Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,909)
  • Open Access

    ARTICLE

    Reference Selection for Offline Hybrid Siamese Signature Verification Systems

    Tsung-Yu Lu1, Mu-En Wu2, Er-Hao Chen3, Yeong-Luh Ueng4,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 935-952, 2022, DOI:10.32604/cmc.2022.026717

    Abstract This paper presents an off-line handwritten signature verification system based on the Siamese network, where a hybrid architecture is used. The Residual neural Network (ResNet) is used to realize a powerful feature extraction model such that Writer Independent (WI) features can be effectively learned. A single-layer Siamese Neural Network (NN) is used to realize a Writer Dependent (WD) classifier such that the storage space can be minimized. For the purpose of reducing the impact of the high intraclass variability of the signature and ensuring that the Siamese network can learn more effectively, we propose a method of selecting a reference… More >

  • Open Access

    ARTICLE

    Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data

    Taek-Young Youn1, Nam-Su Jho2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 151-164, 2022, DOI:10.32604/cmc.2022.026653

    Abstract

    Due to the development of 5G communication, many aspects of information technology (IT) services are changing. With the development of communication technologies such as 5G, it has become possible to provide IT services that were difficult to provide in the past. One of the services made possible through this change is cloud-based collaboration. In order to support secure collaboration over cloud, encryption technology to securely manage dynamic data is essential. However, since the existing encryption technology is not suitable for encryption of dynamic data, a new technology that can provide encryption for dynamic data is required for secure cloud-based collaboration.… More >

  • Open Access

    ARTICLE

    Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment

    Kun-Lin Tsai1,2,*, Li-Woei Chen3, Fang-Yie Leu4,5, Chuan-Tian Wu1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 547-562, 2022, DOI:10.32604/cmc.2022.026557

    Abstract Secure data communication is an essential requirement for an Internet of Things (IoT) system. Especially in Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) systems, when important data are hacked, it may induce property loss or life hazard. Even though many IoT-related communication protocols are equipped with secure policies, they still have some security weaknesses in their IoT systems. LoRaWAN is one of the low power wide-area network protocols, and it adopts Advanced Encryption Standard (AES) to provide message integrity and confidentiality. However, LoRaWAN's encryption key update scheme can be further improved. In this paper, a Two-stage… More >

  • Open Access

    ARTICLE

    Comprehensive DDoS Attack Classification Using Machine Learning Algorithms

    Olga Ussatova1,2, Aidana Zhumabekova1,*, Yenlik Begimbayeva2,3, Eric T. Matson4, Nikita Ussatov5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 577-594, 2022, DOI:10.32604/cmc.2022.026552

    Abstract The fast development of Internet technologies ignited the growth of techniques for information security that protect data, networks, systems, and applications from various threats. There are many types of threats. The dedicated denial of service attack (DDoS) is one of the most serious and widespread attacks on Internet resources. This attack is intended to paralyze the victim's system and cause the service to fail. This work is devoted to the classification of DDoS attacks in the special network environment called Software-Defined Networking (SDN) using machine learning algorithms. The analyzed dataset included instances of two classes: benign and malicious. As the… More >

  • Open Access

    ARTICLE

    Feature Extraction and Classification of Plant Leaf Diseases Using Deep Learning Techniques

    K. Anitha1, S. Srinivasan2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 233-247, 2022, DOI:10.32604/cmc.2022.026542

    Abstract In India’s economy, agriculture has been the most significant contributor. Despite the fact that agriculture’s contribution is decreasing as the world’s population grows, it continues to be the most important source of employment with a little margin of difference. As a result, there is a pressing need to pick up the pace in order to achieve competitive, productive, diverse, and long-term agriculture. Plant disease misinterpretations can result in the incorrect application of pesticides, causing crop harm. As a result, early detection of infections is critical as well as cost-effective for farmers. To diagnose the disease at an earlier stage, appropriate… More >

  • Open Access

    ARTICLE

    Quantum Artificial Intelligence Based Node Localization Technique for Wireless Networks

    Hanan Abdullah Mengash1, Radwa Marzouk1, Siwar Ben Haj Hassine2, Anwer Mustafa Hilal3,*, Ishfaq Yaseen3, Abdelwahed Motwakel3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 327-342, 2022, DOI:10.32604/cmc.2022.026464

