Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    An Optimal Method for High-Resolution Population Geo-Spatial Data

    Rami Sameer Ahmad Al Kloub*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2801-2820, 2022, DOI:10.32604/cmc.2022.027847

    Abstract Mainland China has a poor distribution of meteorological stations. Existing models’ estimation accuracy for creating high-resolution surfaces of meteorological data is restricted for air temperature, and low for relative humidity and wind speed (few studies reported). This study compared the typical generalized additive model (GAM) and autoencoder-based residual neural network (hereafter, residual network for short) in terms of predicting three meteorological parameters, namely air temperature, relative humidity, and wind speed, using data from 824 monitoring stations across China’s mainland in 2015. The performance of the two models was assessed using a 10-fold cross-validation procedure. The air temperature models employ basic… More >

  • Open Access

    ARTICLE

    Convergence of Stereo Vision-Based Multimodal YOLOs for Faster Detection of Potholes

    Sungan Yoon, Jeongho Cho*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2821-2834, 2022, DOI:10.32604/cmc.2022.027840

    Abstract Road potholes can cause serious social issues, such as unexpected damages to vehicles and traffic accidents. For efficient road management, technologies that quickly find potholes are required, and thus researches on such technologies have been conducted actively. The three-dimensional (3D) reconstruction method has relatively high accuracy and can be used in practice but it has limited application owing to its long data processing time and high sensor maintenance cost. The two-dimensional (2D) vision method has the advantage of inexpensive and easy application of sensor. Recently, although the 2D vision method using the convolutional neural network (CNN) has shown improved pothole… More >

  • Open Access

    ARTICLE

    Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

    Muhammad Fahad Khan1,2,*, Khalid Saleem1, Mohammed Alotaibi3, Mohammad Mazyad Hazzazi4, Eid Rehman2, Aaqif Afzaal Abbasi2, Muhammad Asif Gondal5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2679-2696, 2022, DOI:10.32604/cmc.2022.027655

    Abstract Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes. For the… More >

  • Open Access

    ARTICLE

    Development of Data Mining Models Based on Features Ranks Voting (FRV)

    Mofreh A. Hogo*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2947-2966, 2022, DOI:10.32604/cmc.2022.027300

    Abstract Data size plays a significant role in the design and the performance of data mining models. A good feature selection algorithm reduces the problems of big data size and noise due to data redundancy. Features selection algorithms aim at selecting the best features and eliminating unnecessary ones, which in turn simplifies the structure of the data mining model as well as increases its performance. This paper introduces a robust features selection algorithm, named Features Ranking Voting Algorithm FRV. It merges the benefits of the different features selection algorithms to specify the features ranks in the dataset correctly and robustly; based… More >

  • Open Access

    ARTICLE

    Automating Transfer Credit Assessment-A Natural Language Processing-Based Approach

    Dhivya Chandrasekaran*, Vijay Mago

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2257-2274, 2022, DOI:10.32604/cmc.2022.027236

    Abstract Student mobility or academic mobility involves students moving between institutions during their post-secondary education, and one of the challenging tasks in this process is to assess the transfer credits to be offered to the incoming student. In general, this process involves domain experts comparing the learning outcomes of the courses, to decide on offering transfer credits to the incoming students. This manual implementation is not only labor-intensive but also influenced by undue bias and administrative complexity. The proposed research article focuses on identifying a model that exploits the advancements in the field of Natural Language Processing (NLP) to effectively automate… More >

  • Open Access

    ARTICLE

    Securing Consumer Internet of Things for Botnet Attacks: Deep Learning Approach

    Tariq Ahamed Ahanger1,*, Abdulaziz Aldaej1, Mohammed Atiquzzaman2, Imdad Ullah1, Mohammed Yousuf Uddin1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3199-3217, 2022, DOI:10.32604/cmc.2022.027212

