Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Bio-Inspired Numerical Analysis of COVID-19 with Fuzzy Parameters

    F. M. Allehiany1, Fazal Dayan2,3,*, F. F. Al-Harbi4, Nesreen Althobaiti5, Nauman Ahmed2, Muhammad Rafiq6, Ali Raza7, Mawahib Elamin8

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3213-3229, 2022, DOI:10.32604/cmc.2022.025811

    Abstract Fuzziness or uncertainties arise due to insufficient knowledge, experimental errors, operating conditions and parameters that provide inaccurate information. The concepts of susceptible, infectious and recovered are uncertain due to the different degrees in susceptibility, infectivity and recovery among the individuals of the population. The differences can arise, when the population groups under the consideration having distinct habits, customs and different age groups have different degrees of resistance, etc. More realistic models are needed which consider these different degrees of susceptibility infectivity and recovery of the individuals. In this paper, a Susceptible, Infected and Recovered (SIR) epidemic model with fuzzy parameters… More >

  • Open Access

    ARTICLE

    Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem

    Ramadhan J. Mstafa1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3349-3368, 2022, DOI:10.32604/cmc.2022.025791

    Abstract The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have resulted in breaches of privacy and data security. When it comes to protecting private information in today's Internet era, digital steganography is vital. Many academics are interested in digital video because it has a great capability for concealing important data. There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data. The visual imperceptibility, robustness, and embedding capacity of these approaches are all… More >

  • Open Access

    ARTICLE

    EACR-LEACH: Energy-Aware Cluster-based Routing Protocol for WSN Based IoT

    Sankar Sennan1, Kirubasri1, Youseef Alotaibi2, Digvijay Pandey3,*, Saleh Alghamdi4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2159-2174, 2022, DOI:10.32604/cmc.2022.025773

    Abstract Internet of Things (IoT) is a recent paradigm to improve human lifestyle. Nowadays, number devices are connected to the Internet drastically. Thus, the people can control and monitor the physical things in real-time without delay. The IoT plays a vital role in all kind of fields in our world such as agriculture, livestock, transport, and healthcare, grid system, connected home, elderly people carrying system, cypher physical system, retail, and intelligent systems. In IoT energy conservation is a challenging task, as the devices are made up of low-cost and low-power sensing devices and local processing. IoT networks have significant challenges in… More >

  • Open Access

    ARTICLE

    Metaheuristic Lightweight Cryptography for Security Enhancement inInternet of Things

    Mahmoud Ragab1,2,3,*, Ehab Bahaudien Ashary4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3009-3023, 2022, DOI:10.32604/cmc.2022.025763

    Abstract The advancements made in Internet of Things (IoT) is projected to alter the functioning of healthcare industry in addition to increased penetration of different applications. However, data security and private are challenging tasks to accomplish in IoT and necessary measures to be taken to ensure secure operation. With this background, the current paper proposes a novel lightweight cryptography method for enhance the security in IoT. The proposed encryption algorithm is a blend of Cross Correlation Coefficient (CCC) and Black Widow Optimization (BWO) algorithm. In the presented encryption technique, CCC operation is utilized to optimize the encryption process of cryptography method.… More >

  • Open Access

    ARTICLE

    Hybrid Chaotic Salp Swarm with Crossover Algorithm for Underground Wireless Sensor Networks

    Mariem Ayedi1,2,*, Walaa H. ElAshmawi3,4, Esraa Eldesouky1,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2963-2980, 2022, DOI:10.32604/cmc.2022.025741

    Abstract Resource management in Underground Wireless Sensor Networks (UWSNs) is one of the pillars to extend the network lifetime. An intriguing design goal for such networks is to achieve balanced energy and spectral resource utilization. This paper focuses on optimizing the resource efficiency in UWSNs where underground relay nodes amplify and forward sensed data, received from the buried source nodes through a lossy soil medium, to the aboveground base station. A new algorithm called the Hybrid Chaotic Salp Swarm and Crossover (HCSSC) algorithm is proposed to obtain the optimal source and relay transmission powers to maximize the network resource efficiency. The… More >

