Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    A Novel Stochastic Framework for the MHD Generator in Ocean

    Sakda Noinang1, Zulqurnain Sabir2, Shumaila Javeed3, Muhammad Asif Zahoor Raja4, Dostdar Ali3, Wajaree Weera5,*, Thongchai Botmart5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3383-3402, 2022, DOI:10.32604/cmc.2022.029166

    Abstract This work aims to study the nonlinear ordinary differential equations (ODEs) system of magnetohydrodynamic (MHD) past over an inclined plate using Levenberg-Marquardt backpropagation neural networks (LMBNNs). The stochastic procedures LMBNNs are provided with three categories of sample statistics, testing, training, and verification. The nonlinear MHD system past over an inclined plate is divided into three profiles, dimensionless momentum, species (salinity), and energy (heat) conservations. The data is applied 15%, 10%, and 75% for validation, testing, and training to solve the nonlinear system of MHD past over an inclined plate. A reference data set is designed to compare the obtained and… More >

  • Open Access

    ARTICLE

    Trustworthiness Evaluation for Permissioned Blockchain-Enabled Applications

    Shi-Cho Cha1, Chuang-Ming Shiung1, Wen-Wei Li1, Chun-Neng Peng1, Yi-Hsuan Hung1, Kuo-Hui Yeh2,3,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2731-2755, 2022, DOI:10.32604/cmc.2022.029161

    Abstract As permissioned blockchain becomes a common foundation of blockchain-based circumstances for current organizations, related stakeholders need a means to assess the trustworthiness of the applications involved within. It is extremely important to consider the potential impact brought by the Blockchain technology in terms of security and privacy. Therefore, this study proposes a rigorous security risk management framework for permissioned blockchain-enabled applications. The framework divides itself into different implementation domains, i.e., organization security, application security, consensus mechanism security, node management and network security, host security and perimeter security, and simultaneously provides guidelines to control the security risks of permissioned blockchain applications… More >

  • Open Access

    ARTICLE

    Deep CNN Model for Multimodal Medical Image Denoising

    Walid El-Shafai1,2, Amira A. Mahmoud1, Anas M. Ali1,3, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3795-3814, 2022, DOI:10.32604/cmc.2022.029134

    Abstract In the literature, numerous techniques have been employed to decrease noise in medical image modalities, including X-Ray (XR), Ultrasonic (Us), Computed Tomography (CT), Magnetic Resonance Imaging (MRI), and Positron Emission Tomography (PET). These techniques are organized into two main classes: the Multiple Image (MI) and the Single Image (SI) techniques. In the MI techniques, images usually obtained for the same area scanned from different points of view are used. A single image is used in the entire procedure in the SI techniques. SI denoising techniques can be carried out both in a transform or spatial domain. This paper is concerned… More >

  • Open Access

    ARTICLE

    A Secure Multiparty Quantum Homomorphic Encryption Scheme

    Jing-Wen Zhang1, Xiu-Bo Chen1,*, Gang Xu2,3, Heng-Ji Li4, Ya-Lan Wang5, Li-Hua Miao6, Yi-Xian Yang1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2835-2848, 2022, DOI:10.32604/cmc.2022.029125

    Abstract The significant advantage of the quantum homomorphic encryption scheme is to ensure the perfect security of quantum private data. In this paper, a novel secure multiparty quantum homomorphic encryption scheme is proposed, which can complete arbitrary quantum computation on the private data of multiple clients without decryption by an almost dishonest server. Firstly, each client obtains a secure encryption key through the measurement device independent quantum key distribution protocol and encrypts the private data by using the encryption operator and key. Secondly, with the help of the almost dishonest server, the non-maximally entangled states are pre-shared between the client and… More >

  • Open Access

    ARTICLE

    Maintain Optimal Configurations for Large Configurable Systems Using Multi-Objective Optimization

    Muhammad Abid Jamil1,*, Deafallah Alsadie1, Mohamed K. Nour1, Normi Sham Awang Abu Bakar2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4407-4422, 2022, DOI:10.32604/cmc.2022.029096

    Abstract To improve the maintenance and quality of software product lines, efficient configurations techniques have been proposed. Nevertheless, due to the complexity of derived and configured products in a product line, the configuration process of the software product line (SPL) becomes time-consuming and costly. Each product line consists of a various number of feature models that need to be tested. The different approaches have been presented by Search-based software engineering (SBSE) to resolve the software engineering issues into computational solutions using some metaheuristic approach. Hence, multiobjective evolutionary algorithms help to optimize the configuration process of SPL. In this paper, different multi-objective… More >

