Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Motion Enhanced Model Based on High-Level Spatial Features

    Yang Wu1, Lei Guo1, Xiaodong Dai1, Bin Zhang1, Dong-Won Park2, Ming Ma1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5911-5924, 2022, DOI:10.32604/cmc.2022.031664

    Abstract Action recognition has become a current research hotspot in computer vision. Compared to other deep learning methods, Two-stream convolutional network structure achieves better performance in action recognition, which divides the network into spatial and temporal streams, using video frame images as well as dense optical streams in the network, respectively, to obtain the category labels. However, the two-stream network has some drawbacks, i.e., using dense optical flow as the input of the temporal stream, which is computationally expensive and extremely time-consuming for the current extraction algorithm and cannot meet the requirements of real-time tasks. In this paper, instead of the… More >

  • Open Access

    ARTICLE

    Chaotic Pigeon Inspired Optimization Technique for Clustered Wireless Sensor Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Sami Dhahbi3, Dalia H. Elkamchouchi4, Jaber S. Alzahrani5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6547-6561, 2022, DOI:10.32604/cmc.2022.031660

    Abstract Wireless Sensor Networks (WSN) interlink numerous Sensor Nodes (SN) to support Internet of Things (loT) services. But the data gathered from SNs can be divulged, tempered, and forged. Conventional WSN data processes manage the data in a centralized format at terminal gadgets. These devices are prone to attacks and the security of systems can get compromised. Blockchain is a distributed and decentralized technique that has the ability to handle security issues in WSN. The security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network system. This breaches the mutual trust and allows data… More >

  • Open Access

    ARTICLE

    The Impact of Check Bits on the Performance of Bloom Filter

    Rehan Ullah Khan1, Ali Mustafa Qamar2,*, Suliman A. Alsuhibany2, Mohammed Alsuhaibani2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6037-6046, 2022, DOI:10.32604/cmc.2022.031626

    Abstract Bloom filter (BF) is a space-and-time efficient probabilistic technique that helps answer membership queries. However, BF faces several issues. The problems with traditional BF are generally two. Firstly, a large number of false positives can return wrong content when the data is queried. Secondly, the large size of BF is a bottleneck in the speed of querying and thus uses large memory. In order to solve the above two issues, in this article, we propose the check bits concept. From the implementation perspective, in the check bits approach, before saving the content value in the BF, we obtain the binary… More >

  • Open Access

    ARTICLE

    Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model

    Hadil Shaiba1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Radwa Marzouk4, Heba Mohsen5, Manar Ahmed Hamza6,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6425-6441, 2022, DOI:10.32604/cmc.2022.031625

    Abstract Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords, account identifiers, bank details, etc. In general, these kinds of cyberattacks are made at users through phone calls, emails, or instant messages. The anti-phishing techniques, currently under use, are mainly based on source code features that need to scrape the webpage content. In third party services, these techniques check the classification procedure of phishing Uniform Resource Locators (URLs). Even though Machine Learning (ML) techniques have been lately utilized in the identification of phishing, they still need to undergo feature engineering since… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment

    Fahad F. Alruwaili*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5809-5824, 2022, DOI:10.32604/cmc.2022.031613

    Abstract Internet of Things (IoT) is one of the hottest research topics in recent years, thanks to its dynamic working mechanism that integrates physical and digital world into a single system. IoT technology, applied in industries, is termed as Industrial IoT (IIoT). IIoT has been found to be highly susceptible to attacks from adversaries, based on the difficulties observed in IIoT and its increased dependency upon internet and communication network. Intentional or accidental attacks on these approaches result in catastrophic effects like power outage, denial of vital health services, disruption to civil service, etc., Thus, there is a need exists to… More >

  • Open Access

    ARTICLE

    Two-Fold and Symmetric Repeatability Rates for Comparing Keypoint Detectors

    Ibrahim El rube'*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6495-6511, 2022, DOI:10.32604/cmc.2022.031602