  • Open Access

    ARTICLE

    Robust Prediction of the Bandwidth of Metamaterial Antenna Using Deep Learning

    Abdelaziz A. Abdelhamid1,3,*, Sultan R. Alotaibi2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2305-2321, 2022, DOI:10.32604/cmc.2022.025739

    Abstract The design of microstrip antennas is a complex and time-consuming process, especially the step of searching for the best design parameters. Meanwhile, the performance of microstrip antennas can be improved using metamaterial, which results in a new class of antennas called metamaterial antenna. Several parameters affect the radiation loss and quality factor of this class of antennas, such as the antenna size. Recently, the optimal values of the design parameters of metamaterial antennas can be predicted using machine learning, which presents a better alternative to simulation tools and trial-and-error processes. However, the prediction accuracy depends heavily on the quality of… More >

  • Open Access

    ARTICLE

    LAME: Layout-Aware Metadata Extraction Approach for Research Articles

    Jongyun Choi1, Hyesoo Kong2, Hwamook Yoon2, Heungseon Oh3, Yuchul Jung1,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4019-4037, 2022, DOI:10.32604/cmc.2022.025711

    Abstract The volume of academic literature, such as academic conference papers and journals, has increased rapidly worldwide, and research on metadata extraction is ongoing. However, high-performing metadata extraction is still challenging due to diverse layout formats according to journal publishers. To accommodate the diversity of the layouts of academic journals, we propose a novel LAyout-aware Metadata Extraction (LAME) framework equipped with the three characteristics (e.g., design of automatic layout analysis, construction of a large meta-data training set, and implementation of metadata extractor). In the framework, we designed an automatic layout analysis using PDFMiner. Based on the layout analysis, a large volume… More >

  • Open Access

    ARTICLE

    Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home

    Anusha Vangala1, Ashok Kumar Das1, YoungHo Park2,*, Sajjad Shaukat Jamal3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3549-3570, 2022, DOI:10.32604/cmc.2022.025660

    Abstract The recent surge in development of smart homes and smart cities can be observed in many developed countries. While the idea to control devices that are in home (embedded with the Internet of Things (IoT) smart devices) by the user who is outside the home might sound fancy, but it comes with a lot of potential threats. There can be many attackers who will be trying to take advantage of this. So, there is a need for designing a secure scheme which will be able to distinguish among genuine/authorized users of the system and attackers. And knowing about the details… More >

  • Open Access

    ARTICLE

    Modified Bat Algorithm for Optimal VM's in Cloud Computing

    Amit Sundas1, Sumit Badotra1,*, Youseef Alotaibi2, Saleh Alghamdi3, Osamah Ibrahim Khalaf4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2877-2894, 2022, DOI:10.32604/cmc.2022.025658

    Abstract All task scheduling applications need to ensure that resources are optimally used, performance is enhanced, and costs are minimized. The purpose of this paper is to discuss how to Fitness Calculate Values (FCVs) to provide application software with a reliable solution during the initial stages of load balancing. The cloud computing environment is the subject of this study. It consists of both physical and logical components (most notably cloud infrastructure and cloud storage) (in particular cloud services and cloud platforms). This intricate structure is interconnected to provide services to users and improve the overall system's performance. This case study is… More >

  • Open Access

    ARTICLE

    Linearly Polarized Millimeter Wave Reflectarray with Mutual Coupling Optimization

    M. Inam1, M. H. Dahri2, M. R. Kamarudin3, A. Y. I. Ashyap3, M. H. Jamaluddin4, N. H. Sulaiman5, M. A. Khan6, Z. A. Shamsan7,*, K. Almuhanna7, F. Alorifi7

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2397-2410, 2022, DOI:10.32604/cmc.2022.025650

    Abstract This work provides the design and analysis of a single layer, linearly polarized millimeter wave reflectarray antenna with mutual coupling optimization. Detailed analysis was carried out at 26 GHz design frequency using the simulations of the reflectarray unit cells as well as the periodic reflectarray antenna. The simulated results were verified by the scattering parameter and far-field measurements of the unit cell and periodic arrays, respectively. A close agreement between the simulated and measured results was observed in all the cases. Apart from the unit cells and reflectarray, the waveguide and horn antenna were also fabricated to be used in the… More >

Displaying 8661-8670 on page 867 of 22233. Per Page