Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    A Bibliometric Analysis of Positive Mental Health Research and Development in the Social Science Citation Index

    Petrayuna Dian Omega1, Joniarto Parung1,*, Listyo Yuwanto1, Yuh-Shan Ho2,*

    International Journal of Mental Health Promotion, Vol.26, No.10, pp. 817-836, 2024, DOI:10.32604/ijmhp.2024.056501 - 31 October 2024

    Abstract Background: This study aimed to conduct a bibliometric analysis of positive mental health, focusing on citation performance, article title, abstract, author keywords, Keyword Plus, and their development trends. The novelty of this study is a pioneer within the field of positive mental health. Therefore, it delivered new ideas for researchers and practitioners who had concerns about positive mental health in terms of trends research which covered recommended articles and the research focus in recent years. Methods: The data were retrieved on 30 April 2024 from the Social Sciences Citation Index (SSCI) of Clarivate Analytics’ Web of… More >

  • Open Access

    ARTICLE

    DeepBio: A Deep CNN and Bi-LSTM Learning for Person Identification Using Ear Biometrics

    Anshul Mahajan*, Sunil K. Singla

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1623-1649, 2024, DOI:10.32604/cmes.2024.054468 - 27 September 2024

    Abstract The identification of individuals through ear images is a prominent area of study in the biometric sector. Facial recognition systems have faced challenges during the COVID-19 pandemic due to mask-wearing, prompting the exploration of supplementary biometric measures such as ear biometrics. The research proposes a Deep Learning (DL) framework, termed DeepBio, using ear biometrics for human identification. It employs two DL models and five datasets, including IIT Delhi (IITD-I and IITD-II), annotated web images (AWI), mathematical analysis of images (AMI), and EARVN1. Data augmentation techniques such as flipping, translation, and Gaussian noise are applied to More >

  • Open Access

    ARTICLE

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

    Khawaja Tahir Mehmood1,2,*, Shahid Atiq1, Intisar Ali Sajjad3, Muhammad Majid Hussain4, Malik M. Abdul Basit2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1673-1708, 2024, DOI:10.32604/cmes.2024.053903 - 27 September 2024

    Abstract Software-Defined Networking (SDN), with segregated data and control planes, provides faster data routing, stability, and enhanced quality metrics, such as throughput (Th), maximum available bandwidth (Bd(max)), data transfer (DTransfer), and reduction in end-to-end delay (D(E-E)). This paper explores the critical work of deploying SDN in large­scale Data Center Networks (DCNs) to enhance its Quality of Service (QoS) parameters, using logically distributed control configurations. There is a noticeable increase in Delay(E-E) when adopting SDN with a unified (single) control structure in big DCNs to handle Hypertext Transfer Protocol (HTTP) requests causing a reduction in network quality parameters (Bd(max), Th, DTransfer, D(E-E),… More > Graphic Abstract

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

  • Open Access

    ARTICLE

    Physical Layer Security of 6G Vehicular Networks with UAV Systems: First Order Secrecy Metrics, Optimization, and Bounds

    Sagar Kavaiya1, Hiren Mewada2,*, Sagarkumar Patel3, Dharmendra Chauhan3, Faris A. Almalki4, Hana Mohammed Mujlid4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3685-3711, 2024, DOI:10.32604/cmc.2024.053587 - 12 September 2024

    Abstract The mobility and connective capabilities of unmanned aerial vehicles (UAVs) are becoming more and more important in defense, commercial, and research domains. However, their open communication makes UAVs susceptible to undesirable passive attacks such as eavesdropping or jamming. Recently, the inefficiency of traditional cryptography-based techniques has led to the addition of Physical Layer Security (PLS). This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments, proposing a solution to complement the conventional cryptography approach. Initially, we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems, namely hybrid… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Machine Learning Algorithms in Reduced Dimensional Spaces

    Kaveh Heidary1,*, Venkata Atluri1, John Bland2

    Journal of Cyber Security, Vol.6, pp. 69-87, 2024, DOI:10.32604/jcs.2024.051196 - 28 August 2024

