Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Code-based Sequential Aggregate Signature Scheme

    Bennian Dou1,*, Lei Xu1, Xiaoling Yu2, Lin Mei1, Cong Zuo3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5219-5231, 2022, DOI:10.32604/cmc.2022.030270

    Abstract This paper proposes the first code-based quantum immune sequential aggregate signature (SAS) scheme and proves the security of the proposed scheme in the random oracle model. Aggregate signature (AS) schemes and sequential aggregate signature schemes allow a group of potential signers to sign different messages respectively, and all the signatures of those users on those messages can be aggregated into a single signature such that the size of the aggregate signature is much smaller than the total size of all individual signatures. Because of the aggregation of many signatures into a single short signature, AS and SAS schemes can reduce… More >

  • Open Access

    ARTICLE

    Cluster Representation of the Structural Description of Images for Effective Classification

    Yousef Ibrahim Daradkeh1,*, Volodymyr Gorokhovatskyi2, Iryna Tvoroshenko2, Medien Zeghid3,4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6069-6084, 2022, DOI:10.32604/cmc.2022.030254

    Abstract The problem of image recognition in the computer vision systems is being studied. The results of the development of efficient classification methods, given the figure of processing speed, based on the analysis of the segment representation of the structural description in the form of a set of descriptors are provided. We propose three versions of the classifier according to the following principles: “object–etalon”, “object descriptor–etalon” and “vector description of the object–etalon”, which are not similar in level of integration of researched data analysis. The options for constructing clusters over the whole set of descriptions of the etalon database, separately for… More >

  • Open Access

    ARTICLE

    An Approximation for the Entropy Measuring in the General Structure of SGSP3

    Kamel Jebreen1,2,3,*, Muhammad Haroon Aftab4, Mohammad Issa Sowaity5, Zeeshan Saleem Mufti4, Muhammad Hussain6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4455-4463, 2022, DOI:10.32604/cmc.2022.030246

    Abstract In this article, we calculate various topological invariants such as symmetric division degree index, redefined Zagreb index, VL index, first and second exponential Zagreb index, first and second multiplicative exponential Zagreb indices, symmetric division degree entropy, redefined Zagreb entropy, VL entropy, first and second exponential Zagreb entropies, multiplicative exponential Zagreb entropy. We take the chemical compound named Proanthocyanidins, which is a very useful polyphenol in human’s diet. They are very beneficial for one’s health. These chemical compounds are extracted from grape seeds. They are tremendously anti-inflammatory. A subdivision form of this compound is presented in this article. The compound named… More >

  • Open Access

    ARTICLE

    AI-Enabled Grouping Bridgehead to Secure Penetration Topics of Metaverse

    Woo Hyun Park1, Isma Farah Siddiqui3, Nawab Muhammad Faseeh Qureshi2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5609-5624, 2022, DOI:10.32604/cmc.2022.030235

    Abstract With the advent of the big data era, security issues in the context of artificial intelligence (AI) and data analysis are attracting research attention. In the metaverse, which will become a virtual asset in the future, users’ communication, movement with characters, text elements, etc., are required to integrate the real and virtual. However, they can be exposed to threats. Particularly, various hacker threats exist. For example, users’ assets are exposed through notices and mail alerts regularly sent to users by operators. In the future, hacker threats will increase mainly due to naturally anonymous texts. Therefore, it is necessary to use… More >

  • Open Access

    ARTICLE

    Impairments Approximations in Assembled mmWave and Radio Over Fiber Network

    Muhammad Irfan1, Farman Ali2, Fazal Muhammad3,*, Saifur Rahman1, Ammar Armghan4, Yousaf Khan5, Faisal Althobiani6, Rehan Shafiq7, Mohammed Alshareef8, Mohammad E. Gommosani9

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4885-4895, 2022, DOI:10.32604/cmc.2022.030157

    Abstract The fiber nonlinearity and phase noise (PN) are the focused impairments in the optical communication system, induced by high-capacity transmission and high laser input power. The channels include high-capacity transmissions that cannot be achieved at the end side without aliasing because of fiber nonlinearity and PN impairments. Thus, addressing of these distortions is the basic objective for the 5G mobile network. In this paper, the fiber nonlinearity and PN are investigated using the assembled methodology of millimeter-wave and radio over fiber (mmWave-RoF). The analytical model is designed in terms of outage probability for the proposed mmWave-RoF system. The performance of… More >

