Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    An Optimized and Hybrid Framework for Image Processing Based Network Intrusion Detection System

    Murtaza Ahmed Siddiqi, Wooguil Pak*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3921-3949, 2022, DOI:10.32604/cmc.2022.029541 - 16 June 2022

    Abstract The network infrastructure has evolved rapidly due to the ever-increasing volume of users and data. The massive number of online devices and users has forced the network to transform and facilitate the operational necessities of consumers. Among these necessities, network security is of prime significance. Network intrusion detection systems (NIDS) are among the most suitable approaches to detect anomalies and assaults on a network. However, keeping up with the network security requirements is quite challenging due to the constant mutation in attack patterns by the intruders. This paper presents an effective and prevalent framework for More >

  • Open Access

    ARTICLE

    Profiling Casualty Severity Levels of Road Accident Using Weighted Majority Voting

    Saba Awan1, Zahid Mehmood2,*, Hassan Nazeer Chaudhry3, Usman Tariq4, Amjad Rehman5, Tanzila Saba5, Muhammad Rashid6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4609-4626, 2022, DOI:10.32604/cmc.2022.019404 - 14 January 2022

    Abstract To determine the individual circumstances that account for a road traffic accident, it is crucial to consider the unplanned connections amongst various factors related to a crash that results in high casualty levels. Analysis of the road accident data concentrated mainly on categorizing accidents into different types using individually built classification methods which limit the prediction accuracy and fitness of the model. In this article, we proposed a multi-model hybrid framework of the weighted majority voting (WMV) scheme with parallel structure, which is designed by integrating individually implemented multinomial logistic regression (MLR) and multilayer perceptron… More >

  • Open Access

    ARTICLE

    SSA-HIAST: A Novel Framework for Code Clone Detection

    Neha Saini*, Sukhdip Singh

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2999-3017, 2022, DOI:10.32604/cmc.2022.022659 - 07 December 2021

    Abstract In the recent era of software development, reusing software is one of the major activities that is widely used to save time. To reuse software, the copy and paste method is used and this whole process is known as code cloning. This activity leads to problems like difficulty in debugging, increase in time to debug and manage software code. In the literature, various algorithms have been developed to find out the clones but it takes too much time as well as more space to figure out the clones. Unfortunately, most of them are not scalable.… More >

Displaying 1-10 on page 1 of 3. Per Page