Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,115)
  • Open Access

    ARTICLE

    A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks

    Vivek Kumar Sinha1, Divya Anand1,*, Fahd S. Alharithi2, Ahmed H. Almulihi2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6293-6305, 2022, DOI:10.32604/cmc.2022.024877

    Abstract The 3PAKE (Three-Party Authenticated Key Exchange) protocol is a valuable cryptographic method that offers safe communication and permits two diverse parties to consent to a new safe meeting code using the trusted server. There have been explored numerous 3PAKE protocols earlier to create a protected meeting code between users employing the trusted server. However, existing modified 3PAKE protocols have numerous drawbacks and are incapable to provide desired secrecy against diverse attacks such as man-in-the-middle, brute-force attacks, and many others in social networks. In this article, the authors proposed an improved as well as safe 3PAKE protocol based on the hash… More >

  • Open Access

    ARTICLE

    Reinforced CNN Forensic Discriminator to Detect Document Forgery by DCGAN

    Seo-young Lim, Jeongho Cho*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6039-6051, 2022, DOI:10.32604/cmc.2022.024862

    Abstract Recently, the technology of digital image forgery based on a generative adversarial network (GAN) has considerably improved to the extent that it is difficult to distinguish it from the original image with the naked eye by compositing and editing a person's face or a specific part with the original image. Thus, much attention has been paid to digital image forgery as a social issue. Further, document forgery through GANs can completely change the meaning and context in a document, and it is difficult to identify whether the document is forged or not, which is dangerous. Nonetheless, few studies have been… More >

  • Open Access

    ARTICLE

    Estimator-Based GPS Attitude and Angular Velocity Determination

    Dah-Jing Jwo*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6107-6124, 2022, DOI:10.32604/cmc.2022.024722

    Abstract In this paper, the estimator-based Global Positioning System (GPS) attitude and angular velocity determination is presented. Outputs of the attitude estimator include the attitude angles and attitude rates or body angular velocities, depending on the design of estimator. Traditionally as a position, velocity and time sensor, the GPS also offers a free attitude-determination interferometer. GPS research and applications to the field of attitude determination using carrier phase or Doppler measurement has been extensively conducted. The raw attitude solution using the interferometry technique based on the least-squares approach is inherently noisy. The estimator such as the Kalman filter (KF) or extended… More >

  • Open Access

    ARTICLE

    Optimized Deep Learning Model for Colorectal Cancer Detection and Classification Model

    Mahmoud Ragab1,2,3,*, Khalid Eljaaly4, Maha Farouk S. Sabir5, Ehab Bahaudien Ashary6, S. M. Abo-Dahab7,8, E. M. Khalil3,9

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5751-5764, 2022, DOI:10.32604/cmc.2022.024658

    Abstract The recent developments in biological and information technologies have resulted in the generation of massive quantities of data it speeds up the process of knowledge discovery from biological systems. Due to the advancements of medical imaging in healthcare decision making, significant attention has been paid by the computer vision and deep learning (DL) models. At the same time, the detection and classification of colorectal cancer (CC) become essential to reduce the severity of the disease at an earlier stage. The existing methods are commonly based on the combination of textual features to examine the classifier results or machine learning (ML)… More >

  • Open Access

    ARTICLE

    Exploration of IoT Nodes Communication Using LoRaWAN in Forest Environment

    Anshul Sharma1, Divneet Singh Kapoor1, Anand Nayyar2,3,*, Basit Qureshi4, Kiran Jot Singh1, Khushal Thakur1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6239-6256, 2022, DOI:10.32604/cmc.2022.024639

    Abstract The simultaneous advances in the Internet of Things (IoT), Artificial intelligence (AI) and Robotics is going to revolutionize our world in the near future. In recent years, LoRa (Long Range) wireless powered by LoRaWAN (LoRa Wide Area Network) protocol has attracted the attention of researchers for numerous applications in the IoT domain. LoRa is a low power, unlicensed Industrial, Scientific, and Medical (ISM) band-equipped wireless technology that utilizes a wide area network protocol, i.e., LoRaWAN, to incorporate itself into the network infrastructure. In this paper, we have evaluated the LoRaWAN communication protocol for the implementation of the IoT (Internet of Things)… More >

  • Open Access

    ARTICLE

    LCF: A Deep Learning-Based Lightweight CSI Feedback Scheme for MIMO Networks

    Kyu-haeng Lee*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5561-5580, 2022, DOI:10.32604/cmc.2022.024562

