Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Local Stress Field in Wafer Thinning Simulations with Phase Space Averaging

    Miaocao Wang1, Yuhua Huang1, Jinming Li1, Ling Xu2, Fulong Zhu1,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 743-759, 2021, DOI:10.32604/cmc.2021.016372

    Abstract From an ingot to a wafer then to a die, wafer thinning plays an important role in the semiconductor industry. To reveal the material removal mechanism of semiconductor at nanoscale, molecular dynamics has been widely used to investigate the grinding process. However, most simulation analyses were conducted with a single phase space trajectory, which is stochastic and subjective. In this paper, the stress field in wafer thinning simulations of 4H-SiC was obtained from 50 trajectories with spatial averaging and phase space averaging. The spatial averaging was conducted on a uniform spatial grid for each trajectory. A variable named mask was… More >

  • Open Access

    ARTICLE

    Traffic Engineering in Dynamic Hybrid Segment Routing Networks

    Yingya Guo1,2,3,7, Kai Huang1, Cheng Hu4,*, Jiangyuan Yao5, Siyu Zhou6

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 655-670, 2021, DOI:10.32604/cmc.2021.016364

    Abstract The emergence of Segment Routing (SR) provides a novel routing paradigm that uses a routing technique called source packet routing. In SR architecture, the paths that the packets choose to route on are indicated at the ingress router. Compared with shortest-path-based routing in traditional distributed routing protocols, SR can realize a flexible routing by implementing an arbitrary flow splitting at the ingress router. Despite the advantages of SR, it may be difficult to update the existing IP network to a full SR deployed network, for economical and technical reasons. Updating partial of the traditional IP network to the SR network,… More >

  • Open Access

    ARTICLE

    Computer Decision Support System for Skin Cancer Localization and Classification

    Muhammad Attique Khan1, Tallha Akram2, Muhammad Sharif1, Seifedine Kadry3, Yunyoung Nam4,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1041-1064, 2021, DOI:10.32604/cmc.2021.016307

    Abstract In this work, we propose a new, fully automated system for multiclass skin lesion localization and classification using deep learning. The main challenge is to address the problem of imbalanced data classes, found in HAM10000, ISBI2018, and ISBI2019 datasets. Initially, we consider a pre-trained deep neural network model, DarkeNet19, and fine-tune the parameters of third convolutional layer to generate the image gradients. All the visualized images are fused using a High-Frequency approach along with Multilayered Feed-Forward Neural Network (HFaFFNN). The resultant image is further enhanced by employing a log-opening based activation function to generate a localized binary image. Later, two… More >

  • Open Access

    ARTICLE

    A Knowledge-Enriched and Span-Based Network for Joint Entity and Relation Extraction

    Kun Ding1, Shanshan Liu1, Yuhao Zhang2, Hui Zhang1, Xiaoxiong Zhang1,*, Tongtong Wu2,3, Xiaolei Zhou1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 377-389, 2021, DOI:10.32604/cmc.2021.016301

    Abstract The joint extraction of entities and their relations from certain texts plays a significant role in most natural language processes. For entity and relation extraction in a specific domain, we propose a hybrid neural framework consisting of two parts: a span-based model and a graph-based model. The span-based model can tackle overlapping problems compared with BILOU methods, whereas the graph-based model treats relation prediction as graph classification. Our main contribution is to incorporate external lexical and syntactic knowledge of a specific domain, such as domain dictionaries and dependency structures from texts, into end-to-end neural models. We conducted extensive experiments on… More >

  • Open Access

    ARTICLE

    Developing a Recognition System for Classifying COVID-19 Using a Convolutional Neural Network Algorithm

    Fawaz Waselallah Alsaade1, Theyazn H. H. Aldhyani2,*, Mosleh Hmoud Al-Adhaileh3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 805-819, 2021, DOI:10.32604/cmc.2021.016264

    Abstract The COVID-19 pandemic poses an additional serious public health threat due to little or no pre-existing human immunity, and developing a system to identify COVID-19 in its early stages will save millions of lives. This study applied support vector machine (SVM), k-nearest neighbor (K-NN) and deep learning convolutional neural network (CNN) algorithms to classify and detect COVID-19 using chest X-ray radiographs. To test the proposed system, chest X-ray radiographs and CT images were collected from different standard databases, which contained 95 normal images, 140 COVID-19 images and 10 SARS images. Two scenarios were considered to develop a system for predicting… More >

