Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack

    Fahd N. Al-Wesabi1,2,*, Huda G. Iskandar2,3, Saleh Alzahrani4, Abdelzahir Abdelmaboud4, Mohammed Abdul4, Nadhem Nemri4, Mohammad Medani4, Mohammed Y. Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3789-3806, 2021, DOI:10.32604/cmc.2021.017674

    Abstract In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing. The HFDATAI solution technically integrates and senses the watermark without modifying the original text. The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated, null-watermarking approach to enhance the proposed approach’s efficiency, accuracy, and intensity. The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of… More >

  • Open Access

    ARTICLE

    Enhanced Deep Autoencoder Based Feature Representation Learning for Intelligent Intrusion Detection System

    Thavavel Vaiyapuri*, Adel Binbusayyis

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3271-3288, 2021, DOI:10.32604/cmc.2021.017665

    Abstract In the era of Big data, learning discriminant feature representation from network traffic is identified has as an invariably essential task for improving the detection ability of an intrusion detection system (IDS). Owing to the lack of accurately labeled network traffic data, many unsupervised feature representation learning models have been proposed with state-of-the-art performance. Yet, these models fail to consider the classification error while learning the feature representation. Intuitively, the learnt feature representation may degrade the performance of the classification task. For the first time in the field of intrusion detection, this paper proposes an unsupervised IDS model leveraging the… More >

  • Open Access

    ARTICLE

    Hybrid Nanofluid Flow with Homogeneous-Heterogeneous Reactions

    Iskandar Waini1,2, Anuar Ishak2,*, Ioan Pop3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3255-3269, 2021, DOI:10.32604/cmc.2021.017643

    Abstract This study examines the stagnation point flow over a stretching/shrinking sheet in a hybrid nanofluid with homogeneous-heterogeneous reactions. The hybrid nanofluid consists of copper (Cu) and alumina (Al2O3) nanoparticles which are added into water to form Cu-Al2O3/water hybrid nanofluid. The similarity equations are obtained using a similarity transformation. Then, the function bvp4c in MATLAB is utilised to obtain the numerical results. The dual solutions are found for limited values of the stretching/shrinking parameter. Also, the turning point arises in the shrinking region (λ < 0). Besides, the presence of hybrid nanoparticles enhances the heat transfer rate, skin friction coefficient, and… More >

  • Open Access

    ARTICLE

    UFC-Net with Fully-Connected Layers and Hadamard Identity Skip Connection for Image Inpainting

    Chung-Il Kim1, Jehyeok Rew2, Yongjang Cho2, Eenjun Hwang2,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3447-3463, 2021, DOI:10.32604/cmc.2021.017633

    Abstract Image inpainting is an interesting technique in computer vision and artificial intelligence for plausibly filling in blank areas of an image by referring to their surrounding areas. Although its performance has been improved significantly using diverse convolutional neural network (CNN)-based models, these models have difficulty filling in some erased areas due to the kernel size of the CNN. If the kernel size is too narrow for the blank area, the models cannot consider the entire surrounding area, only partial areas or none at all. This issue leads to typical problems of inpainting, such as pixel reconstruction failure and unintended filling.… More >

  • Open Access

    ARTICLE

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620

    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a vital role in ensuring security,… More >

  • Open Access

    ARTICLE

    An Optimized SW/HW AVMF Design Based on High-Level Synthesis Flow for Color Images

    Turki M. Alanazi1, Ahmed Ben Atitallah1,2,*, Imen Abid2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2925-2943, 2021, DOI:10.32604/cmc.2021.017575

    Abstract In this paper, a software/hardware High-level Synthesis (HLS) design is proposed to compute the Adaptive Vector Median Filter (AVMF) in real-time. In fact, this filter is known by its excellent impulsive noise suppression and chromaticity conservation. The software (SW) study of this filter demonstrates that its implementation is too complex. The purpose of this work is to study the impact of using an HLS tool to design ideal floating-point and optimized fixed-point hardware (HW) architectures for the AVMF filter using square root function (ideal HW) and ROM memory (optimized HW), respectively, to select the best HLS architectures and to design… More >

  • Open Access

    ARTICLE

    Research on Face Anti-Spoofing Algorithm Based on Image Fusion

    Pingping Yu1, Jiayu Wang1, Ning Cao2,*, Heiner Dintera3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3861-3876, 2021, DOI:10.32604/cmc.2021.017527

    Abstract Along with the rapid development of biometric authentication technology, face recognition has been commercially used in many industries in recent years. However, it cannot be ignored that face recognition-based authentication techniques can be easily spoofed using various types of attacks such photographs, videos or forged 3D masks. In order to solve this problem, this work proposed a face anti-fraud algorithm based on the fusion of thermal infrared images and visible light images. The normal temperature distribution of the human face is stable and characteristic, and the important physiological information of the human body can be observed by the infrared thermal… More >

  • Open Access

    ARTICLE

    Assessing the Performance of Some Ranked Set Sampling Designs Using HybridApproach

    Mohamed. A. H. Sabry1,*, Ehab M. Almetwally2, Hisham M. Almongy3, Gamal M. Ibrahim4

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3737-3753, 2021, DOI:10.32604/cmc.2021.017510

    Abstract In this paper, a joint analysis consisting of goodness-of-fit tests and Markov chain Monte Carlo simulations are used to assess the performance of some ranked set sampling designs. The Markov chain Monte Carlo simulations are conducted when Bayesian methods with Jeffery’s priors of the unknown parameters of Weibull distribution are used, while the goodness of fit analysis is conducted when the likelihood estimators are used and the corresponding empirical distributions are obtained. The ranked set sampling designs considered in this research are the usual ranked set sampling, extreme ranked set sampling, median ranked set sampling, and neoteric ranked set sampling… More >

  • Open Access

    ARTICLE

    Unknown Attack Detection: Combining Relabeling and Hybrid Intrusion Detection

    Gun-Yoon Shin1, Dong-Wook Kim1, Sang-Soo Kim2, Myung-Mook Han3,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3289-3303, 2021, DOI:10.32604/cmc.2021.017502

    Abstract Detection of unknown attacks like a zero-day attack is a research field that has long been studied. Recently, advances in Machine Learning (ML) and Artificial Intelligence (AI) have led to the emergence of many kinds of attack-generation tools developed using these technologies to evade detection skillfully. Anomaly detection and misuse detection are the most commonly used techniques for detecting intrusion by unknown attacks. Although anomaly detection is adequate for detecting unknown attacks, its disadvantage is the possibility of high false alarms. Misuse detection has low false alarms; its limitation is that it can detect only known attacks. To overcome such… More >

  • Open Access

    ARTICLE

    A Hybrid Approach for Performance and Energy-Based Cost Prediction in Clouds

    Mohammad Aldossary*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3531-3562, 2021, DOI:10.32604/cmc.2021.017477

    Abstract With the striking rise in penetration of Cloud Computing, energy consumption is considered as one of the key cost factors that need to be managed within cloud providers’ infrastructures. Subsequently, recent approaches and strategies based on reactive and proactive methods have been developed for managing cloud computing resources, where the energy consumption and the operational costs are minimized. However, to make better cost decisions in these strategies, the performance and energy awareness should be supported at both Physical Machine (PM) and Virtual Machine (VM) levels. Therefore, in this paper, a novel hybrid approach is proposed, which jointly considered the prediction… More >

Displaying 11951-11960 on page 1196 of 22225. Per Page