Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,186)
  • Open Access


    Partially Deep-Learning Encryption Technique

    Hamdy M. Mousa*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4277-4291, 2023, DOI:10.32604/cmc.2023.034593

    Abstract The biggest problem facing the world is information security in the digital era. Information protection and integrity are hot topics at all times, so many techniques have been introduced to transmit and store data securely. The increase in computing power is increasing the number of security breaches and attacks at a higher rate than before on average. Thus, a number of existing security systems are at risk of hacking. This paper proposes an encryption technique called Partial Deep-Learning Encryption Technique (PD-LET) to achieve data security. PD-LET includes several stages for encoding and decoding digital data. Data preprocessing, convolution layer of… More >

  • Open Access


    Reducing Dataset Specificity for Deepfakes Using Ensemble Learning

    Qaiser Abbas1, Turki Alghamdi1, Yazed Alsaawy1, Tahir Alyas2,*, Ali Alzahrani1, Khawar Iqbal Malik3, Saira Bibi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4261-4276, 2023, DOI:10.32604/cmc.2023.034482

    Abstract The emergence of deep fake videos in recent years has made image falsification a real danger. A person’s face and emotions are deep-faked in a video or speech and are substituted with a different face or voice employing deep learning to analyze speech or emotional content. Because of how clever these videos are frequently, Manipulation is challenging to spot. Social media are the most frequent and dangerous targets since they are weak outlets that are open to extortion or slander a human. In earlier times, it was not so easy to alter the videos, which required expertise in the domain… More >

  • Open Access


    Intelligent Systems and Photovoltaic Cells Empowered Topologically by Sudoku Networks

    Khalid Hamid1, Muhammad Waseem Iqbal2, M. Usman Ashraf3, Akber Abid Gardezi4, Shafiq Ahmad5, Mejdal Alqahtani5, Muhammad Shafiq6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4221-4238, 2023, DOI:10.32604/cmc.2023.034320

    Abstract A graph invariant is a number that can be easily and uniquely calculated through a graph. Recently, part of mathematical graph invariants has been portrayed and utilized for relationship examination. Nevertheless, no reliable appraisal has been embraced to pick, how much these invariants are associated with a network graph in interconnection networks of various fields of computer science, physics, and chemistry. In this paper, the study talks about sudoku networks will be networks of fractal nature having some applications in computer science like sudoku puzzle game, intelligent systems, Local area network (LAN) development and parallel processors interconnections, music composition creation,… More >

  • Open Access


    View Types and Visual Communication Cues for Remote Collaboration

    Seungwon Kim1, Weidong Huang2, Chi-Min Oh3, Gun Lee4, Mark Billinghurst4, Sang-Joon Lee5,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4363-4379, 2023, DOI:10.32604/cmc.2023.034209

    Abstract Over the last several years, remote collaboration has been getting more attention in the research community because of the COVID-19 pandemic. In previous studies, researchers have investigated the effect of adding visual communication cues or shared views in collaboration, but there has not been any previous study exploring the influence between them. In this paper, we investigate the influence of view types on the use of visual communication cues. We compared the use of the three visual cues (hand gesture, a pointer with hand gesture, and sketches with hand gesture) across two view types (dependent and independent views), respectively. We… More >

  • Open Access


    Crime Prediction Methods Based on Machine Learning: A Survey

    Junxiang Yin*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4601-4629, 2023, DOI:10.32604/cmc.2023.034190

    Abstract The objective of crime prediction, one of the most important technologies in social computing, is to extract useful information from many existing criminal records to predict the next process-related crime. It can aid the police in obtaining criminal information and warn the public to be vigilant in certain areas. With the rapid growth of big data, the Internet of Things, and other technologies, as well as the increasing use of artificial intelligence in forecasting models, crime prediction models based on deep learning techniques are accelerating. Therefore, it is necessary to classify the existing crime prediction algorithms and compare in depth… More >

  • Open Access


    Modeling and Simulation of DVR and D-STATCOM in Presence of Wind Energy System

    Mehrdad Ahmadi Kamarposhti1,*, Ilhami Colak2, Phatiphat Thounthong3, Kei Eguchi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4547-4570, 2023, DOI:10.32604/cmc.2023.034082

