Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,446)
  • Open Access

    ARTICLE

    Performance Evaluation of Virtualization Methodologies to Facilitate NFV Deployment

    Sumbal Zahoor1, Ishtiaq Ahmad1, Ateeq Ur Rehman2, Elsayed Tag Eldin3, Nivin A. Ghamry4, Muhammad Shafiq5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960

    Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial when implementing network operations at… More >

  • Open Access

    ARTICLE

    Self-Tuning Parameters for Decision Tree Algorithm Based on Big Data Analytics

    Manar Mohamed Hafez1,*, Essam Eldin F. Elfakharany1, Amr A. Abohany2, Mostafa Thabet3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 943-958, 2023, DOI:10.32604/cmc.2023.034078

    Abstract Big data is usually unstructured, and many applications require the analysis in real-time. Decision tree (DT) algorithm is widely used to analyze big data. Selecting the optimal depth of DT is time-consuming process as it requires many iterations. In this paper, we have designed a modified version of a (DT). The tree aims to achieve optimal depth by self-tuning running parameters and improving the accuracy. The efficiency of the modified (DT) was verified using two datasets (airport and fire datasets). The airport dataset has 500000 instances and the fire dataset has 600000 instances. A comparison has been made between the… More >

  • Open Access

    ARTICLE

    A Novel Compact Highly Isolated UWB MIMO Antenna with WLAN Notch

    Muhammad Awais1, Shahid Bashir1, Awais Khan1,2, Muhammad Asif2, Nasim Ullah3,*, Hend I. Alkhammash4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 669-681, 2023, DOI:10.32604/cmc.2022.033939

    Abstract This paper presents a compact Multiple Input Multiple Output (MIMO) antenna with WLAN band notch for Ultra-Wideband (UWB) applications. The antenna is designed on 0.8 mm thick low-cost FR-4 substrate having a compact size of 22 mm × 30 mm. The proposed antenna comprises of two monopole patches on the top layer of substrate while having a shared ground on its bottom layer. The mutual coupling between adjacent patches has been reduced by using a novel stub with shared ground structure. The stub consists of complementary rectangular slots that disturb the surface current direction and thus result in reducing mutual… More >

  • Open Access

    ARTICLE

    Robust Image Watermarking Using LWT and Stochastic Gradient Firefly Algorithm

    Sachin Sharma1,*, Meena Malik2, Chander Prabha3, Amal Al-Rasheed4, Mona Alduailij4, Sultan Almakdi5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 393-407, 2023, DOI:10.32604/cmc.2023.033536

    Abstract Watermarking of digital images is required in diversified applications ranging from medical imaging to commercial images used over the web. Usually, the copyright information is embossed over the image in the form of a logo at the corner or diagonal text in the background. However, this form of visible watermarking is not suitable for a large class of applications. In all such cases, a hidden watermark is embedded inside the original image as proof of ownership. A large number of techniques and algorithms are proposed by researchers for invisible watermarking. In this paper, we focus on issues that are critical… More >

  • Open Access

    ARTICLE

    A Novel Lightweight Image Encryption Scheme

    Rawia Abdulla Mohammed1,*, Maisa’a Abid Ali Khodher1, Ashwak Alabaichi2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2137-2153, 2023, DOI:10.32604/cmc.2023.036861

    Abstract Encryption algorithms are one of the methods to protect data during its transmission through an unsafe transmission medium. But encryption methods need a lot of time during encryption and decryption, so it is necessary to find encryption algorithms that consume little time while preserving the security of the data. In this paper, more than one algorithm was combined to obtain high security with a short implementation time. A chaotic system, DNA computing, and Salsa20 were combined. A proposed 5D chaos system was used to generate more robust keys in a Salsa algorithm and DNA computing. Also, the confusion is performed… More >

  • Open Access

    ARTICLE

    ML and CFD Simulation of Flow Structure around Tandem Bridge Piers in Pressurized Flow