    Abstract Artificial intelligence (AI) techniques have received significant attention among research communities in the field of networking, image processing, natural language processing, robotics, etc. At the same time, a major problem in wireless sensor networks (WSN) is node localization, which aims to identify the exact position of the sensor nodes (SN) using the known position of several anchor nodes. WSN comprises a massive number of SNs and records the position of the nodes, which becomes a tedious process. Besides, the SNs might be subjected to node mobility and the position alters with time. So, a precise node localization (NL) manner is… More >

  • Open Access

    ARTICLE

    PoEC: A Cross-Blockchain Consensus Mechanism for Governing Blockchain by Blockchain

    Jieren Cheng1,3, Yuan Zhang2,3,*, Yuming Yuan4, Hui Li4, Xiangyan Tang1,3, Victor S. Sheng5, Guangjing Hu1,3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1385-1402, 2022, DOI:10.32604/cmc.2022.026437

    Abstract The research on the governing blockchain by blockchain supervision system is an important development trend of blockchain technology. In this system there is a supervisory blockchain managing and governing the supervised blockchain based on blockchain technology, results in a uniquely cross-blockchain demand to consensus mechanism for solving the trust problem between supervisory blockchain and supervised blockchain. To solve this problem, this paper proposes a cross-blockchain consensus mechanism based on smart contract and a set of smart contracts endorse the cross-blockchain consensus. New consensus mechanism called Proof-of-Endorse-Contracts (PoEC) consensus, which firstly transfers the consensus reached in supervisory blockchain to supervised blockchain… More >

  • Open Access

    ARTICLE

    Whale Optimization Algorithm Strategies for Higher Interaction Strength T-Way Testing

    Ali Abdullah Hassan1,*, Salwani Abdullah1, Kamal Z. Zamli2, Rozilawati Razali1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2057-2077, 2022, DOI:10.32604/cmc.2022.026310

    Abstract Much of our daily tasks have been computerized by machines and sensors communicating with each other in real-time. There is a reasonable risk that something could go wrong because there are a lot of sensors producing a lot of data. Combinatorial testing (CT) can be used in this case to reduce risks and ensure conformance to specifications. Numerous existing meta-heuristic-based solutions aim to assist the test suite generation for combinatorial testing, also known as t-way testing (where t indicates the interaction strength), viewed as an optimization problem. Much previous research, while helpful, only investigated a small number of interaction strengths… More >

  • Open Access

    ARTICLE

    A Hybrid Neural Network-based Approach for Forecasting Water Demand

    Al-Batool Al-Ghamdi1,*, Souad Kamel2, Mashael Khayyat3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1365-1383, 2022, DOI:10.32604/cmc.2022.026246

    Abstract Water is a vital resource. It supports a multitude of industries, civilizations, and agriculture. However, climatic conditions impact water availability, particularly in desert areas where the temperature is high, and rain is scarce. Therefore, it is crucial to forecast water demand to provide it to sectors either on regular or emergency days. The study aims to develop an accurate model to forecast daily water demand under the impact of climatic conditions. This forecasting is known as a multivariate time series because it uses both the historical data of water demand and climatic conditions to forecast the future. Focusing on the… More >

  • Open Access

    ARTICLE

    Mutation Prediction for Coronaviruses Using Genome Sequence and Recurrent Neural Networks

    Pranav Pushkar1, Christo Ananth2, Preeti Nagrath1, Jehad F. Al-Amri5, Vividha1, Anand Nayyar3,4,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1601-1619, 2022, DOI:10.32604/cmc.2022.026205

    Abstract The study of viruses and their genetics has been an opportunity as well as a challenge for the scientific community. The recent ongoing SARS-Cov2 (Severe Acute Respiratory Syndrome) pandemic proved the unpreparedness for these situations. Not only the countermeasures for the effect caused by virus need to be tackled but the mutation taking place in the very genome of the virus is needed to be kept in check frequently. One major way to find out more information about such pathogens is by extracting the genetic data of such viruses. Though genetic data of viruses have been cultured and stored as… More >

Displaying 7761-7770 on page 777 of 21909. Per Page