Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Mining the Chatbot Brain to Improve COVID-19 Bot Response Accuracy

    Mukhtar Ghaleb1,*, Yahya Almurtadha2, Fahad Algarni3, Monir Abdullah3, Emad Felemban4, Ali M. Alsharafi3, Mohamed Othman5, Khaled Ghilan6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2619-2638, 2022, DOI:10.32604/cmc.2022.020358

    Abstract People often communicate with auto-answering tools such as conversational agents due to their 24/7 availability and unbiased responses. However, chatbots are normally designed for specific purposes and areas of experience and cannot answer questions outside their scope. Chatbots employ Natural Language Understanding (NLU) to infer their responses. There is a need for a chatbot that can learn from inquiries and expand its area of experience with time. This chatbot must be able to build profiles representing intended topics in a similar way to the human brain for fast retrieval. This study proposes a methodology to enhance a chatbot's brain functionality… More >

  • Open Access

    ARTICLE

    Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique

    Asif Irshad Khan1,*, Abdullah Saad Al-Malaise ALGhamdi2, Fawaz Jaber Alsolami1, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Abdullah Marish Ali1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2835-2860, 2022, DOI:10.32604/cmc.2022.020342

    Abstract The blockchain technology plays a significant role in the present era of information technology. In the last few years, this technology has been used effectively in several domains. It has already made significant differences in human life, as well as is intended to have noticeable impact in many other domains in the forthcoming years. The rapid growth in blockchain technology has created numerous new possibilities for use, especially for healthcare applications. The digital healthcare services require highly effective security methodologies that can integrate data security with the available management strategies. To test and understand this goal of security management in… More >

  • Open Access

    ARTICLE

    Earthquake Risk Assessment Approach Using Multiple Spatial Parameters for Shelter Demands

    Wenquan Jin1, Naeem Iqbal2, Hee-Cheal Kang3, Dohyeun Kim2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3763-3780, 2022, DOI:10.32604/cmc.2022.020336

    Abstract The earthquake is considered one of the most devastating disasters in any area of the world due to its potentially destructive force. Based on the various earthquake-related parameters, the risk assessment is enabled in advance to prevent future earthquake disasters. In this paper, for providing the shelter space demands to reduce the damage level and prevention costs, an earthquake risk assessment approach is proposed for deriving the risk index based on multiple spatial parameters in the gridded map. The proposed assessment approach is comprised of pre-processing, methodology model, and data visualization. The risk index model derives the earthquake risk index… More >

  • Open Access

    ARTICLE

    An Optimized Algorithm for Resource Allocation for D2D in Heterogeneous Networks

    Abdul Kadir Hamid1, Fahd N. Al-Wesabi2,3,*, Nadhem Nemri4, Ammar Zahary3, Imran Khan5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2923-2936, 2022, DOI:10.32604/cmc.2022.020309

    Abstract With the emergence of 5G mobile multimedia services, end users’ demand for high-speed, low-latency mobile communication network access is increasing. Among them, the device-to-device (D2D) communication is one of the considerable technology. In D2D communication, the data does not need to be relayed and forwarded by the base station, but under the control of the base station, a direct local link is allowed between two adjacent mobile devices. This flexible communication mode reduces the processing bottlenecks and coverage blind spots of the base station, and can be widely used in dense user communication scenarios such as heterogeneous ultra-dense wireless networks.… More >

  • Open Access

    ARTICLE

    Dorsal-Ventral Visual Pathways and Object Characteristics: Beamformer Source Analysis of EEG

    Akanksha Tiwari1, Ram Bilas Pachori1,2, Premjit Khanganba Sanjram1,3,4,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2347-2363, 2022, DOI:10.32604/cmc.2022.020299

    Abstract In performing a gaming task, mental rotation (MR) is one of the important aspects of visuospatial processing. MR involves dorsal-ventral pathways of the brain. Visual objects/models used in computer-games play a crucial role in gaming experience of the users. The visuospatial characteristics of the objects used in the computer-game influence the engagement of dorsal-ventral visual pathways. The current study investigates how the objects’ visuospatial characteristics (i.e., angular disparity and dimensionality) in an MR-based computer-game influence the cortical activities in dorsal-ventral visual pathways. Both the factors have two levels, angular disparity: convex angle (CA) vs. reflex angle (RA) and dimensionality: 2D… More >