  • Open Access

    ARTICLE

    KGSR-GG: A Noval Scheme for Dynamic Recommendation

    Jun-Ping Yao1, Kai-Yuan Cheng1,*, Meng-Meng Ge2, Xiao-Jun Li1, Yi-Jing Wang1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5509-5524, 2022, DOI:10.32604/cmc.2022.030150

    Abstract Recommendation algorithms regard user-item interaction as a sequence to capture the user’s short-term preferences, but conventional algorithms cannot capture information of constantly-changing user interest in complex contexts. In these years, combining the knowledge graph with sequential recommendation has gained momentum. The advantages of knowledge graph-based recommendation systems are that more semantic associations can improve the accuracy of recommendations, rich association facts can increase the diversity of recommendations, and complex relational paths can hence the interpretability of recommendations. But the information in the knowledge graph, such as entities and relations, often fails to be fully utilized and high-order connectivity is unattainable… More >

  • Open Access

    ARTICLE

    Unconstrained Hand Dorsal Veins Image Database and Recognition System

    Mustafa M. Al Rifaee1,*, Mohammad M. Abdallah1, Mosa I. Salah2, Ayman M. Abdalla1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5063-5073, 2022, DOI:10.32604/cmc.2022.030033

    Abstract Hand veins can be used effectively in biometric recognition since they are internal organs that, in contrast to fingerprints, are robust under external environment effects such as dirt and paper cuts. Moreover, they form a complex rich shape that is unique, even in identical twins, and allows a high degree of freedom. However, most currently employed hand-based biometric systems rely on hand-touch devices to capture images with the desired quality. Since the start of the COVID-19 pandemic, most hand-based biometric systems have become undesirable due to their possible impact on the spread of the pandemic. Consequently, new contactless hand-based biometric… More >

  • Open Access

    ARTICLE

    Mutated Leader Sine-Cosine Algorithm for Secure Smart IoT-Blockchain of Industry 4.0

    Mustufa Haider Abidi*, Hisham Alkhalefah, Muneer Khan Mohammed

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5367-5383, 2022, DOI:10.32604/cmc.2022.030018

    Abstract In modern scenarios, Industry 4.0 entails invention with various advanced technology, and blockchain is one among them. Blockchains are incorporated to enhance privacy, data transparency as well as security for both large and small scale enterprises. Industry 4.0 is considered as a new synthesis fabrication technique that permits the manufacturers to attain their target effectively. However, because numerous devices and machines are involved, data security and privacy are always concerns. To achieve intelligence in Industry 4.0, blockchain technologies can overcome potential cybersecurity constraints. Nowadays, the blockchain and internet of things (IoT) are gaining more attention because of their favorable outcome… More >

  • Open Access

    ARTICLE

    Model for Generating Scale-Free Artificial Social Networks Using Small-World Networks

    Farhan Amin, Gyu Sang Choi*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6367-6391, 2022, DOI:10.32604/cmc.2022.029927

    Abstract The Internet of Things (IoT) has the potential to be applied to social networks due to innovative characteristics and sophisticated solutions that challenge traditional uses. Social network analysis (SNA) is a good example that has recently gained a lot of scientific attention. It has its roots in social and economic research, as well as the evaluation of network science, such as graph theory. Scientists in this area have subverted predefined theories, offering revolutionary ones regarding interconnected networks, and they have highlighted the mystery of six degrees of separation with confirmation of the small-world phenomenon. The motivation of this study is… More >

  • Open Access

    ARTICLE

    An Image Edge Detection Algorithm Based on Multi-Feature Fusion

    Zhenzhou Wang1, Kangyang Li1, Xiang Wang1,*, Antonio Lee2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4995-5009, 2022, DOI:10.32604/cmc.2022.029650

    Abstract Edge detection is one of the core steps of image processing and computer vision. Accurate and fine image edge will make further target detection and semantic segmentation more effective. Holistically-Nested edge detection (HED) edge detection network has been proved to be a deep-learning network with better performance for edge detection. However, it is found that when the HED network is used in overlapping complex multi-edge scenarios for automatic object identification. There will be detected edge incomplete, not smooth and other problems. To solve these problems, an image edge detection algorithm based on improved HED and feature fusion is proposed. On… More >

Displaying 6691-6700 on page 670 of 22098. Per Page