Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    High Gain of UWB Planar Antenna Utilising FSS Reflector for UWB Applications

    Ahmed Jamal Abdullah Al-Gburi*, Imran Bin Mohd Ibrahim, Zahriladha Zakaria, Badrul Hisham Ahmad, Noor Azwan Bin Shairi, Mohammed Yousif Zeain

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1419-1436, 2022, DOI:10.32604/cmc.2022.019741

    Abstract In this paper, a high gain and directional coplanar waveguide (CPW)-fed ultra-wideband (UWB) planar antenna with a new frequency selective surface (FSS) unit cells design is proposed for UWB applications. The proposed UWB antenna was designed based on the Mercedes artistic-shaped planar (MAP) antenna. The antenna consisted of a circular ring embedded with three straight legs for antenna impedance bandwidth improvement. The modelled FSS used the integration of a two parallel conductive metallic patch with a circular loop structure. The FSS provided a UWB stopband filter response covering a bandwidth of 10.5 GHz, for frequencies from 2.2 to 12.7 GHz.… More >

  • Open Access

    ARTICLE

    Secure Audio Transmission Over Wireless Uncorrelated Rayleigh Fading Channel

    Osama S. Faragallah1,*, M. Farouk2, Hala S. El-sayed3, Mohsen A.M. El-bendary4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1603-1615, 2022, DOI:10.32604/cmc.2022.019710

    Abstract Audio communications and computer networking play essential roles in our daily lives, including many domains with different scopes. Developments in these technologies are quick. In consequence, there is a dire need to secure these technologies up to date. This paper presents an efficient model for secure audio signal transmission over the wireless noisy uncorrelated Rayleigh fading channel. Also, the performance of the utilized multiple secret keys-based audio cryptosystem is analyzed in different transformation domains. The discrete cosine transform (DCT), the discrete sine transform (DST), and the discrete wavelet transform (DWT) are investigated in the utilized multiple secret key-based audio cryptosystem.… More >

  • Open Access

    ARTICLE

    An Artificial Intelligence Approach for Solving Stochastic Transportation Problems

    Prachi Agrawal1, Khalid Alnowibet2, Talari Ganesh1, Adel F. Alrasheedi2, Hijaz Ahmad3, Ali Wagdy Mohamed4,5,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 817-829, 2022, DOI:10.32604/cmc.2022.019685

    Abstract Recent years witness a great deal of interest in artificial intelligence (AI) tools in the area of optimization. AI has developed a large number of tools to solve the most difficult search-and-optimization problems in computer science and operations research. Indeed, metaheuristic-based algorithms are a sub-field of AI. This study presents the use of the metaheuristic algorithm, that is, water cycle algorithm (WCA), in the transportation problem. A stochastic transportation problem is considered in which the parameters supply and demand are considered as random variables that follow the Weibull distribution. Since the parameters are stochastic, the corresponding constraints are probabilistic. They… More >

  • Open Access

    ARTICLE

    Real-Time Network Intrusion Prevention System Using Incremental Feature Generation

    Yeongje Uhm1, Wooguil Pak2,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1631-1648, 2022, DOI:10.32604/cmc.2022.019667

    Abstract Security measures are urgently required to mitigate the recent rapid increase in network security attacks. Although methods employing machine learning have been researched and developed to detect various network attacks effectively, these are passive approaches that cannot protect the network from attacks, but detect them after the end of the session. Since such passive approaches cannot provide fundamental security solutions, we propose an active approach that can prevent further damage by detecting and blocking attacks in real time before the session ends. The proposed technology uses a two-level classifier structure: the first-stage classifier supports real-time classification, and the second-stage classifier… More >

  • Open Access

    ARTICLE

    Towards Prevention of Sportsmen Burnout: Formal Analysis of Sub-Optimal Tournament Scheduling

    Syed Rameez Naqvi1, Adnan Ahmad1, S. M. Riazul Islam2,*, Tallha Akram1, M. Abdullah-Al-Wadud3, Atif Alamri4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1509-1526, 2022, DOI:10.32604/cmc.2022.019653

    Abstract Scheduling a sports tournament is a complex optimization problem, which requires a large number of hard constraints to satisfy. Despite the availability of several such constraints in the literature, there remains a gap since most of the new sports events pose their own unique set of requirements, and demand novel constraints. Specifically talking of the strictly time bound events, ensuring fairness between the different teams in terms of their rest days, traveling, and the number of successive games they play, becomes a difficult task to resolve, and demands attention. In this work, we present a similar situation with a recently… More >

