Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,887)
  • Open Access

    ARTICLE

    Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

    Muhammad Akram1, Muhammad Waseem Iqbal2,*, Syed Ashraf Ali3, Muhammad Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6061-6077, 2022, DOI:10.32604/cmc.2022.028272

    Abstract In cipher algorithms, the encryption and decryption are based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless. This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS) in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext. Each plaintext character is substituted by an alternative message. The mode of substitution is transformed cyclically… More >

  • Open Access

    ARTICLE

    UAV-Aided Data Acquisition Using Gaining-Sharing Knowledge Optimization Algorithm

    Rania M Tawfik1, Hazem A. A. Nomer2, M. Saeed Darweesh1,*, Ali Wagdy Mohamed3,4, Hassan Mostafa5,6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5999-6013, 2022, DOI:10.32604/cmc.2022.028234

    Abstract Unmanned Aerial Vehicles (UAVs) provide a reliable and energy-efficient solution for data collection from the Narrowband Internet of Things (NB-IoT) devices. However, the UAV’s deployment optimization, including locations of the UAV’s stop points, is a necessity to minimize the energy consumption of the UAV and the NB-IoT devices and also to conduct the data collection efficiently. In this regard, this paper proposes Gaining-Sharing Knowledge (GSK) algorithm for optimizing the UAV’s deployment. In GSK, the number of UAV’s stop points in the three-dimensional space is encapsulated into a single individual with a fixed length representing an entire deployment. The superiority of… More >

  • Open Access

    ARTICLE

    Improved Dijkstra Algorithm for Mobile Robot Path Planning and Obstacle Avoidance

    Shaher Alshammrei1, Sahbi Boubaker2,*, Lioua Kolsi1,3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5939-5954, 2022, DOI:10.32604/cmc.2022.028165

    Abstract Optimal path planning avoiding obstacles is among the most attractive applications of mobile robots (MRs) in both research and education. In this paper, an optimal collision-free algorithm is designed and implemented practically based on an improved Dijkstra algorithm. To achieve this research objectives, first, the MR obstacle-free environment is modeled as a diagraph including nodes, edges and weights. Second, Dijkstra algorithm is used offline to generate the shortest path driving the MR from a starting point to a target point. During its movement, the robot should follow the previously obtained path and stop at each node to test if there… More >

  • Open Access

    ARTICLE

    Iterative Semi-Supervised Learning Using Softmax Probability

    Heewon Chung, Jinseok Lee*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5607-5628, 2022, DOI:10.32604/cmc.2022.028154

    Abstract For the classification problem in practice, one of the challenging issues is to obtain enough labeled data for training. Moreover, even if such labeled data has been sufficiently accumulated, most datasets often exhibit long-tailed distribution with heavy class imbalance, which results in a biased model towards a majority class. To alleviate such class imbalance, semi-supervised learning methods using additional unlabeled data have been considered. However, as a matter of course, the accuracy is much lower than that from supervised learning. In this study, under the assumption that additional unlabeled data is available, we propose the iterative semi-supervised learning algorithms, which… More >

  • Open Access

    ARTICLE

    Securing Copyright Using 3D Objects Blind Watermarking Scheme

    Hussein Abulkasim1,*, Mona Jamjoom2, Safia Abbas2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5969-5983, 2022, DOI:10.32604/cmc.2022.027999

    Abstract Recently, securing Copyright has become a hot research topic due to rapidly advancing information technology. As a host cover, watermarking methods are used to conceal or embed sensitive information messages in such a manner that it was undetectable to a human observer in contemporary times. Digital media covers may often take any form, including audio, video, photos, even DNA data sequences. In this work, we present a new methodology for watermarking to hide secret data into 3-D objects. The technique of blind extraction based on reversing the steps of the data embedding process is used. The implemented technique uses the… More >

  • Open Access

    ARTICLE

    Swarming Computational Approach for the Heartbeat Van Der Pol Nonlinear System

    Muhammad Umar1, Fazli Amin1, Soheil Salahshour2, Thongchai Botmart3, Wajaree Weera3, Prem Junswang4,*, Zulqurnain Sabir1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6185-6202, 2022, DOI:10.32604/cmc.2022.027970