    Aliasghar Azma1, Ramin Kiyanfar2, Yakun Liu1,*, Masoumeh Azma3,*, Di Zhang1, Ze Cao1, Zhuoyue Li1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1711-1733, 2023, DOI:10.32604/cmc.2023.036680

    Abstract Various regions are becoming increasingly vulnerable to the increased frequency of floods due to the recent changes in climate and precipitation patterns throughout the world. As a result, specific infrastructures, notably bridges, would experience significant flooding for which they were not intended and would be submerged. The flow field and shear stress distribution around tandem bridge piers under pressurized flow conditions for various bridge deck widths are examined using a series of three-dimensional (3D) simulations. It is indicated that scenarios with a deck width to pier diameter (Ld/p) ratio of 3 experience the highest levels of turbulent disturbance. In addition,… More >

  • Open Access

    ARTICLE

    MCMOD: The Multi-Category Large-Scale Dataset for Maritime Object Detection

    Zihao Sun1,*, Xiao Hu2, Yining Qi2, Yongfeng Huang2, Songbin Li3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1657-1669, 2023, DOI:10.32604/cmc.2023.036558

    Abstract The marine environment is becoming increasingly complex due to the various marine vehicles, and the diversity of maritime objects poses a challenge to marine environmental governance. Maritime object detection technology plays an important role in this segment. In the field of computer vision, there is no sufficiently comprehensive public dataset for maritime objects in the contrast to the automotive application domain. The existing maritime datasets either have no bounding boxes (which are made for object classification) or cover limited varieties of maritime objects. To fulfil the vacancy, this paper proposed the Multi-Category Large-Scale Dataset for Maritime Object Detection (MCMOD) which… More >

  • Open Access

    ARTICLE

    Teamwork Optimization with Deep Learning Based Fall Detection for IoT-Enabled Smart Healthcare System

    Sarah B. Basahel1, Saleh Bajaba2, Mohammad Yamin3, Sachi Nandan Mohanty4, E. Laxmi Lydia5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1353-1369, 2023, DOI:10.32604/cmc.2023.036453

    Abstract The current advancement in cloud computing, Artificial Intelligence (AI), and the Internet of Things (IoT) transformed the traditional healthcare system into smart healthcare. Healthcare services could be enhanced by incorporating key techniques like AI and IoT. The convergence of AI and IoT provides distinct opportunities in the medical field. Fall is regarded as a primary cause of death or post-traumatic complication for the ageing population. Therefore, earlier detection of older person falls in smart homes is required to improve the survival rate of an individual or provide the necessary support. Lately, the emergence of IoT, AI, smartphones, wearables, and so… More >

  • Open Access

    ARTICLE

    Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT

    Mingshuai Sheng1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2,3, Jing Liu4, Mengxing Huang1,5, Yen-Wei Chen6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 293-309, 2023, DOI:10.32604/cmc.2023.036438

    Abstract Medical images are used as a diagnostic tool, so protecting their confidentiality has long been a topic of study. From this, we propose a Resnet50-DCT-based zero watermarking algorithm for use with medical images. To begin, we use Resnet50, a pre-training network, to draw out the deep features of medical images. Then the deep features are transformed by DCT transform and the perceptual hash function is used to generate the feature vector. The original watermark is chaotic scrambled to get the encrypted watermark, and the watermark information is embedded into the original medical image by XOR operation, and the logical key… More >

  • Open Access

    ARTICLE

    Machine Learning Techniques for Detecting Phishing URL Attacks

    Diana T. Mosa1,2, Mahmoud Y. Shams3,*, Amr A. Abohany2, El-Sayed M. El-kenawy4, M. Thabet5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1271-1290, 2023, DOI:10.32604/cmc.2023.036422

    Abstract Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One of the online security challenges… More >

Displaying 1-10 on page 1 of 4446. Per Page  

Share Link

WeChat scan