Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Subcarrier BD with Cooperative Communication for MIMO-NOMA System

    Jung-In Baik, Ji-Hwan Kim, Beom-Sik Shin, Ji-Hye Oh, Hyoung-Kyu Song*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5807-5821, 2022, DOI:10.32604/cmc.2022.028434

    Abstract With the rapid evolution of Internet of things (IoT), many edge devices require simultaneous connection in 5G communication era. To afford massive data of IoT devices, multiple input multiple output non-orthogonal multiple access (MIMO-NOMA) method has been considered as a promising technology. However, there are numerous drawbacks due to error propagation and inter-user interferences. Therefore, proposed scheme aims to improve the reliability of the MIMO-NOMA system with digital beamforming and intra-cluster cooperative multi point (CoMP) to efficiently support IoT system. In the conventional MIMO-NOMA system, user entities are grouped into clusters. Block diagonalization (BD) is applied to efficiently eliminate the… More >

  • Open Access

    ARTICLE

    Incremental Learning Model for Load Forecasting without Training Sample

    Charnon Chupong, Boonyang Plangklang*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5415-5427, 2022, DOI:10.32604/cmc.2022.028416

    Abstract This article presents hourly load forecasting by using an incremental learning model called Online Sequential Extreme Learning Machine (OS-ELM), which can learn and adapt automatically according to new arrival input. However, the use of OS-ELM requires a sufficient amount of initial training sample data, which makes OS-ELM inoperable if sufficiently accurate sample data cannot be obtained. To solve this problem, a synthesis of the initial training sample is proposed. The synthesis of the initial sample is achieved by taking the first data received at the start of working and adding random noises to that data to create new and sufficient… More >

  • Open Access

    ARTICLE

    Artificial Fish Swarm for Multi Protein Sequences Alignment in Bioinformatics

    Medhat A. Tawfeek1,2,*, Saad Alanazi1, A. A. Abd El-Aziz3,4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6091-6106, 2022, DOI:10.32604/cmc.2022.028391

    Abstract The alignment operation between many protein sequences or DNA sequences related to the scientific bioinformatics application is very complex. There is a trade-off in the objectives in the existing techniques of Multiple Sequence Alignment (MSA). The techniques that concern with speed ignore accuracy, whereas techniques that concern with accuracy ignore speed. The term alignment means to get the similarity in different sequences with high accuracy. The more growing number of sequences leads to a very complex and complicated problem. Because of the emergence; rapid development; and dependence on gene sequencing, sequence alignment has become important in every biological relationship analysis… More >

  • Open Access

    ARTICLE

    Hybrid Single Image Super-Resolution Algorithm for Medical Images

    Walid El-Shafai1,2, Ehab Mahmoud Mohamed3,4,*, Medien Zeghid3,5, Anas M. Ali1,6, Moustafa H. Aly7

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4879-4896, 2022, DOI:10.32604/cmc.2022.028364

    Abstract High-quality medical microscopic images used for diseases detection are expensive and difficult to store. Therefore, low-resolution images are favorable due to their low storage space and ease of sharing, where the images can be enlarged when needed using Super-Resolution (SR) techniques. However, it is important to maintain the shape and size of the medical images while enlarging them. One of the problems facing SR is that the performance of medical image diagnosis is very poor due to the deterioration of the reconstructed image resolution. Consequently, this paper suggests a multi-SR and classification framework based on Generative Adversarial Network (GAN) to… More >

  • Open Access

    ARTICLE

    Automated Service Search Model for the Social Internet of Things

    Farhan Amin, Seong Oun Hwang*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5871-5888, 2022, DOI:10.32604/cmc.2022.028342

    Abstract The social internet of things (SIoT) is one of the emerging paradigms that was proposed to solve the problems of network service discovery, navigability, and service composition. The SIoT aims to socialize the IoT devices and shape the interconnection between them into social interaction just like human beings. In IoT, an object can offer multiple services and different objects can offer the same services with different parameters and interest factors. The proliferation of offered services led to difficulties during service customization and service filtering. This problem is known as service explosion. The selection of suitable service that fits the requirements… More >

