Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects

    Jun-Seob Kim, Ki-Woong Park*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3401-3424, 2022, DOI:10.32604/cmc.2022.026621

    Abstract A ransomware attack that interrupted the operation of Colonial Pipeline (a large U.S. oil pipeline company), showed that security threats by malware have become serious enough to affect industries and social infrastructure rather than individuals alone. The agents and characteristics of attacks should be identified, and appropriate strategies should be established accordingly in order to respond to such attacks. For this purpose, the first task that must be performed is malware classification. Malware creators are well aware of this and apply various concealment and avoidance techniques, making it difficult to classify malware. This study focuses on new features and classification… More >

  • Open Access

    ARTICLE

    Optimization Agricultural Supply Chain: A Case Study of Fertilizer Supplier Selection

    Nguyen Van Thanh1, Nguyen Thi Kim Lan2,*, Syed Tam Husain1, Nguyen Hoang Hai1, Nguyen Viet Tinh1

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4057-4068, 2022, DOI:10.32604/cmc.2022.026587

    Abstract The 21st century is associated with the Industrial Revolution 4.0 and the organic agriculture trend, making the utilization of high-quality fertilizers, abundant nutritional content, economical, and no affect to environment pollution. According to the new concept, clean agricultural production and organic agricultural products are not allowed to excessively use synthetic chemicals such as chemical fertilizers, and plant protection drugs, but priority is to use manure, organic fertilizers, and natural mineral fertilizers. Fertilizer must meet the balanced nutritional requirements of crops, maintain, and improve the fertility of the ground, protect the surrounding ecosystem, and leave harmful effects in agricultural products, products… More >

  • Open Access

    ARTICLE

    Dynamic Intelligent Supply-Demand Adaptation Model Towards Intelligent Cloud Manufacturing

    Yanfei Sun1, Feng Qiao2, Wei Wang1, Bin Xu1, Jianming Zhu1, Romany Fouad Mansour3, Jin Qi1,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2825-2843, 2022, DOI:10.32604/cmc.2022.026574

    Abstract As a new mode and means of smart manufacturing, smart cloud manufacturing (SCM) faces great challenges in massive supply and demand, dynamic resource collaboration and intelligent adaptation. To address the problem, this paper proposes an SCM-oriented dynamic supply-demand (S-D) intelligent adaptation model for massive manufacturing services. In this model, a collaborative network model is established based on the properties of both the supply-demand and their relationships; in addition, an algorithm based on deep graph clustering (DGC) and aligned sampling (AS) is used to divide and conquer the large adaptation domain to solve the problem of the slow computational speed caused… More >

  • Open Access

    ARTICLE

    Multi-Stream CNN-Based Personal Recognition Method Using Surface Electromyogram for 5G Security

    Jin Su Kim1, Min-Gu Kim1, Jae Myung Kim1,2, Sung Bum Pan1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2997-3007, 2022, DOI:10.32604/cmc.2022.026572

    Abstract As fifth generation technology standard (5G) technology develops, the possibility of being exposed to the risk of cyber-attacks that exploits vulnerabilities in the 5G environment is increasing. The existing personal recognition method used for granting permission is a password-based method, which causes security problems. Therefore, personal recognition studies using bio-signals are being conducted as a method to access control to devices. Among bio-signal, surface electromyogram (sEMG) can solve the existing personal recognition problem that was unable to the modification of registered information owing to the characteristic changes in its signal according to the performed operation. Furthermore, as an advantage, sEMG… More >

  • Open Access

    ARTICLE

    Blockchain-based Distributed Power Market Trading Mechanism

    Dongjun Cui1,*, Jinghan He2, Guofang Zhang3, Zihan Hou4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2845-2858, 2022, DOI:10.32604/cmc.2022.026568

