of vehicle and non-vehicle users. Nowadays, wireless fidelity access points Wi-Fi access point (AP) and fourth generation long-term evolution advanced (4G LTE-A) networks are broadly accessible. Wi-Fi APs can be utilized by vehicle users to stabilize 4G LTE-A networks. However, utilizing the opportunistic Wi-Fi APs to offload the 4G LTE-A networks in a vehicular ad hoc network environment is a relatively difficult task. This condition is due… More >

  • Open Access

    ARTICLE

    Toward Robust Classifiers for PDF Malware Detection

    Marwan Albahar*, Mohammed Thanoon, Monaj Alzilai, Alaa Alrehily, Munirah Alfaar, Maimoona Algamdi, Norah Alassaf

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2181-2202, 2021, DOI:10.32604/cmc.2021.018260

    Abstract Malicious Portable Document Format (PDF) files represent one of the largest threats in the computer security space. Significant research has been done using handwritten signatures and machine learning based on detection via manual feature extraction. These approaches are time consuming, require substantial prior knowledge, and the list of features must be updated with each newly discovered vulnerability individually. In this study, we propose two models for PDF malware detection. The first model is a convolutional neural network (CNN) integrated into a standard deviation based regularization model to detect malicious PDF documents. The second model is a support vector machine (SVM)… More >

  • Open Access

    ARTICLE

    A Novel AlphaSRGAN for Underwater Image Super Resolution

    Aswathy K. Cherian*, E. Poovammal

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1537-1552, 2021, DOI:10.32604/cmc.2021.018213

    Abstract Obtaining clear images of underwater scenes with descriptive details is an arduous task. Conventional imaging techniques fail to provide clear cut features and attributes that ultimately result in object recognition errors. Consequently, a need for a system that produces clear images for underwater image study has been necessitated. To overcome problems in resolution and to make better use of the Super-Resolution (SR) method, this paper introduces a novel method that has been derived from the Alpha Generative Adversarial Network (AlphaGAN) model, named Alpha Super Resolution Generative Adversarial Network (AlphaSRGAN). The model put forth in this paper helps in enhancing the… More >

  • Open Access

    ARTICLE

    Enhanced Fingerprinting Based Indoor Positioning Using Machine Learning

    Muhammad Waleed Pasha1, Mir Yasir Umair1, Alina Mirza1,*, Faizan Rao1, Abdul Wakeel1, Safia Akram1, Fazli Subhan2, Wazir Zada Khan3

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1631-1652, 2021, DOI:10.32604/cmc.2021.018205

    Abstract Due to the inability of the Global Positioning System (GPS) signals to penetrate through surfaces like roofs, walls, and other objects in indoor environments, numerous alternative methods for user positioning have been presented. Amongst those, the Wi-Fi fingerprinting method has gained considerable interest in Indoor Positioning Systems (IPS) as the need for line-of-sight measurements is minimal, and it achieves better efficiency in even complex indoor environments. Offline and online are the two phases of the fingerprinting method. Many researchers have highlighted the problems in the offline phase as it deals with huge datasets and validation of Fingerprints without pre-processing of… More >

  • Open Access

    ARTICLE

    An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques

    Fahd N. Al-Wesabi1,2,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1519-1536, 2021, DOI:10.32604/cmc.2021.018202

    Abstract In this paper, the text analysis-based approach RTADZWA (Reliable Text Analysis and Digital Zero-Watermarking Approach) has been proposed for transferring and receiving authentic English text via the internet. Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it. Text analysis and text zero-watermarking techniques have been integrated by… More >

Displaying 11471-11480 on page 1148 of 22248. Per Page