Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    E-Learning during COVID-19 Outbreak: Cloud Computing Adoption in Indian Public Universities

    Amit Kumar Bhardwaj1, Lalit Garg2,*, Arunesh Garg1, Yuvraj Gajpal3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2471-2492, 2021, DOI:10.32604/cmc.2021.014099

    Abstract In the COVID-19 pandemic situation, the need to adopt cloud computing (CC) applications by education institutions, in general, and higher education (HE) institutions, in particular, has especially increased to engage students in an online mode and remotely carrying out research. The adoption of CC across various sectors, including HE, has been picking momentum in the developing countries in the last few years. In the Indian context, the CC adaptation in the HE sector (HES) remains a less thoroughly explored sector, and no comprehensive study is reported in the literature. Therefore, the aim of the present study is to overcome this… More >

  • Open Access

    ARTICLE

    A Formal Testing Model for Operating Room Control System Using Internet of Things

    Moez Krichen1, Seifeddine Mechti2, Roobaea Alroobaea3, Elyes Said4, Parminder Singh5, Osamah Ibrahim Khalaf6, Mehedi Masud3,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2997-3011, 2021, DOI:10.32604/cmc.2021.014090

    Abstract Technological advances in recent years have significantly changed the way an operating room works. This work aims to create a platform to solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations. Using this system, a doctor can control all operation rooms, especially before an operation, and monitor their temperature and humidity to prepare for the operation. Also, in the event of a problem, an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved. The platform is tested using… More >

  • Open Access

    ARTICLE

    Modelling and Simulation of COVID-19 Outbreak Prediction Using Supervised Machine Learning

    Rachid Zagrouba1, Muhammad Adnan Khan2,*, Atta-ur-Rahman1, Muhammad Aamer Saleem3, Muhammad Faheem Mushtaq4, Abdur Rehman5, Muhammad Farhan Khan6

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2397-2407, 2021, DOI:10.32604/cmc.2021.014042

    Abstract Novel Coronavirus-19 (COVID-19) is a newer type of coronavirus that has not been formally detected in humans. It is established that this disease often affects people of different age groups, particularly those with body disorders, blood pressure, diabetes, heart problems, or weakened immune systems. The epidemic of this infection has recently had a huge impact on people around the globe with rising mortality rates. Rising levels of mortality are attributed to their transmitting behavior through physical contact between humans. It is extremely necessary to monitor the transmission of the infection and also to anticipate the early stages of the disease… More >

  • Open Access

    ARTICLE

    An Efficient False-Positive Reduction System for Cerebral Microbleeds Detection

    Sitara Afzal1, Muazzam Maqsood1,*, Irfan Mehmood2, Muhammad Tabish Niaz3, Sanghyun Seo4

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2301-2315, 2021, DOI:10.32604/cmc.2021.013966

    Abstract Cerebral Microbleeds (CMBs) are microhemorrhages caused by certain abnormalities of brain vessels. CMBs can be found in people with Traumatic Brain Injury (TBI), Alzheimer’s disease, and in old individuals having a brain injury. Current research reveals that CMBs can be highly dangerous for individuals having dementia and stroke. The CMBs seriously impact individuals’ life which makes it crucial to recognize the CMBs in its initial phase to stop deterioration and to assist individuals to have a normal life. The existing work report good results but often ignores false-positive’s perspective for this research area. In this paper, an efficient approach is… More >

  • Open Access

    ARTICLE

    An Improved Dictionary Cracking Scheme Based on Multiple GPUs for Wi-Fi Network

    Majdi K. Qabalin1, Zaid A. Arida2, Omar A. Saraereh3, Falin Wu4,*, Imran Khan5, Peerapong Uthansakul6, Moath Alsafasfeh7

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2957-2972, 2021, DOI:10.32604/cmc.2021.013951