    Abstract The present study suggests that series voltage injection is more effective than parallel current injection to improve voltage quality on the load side. The line voltage can be accurately symmetrized at the connection point by creating and controlling a series voltage component in each phase. This is more reliable and effective than parallel current injection. A dynamic voltage restorer (DVR) and a distribution static synchronous compensator (DSTATCOM) were utilized to provide the required power. The DVR is an effective and modern device utilized in parallel within the grid and can protect sensitive loads from voltage problems in the grid by… More >

  • Open Access


    Topological Evaluation of Certain Computer Networks by Contraharmonic-Quadratic Indices

    Ahmed M. Alghamdi1,*, Khalid Hamid2, Muhammad Waseem Iqbal3, M. Usman Ashraf4, Abdullah Alshahrani5, Adel Alshamrani6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3795-3810, 2023, DOI:10.32604/cmc.2023.033976

    Abstract In various fields, different networks are used, most of the time not of a single kind; but rather a mix of at least two networks. These kinds of networks are called bridge networks which are utilized in interconnection networks of PC, portable networks, spine of internet, networks engaged with advanced mechanics, power generation interconnection, bio-informatics and substance intensify structures. Any number that can be entirely calculated by a graph is called graph invariants. Countless mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty years. Nevertheless, no trustworthy evaluation has been embraced to pick, how… More >

  • Open Access


    A Parallel Hybrid Testing Technique for Tri-Programming Model-Based Software Systems

    Huda Basloom1,*, Mohamed Dahab1, Abdullah Saad AL-Ghamdi2, Fathy Eassa1, Ahmed Mohammed Alghamdi3, Seif Haridi4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4501-4530, 2023, DOI:10.32604/cmc.2023.033928

    Abstract Recently, researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems (HPCs) to achieve exascale by applying parallelism at multiple levels. Combining different programming paradigms, such as Message Passing Interface (MPI), Open Multiple Processing (OpenMP), and Open Accelerators (OpenACC), can increase computation speed and improve performance. During the integration of multiple models, the probability of runtime errors increases, making their detection difficult, especially in the absence of testing techniques that can detect these errors. Numerous studies have been conducted to identify these errors, but no technique exists for detecting errors… More >

  • Open Access


    Detection of Omicron Caused Pneumonia from Radiology Images Using Convolution Neural Network (CNN)

    Arfat Ahmad Khan1, Malik Muhammad Ali Shahid2, Rab Nawaz Bashir2, Salman Iqbal2, Arshad Shehzad Ahmad Shahid3, Javeria Maqbool4, Chitapong Wechtaisong5,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3743-3761, 2023, DOI:10.32604/cmc.2023.033924

    Abstract COVID-19 disease caused by the SARS-CoV-2 virus has created social and economic disruption across the world. The ability of the COVID-19 virus to quickly mutate and transfer has created serious concerns across the world. It is essential to detect COVID-19 infection caused by different variants to take preventive measures accordingly. The existing method of detection of infections caused by COVID-19 and its variants is costly and time-consuming. The impacts of the COVID-19 pandemic in developing countries are very drastic due to the unavailability of medical facilities and infrastructure to handle the pandemic. Pneumonia is the major symptom of COVID-19 infection.… More >

  • Open Access


    Light-Weighted Decision Support Framework for Selecting Cloud Service Providers

    Abdulmajeed Aljuhani1,*, Abdulaziz Alhubaishy2, Mohammad Khalid Imam Rahmani2, Ahmad A. Alzahrani3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4293-4317, 2023, DOI:10.32604/cmc.2023.033893

    Abstract Multi-criteria decision making (MCDM) is a technique used to achieve better outcomes for some complex business-related problems, whereby the selection of the best alternative can be made in as many cases as possible. This paper proposes a model, the multi-criteria decision support method, that allows both service providers and consumers to maximize their profits while preserving the best matching process for resource allocation and task scheduling. The increasing number of service providers with different service provision capabilities creates an issue for consumers seeking to select the best service provider. Each consumer seeks a service provider based on various preferences, such… More >

Displaying 1-10 on page 1 of 4186. Per Page  

Share Link

WeChat scan