Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25,093)
  • Open Access

    ARTICLE

    Machine Learning-based USD/PKR Exchange Rate Forecasting Using Sentiment Analysis of Twitter Data

    Samreen Naeem1, Wali Khan Mashwani2,*, Aqib Ali1,3, M. Irfan Uddin4, Marwan Mahmoud5, Farrukh Jamal6, Christophe Chesneau7

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3451-3461, 2021, DOI:10.32604/cmc.2021.015872 - 01 March 2021

    Abstract This study proposes an approach based on machine learning to forecast currency exchange rates by applying sentiment analysis to messages on Twitter (called tweets). A dataset of the exchange rates between the United States Dollar (USD) and the Pakistani Rupee (PKR) was formed by collecting information from a forex website as well as a collection of tweets from the business community in Pakistan containing finance-related words. The dataset was collected in raw form, and was subjected to natural language processing by way of data preprocessing. Response variable labeling was then applied to the standardized dataset,… More >

  • Open Access

    ARTICLE

    Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text

    Fahd N. Al-Wesabi1,2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3635-3648, 2021, DOI:10.32604/cmc.2021.015865 - 01 March 2021

    Abstract The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks. Therefore, improving the security and authenticity of the text when it is transferred via the internet has become one of the most difficult challenges that researchers face today. Arabic text is more sensitive than other languages due to Harakat’s existence in Arabic diacritics such as Kasra, and Damma in which making basic changes such as modifying diacritic arrangements can lead to… More >

  • Open Access

    ARTICLE

    Intelligent Approach for Traffic Orchestration in SDVN Based on CMPR

    Thamer Alhussain1, Ahmad Ali AlZubi2,*, Abdulaziz Alarifi2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3749-3763, 2021, DOI:10.32604/cmc.2021.015858 - 01 March 2021

    Abstract The vehicle ad hoc network that has emerged in recent years was originally a branch of the mobile ad hoc network. With the drafting and gradual establishment of standards such as IEEE802.11p and IEEE1609, the vehicle ad hoc network has gradually become independent of the mobile ad hoc network. The Internet of Vehicles (Vehicular Ad Hoc Network, VANET) is a vehicle-mounted network that comprises vehicles and roadside basic units. This multi-hop hybrid wireless network is based on a vehicle-mounted self-organizing network. As compared to other wireless networks, such as mobile ad hoc networks, wireless sensor… More >

  • Open Access

    ARTICLE

    Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida

    Ali A.R. Alkhafaji1,*, Nilam Nur Amir Sjarif1, M.A Shahidan1, Nurulhuda Firdaus Mohd Azmi1, Haslina Md Sarkan1, Suriayati Chuprat1, Osamah Ibrahim Khalaf2, Ehab Nabiel Al-Khanak3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3865-3885, 2021, DOI:10.32604/cmc.2021.015803 - 01 March 2021

    Abstract The most sensitive Arabic text available online is the digital Holy Quran. This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs. Thus, it should be protected from any kind of tampering to keep its invaluable meaning intact. Different characteristics of Arabic letters like the vowels (), Kashida (extended letters), and other symbols in the Holy Quran must be secured from alterations. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio… More >

  • Open Access

    ARTICLE

    On Network Designs with Coding Error Detection and Correction Application

    Mahmoud Higazy1,2,*, Taher A. Nofal1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3401-3418, 2021, DOI:10.32604/cmc.2021.015790 - 01 March 2021

    Abstract The detection of error and its correction is an important area of mathematics that is vastly constructed in all communication systems. Furthermore, combinatorial design theory has several applications like detecting or correcting errors in communication systems. Network (graph) designs (GDs) are introduced as a generalization of the symmetric balanced incomplete block designs (BIBDs) that are utilized directly in the above mentioned application. The networks (graphs) have been represented by vectors whose entries are the labels of the vertices related to the lengths of edges linked to it. Here, a general method is proposed and applied… More >

  • Open Access

    ARTICLE

    Text Analysis-Based Watermarking Approach for Tampering Detection of English Text