    Abstract The Internet has penetrated all aspects of human society and has promoted social progress. Cyber-crimes in many forms are commonplace and are dangerous to society and national security. Cybersecurity has become a major concern for citizens and governments. The Internet functions and software applications play a vital role in cybersecurity research and practice. Most of the cyber-attacks are based on exploits in system or application software. It is of utmost urgency to investigate software security problems. The demand for Wi-Fi applications is proliferating but the security problem is growing, requiring an optimal solution from researchers. To overcome the shortcomings of… More >

  • Open Access

    ARTICLE

    Quintuple Band Antenna for Wireless Applications with Small Form Factor

    Amir Haider1, Tayyaba Khan2, MuhibUr Rahman3, Byung Moo Lee1, Hyung Seok Kim1,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2241-2251, 2021, DOI:10.32604/cmc.2021.013908

    Abstract A coplanar waveguide-fed quintuple band antenna with a slotted circular-shaped radiator for wireless applications with a high isolation between adjacent bands is presented in this paper. The proposed antenna resonates at multiple frequencies with corresponding center frequencies of 2.35, 4.92, 5.75, 6.52, and 8.46 GHz. The intended functionality is achieved by introducing a circular disc radiator with five slots and a U-shaped slot in the feed. The proposed antenna exhibits coverage of the maximum set of wireless applications, such as satellite communication, worldwide interoperability for microwave access, wireless local area network (WLAN), long-distance radio telecommunications, and X-band/Satcom wireless applications. The… More >

  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

  • Open Access

    ARTICLE

    Entanglement and Entropy Squeezing for Moving Two Two-Level Atoms Interaction with a Radiation Field

    S. Abdel-Khalek1,2,*, E. M. Khalil1,3, Beida Alsubei1, A. Al-Barakaty4, S. M. Abo Dahab5

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2445-2456, 2021, DOI:10.32604/cmc.2021.013830

    Abstract In this paper, we analyzed squeezing in the information entropy, quantum state fidelity, and qubit-qubit entanglement in a time-dependent system. The proposed model consists of two qubits that interact with a two-mode electromagnetic field under the dissipation effect. An analytical solution is calculated by considering the constants for the equations of motion. The effect of the general form of the time-dependent for qubit-field coupling and the dissipation term on the temporal behavior of the qubit-qubit entanglement, quantum state fidelity, entropy, and variance squeezing are examined. It is shown that the intervals of entanglement caused more squeezing for the case of… More >

  • Open Access

    ARTICLE

    Extension of Direct Citation Model Using In-Text Citations

    Abdul Shahid1,*, Muhammad Tanvir Afzal2, Muhammad Qaiser Saleem3, M. S. Elsayed Idrees3, Majzoob K. Omer3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3121-3138, 2021, DOI:10.32604/cmc.2021.013809

    Abstract Citations based relevant research paper recommendations can be generated primarily with the assistance of three citation models: (1) Bibliographic Coupling, (2) Co-Citation, and (3) Direct Citations. Millions of new scholarly articles are published every year. This flux of scientific information has made it a challenging task to devise techniques that could help researchers to find the most relevant research papers for the paper at hand. In this study, we have deployed an in-text citation analysis that extends the Direct Citation Model to discover the nature of the relationship degree-of-relevancy among scientific papers. For this purpose, the relationship between citing and… More >

  • Open Access

    ARTICLE

    An Advanced Analysis of Cloud Computing Concepts Based on the Computer Science Ontology

    Paweł Lula1, Octavian Dospinescu2,*, Daniel Homocianu2, Napoleon-Alexandru Sireteanu2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2425-2443, 2021, DOI:10.32604/cmc.2021.013771

    Abstract Our primary research hypothesis stands on a simple idea: The evolution of top-rated publications on a particular theme depends heavily on the progress and maturity of related topics. And this even when there are no clear relations or some concepts appear to cease to exist and leave place for newer ones starting many years ago. We implemented our model based on Computer Science Ontology (CSO) and analyzed 44 years of publications. Then we derived the most important concepts related to Cloud Computing (CC) from the scientific collection offered by Clarivate Analytics. Our methodology includes data extraction using advanced web crawling… More >

Displaying 13081-13090 on page 1309 of 22098. Per Page