  • Open Access

    ARTICLE

    An Efficient Impersonation Attack Detection Method in Fog Computing

    Jialin Wan1, Muhammad Waqas1,2, Shanshan Tu1,*, Syed Mudassir Hussain3, Ahsan Shah2, Sadaqat Ur Rehman4, Muhammad Hanif2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 267-281, 2021, DOI:10.32604/cmc.2021.016260

    Abstract Fog computing paradigm extends computing, communication, storage, and network resources to the network’s edge. As the fog layer is located between cloud and end-users, it can provide more convenience and timely services to end-users. However, in fog computing (FC), attackers can behave as real fog nodes or end-users to provide malicious services in the network. The attacker acts as an impersonator to impersonate other legitimate users. Therefore, in this work, we present a detection technique to secure the FC environment. First, we model a physical layer key generation based on wireless channel characteristics. To generate the secret keys between the… More >

  • Open Access

    ARTICLE

    Automatic Surveillance of Pandemics Using Big Data and Text Mining

    Abdullah Alharbi1,*, Wael Alosaimi1, M. Irfan Uddin2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 303-317, 2021, DOI:10.32604/cmc.2021.016230

    Abstract COVID-19 disease is spreading exponentially due to the rapid transmission of the virus between humans. Different countries have tried different solutions to control the spread of the disease, including lockdowns of countries or cities, quarantines, isolation, sanitization, and masks. Patients with symptoms of COVID-19 are tested using medical testing kits; these tests must be conducted by healthcare professionals. However, the testing process is expensive and time-consuming. There is no surveillance system that can be used as surveillance framework to identify regions of infected individuals and determine the rate of spread so that precautions can be taken. This paper introduces a… More >

  • Open Access

    ARTICLE

    Fractional-Order Control of a Wind Turbine Using Manta Ray Foraging Optimization

    Hegazy Rezk1,2,*, Mohammed Mazen Alhato3, Mohemmed Alhaider1, Soufiene Bouallègue3,4

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 185-199, 2021, DOI:10.32604/cmc.2021.016175

    Abstract In this research paper, an improved strategy to enhance the performance of the DC-link voltage loop regulation in a Doubly Fed Induction Generator (DFIG) based wind energy system has been proposed. The proposed strategy used the robust Fractional-Order (FO) Proportional-Integral (PI) control technique. The FOPI control contains a non-integer order which is preferred over the integer-order control owing to its benefits. It offers extra flexibility in design and demonstrates superior outcomes such as high robustness and effectiveness. The optimal gains of the FOPI controller have been determined using a recent Manta Ray Foraging Optimization (MRFO) algorithm. During the optimization process,… More >

  • Open Access

    ARTICLE

    A Triple-Channel Encrypted Hybrid Fusion Technique to Improve Security of Medical Images

    Ahmed S. Salama1,2,3, Mohamed Amr Mokhtar3, Mazhar B. Tayel3, Esraa Eldesouky4,6, Ahmed Ali5,6,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 431-446, 2021, DOI:10.32604/cmc.2021.016165

    Abstract Assuring medical images protection and robustness is a compulsory necessity nowadays. In this paper, a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform (DWT) with the energy compaction of the Discrete Wavelet Transform (DCT). The multi-level Encryption-based Hybrid Fusion Technique (EbhFT) aims to achieve great advances in terms of imperceptibility and security of medical images. A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform. Afterwards, a 64-bit hex key is employed to encrypt the host image as well as participate in the second key creation process to… More >

  • Open Access

    ARTICLE

    Dynamic Multi-Attribute Decision-Making Method with Double Reference Points and Its Application

    Haoran Huang1, Qinyong Lin2, Weitong Chen3, Kai Fang4, Huazhou Chen5, Ken Cai2,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1303-1320, 2021, DOI:10.32604/cmc.2021.016163

    Abstract To better reflect the psychological behavior characteristics of loss aversion, this paper builds a double reference point decision making method for dynamic multi-attribute decision-making (DMADM) problem, taking bottom-line and target as reference pints. First, the gain/loss function is given, and the state is divided according to the relationship between the gain/loss value and the reference point. Second, the attitude function is constructed based on the results of state division to establish the utility function. Third, the comprehensive utility value is calculated as the basis for alternatives classification and ranking. Finally, the new method is used to evaluate the development level… More >

Displaying 12351-12360 on page 1236 of 22098. Per Page