    Fahd N. Al-Wesabi1,2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3701-3719, 2021, DOI:10.32604/cmc.2021.015785 - 01 March 2021

    Abstract Due to the rapid increase in the exchange of text information via internet networks, the security and the reliability of digital content have become a major research issue. The main challenges faced by researchers are authentication, integrity verification, and tampering detection of the digital contents. In this paper, text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents. The proposed approach embeds and detects the watermark logically without altering the original English text document. Based on hidden Markov model (HMM), the fourth level order of the word… More >

  • Open Access

    ARTICLE

    A Novel Design of Octal-Valued Logic Full Adder Using Light Color State Model

    Ahmed Talal, Osama Abu-Elnasr*, Samir Elmougy

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3487-3503, 2021, DOI:10.32604/cmc.2021.015759 - 01 March 2021

    Abstract Due to the demand of high computational speed for processing big data that requires complex data manipulations in a timely manner, the need for extending classical logic to construct new multi-valued optical models becomes a challenging and promising research area. This paper establishes a novel octal-valued logic design model with new optical gates construction based on the hypothesis of Light Color State Model to provide an efficient solution to the limitations of computational processing inherent in the electronics computing. We provide new mathematical definitions for both of the binary OR function and the PLUS operation More >

  • Open Access

    ARTICLE

    Social Distancing and Isolation Management Using Machine-to-Machine Technologies to Prevent Pandemics

    Muhammad Saad1, Maaz Bin Ahmad1, Muhammad Asif2,*, Khalid Masood2, Mohammad A. Al Ghamdi3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3545-3562, 2021, DOI:10.32604/cmc.2021.015720 - 01 March 2021

    Abstract Social distancing and self-isolation management are crucial preventive measures that can save millions of lives during challenging pandemics of diseases such as the Spanish flu, swine flu, and coronavirus disease 2019 (COVID-19). This study describes the comprehensive and effective implementation of the Industrial Internet of Things and machine-to-machine technologies for social distancing and smart self-isolation management. These technologies can help prevent outbreaks of any disease that can disperse widely and develop into a pandemic. Initially, a smart wristband is proposed that incorporates Bluetooth beacon technology to facilitate the tracing and tracking of Bluetooth Low Energy… More >

  • Open Access

    ARTICLE

    Implementation of a Subjective Visual Vertical and Horizontal Testing System Using Virtual Reality

    Sungjin Lee1, Min Hong2, Hongly Va1, Ji-Yun Park3,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3669-3679, 2021, DOI:10.32604/cmc.2021.015706 - 01 March 2021

    Abstract Subjective visual vertical (SVV) and subjective visual horizontal (SVH) tests can be used to evaluate the perception of verticality and horizontality, respectively, and can aid the diagnosis of otolith dysfunction in clinical practice. In this study, SVV and SVH screen version tests are implemented using virtual reality (VR) equipment; the proposed test method promotes a more immersive feeling for the subject while using a simple equipment configuration and possessing excellent mobility. To verify the performance of the proposed VR-based SVV and SVH tests, a reliable comparison was made between the traditional screen-based SVV and SVH More >

  • Open Access

    ARTICLE

    Control Strategy for a Quadrotor Based on a Memetic Shuffled Frog Leaping Algorithm

    Nour Ben Ammar1, Hegazy Rezk2,3,*, Soufiene Bouallègue1,4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4081-4100, 2021, DOI:10.32604/cmc.2021.015681 - 01 March 2021

    Abstract This work presents a memetic Shuffled Frog Leaping Algorithm (SFLA) based tuning approach of an Integral Sliding Mode Controller (ISMC) for a quadrotor type of Unmanned Aerial Vehicles (UAV). Based on the Newton–Euler formalism, a nonlinear dynamic model of the studied quadrotor is firstly established for control design purposes. Since the main parameters of the ISMC design are the gains of the sliding surfaces and signum functions of the switching control law, which are usually selected by repetitive and time-consuming trials-errors based procedures, a constrained optimization problem is formulated for the systematically tuning of these… More >

Displaying 14271-14280 on page 1428 of 25093. Per Page