  • Open Access

    ARTICLE

    Efficient Feature Selection and Machine Learning Based ADHD Detection Using EEG Signal

    Md. Maniruzzaman1, Jungpil Shin1,*, Md. Al Mehedi Hasan1, Akira Yasumura2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5179-5195, 2022, DOI:10.32604/cmc.2022.028339

    Abstract Attention deficit hyperactivity disorder (ADHD) is one of the most common psychiatric and neurobehavioral disorders in children, affecting 11% of children worldwide. This study aimed to propose a machine learning (ML)-based algorithm for discriminating ADHD from healthy children using their electroencephalography (EEG) signals. The study included 61 children with ADHD and 60 healthy children aged 7–12 years. Different morphological and time-domain features were extracted from EEG signals. The t-test (p-value < 0.05) and least absolute shrinkage and selection operator (LASSO) were used to select potential features of children with ADHD and enhance the classification accuracy. The selected potential features were… More >

  • Open Access

    ARTICLE

    Handling Big Data in Relational Database Management Systems

    Kamal ElDahshan1, Eman Selim2, Ahmed Ismail Ebada2, Mohamed Abouhawwash3,4, Yunyoung Nam5,*, Gamal Behery2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5149-5164, 2022, DOI:10.32604/cmc.2022.028326

    Abstract Currently, relational database management systems (RDBMSs) face different challenges in application development due to the massive growth of unstructured and semi-structured data. This introduced new DBMS categories, known as not only structured query language (NoSQL) DBMSs, which do not adhere to the relational model. The migration from relational databases to NoSQL databases is challenging due to the data complexity. This study aims to enhance the storage performance of RDBMSs in handling a variety of data. The paper presents two approaches. The first approach proposes a convenient representation of unstructured data storage. Several extensive experiments were implemented to assess the efficiency… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Framework for Secure Storage and Sharing of Resumes

    Huanrong Tang1, Changlin Hu1, Tianming Liu2, Jianquan Ouyang1,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5395-5413, 2022, DOI:10.32604/cmc.2022.028284

    Abstract In response to problems in the centralized storage of personal resumes on third-party recruitment platforms, such as inadequate privacy protection, inability of individuals to accurately authorize downloads, and inability to determine who downloaded the resume and when, this study proposes a blockchain-based framework for secure storage and sharing of resumes. Users can employ an authorized access mechanism to protect their privacy rights. The proposed framework uses smart contracts, interplanetary file system, symmetric encryption, and digital signatures to protect, verify, and share resumes. Encryption keys are split and stored in multiple depositories through secret-sharing technology to improve the security of these… More >

  • Open Access

    ARTICLE

    Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

    Muhammad Akram1, Muhammad Waseem Iqbal2,*, Syed Ashraf Ali3, Muhammad Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6061-6077, 2022, DOI:10.32604/cmc.2022.028272

    Abstract In cipher algorithms, the encryption and decryption are based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless. This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS) in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext. Each plaintext character is substituted by an alternative message. The mode of substitution is transformed cyclically… More >

  • Open Access

    ARTICLE

    UAV-Aided Data Acquisition Using Gaining-Sharing Knowledge Optimization Algorithm

    Rania M Tawfik1, Hazem A. A. Nomer2, M. Saeed Darweesh1,*, Ali Wagdy Mohamed3,4, Hassan Mostafa5,6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5999-6013, 2022, DOI:10.32604/cmc.2022.028234

    Abstract Unmanned Aerial Vehicles (UAVs) provide a reliable and energy-efficient solution for data collection from the Narrowband Internet of Things (NB-IoT) devices. However, the UAV’s deployment optimization, including locations of the UAV’s stop points, is a necessity to minimize the energy consumption of the UAV and the NB-IoT devices and also to conduct the data collection efficiently. In this regard, this paper proposes Gaining-Sharing Knowledge (GSK) algorithm for optimizing the UAV’s deployment. In GSK, the number of UAV’s stop points in the three-dimensional space is encapsulated into a single individual with a fixed length representing an entire deployment. The superiority of… More >

Displaying 8301-8310 on page 831 of 22225. Per Page