Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    ARTICLE

    Accurate Fault Location Modeling for Parallel Transmission Lines Considering Mutual Effect

    Hamdy A. Ziedan1, Hegazy Rezk2,3, Mujahed Al-Dhaifallah4,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 491-518, 2021, DOI:10.32604/cmc.2021.014493

    Abstract A new accurate algorithms based on mathematical modeling of two parallel transmissions lines system (TPTLS) as influenced by the mutual effect to determine the fault location is discussed in this work. The distance relay measures the impedance to the fault location which is the positive-sequence. The principle of summation the positive-, negative-, and zero-sequence voltages which equal zero is used to determine the fault location on the TPTLS. Also, the impedance of the transmission line to the fault location is determined. These algorithms are applied to single-line-to-ground (SLG) and double-line-to-ground (DLG) faults. To detect the fault location along the transmission… More >

  • Open Access

    ARTICLE

    Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm

    Bijeta Seth1, Surjeet Dalal1, Dac-Nhuong Le2,3,*, Vivek Jaglan4, Neeraj Dahiya1, Akshat Agrawal5, Mayank Mohan Sharma6, Deo Prakash7, K. D. Verma8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 779-798, 2021, DOI:10.32604/cmc.2021.014466

    Abstract Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically reconfigured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blowfish and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption… More >

  • Open Access

    ARTICLE

    Timing and Classification of Patellofemoral Osteoarthritis Patients Using Fast Large Margin Classifier

    Mai Ramadan Ibraheem1, Jilan Adel2, Alaa Eldin Balbaa3, Shaker El-Sappagh4, Tamer Abuhmed5,*, Mohammed Elmogy6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 393-409, 2021, DOI:10.32604/cmc.2021.014446

    Abstract Surface electromyogram (sEMG) processing and classification can assist neurophysiological standardization and evaluation and provide habitational detection. The timing of muscle activation is critical in determining various medical conditions when looking at sEMG signals. Understanding muscle activation timing allows identification of muscle locations and feature validation for precise modeling. This work aims to develop a predictive model to investigate and interpret Patellofemoral (PF) osteoarthritis based on features extracted from the sEMG signal using pattern classification. To this end, sEMG signals were acquired from five core muscles over about 200 reads from healthy adult patients while they were going upstairs. Onset, offset,… More >

  • Open Access

    ARTICLE

    Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

    Nazli Sanam1,*, Asif Ali1, Tariq Shah1, Ghazanfar Farooq2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1-21, 2021, DOI:10.32604/cmc.2021.014442

    Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the designing of these S-boxes is… More >

  • Open Access

    ARTICLE

    Soil Properties for Earthen Building Construction in Najran City, Saudi Arabia

    Yaser Khaled Al-Sakkaf1, Gamil M. S. Abdullah2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 127-140, 2021, DOI:10.32604/cmc.2021.014438

    Abstract Earth is the most common and important building material used in the construction industry, since it is found in almost every country in the world. Modern earthen construction is alive and well, and is spread over an enormous geographical area. This technique utilizes various earthen materials and numerous methods, and features many benefits for both construction in general and buildings in particular. Najran, a city located in the south of Saudi Arabia, is distinguished by its heritage of earthen architecture, which displays many advantages and a marvelous variety of types and exterior designs. Many weaknesses of the material, however, along… More >

  • Open Access

    ARTICLE

    A Secure NDN Framework for Internet of Things Enabled Healthcare

    Syed Sajid Ullah1, Saddam Hussain1,*, Abdu Gumaei2,3, Hussain AlSalman2,4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 223-240, 2021, DOI:10.32604/cmc.2021.014413

    Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt the services of Identity-Based Signcryption… More >

  • Open Access

    ARTICLE

    Automatic Segmentation of Liver from Abdominal Computed Tomography Images Using Energy Feature

    Prabakaran Rajamanickam1, Shiloah Elizabeth Darmanayagam1,*, Sunil Retmin Raj Cyril Raj2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 709-722, 2021, DOI:10.32604/cmc.2021.014347

    Abstract Liver Segmentation is one of the challenging tasks in detecting and classifying liver tumors from Computed Tomography (CT) images. The segmentation of hepatic organ is more intricate task, owing to the fact that it possesses a sizeable quantum of vascularization. This paper proposes an algorithm for automatic seed point selection using energy feature for use in level set algorithm for segmentation of liver region in CT scans. The effectiveness of the method can be determined when used in a model to classify the liver CT images as tumorous or not. This involves segmentation of the region of interest (ROI) from… More >

  • Open Access

    ARTICLE

    Enhancing Network Intrusion Detection Model Using Machine Learning Algorithms

    Nancy Awadallah Awad*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 979-990, 2021, DOI:10.32604/cmc.2021.014307

    Abstract After the digital revolution, large quantities of data have been generated with time through various networks. The networks have made the process of data analysis very difficult by detecting attacks using suitable techniques. While Intrusion Detection Systems (IDSs) secure resources against threats, they still face challenges in improving detection accuracy, reducing false alarm rates, and detecting the unknown ones. This paper presents a framework to integrate data mining classification algorithms and association rules to implement network intrusion detection. Several experiments have been performed and evaluated to assess various machine learning classifiers based on the KDD99 intrusion dataset. Our study focuses… More >

  • Open Access

    ARTICLE

    Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

    Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3, Dac-Nhuong Le4,5,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1207-1224, 2021, DOI:10.32604/cmc.2021.014293

    Abstract With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images is then hidden within individual… More >

  • Open Access

    ARTICLE

    AI-Enabled COVID-19 Outbreak Analysis and Prediction: Indian States vs. Union Territories

    Meenu Gupta1, Rachna Jain2, Simrann Arora2, Akash Gupta2, Mazhar Javed Awan3, Gopal Chaudhary2,*, Haitham Nobanee4,5,6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 933-950, 2021, DOI:10.32604/cmc.2021.014221

    Abstract The COVID-19 disease has already spread to more than 213 countries and territories with infected (confirmed) cases of more than 27 million people throughout the world so far, while the numbers keep increasing. In India, this deadly disease was first detected on January 30, 2020, in a student of Kerala who returned from Wuhan. Because of India’s high population density, different cultures, and diversity, it is a good idea to have a separate analysis of each state. Hence, this paper focuses on the comprehensive analysis of the effect of COVID-19 on Indian states and Union Territories and the development of… More >

Displaying 13231-13240 on page 1324 of 22360. Per Page