Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Classification of Epileptic Electroencephalograms Using Time-Frequency and Back Propagation Methods

    Sengul Bayrak1,2,*, Eylem Yucel2, Hidayet Takci3, Ruya Samli2

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1427-1446, 2021, DOI:10.32604/cmc.2021.015524

    Abstract Today, electroencephalography is used to measure brain activity by creating signals that are viewed on a monitor. These signals are frequently used to obtain information about brain neurons and may detect disorders that affect the brain, such as epilepsy. Electroencephalogram (EEG) signals are however prone to artefacts. These artefacts must be removed to obtain accurate and meaningful signals. Currently, computer-aided systems have been used for this purpose. These systems provide high computing power, problem-specific development, and other advantages. In this study, a new clinical decision support system was developed for individuals to detect epileptic seizures using EEG signals. Comprehensive classification… More >

  • Open Access

    ARTICLE

    Design of Intelligent Mosquito Nets Based on Deep Learning Algorithms

    Yuzhen Liu1,3, Xiaoliang Wang1,*, Xinghui She1, Ming Yi1, Yuelong Li1, Frank Jiang2

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2261-2276, 2021, DOI:10.32604/cmc.2021.015501

    Abstract An intelligent mosquito net employing deep learning has been one of the hotspots in the field of Internet of Things as it can reduce significantly the spread of pathogens carried by mosquitoes, and help people live well in mosquito-infested areas. In this study, we propose an intelligent mosquito net that can produce and transmit data through the Internet of Medical Things. In our method, decision-making is controlled by a deep learning model, and the proposed method uses infrared sensors and an array of pressure sensors to collect data. Moreover the ZigBee protocol is used to transmit the pressure map which… More >

  • Open Access

    ARTICLE

    Negotiation Based Combinatorial Double Auction Mechanism in Cloud Computing

    Zakir Ullah1, Asif Umer1, Mahdi Zaree2, Jamil Ahmad1, Faisal Alanazi3,*, Noor Ul Amin1, Arif Iqbal Umar1, Ali Imran Jehangiri1, Muhammad Adnan1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2123-2140, 2021, DOI:10.32604/cmc.2021.015445

    Abstract Cloud computing is a demanding business platform for services related to the field of IT. The goal of cloud customers is to access resources at a sustainable price, while the goal of cloud suppliers is to maximize their services utilization. Previously, the customers would bid for every single resource type, which was a limitation of cloud resources allocation. To solve these issues, researchers have focused on a combinatorial auction in which the resources are offered by the providers in bundles so that the user bids for their required bundle. Still, in this allocation mechanism, some drawbacks need to be tackled,… More >

  • Open Access

    ARTICLE

    ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network

    Sundresan Perumal1, Mujahid Tabassum1, Ganthan Narayana2, Suresh Ponnan3,*, Chinmay Chakraborty4, Saju Mohanan5, Zeeshan Basit5, Mohammad Tabrez Quasim6

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1447-1462, 2021, DOI:10.32604/cmc.2021.014854

    Abstract A wireless sensor network (WSN) consists of several tiny sensor nodes to monitor, collect, and transmit the physical information from an environment through the wireless channel. The node failure is considered as one of the main issues in the WSN which creates higher packet drop, delay, and energy consumption during the communication. Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets. In this paper, Artificial Neural Network (ANN) based Node Failure Detection (NFD) is developed with cognitive radio for detecting the location of the node failure. The ad hoc on-demand distance vector (AODV)… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Clustering Based Transmission Protocol for Wireless Body Area Networks

    Neelam Sharma1,*, Harshita Chadha2, Karan Singh3, B. M. Singh4, Nitish Pathak5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2459-2473, 2021, DOI:10.32604/cmc.2021.014305

    Abstract Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst themselves. In recent years, this field of research has become increasingly popular due to the host of useful applications it can potentially serve. A deep analysis of the concepts associated with this domain reveals that the two main problems that are to be tackled here are throughput enhancement and network security improvement. The present article takes on one of these two issues namely the throughput enhancement. For the purpose of improving network productivity, a hybrid… More >

