Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (926)
  • Open Access

    ARTICLE

    Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS

    Kenian Wang1,2,*, Yuan Hong1,2, Chunxiao Li2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1123-1142, 2024, DOI:10.32604/cmc.2024.052088

    Abstract With the exponential increase in information security risks, ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment. However, experts possess a limited understanding of fundamental security elements, such as assets, threats, and vulnerabilities, due to the confidentiality of airborne networks, resulting in cognitive uncertainty. Therefore, the Pythagorean fuzzy Analytic Hierarchy Process (AHP) Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks. First, Pythagorean fuzzy AHP is employed to construct an index system… More >

  • Open Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 195-215, 2024, DOI:10.32604/cmc.2024.052070

    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

  • Open Access

    ARTICLE

    Target Detection on Water Surfaces Using Fusion of Camera and LiDAR Based Information

    Yongguo Li, Yuanrong Wang, Jia Xie*, Caiyin Xu, Kun Zhang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 467-486, 2024, DOI:10.32604/cmc.2024.051426

    Abstract To address the challenges of missed detections in water surface target detection using solely visual algorithms in unmanned surface vehicle (USV) perception, this paper proposes a method based on the fusion of visual and LiDAR point-cloud projection for water surface target detection. Firstly, the visual recognition component employs an improved YOLOv7 algorithm based on a self-built dataset for the detection of water surface targets. This algorithm modifies the original YOLOv7 architecture to a Slim-Neck structure, addressing the problem of excessive redundant information during feature extraction in the original YOLOv7 network model. Simultaneously, this modification simplifies… More >

  • Open Access

    ARTICLE

    Orbit Weighting Scheme in the Context of Vector Space Information Retrieval

    Ahmad Ababneh1, Yousef Sanjalawe2, Salam Fraihat3,*, Salam Al-E’mari4, Hamzah Alqudah5

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1347-1379, 2024, DOI:10.32604/cmc.2024.050600

    Abstract This study introduces the Orbit Weighting Scheme (OWS), a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval (IR) models, which have traditionally relied on weighting schemes like tf-idf and BM25. These conventional methods often struggle with accurately capturing document relevance, leading to inefficiencies in both retrieval performance and index size management. OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space, emphasizing term relationships and distribution patterns overlooked by existing models. Our research focuses on evaluating OWS’s impact… More >

  • Open Access

    ARTICLE

    Automatic Rule Discovery for Data Transformation Using Fusion of Diversified Feature Formats

    G. Sunil Santhosh Kumar1,2,*, M. Rudra Kumar3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 695-713, 2024, DOI:10.32604/cmc.2024.050143

    Abstract This article presents an innovative approach to automatic rule discovery for data transformation tasks leveraging XGBoost, a machine learning algorithm renowned for its efficiency and performance. The framework proposed herein utilizes the fusion of diversified feature formats, specifically, metadata, textual, and pattern features. The goal is to enhance the system’s ability to discern and generalize transformation rules from source to destination formats in varied contexts. Firstly, the article delves into the methodology for extracting these distinct features from raw data and the pre-processing steps undertaken to prepare the data for the model. Subsequent sections expound… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things: A Hybrid Approach

    Amal Al-Rasheed1, Rahim Khan2,3,*, Tahani Alsaed4, Mahwish Kundi2,5, Mohamad Hanif Md. Saad6, Mahidur R. Sarker7,8

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1305-1323, 2024, DOI:10.32604/cmc.2024.049215

    Abstract Due to the overwhelming characteristics of the Internet of Things (IoT) and its adoption in approximately every aspect of our lives, the concept of individual devices’ privacy has gained prominent attention from both customers, i.e., people, and industries as wearable devices collect sensitive information about patients (both admitted and outdoor) in smart healthcare infrastructures. In addition to privacy, outliers or noise are among the crucial issues, which are directly correlated with IoT infrastructures, as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing, i.e.,… More >

  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

  • Open Access

    ARTICLE

    An Elastoplastic Fracture Model Based on Bond-Based Peridynamics

    Liping Zu1, Yaxun Liu1, Haoran Zhang1, Lisheng Liu2,*, Xin Lai2,*, Hai Mei2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2349-2371, 2024, DOI:10.32604/cmes.2024.050488

    Abstract Fracture in ductile materials often occurs in conjunction with plastic deformation. However, in the bond-based peridynamic (BB-PD) theory, the classic mechanical stress is not defined inherently. This makes it difficult to describe plasticity directly using the classical plastic theory. To address the above issue, a unified bond-based peridynamics model was proposed as an effective tool to solve elastoplastic fracture problems. Compared to the existing models, the proposed model directly describes the elastoplastic theory at the bond level without the need for additional calculation means. The results obtained in the context of this model are shown More >

  • Open Access

    ARTICLE

    Mesures d’accessibilité géographique aux soins de santé dans le district sanitaire de Bougouni au Mali

    Sidiki Traoré1,2,*

    Revue Internationale de Géomatique, Vol.33, pp. 167-182, 2024, DOI:10.32604/rig.2024.052696

    Abstract Au Mali, l’accès à la santé est une préoccupation majeure. Il est devenu une priorité nationale depuis la déclaration d’Alma-Ata en 1978. Dès lors, des efforts importants ont été consentis par l’État et ses partenaires pour atteindre cet objectif. Ces efforts semblent insuffisants dans le district sanitaire de Bougouni, car, plus de la moitié de la population reste très loin des services de santé de base. Face à ce constat, évaluer l’accessibilité géographique aux soins de santé est essentiel pour identifier les localités qui ont été laissées pour compte, d’’où l’objet de cette recherche dans… More >

  • Open Access

    ARTICLE

    Scientific Elegance in NIDS: Unveiling Cardinality Reduction, Box-Cox Transformation, and ADASYN for Enhanced Intrusion Detection

    Amerah Alabrah*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3897-3912, 2024, DOI:10.32604/cmc.2024.048528

    Abstract The emergence of digital networks and the wide adoption of information on internet platforms have given rise to threats against users’ private information. Many intruders actively seek such private data either for sale or other inappropriate purposes. Similarly, national and international organizations have country-level and company-level private information that could be accessed by different network attacks. Therefore, the need for a Network Intruder Detection System (NIDS) becomes essential for protecting these networks and organizations. In the evolution of NIDS, Artificial Intelligence (AI) assisted tools and methods have been widely adopted to provide effective solutions. However,… More >

Displaying 1-10 on page 1 of 926. Per Page