    Abstract Distributed power market trading has the characteristics of large number of participants, scattered locations, small single trading scale, and point-to-point trading. The traditional centralized power trading model has the problems of large load, low efficiency, high cost, reliance on third parties and unreliable data. With the characteristics of decentralization and non-tampering, blockchain can establish a point-to-point trusted trading environment and provide effective solutions to the above problems. Therefore, this paper proposed a distributed power market trading framework based on blockchain. In this framework, the distributed power supply characteristics and trading needs of each participant are analyzed, a complete distributed trading… More >

  • Open Access

    ARTICLE

    Selecting Best Software Vulnerability Scanner Using Intuitionistic Fuzzy Set TOPSIS

    Navneet Bhatt1, Jasmine Kaur2, Adarsh Anand2, Omar H. Alhazmi3,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3613-3629, 2022, DOI:10.32604/cmc.2022.026554

    Abstract Software developers endeavor to build their products with the least number of bugs. Despite this, many vulnerabilities are detected in software that threatens its integrity. Various automated software i.e., vulnerability scanners, are available in the market which helps detect and manage vulnerabilities in a computer, application, or a network. Hence, the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management. The current work serves a dual purpose, first, to identify the key factors which affect the vulnerability discovery process in a network. The second, is to rank the popular vulnerability scanners based on the identified attributes.… More >

  • Open Access

    ARTICLE

    Automated Handwriting Recognition and Speech Synthesizer for Indigenous Language Processing

    Bassam A. Y. Alqaralleh1,*, Fahad Aldhaban1, Feras Mohammed A-Matarneh2, Esam A. AlQaralleh3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3913-3927, 2022, DOI:10.32604/cmc.2022.026531

    Abstract In recent years, researchers in handwriting recognition analysis relating to indigenous languages have gained significant internet among research communities. The recent developments of artificial intelligence (AI), natural language processing (NLP), and computational linguistics (CL) find useful in the analysis of regional low resource languages. Automatic lexical task participation might be elaborated to various applications in the NLP. It is apparent from the availability of effective machine recognition models and open access handwritten databases. Arabic language is a commonly spoken Semitic language, and it is written with the cursive Arabic alphabet from right to left. Arabic handwritten Character Recognition (HCR) is… More >

  • Open Access

    ARTICLE

    Cognitive Computing-Based Mammographic Image Classification on an Internet of Medical

    Romany F. Mansour1,*, Maha M. Althobaiti2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3945-3959, 2022, DOI:10.32604/cmc.2022.026515

    Abstract Recently, the Internet of Medical Things (IoMT) has become a research hotspot due to its various applicability in medical field. However, the data analysis and management in IoMT remain challenging owing to the existence of a massive number of devices linked to the server environment, generating a massive quantity of healthcare data. In such cases, cognitive computing can be employed that uses many intelligent technologies–machine learning (ML), deep learning (DL), artificial intelligence (AI), natural language processing (NLP) and others–to comprehend data expansively. Furthermore, breast cancer (BC) has been found to be a major cause of mortality among ladies globally. Earlier… More >

  • Open Access

    ARTICLE

    An Efficient Security Solution for Industrial Internet of Things Applications

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3961-3983, 2022, DOI:10.32604/cmc.2022.026513

    Abstract The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications. Due to continual needs for new functionality, such as foresight, the number of linked devices in the industrial environment increases. Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments. Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints. A resolver supports the… More >

  • Open Access

    ARTICLE

    Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*, Maha Farouk S. Sabir1, Ahmed Elhassanein5,6, Ashraf A. Gouda4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3385-3399, 2022, DOI:10.32604/cmc.2022.026477

    Abstract Education acts as an important part of economic growth and improvement in human welfare. The educational sectors have transformed a lot in recent days, and Information and Communication Technology (ICT) is an effective part of the education field. Almost every action in university and college, right from the process from counselling to admissions and fee deposits has been automated. Attendance records, quiz, evaluation, mark, and grade submissions involved the utilization of the ICT. Therefore, security is essential to accomplish cybersecurity in higher security institutions (HEIs). In this view, this study develops an Automated Outlier Detection for CyberSecurity in Higher Education… More >

Displaying 8621-8630 on page 863 of 22233. Per Page