    Abstract DDoS attacks in the Internet of Things (IoT) technology have increased significantly due to its spread adoption in different industrial domains. The purpose of the current research is to propose a novel technique for detecting botnet attacks in user-oriented IoT environments. Conspicuously, an attack identification technique inspired by Recurrent Neural networks and Bidirectional Long Short Term Memory (BLRNN) is presented using a unique Deep Learning (DL) technique. For text identification and translation of attack data segments into tokenized form, word embedding is employed. The performance analysis of the presented technique is performed in comparison to the state-of-the-art DL techniques. Specifically,… More >

  • Open Access

    ARTICLE

    Characteristics of Desertification Change in Lake Basin Area in Gangcha County

    Wenzheng Yu1, Mingxuan Zhu1, Li Shao1, Yanbo Shen2,3,*, Haitao Liu1, Tianliang Chen1, Hanxiaoya Zhang4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3771-3793, 2022, DOI:10.32604/cmc.2022.027094

    Abstract Qinghai Lake Basin area in Gangcha county is selected as the study area in terms of desertification change features in this paper. Based on the remote sensing (RS) and global positioning system (GPS) technologies, the desertification information range from 1989 to 2014 in the study area is extracted. Using the method of the decision tree, the desertification in the research area is been divided into four grades including mild desertification, moderate desertification, severe desertification and serious desertification. The change characteristics of desertification in the study area were analyzed in detail, which showed that the desertification in the study area experienced… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Microarray Gene Expression Classification for Data Science Applications

    Areej A. Malibari1, Reem M. Alshehri2, Fahd N. Al-Wesabi3, Noha Negm3, Mesfer Al Duhayyim4, Anwer Mustafa Hilal5,*, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4277-4290, 2022, DOI:10.32604/cmc.2022.027030

    Abstract In bioinformatics applications, examination of microarray data has received significant interest to diagnose diseases. Microarray gene expression data can be defined by a massive searching space that poses a primary challenge in the appropriate selection of genes. Microarray data classification incorporates multiple disciplines such as bioinformatics, machine learning (ML), data science, and pattern classification. This paper designs an optimal deep neural network based microarray gene expression classification (ODNN-MGEC) model for bioinformatics applications. The proposed ODNN-MGEC technique performs data normalization process to normalize the data into a uniform scale. Besides, improved fruit fly optimization (IFFO) based feature selection technique is used… More >

  • Open Access

    ARTICLE

    Pedestrian Physical Education Training Over Visualization Tool

    Tamara al Shloul1, Israr Akhter2, Suliman A. Alsuhibany3, Yazeed Yasin Ghadi4, Ahmad Jalal2, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2389-2405, 2022, DOI:10.32604/cmc.2022.027007

    Abstract E-learning approaches are one of the most important learning platforms for the learner through electronic equipment. Such study techniques are useful for other groups of learners such as the crowd, pedestrian, sports, transports, communication, emergency services, management systems and education sectors. E-learning is still a challenging domain for researchers and developers to find new trends and advanced tools and methods. Many of them are currently working on this domain to fulfill the requirements of industry and the environment. In this paper, we proposed a method for pedestrian behavior mining of aerial data, using deep flow feature, graph mining technique, and… More >

  • Open Access

    ARTICLE

    Bilateral Contract for Load Frequency and Renewable Energy Sources Using Advanced Controller

    Krishan Arora1, Gyanendra Prasad Joshi2, Mahmoud Ragab3,4,5,*, Muhyaddin Rawa6,7,8, Ahmad H. Milyani6,7, Romany F. Mansour9, Eunmok Yang10

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3165-3180, 2022, DOI:10.32604/cmc.2022.026966

    Abstract Reestablishment in power system brings in significant transformation in the power sector by extinguishing the possession of sound consolidated assistance. However, the collaboration of various manufacturing agencies, autonomous power manufacturers, and buyers have created complex installation processes. The regular active load and inefficiency of best measures among varied associates is a huge hazard. Any sudden load deviation will give rise to immediate amendment in frequency and tie-line power errors. It is essential to deal with every zone’s frequency and tie-line power within permitted confines followed by fluctuations within the load. Therefore, it can be proficient by implementing Load Frequency Control… More >

Displaying 7401-7410 on page 741 of 22098. Per Page