  • Open Access

    ARTICLE

    Analysis and Assessment of Wind Energy Potential of Socotra Archipelago in Yemen

    Murad A. A. Almekhlaf1, Fahd N. Al-Wesabi2,3,*, Imran Khan4, Nadhem Nemri5, Khalid Mahmood5, Hany Mahgoub6, Noha Negm7, Amin M. El-Kustaban8, Ammar Zahary9

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1177-1193, 2022, DOI:10.32604/cmc.2022.019626

    Abstract The increasing use of fossil fuels has a significant impact on the environment and ecosystem, which increases the rate of pollution. Given the high potential of renewable energy sources in Yemen and the absence of similar studies in the region, this study aims to examine the potential of wind energy in Socotra Island. This was done by analyzing and evaluating wind properties, determining available energy density, calculating wind energy extracted at different altitudes, and then computing the capacity factor for a number of wind turbines and determining the best. The average wind speed in Socotra Island was obtained from the… More >

  • Open Access

    ARTICLE

    Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain

    Hani Mohammed Alshahrani*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 739-766, 2022, DOI:10.32604/cmc.2022.019623

    Abstract One of the most rapidly growing areas in the last few years is the Internet of Things (IoT), which has been used in widespread fields such as healthcare, smart homes, and industries. Android is one of the most popular operating systems (OS) used by IoT devices for communication and data exchange. Android OS captured more than 70 percent of the market share in 2021. Because of the popularity of the Android OS, it has been targeted by cybercriminals who have introduced a number of issues, such as stealing private information. As reported by one of the recent studies Android malware… More >

  • Open Access

    ARTICLE

    IoT Information Status Using Data Fusion and Feature Extraction Method

    S. S. Saranya*, N. Sabiyath Fatima

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1857-1874, 2022, DOI:10.32604/cmc.2022.019621

    Abstract The Internet of Things (IoT) role is instrumental in the technological advancement of the healthcare industry. Both the hardware and the core level of software platforms are the progress resulted from the accompaniment of Medicine 4.0. Healthcare IoT systems are the emergence of this foresight. The communication systems between the sensing nodes and the processors; and the processing algorithms to produce output obtained from the data collected by the sensors are the major empowering technologies. At present, many new technologies supplement these empowering technologies. So, in this research work, a practical feature extraction and classification technique is suggested for handling… More >

  • Open Access

    ARTICLE

    BHGSO: Binary Hunger Games Search Optimization Algorithm for Feature Selection Problem

    R. Manjula Devi1, M. Premkumar2, Pradeep Jangir3, B. Santhosh Kumar4, Dalal Alrowaili5, Kottakkaran Sooppy Nisar6,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 557-579, 2022, DOI:10.32604/cmc.2022.019611

    Abstract In machine learning and data mining, feature selection (FS) is a traditional and complicated optimization problem. Since the run time increases exponentially, FS is treated as an NP-hard problem. The researcher’s effort to build a new FS solution was inspired by the ongoing need for an efficient FS framework and the success rates of swarming outcomes in different optimization scenarios. This paper presents two binary variants of a Hunger Games Search Optimization (HGSO) algorithm based on V- and S-shaped transfer functions within a wrapper FS model for choosing the best features from a large dataset. The proposed technique transforms the… More >

  • Open Access

    ARTICLE

    Medical Image Compression Method Using Lightweight Multi-Layer Perceptron for Mobile Healthcare Applications

    Taesik Lee1, Dongsan Jun1,*, Sang-hyo Park2, Byung-Gyu Kim3, Jungil Yun4, Kugjin Yun4, Won-Sik Cheong4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 2013-2029, 2022, DOI:10.32604/cmc.2022.019604

    Abstract As video compression is one of the core technologies required to enable seamless medical data streaming in mobile healthcare applications, there is a need to develop powerful media codecs that can achieve minimum bitrates while maintaining high perceptual quality. Versatile Video Coding (VVC) is the latest video coding standard that can provide powerful coding performance with a similar visual quality compared to the previously developed method that is High Efficiency Video Coding (HEVC). In order to achieve this improved coding performance, VVC adopted various advanced coding tools, such as flexible Multi-type Tree (MTT) block structure which uses Binary Tree (BT)… More >

Displaying 10901-10910 on page 1091 of 22212. Per Page