    Abstract This paper investigates the impact of reducing feature-vector dimensionality on the performance of machine learning (ML) models. Dimensionality reduction and feature selection techniques can improve computational efficiency, accuracy, robustness, transparency, and interpretability of ML models. In high-dimensional data, where features outnumber training instances, redundant or irrelevant features introduce noise, hindering model generalization and accuracy. This study explores the effects of dimensionality reduction methods on binary classifier performance using network traffic data for cybersecurity applications. The paper examines how dimensionality reduction techniques influence classifier operation and performance across diverse performance metrics for seven ML models. Four… More >

  • Open Access

    ARTICLE

    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*

    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563 - 18 July 2024

    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open Access

    REVIEW

    Research Progress on Economic Forest Water Stress Based on Bibliometrics and Knowledge Graph

    Xin Yin1,#, Shuai Wang1,#, Chunguang Wang1, Haichao Wang2, Zheying Zong1,3,*, Zeyu Ban1

    Phyton-International Journal of Experimental Botany, Vol.93, No.5, pp. 843-858, 2024, DOI:10.32604/phyton.2024.049114 - 28 May 2024

    Abstract This study employed the bibliometric software CiteSpace 6.1.R6 to analyze the correlation between thermal infrared, spectral remote sensing technology, and the estimation of economic forest water stress. It aimed to review the development and current status of this field, as well as to identify future research trends. A search was conducted on the China National Knowledge Infrastructure (CNKI) database using the keyword “water stress” for relevant studies from 2003 to 2023. The visual analysis function of CNKI was used to generate the distribution of annual publication volume, and CiteSpace 6.1.R6 was utilized to create network More >

  • Open Access

    ARTICLE

    Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches

    Jiajun Yan, Ying Zhou*, Anchen Dai, Tao Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 563-580, 2024, DOI:10.32604/cmc.2024.048922 - 25 April 2024

    Abstract As an emerging network paradigm, the software-defined network (SDN) finds extensive application in areas such as smart grids, the Internet of Things (IoT), and edge computing. The forwarding layer in software-defined networks is susceptible to eavesdropping attacks. Route hopping is a moving target defense (MTD) technology that is frequently employed to resist eavesdropping attacks. In the traditional route hopping technology, both request and reply packets use the same hopping path. If an eavesdropping attacker monitors the nodes along this path, the risk of 100% data leakage becomes substantial. In this paper, we present an effective… More >

  • Open Access

    ARTICLE

    A Hand Features Based Fusion Recognition Network with Enhancing Multi-Modal Correlation

    Wei Wu*, Yuan Zhang, Yunpeng Li, Chuanyang Li, Yan Hao

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 537-555, 2024, DOI:10.32604/cmes.2024.049174 - 16 April 2024

    Abstract Fusing hand-based features in multi-modal biometric recognition enhances anti-spoofing capabilities. Additionally, it leverages inter-modal correlation to enhance recognition performance. Concurrently, the robustness and recognition performance of the system can be enhanced through judiciously leveraging the correlation among multimodal features. Nevertheless, two issues persist in multi-modal feature fusion recognition: Firstly, the enhancement of recognition performance in fusion recognition has not comprehensively considered the inter-modality correlations among distinct modalities. Secondly, during modal fusion, improper weight selection diminishes the salience of crucial modal features, thereby diminishing the overall recognition performance. To address these two issues, we introduce an… More > Graphic Abstract

    A Hand Features Based Fusion Recognition Network with Enhancing Multi-Modal Correlation

  • Open Access

    ARTICLE

    A Hybrid Machine Learning Approach for Improvised QoE in Video Services over 5G Wireless Networks

    K. B. Ajeyprasaath, P. Vetrivelan*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3195-3213, 2024, DOI:10.32604/cmc.2023.046911 - 26 March 2024

    Abstract Video streaming applications have grown considerably in recent years. As a result, this becomes one of the most significant contributors to global internet traffic. According to recent studies, the telecommunications industry loses millions of dollars due to poor video Quality of Experience (QoE) for users. Among the standard proposals for standardizing the quality of video streaming over internet service providers (ISPs) is the Mean Opinion Score (MOS). However, the accurate finding of QoE by MOS is subjective and laborious, and it varies depending on the user. A fully automated data analytics framework is required to… More >

Displaying 1-10 on page 1 of 78. Per Page