    Abstract Recently, as deep learning technologies have received much attention for their great potential in extracting the principal components of data, there have been many efforts to apply them to the Channel State Information (CSI) feedback overhead problem, which can significantly limit Multi-Input Multi-Output (MIMO) beamforming gains. Unfortunately, since most compression models can quickly become outdated due to channel variation, timely model updates are essential for reflecting the current channel conditions, resulting in frequent additional transmissions for model sharing between transceivers. In particular, the heavy network models employed by most previous studies to achieve high compression gains exacerbate the impact of… More >

  • Open Access

    ARTICLE

    Automated Multi-Document Biomedical Text Summarization Using Deep Learning Model

    Ahmed S. Almasoud1, Siwar Ben Haj Hassine2, Fahd N. Al-Wesabi2,3, Mohamed K. Nour4, Anwer Mustafa Hilal5, Mesfer Al Duhayyim6, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5799-5815, 2022, DOI:10.32604/cmc.2022.024556

    Abstract Due to the advanced developments of the Internet and information technologies, a massive quantity of electronic data in the biomedical sector has been exponentially increased. To handle the huge amount of biomedical data, automated multi-document biomedical text summarization becomes an effective and robust approach of accessing the increased amount of technical and medical literature in the biomedical sector through the summarization of multiple source documents by retaining the significantly informative data. So, multi-document biomedical text summarization acts as a vital role to alleviate the issue of accessing precise and updated information. This paper presents a Deep Learning based Attention Long… More >

  • Open Access

    ARTICLE

    Mathematical Modelling of Quantum Kernel Method for Biomedical Data Analysis

    Mahmoud Ragab1,2,3, Ehab Bahauden Ashary4, Maha Farouk S. Sabir5, Adel A. Bahaddad5, Romany F. Mansour6,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5441-5457, 2022, DOI:10.32604/cmc.2022.024545

    Abstract This study presents a novel method to detect the medical application based on Quantum Computing (QC) and a few Machine Learning (ML) systems. QC has a primary advantage i.e., it uses the impact of quantum parallelism to provide the consequences of prime factorization issue in a matter of seconds. So, this model is suggested for medical application only by recent researchers. A novel strategy i.e., Quantum Kernel Method (QKM) is proposed in this paper for data prediction. In this QKM process, Linear Tunicate Swarm Algorithm (LTSA), the optimization technique is used to calculate the loss function initially and is aimed… More >

  • Open Access

    ARTICLE

    Examination of Pine Wilt Epidemic Model through Efficient Algorithm

    Ali Raza1,*, Emad E. Mahmoud2, A. M. Al-Bugami2, Dumitru Baleanu3,4, Muhammad Rafiq5, Muhammad Mohsin6, Muneerah Al Nuwairan7

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5293-5310, 2022, DOI:10.32604/cmc.2022.024535

    Abstract Pine wilt is a dramatic disease that kills infected trees within a few weeks to a few months. The cause is the pathogen Pinewood Nematode. Most plant-parasitic nematodes are attached to plant roots, but pinewood nematodes are found in the tops of trees. Nematodes kill the tree by feeding the cells around the resin ducts. The modeling of a pine wilt disease is based on six compartments, including three for plants (susceptible trees, exposed trees, and infected trees) and the other for the beetles (susceptible beetles, exposed beetles, and infected beetles). The deterministic modeling, along with subpopulations, is based on… More >

  • Open Access

    ARTICLE

    Annealing Harmony Search Algorithm to Solve the Nurse Rostering Problem

    Mohammed Hadwan1,2,3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5545-5559, 2022, DOI:10.32604/cmc.2022.024512

    Abstract A real-life problem is the rostering of nurses at hospitals. It is a famous nondeterministic, polynomial time (NP) -hard combinatorial optimization problem. Handling the real-world nurse rostering problem (NRP) constraints in distributing workload equally between available nurses is still a difficult task to achieve. The international shortage of nurses, in addition to the spread of COVID-19, has made it more difficult to provide convenient rosters for nurses. Based on the literature, heuristic-based methods are the most commonly used methods to solve the NRP due to its computational complexity, especially for large rosters. Heuristic-based algorithms in general have problems striking the… More >

Displaying 9171-9180 on page 918 of 22115. Per Page