  • Open Access

    ARTICLE

    TMTACS: Two-Tier Multi-Trust-Based Algorithm to Countermeasure the Sybil Attacks

    Meena Bharti1,*, Shaveta Rani2, Paramjeet Singh2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3497-3512, 2022, DOI:10.32604/cmc.2022.029072

    Abstract Mobile Ad hoc Networks (MANETs) have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic. These fake nodes need to be detected and deactivated for security reasons, to avoid harming the data collected by various applications. The MANET is an emerging field that promotes trust management among devices. Transparency is becoming more essential in the communication process, which is why clear and honest communication strategies are needed. Trust Management allows for MANET devices with different security protocols to connect. If a device finds difficulty in sending a message to… More >

  • Open Access

    ARTICLE

    LBP–Bilateral Based Feature Fusion for Breast Cancer Diagnosis

    Yassir Edrees Almalki1, Maida Khalid2, Sharifa Khalid Alduraibi3, Qudsia Yousaf2, Maryam Zaffar2, Shoayea Mohessen Almutiri4, Muhammad Irfan5, Mohammad Abd Alkhalik Basha6, Alaa Khalid Alduraibi3, Abdulrahman Manaa Alamri7, Khalaf Alshamrani8, Hassan A. Alshamrani8,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4103-4121, 2022, DOI:10.32604/cmc.2022.029039

    Abstract Since reporting cases of breast cancer are on the rise all over the world. Especially in regions such as Pakistan, Saudi Arabia, and the United States. Efficient methods for the early detection and diagnosis of breast cancer are needed. The usual diagnosis procedures followed by physicians has been updated with modern diagnostic approaches that include computer-aided support for better accuracy. Machine learning based practices has increased the accuracy and efficiency of medical diagnosis, which has helped save lives of many patients. There is much research in the field of medical imaging diagnostics that can be applied to the variety of… More >

  • Open Access

    ARTICLE

    Cache Memory Design for Single Bit Architecture with Different Sense Amplifiers

    Reeya Agrawal1,*, Anjan Kumar1, Salman A. AlQahtani2, Mashael Maashi3, Osamah Ibrahim Khalaf4, Theyazn H. H. Aldhyani5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2313-2331, 2022, DOI:10.32604/cmc.2022.029019

    Abstract Most modern microprocessors have one or two levels of on-chip caches to make things run faster, but this is not always the case. Most of the time, these caches are made of static random access memory cells. They take up a lot of space on the chip and use a lot of electricity. A lot of the time, low power is more important than several aspects. This is true for phones and tablets. Cache memory design for single bit architecture consists of six transistors static random access memory cell, a circuit of write driver, and sense amplifiers (such as voltage… More >

  • Open Access

    ARTICLE

    Optimal and Robust Power System Stabilizers in a Multi Machine System

    Mehrdad Ahmadi Kamarposhti1,*, Hassan Shokouhandeh2, Ilhami Colak3, Kei Eguchi4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4139-4156, 2022, DOI:10.32604/cmc.2022.029011

    Abstract One method for eliminating oscillations in power systems is using stabilizers. By applying an appropriate control signal in the excitation system of a generator, a power system stabilizer improves the dynamic stability of power systems. However, the issue that is of high importance is the correct design of these stabilizers. These stabilizers must be designed to have proper performance when operating conditions change. When designed incorrectly, not only they do not improve the stability margin, but also increase the oscillations. In this paper, the robust design of power system stabilizers on a four-machine power system has been performed. For this… More >

  • Open Access

    ARTICLE

    Natural Language Processing with Optimal Deep Learning Based Fake News Classification

    Sara A. Althubiti1, Fayadh Alenezi2, Romany F. Mansour3,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3529-3544, 2022, DOI:10.32604/cmc.2022.028981

    Abstract The recent advancements made in World Wide Web and social networking have eased the spread of fake news among people at a faster rate. At most of the times, the intention of fake news is to misinform the people and make manipulated societal insights. The spread of low-quality news in social networking sites has a negative influence upon people as well as the society. In order to overcome the ever-increasing dissemination of fake news, automated detection models are developed using Artificial Intelligence (AI) and Machine Learning (ML) methods. The latest advancements in Deep Learning (DL) models and complex Natural Language… More >

Displaying 7481-7490 on page 749 of 22225. Per Page