  • Open Access

    ARTICLE

    Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks

    Merna Gamal1, Hala M. Abbas2, Nour Moustafa3,*, Elena Sitnikova3, Rowayda A. Sadek1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1823-1837, 2021, DOI:10.32604/cmc.2021.012877

    Abstract Intrusion Detection Systems (IDSs) have a great interest these days to discover complex attack events and protect the critical infrastructures of the Internet of Things (IoT) networks. Existing IDSs based on shallow and deep network architectures demand high computational resources and high volumes of data to establish an adaptive detection engine that discovers new families of attacks from the edge of IoT networks. However, attackers exploit network gateways at the edge using new attacking scenarios (i.e., zero-day attacks), such as ransomware and Distributed Denial of Service (DDoS) attacks. This paper proposes new IDS based on Few-Shot Deep Learning, named CNN-IDS,… More >

  • Open Access

    ARTICLE

    Using Blockchain Technology in Mobile Network to create decentralized Home Location Registry (HLR)

    Behnam Kiani Kalejahi1,2,*, Ruslan Eminov1, Aga Guliyev1

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 287-296, 2021, DOI:10.32604/csse.2021.05480

    Abstract Blockchain can mean many things to many people. It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers. It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies. For technologists, it is the driving force behind the next generation of the internet. On the other hand, it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people, a tool for radically reshaping society and economy. Some view it as a disruptive technology that… More >

  • Open Access

    ARTICLE

    Task Allocation Approach for Minimizing Make-Span in Wireless Sensor Actor Networks

    Mohammad Reza Okhovvat1, Mohammad Taghi Kheirabadi1,*, Ali Nodehi1, Morteza Okhovvat2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 165-178, 2021, DOI:10.32604/csse.2021.05468

    Abstract Wireless Sensor Actor Networks (WSANs) have contributed to the development of pervasive computing wherein time consideration to perform the tasks of pervasive applications is necessary. Hence, time constraint is one of the major challenges of WSANs. In this paper, we propose an analytical approach based on queuing theory to minimize the total time taken for completion of tasks, i.e., make-span, in WSANs with hybrid architecture. The best allocation rates of tasks to actor nodes are figured out through solving inequities and qualities resulting from a steady state analysis of the proposed model. Applying the calculated tasks arrival rates at each… More >

  • Open Access

    A Novel PoW Scheme Implemented by Probabilistic Signature for Blockchain

    Bo Mi1, Yuan Weng1, Darong Huang1,*, Yang Liu1, Yuqing Gan2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 265-274, 2021, DOI:10.32604/csse.2021.017507

    Abstract PoW (Proof of Work) plays a significant role in most blockchain systems to grant an accounting right over decentralized participants and ensure tamper resistance. Though hash functions are generally exploited for PoW due to their merits on summering, anti-collision, and irreversibility, they cannot certify that the bookkeeper is exactly the worker. Thereafter, such insistence may lead to abuse or even embezzlement of computing power for the benefit of malicious miners. To preserve the functionality of PoW but also bind the miners’ signing keys with their works, we build a post-quantum PoW scheme by changing the approximate closest vector norm for… More >

  • Open Access

    ARTICLE

    Community Detection in Aviation Network Based on K-means and Complex Network

    Hang He1,*, Zhenhan Zhao1, Weiwei Luo1, Jinghui Zhang2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 251-264, 2021, DOI:10.32604/csse.2021.017296

    Abstract With the increasing number of airports and the expansion of their scale, the aviation network has become complex and hierarchical. In order to investigate the complex network characteristics of aviation networks, this paper constructs a Chinese aviation network model and carries out related research based on complex network theory and K-means algorithm. Initially, the P-space model is employed to construct the Chinese aviation network model. Then, complex network indicators such as degree, clustering coefficient, average path length, betweenness and coreness are selected to investigate the complex characteristics and hierarchical features of aviation networks and explore their causes. Secondly, using K-means… More >

Displaying 11481-11490 on page 1149 of 22212. Per Page