    Abstract The present study is related to design a stochastic framework for the numerical treatment of the Van der Pol heartbeat model (VP-HBM) using the feedforward artificial neural networks (ANNs) under the optimization of particle swarm optimization (PSO) hybridized with the active-set algorithm (ASA), i.e., ANNs-PSO-ASA. The global search PSO scheme and local refinement of ASA are used as an optimization procedure in this study. An error-based merit function is defined using the differential VP-HBM form as well as the initial conditions. The optimization of the merit function is accomplished using the hybrid computing performances of PSO-ASA. The designed performance of… More >

  • Open Access

    ARTICLE

    A Truck Scheduling Problem for Multi-Crossdocking System with Metaheuristics

    Phan Nguyen Ky Phuc1, Nguyen Van Thanh2,*, Duong Bao Tram1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5165-5178, 2022, DOI:10.32604/cmc.2022.027967

    Abstract The cross-docking is a very important subject in logistics and supply chain managements. According to the definition, cross-docking is a process dealing with transhipping inventory, in which goods and products are unloaded from an inbound truck and process through a flow-center to be directly loaded onto an outbound truck. Cross-docking is favored due to its advantages in reducing the material handing cost, the needs to store the product in warehouse, as well decreasing the labor cost by eliminating packaging, storing, pick-location and order picking. In cross-docking, products can be consolidated and transported as a full load, reducing overall distribution costs.… More >

  • Open Access

    ARTICLE

    Online Rail Fastener Detection Based on YOLO Network

    Jun Li1, Xinyi Qiu1, Yifei Wei1,*, Mei Song1, Xiaojun Wang2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5955-5967, 2022, DOI:10.32604/cmc.2022.027947

    Abstract Traveling by high-speed rail and railway transportation have become an important part of people’s life and social production. Track is the basic equipment of railway transportation, and its performance directly affects the service lifetime of railway lines and vehicles. The anomaly detection of rail fasteners is in a priority, while the traditional manual method is extremely inefficient and dangerous to workers. Therefore, this paper introduces efficient computer vision into the railway detection system not only to locate the normal fasteners, but also to recognize the fasteners states. To be more specific, this paper mainly studies the rail fastener detection based… More >

  • Open Access

    ARTICLE

    Enhancing the Prediction of User Satisfaction with Metaverse Service Through Machine Learning

    Seon Hong Lee1, Haein Lee1, Jang Hyun Kim2,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4983-4997, 2022, DOI:10.32604/cmc.2022.027943

    Abstract Metaverse is one of the main technologies in the daily lives of several people, such as education, tour systems, and mobile application services. Particularly, the number of users of mobile metaverse applications is increasing owing to the merit of accessibility everywhere. To provide an improved service, it is important to analyze online reviews that contain user satisfaction. Several previous studies have utilized traditional methods, such as the structural equation model (SEM) and technology acceptance method (TAM) for exploring user satisfaction, using limited survey data. These methods may not be appropriate for analyzing the users of mobile applications. To overcome this… More >

  • Open Access

    ARTICLE

    Compact Bat Algorithm with Deep Learning Model for Biomedical EEG EyeState Classification

    Souad Larabi-Marie-Sainte1, Eatedal Alabdulkreem2, Mohammad Alamgeer3, Mohamed K Nour4, Anwer Mustafa Hilal5,*, Mesfer Al Duhayyim6, Abdelwahed Motwakel5, Ishfaq Yaseen5

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4589-4601, 2022, DOI:10.32604/cmc.2022.027922

    Abstract Electroencephalography (EEG) eye state classification becomes an essential tool to identify the cognitive state of humans. It can be used in several fields such as motor imagery recognition, drug effect detection, emotion categorization, seizure detection, etc. With the latest advances in deep learning (DL) models, it is possible to design an accurate and prompt EEG EyeState classification problem. In this view, this study presents a novel compact bat algorithm with deep learning model for biomedical EEG EyeState classification (CBADL-BEESC) model. The major intention of the CBADL-BEESC technique aims to categorize the presence of EEG EyeState. The CBADL-BEESC model performs feature… More >

Displaying 7971-7980 on page 798 of 21887. Per Page