Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Acceptance Sampling Plans with Truncated Life Tests for the Length-Biased Weighted Lomax Distribution

    Amer Ibrahim Al-Omari1,*, Ibrahim M. Almanjahie2,3, Olena Kravchuk4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 285-301, 2021, DOI:10.32604/cmc.2021.014537

    Abstract In this paper, we considered the Length-biased weighted Lomax distribution and constructed new acceptance sampling plans (ASPs) where the life test is assumed to be truncated at a pre-assigned time. For the new suggested ASPs, the tables of the minimum samples sizes needed to assert a specific mean life of the test units are obtained. In addition, the values of the corresponding operating characteristic function and the associated producer’s risks are calculated. Analyses of two real data sets are presented to investigate the applicability of the proposed acceptance sampling plans; one data set contains the first failure of 20 small… More >

  • Open Access

    ARTICLE

    SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications

    Nafisa Ahmed1, Manar Abu Talib2,*, Qassim Nasir3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 23-49, 2021, DOI:10.32604/cmc.2021.014523

    Abstract Security is one of the major challenges that devices connected to the Internet of Things (IoT) face today. Remote attestation is used to measure these devices’ trustworthiness on the network by measuring the device platform’s integrity. Several software-based attestation mechanisms have been proposed, but none of them can detect runtime attacks. Although some researchers have attempted to tackle these attacks, the proposed techniques require additional secured hardware parts to be integrated with the attested devices to achieve their aim. These solutions are expensive and not suitable in many cases. This paper proposes a dual attestation process, SAPEM, with two phases:… More >

  • Open Access

    ARTICLE

    Accurate Fault Location Modeling for Parallel Transmission Lines Considering Mutual Effect

    Hamdy A. Ziedan1, Hegazy Rezk2,3, Mujahed Al-Dhaifallah4,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 491-518, 2021, DOI:10.32604/cmc.2021.014493

    Abstract A new accurate algorithms based on mathematical modeling of two parallel transmissions lines system (TPTLS) as influenced by the mutual effect to determine the fault location is discussed in this work. The distance relay measures the impedance to the fault location which is the positive-sequence. The principle of summation the positive-, negative-, and zero-sequence voltages which equal zero is used to determine the fault location on the TPTLS. Also, the impedance of the transmission line to the fault location is determined. These algorithms are applied to single-line-to-ground (SLG) and double-line-to-ground (DLG) faults. To detect the fault location along the transmission… More >

  • Open Access

    ARTICLE

    Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm

    Bijeta Seth1, Surjeet Dalal1, Dac-Nhuong Le2,3,*, Vivek Jaglan4, Neeraj Dahiya1, Akshat Agrawal5, Mayank Mohan Sharma6, Deo Prakash7, K. D. Verma8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 779-798, 2021, DOI:10.32604/cmc.2021.014466

    Abstract Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically reconfigured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blowfish and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption… More >

  • Open Access

    ARTICLE

    Timing and Classification of Patellofemoral Osteoarthritis Patients Using Fast Large Margin Classifier

    Mai Ramadan Ibraheem1, Jilan Adel2, Alaa Eldin Balbaa3, Shaker El-Sappagh4, Tamer Abuhmed5,*, Mohammed Elmogy6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 393-409, 2021, DOI:10.32604/cmc.2021.014446

    Abstract Surface electromyogram (sEMG) processing and classification can assist neurophysiological standardization and evaluation and provide habitational detection. The timing of muscle activation is critical in determining various medical conditions when looking at sEMG signals. Understanding muscle activation timing allows identification of muscle locations and feature validation for precise modeling. This work aims to develop a predictive model to investigate and interpret Patellofemoral (PF) osteoarthritis based on features extracted from the sEMG signal using pattern classification. To this end, sEMG signals were acquired from five core muscles over about 200 reads from healthy adult patients while they were going upstairs. Onset, offset,… More >

  • Open Access

    ARTICLE

    Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

    Nazli Sanam1,*, Asif Ali1, Tariq Shah1, Ghazanfar Farooq2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1-21, 2021, DOI:10.32604/cmc.2021.014442

    Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the designing of these S-boxes is… More >

  • Open Access

    ARTICLE

    Soil Properties for Earthen Building Construction in Najran City, Saudi Arabia

    Yaser Khaled Al-Sakkaf1, Gamil M. S. Abdullah2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 127-140, 2021, DOI:10.32604/cmc.2021.014438

    Abstract Earth is the most common and important building material used in the construction industry, since it is found in almost every country in the world. Modern earthen construction is alive and well, and is spread over an enormous geographical area. This technique utilizes various earthen materials and numerous methods, and features many benefits for both construction in general and buildings in particular. Najran, a city located in the south of Saudi Arabia, is distinguished by its heritage of earthen architecture, which displays many advantages and a marvelous variety of types and exterior designs. Many weaknesses of the material, however, along… More >

  • Open Access

    ARTICLE

    A Secure NDN Framework for Internet of Things Enabled Healthcare

    Syed Sajid Ullah1, Saddam Hussain1,*, Abdu Gumaei2,3, Hussain AlSalman2,4

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 223-240, 2021, DOI:10.32604/cmc.2021.014413

    Abstract Healthcare is a binding domain for the Internet of Things (IoT) to automate healthcare services for sharing and accumulation patient records at anytime from anywhere through the Internet. The current IP-based Internet architecture suffers from latency, mobility, location dependency, and security. The Named Data Networking (NDN) has been projected as a future internet architecture to cope with the limitations of IP-based Internet. However, the NDN infrastructure does not have a secure framework for IoT healthcare information. In this paper, we proposed a secure NDN framework for IoT-enabled Healthcare (IoTEH). In the proposed work, we adopt the services of Identity-Based Signcryption… More >

  • Open Access

    ARTICLE

    Automatic Segmentation of Liver from Abdominal Computed Tomography Images Using Energy Feature

    Prabakaran Rajamanickam1, Shiloah Elizabeth Darmanayagam1,*, Sunil Retmin Raj Cyril Raj2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 709-722, 2021, DOI:10.32604/cmc.2021.014347

    Abstract Liver Segmentation is one of the challenging tasks in detecting and classifying liver tumors from Computed Tomography (CT) images. The segmentation of hepatic organ is more intricate task, owing to the fact that it possesses a sizeable quantum of vascularization. This paper proposes an algorithm for automatic seed point selection using energy feature for use in level set algorithm for segmentation of liver region in CT scans. The effectiveness of the method can be determined when used in a model to classify the liver CT images as tumorous or not. This involves segmentation of the region of interest (ROI) from… More >

  • Open Access

    ARTICLE

    Enhancing Network Intrusion Detection Model Using Machine Learning Algorithms

    Nancy Awadallah Awad*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 979-990, 2021, DOI:10.32604/cmc.2021.014307

    Abstract After the digital revolution, large quantities of data have been generated with time through various networks. The networks have made the process of data analysis very difficult by detecting attacks using suitable techniques. While Intrusion Detection Systems (IDSs) secure resources against threats, they still face challenges in improving detection accuracy, reducing false alarm rates, and detecting the unknown ones. This paper presents a framework to integrate data mining classification algorithms and association rules to implement network intrusion detection. Several experiments have been performed and evaluated to assess various machine learning classifiers based on the KDD99 intrusion dataset. Our study focuses… More >

Displaying 13081-13090 on page 1309 of 22212. Per Page