  • Open Access

    ARTICLE

    Optimal Routing Protocol for Wireless Sensor Network Using Genetic Fuzzy Logic System

    S. Zulaikha Beevi, Abdullah Alabdulatif*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4107-4122, 2022, DOI:10.32604/cmc.2022.020292

    Abstract The wireless sensor network (WSN) is a growing sector in the network domain. By implementing it many industries developed smart task for different purposes. Sensor nodes interact with each other and this interaction technique are handled by different routing protocol. Extending the life of the network in WSN is a challenging issue because energy in sensor nodes are quickly drained. So the overall performance of WSN are degraded by this limitation. To resolve this unreliable low power link, many researches have provided various routing protocols to make the network as dependable and sustainable as possible. While speeding up the data… More >

  • Open Access

    ARTICLE

    Cross Intelligence Evaluation for Effective Emotional Intelligence Estimation

    Ibrahim Alsukayti1, Aman Singh2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2489-2505, 2022, DOI:10.32604/cmc.2022.020264

    Abstract A famous psychologist or researcher, Daniel Goleman, gave a theory on the importance of Emotional Intelligence for the success of an individual’s life. Daniel Goleman quoted in the research that “The contribution of an individual’s Intelligence Quotient (IQ) is only 20% for their success, the remaining 80% is due to Emotional Intelligence (EQ)”. However, in the absence of a reliable technique for EQ evaluation, this factor of overall intelligence is ignored in most of the intelligence evaluation mechanisms. This research presented an analysis based on basic statistical tools along with more sophisticated deep learning tools. The proposed cross intelligence evaluation… More >

  • Open Access

    ARTICLE

    An Optimal DF Based Method for Transient Stability Analysis

    Z. A. Zaki1, Emad M. Ahmed1,*, Ziad M. Ali2,3, Imran Khan4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3449-3471, 2022, DOI:10.32604/cmc.2022.020263

    Abstract The effect of energy on the natural environment has become increasingly severe as human consumption of fossil energy has increased. The capacity of the synchronous generators to keep working without losing synchronization when the system is exposed to severe faults such as short circuits is referred to as the power system's transient stability. As the power system's safe and stable operation and mechanism of action become more complicated, higher demands for accurate and rapid power system transient stability analysis are made. Current methods for analyzing transient stability are less accurate because they do not account for misclassification of unstable samples.… More >

  • Open Access

    ARTICLE

    Improved KNN Imputation for Missing Values in Gene Expression Data

    Phimmarin Keerin1, Tossapon Boongoen2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4009-4025, 2022, DOI:10.32604/cmc.2022.020261

    Abstract The problem of missing values has long been studied by researchers working in areas of data science and bioinformatics, especially the analysis of gene expression data that facilitates an early detection of cancer. Many attempts show improvements made by excluding samples with missing information from the analysis process, while others have tried to fill the gaps with possible values. While the former is simple, the latter safeguards information loss. For that, a neighbour-based (KNN) approach has proven more effective than other global estimators. The paper extends this further by introducing a new summarization method to the KNN model. It is… More >

  • Open Access

    ARTICLE

    Identification of Composite-Metal Bolted Structures with Nonlinear Contact Effect

    Mohammad Ghalandari1, Ibrahim Mahariq2, Majid Pourghasem3, Hasan Mulki2, Fahd Jarad4,5,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3383-3397, 2022, DOI:10.32604/cmc.2022.020245

    Abstract The middle layer model has been used in recent years to better describe the connection behavior in composite structures. The influencing parameters including low pre-screw and high preload have the main effects on nonlinear behavior of the connection as well as the amplitude of the excitation force applied to the structure. Therefore, in this study, the effects of connection behavior on the general structure in two sections of increasing damping and reducing the stiffness of the structures that lead to non-linear phenomena have been investigated. Due to the fact that in composite structure we are faced to the limitation of… More >

Displaying 10521-10530 on page 1053 of 22098. Per Page