Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    A Novel Broadband Antenna Design for 5G Applications

    Omar A. Saraereh*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1121-1136, 2021, DOI:10.32604/cmc.2021.015066

    Abstract Wireless communication is one of the rapidly-growing fields of the communication industry. This continuous growth motivates the antenna community to design new radiating structures to meet the needs of the market. The 5G wireless communication has received a lot of attention from both academia and industry and significant efforts have been made to improve different aspects, such as data rate, latency, mobility, reliability and QoS. Antenna design has received renewed attention in the last decade due to its potential applications in 5G, IoT, mmWave, and massive MIMO. This paper proposes a novel design of broadband antenna for 5G mmWave and… More >

  • Open Access

    ARTICLE

    Methodology for Detecting Strabismus through Video Analysis and Intelligent Mining Techniques

    Hanan Abdullah Mengash1,*, Hanan A. Hosni Mahmoud1,2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1013-1032, 2021, DOI:10.32604/cmc.2021.014942

    Abstract Strabismus is a medical condition that is defined as the lack of coordination between the eyes. When Strabismus is detected at an early age, the chances of curing it are higher. The methods used to detect strabismus and measure its degree of deviation are complex and time-consuming, and they always require the presence of a physician. In this paper, we present a method of detecting strabismus and measuring its degree of deviation using videos of the patient’s eye region under a cover test. Our method involves extracting features from a set of training videos (training corpora) and using them to… More >

  • Open Access

    ARTICLE

    Identifying Driver Genes Mutations with Clinical Significance in Thyroid Cancer

    Hyeong Won Yu1, Muhammad Afzal2, Maqbool Hussain2, Hyungju Kwon3, Young Joo Park4, June Young Choi1,*, Kyu Eun Lee5

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1241-1251, 2021, DOI:10.32604/cmc.2021.014910

    Abstract Advances in technology are enabling gene mutations in papillary thyroid carcinoma (PTC) to be analyzed and clinical outcomes, such as recurrence, to be predicted. To date, the most common genetic mutation in PTC is in BRAF kinase (BRAF). However, whether mutations in other genes coincide with those in BRAF remains to be clarified. The aim of this study was to find mutations in other genes that co-exist with mutated BRAF, and to analyze their frequency and clinical relevance in PTC. Clinical and genetic data were collected from 213 PTC patients with a total of 36,572 mutation sites in 735 genes.… More >

  • Open Access

    ARTICLE

    Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform

    Mohammed Alshehri*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 917-931, 2021, DOI:10.32604/cmc.2021.014848

    Abstract Cyber Threat Intelligence (CTI) has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such attacks. The information exchange and collaborative sharing through different platforms have a significant contribution towards a global solution. While CTI and the information exchange can help a lot in focusing and prioritizing on the use of the large volume of complex information among different organizations, there exists a great challenge ineffective processing of large count of different Indicators of Threat (IoT) which appear regularly, and that can be solved… More >

  • Open Access

    ARTICLE

    An Online Chronic Disease Prediction System Based on Incremental Deep Neural Network

    Bin Yang1,*, Lingyun Xiang2, Xianyi Chen3, Wenjing Jia4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 951-964, 2021, DOI:10.32604/cmc.2021.014839

    Abstract Many chronic disease prediction methods have been proposed to predict or evaluate diabetes through artificial neural network. However, due to the complexity of the human body, there are still many challenges to face in that process. One of them is how to make the neural network prediction model continuously adapt and learn disease data of different patients, online. This paper presents a novel chronic disease prediction system based on an incremental deep neural network. The propensity of users suffering from chronic diseases can continuously be evaluated in an incremental manner. With time, the system can predict diabetes more and more… More >

  • Open Access

    ARTICLE

    Tele-COVID: A Telemedicine SOA-Based Architectural Design for COVID-19 Patients

    Asadullah Shaikh*, Mana Saleh AlReshan, Yousef Asiri, Adel Sulaiman, Hani Alshahrani

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 549-576, 2021, DOI:10.32604/cmc.2021.014813

    Abstract In Wuhan, China, a novel Corona Virus (COVID-19) was detected in December 2019; it has changed the entire world and to date, the number of diagnosed cases is 38,756,2891 and 1,095,2161 people have died. This happened because a large number of people got affected and there is a lack of hospitals for COVID-19 patients. One of the precautionary measures for COVID-19 patients is isolation. To support this, there is an urgent need for a platform that makes treatment possible from a distance. Telemedicine systems have been drastically increasing in number and size over recent years. This increasing number intensifies the… More >

  • Open Access

    ARTICLE

    An Efficient Sound and Data Steganography Based Secure Authentication System

    Debajit Datta1, Lalit Garg2,*, Kathiravan Srinivasan3, Atsushi Inoue4, G. Thippa Reddy3, M. Praveen Kumar Reddy3, K. Ramesh5, Nidal Nasser6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 723-751, 2021, DOI:10.32604/cmc.2021.014802

    Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into… More >

  • Open Access

    ARTICLE

    High Order Block Method for Third Order ODEs

    A. I. Asnor1, S. A. M. Yatim1, Z. B. Ibrahim2, N. Zainuddin3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1253-1267, 2021, DOI:10.32604/cmc.2021.014781

    Abstract Many initial value problems are difficult to be solved using ordinary, explicit step-by-step methods because most of these problems are considered stiff. Certain implicit methods, however, are capable of solving stiff ordinary differential equations (ODEs) usually found in most applied problems. This study aims to develop a new numerical method, namely the high order variable step variable order block backward differentiation formula (VSVO-HOBBDF) for the main purpose of approximating the solutions of third order ODEs. The computational work of the VSVO-HOBBDF method was carried out using the strategy of varying the step size and order in a single code. The… More >

  • Open Access

    ARTICLE

    Hacking Anti-Shoplifting System to Hide Data within Clothes

    Al Hussien Seddik Saad1,*, E. H. Hafez2, Zubair Ahmad3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 659-674, 2021, DOI:10.32604/cmc.2021.014758

    Abstract Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The… More >

  • Open Access

    ARTICLE

    Collision Observation-Based Optimization of Low-Power and Lossy IoT Network Using Reinforcement Learning

    Arslan Musaddiq1, Rashid Ali2, Jin-Ghoo Choi1, Byung-Seo Kim3,*, Sung-Won Kim1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 799-814, 2021, DOI:10.32604/cmc.2021.014751

    Abstract The Internet of Things (IoT) has numerous applications in every domain, e.g., smart cities to provide intelligent services to sustainable cities. The next-generation of IoT networks is expected to be densely deployed in a resource-constrained and lossy environment. The densely deployed nodes producing radically heterogeneous traffic pattern causes congestion and collision in the network. At the medium access control (MAC) layer, mitigating channel collision is still one of the main challenges of future IoT networks. Similarly, the standardized network layer uses a ranking mechanism based on hop-counts and expected transmission counts (ETX), which often does not adapt to the dynamic… More >

Displaying 13051-13060 on page 1306 of 22212. Per Page