    Abstract The repeatability rate is an important measure for evaluating and comparing the performance of keypoint detectors. Several repeatability rate measurements were used in the literature to assess the effectiveness of keypoint detectors. While these repeatability rates are calculated for pairs of images, the general assumption is that the reference image is often known and unchanging compared to other images in the same dataset. So, these rates are asymmetrical as they require calculations in only one direction. In addition, the image domain in which these computations take place substantially affects their values. The presented scatter diagram plots illustrate how these directional… More >

  • Open Access

    ARTICLE

    Optimization of Adaptive Fuzzy Controller for Maximum Power Point Tracking Using Whale Algorithm

    Mehrdad Ahmadi Kamarposhti1,*, Hassan Shokouhandeh2, Ilhami Colak3, Kei Eguchi4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5041-5061, 2022, DOI:10.32604/cmc.2022.031583

    Abstract The advantage of fuzzy controllers in working with inaccurate and nonlinear inputs is that there is no need for an accurate mathematical model and fast convergence and minimal fluctuations in the maximum power point detector. The capability of online fuzzy tracking systems is maximum power, resistance to radiation and temperature changes, and no need for external sensors to measure radiation intensity and temperature. However, the most important issue is the constant changes in the amount of sunlight that cause the maximum power point to be constantly changing. The controller used in the maximum power point tracking (MPPT) circuit must be… More >

  • Open Access

    ARTICLE

    Optimal FOPID Controllers for LFC Including Renewables by Bald Eagle Optimizer

    Ahmed M. Agwa1, Mohamed Abdeen2, Shaaban M. Shaaban1,3,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5525-5541, 2022, DOI:10.32604/cmc.2022.031580

    Abstract In this study, a bald eagle optimizer (BEO) is used to get optimal parameters of the fractional-order proportional–integral–derivative (FOPID) controller for load frequency control (LFC). Since BEO takes only a very short time in finding the optimal solution, it is selected for designing the FOPID controller that improves the system stability and maintains the frequency within a satisfactory range at different loads. Simulations and demonstrations are carried out using MATLAB-R2020b. The performance of the BEO-FOPID controller is evaluated using a two-zone interlinked power system at different loads and under uncertainty of wind and solar energies. The robustness of the BEO-FOPID… More >

  • Open Access

    ARTICLE

    Intelligent Slime Mould Optimization with Deep Learning Enabled Traffic Prediction in Smart Cities

    Manar Ahmed Hamza1,*, Hadeel Alsolai2, Jaber S. Alzahrani3, Mohammad Alamgeer4,5, Mohamed Mahmoud Sayed6, Abu Sarwar Zamani1, Ishfaq Yaseen1, Abdelwahed Motwakel1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6563-6577, 2022, DOI:10.32604/cmc.2022.031541

    Abstract Intelligent Transportation System (ITS) is one of the revolutionary technologies in smart cities that helps in reducing traffic congestion and enhancing traffic quality. With the help of big data and communication technologies, ITS offers real-time investigation and highly-effective traffic management. Traffic Flow Prediction (TFP) is a vital element in smart city management and is used to forecast the upcoming traffic conditions on transportation network based on past data. Neural Network (NN) and Machine Learning (ML) models are widely utilized in resolving real-time issues since these methods are capable of dealing with adaptive data over a period of time. Deep Learning… More >

  • Open Access

    ARTICLE

    Asymmetric Patch Element Reflectarray with Dual Linear and Dual Circular Polarization

    M. Hashim Dahri1, M. H. Jamaluddin2, M. Inam3, M. R. Kamarudin4, F. C. Seman4, A. Y. I. Ashyap4, Z. A. Shamsan5,*, K. Almuhanna5, F. Alorifi5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6085-6101, 2022, DOI:10.32604/cmc.2022.031532

    Abstract A reflectarray antenna consisting of asymmetrical patch elements is proposed, which is capable of producing dual linear and dual circular polarized operation at 26 GHz frequency. The main purpose of this design is to support four different polarizations using the same patch element. The proposed reflectarray has a single layer configuration with a linearly polarized feed and circular ring slots in the ground plane. Asymmetric patch element is designed from a square patch element by tilting its one vertical side to some optimized inclination. A wide reflection phase range of 600° is obtained with the asymmetric patch element during unit cell… More >

Displaying 6761-6770 on page 677 of 22225. Per Page