Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,115)
  • Open Access

    ARTICLE

    Hybrid BWO-IACO Algorithm for Cluster Based Routing in Wireless Sensor Networks

    R. Punithavathi1, Chinnarao Kurangi2, S. P. Balamurugan3, Irina V. Pustokhina4, Denis A. Pustokhin5, K. Shankar6,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 433-449, 2021, DOI:10.32604/cmc.2021.018231

    Abstract Wireless Sensor Network (WSN) comprises a massive number of arbitrarily placed sensor nodes that are linked wirelessly to monitor the physical parameters from the target region. As the nodes in WSN operate on inbuilt batteries, the energy depletion occurs after certain rounds of operation and thereby results in reduced network lifetime. To enhance energy efficiency and network longevity, clustering and routing techniques are commonly employed in WSN. This paper presents a novel black widow optimization (BWO) with improved ant colony optimization (IACO) algorithm (BWO-IACO) for cluster based routing in WSN. The proposed BWO-IACO algorithm involves BWO based clustering process to… More >

  • Open Access

    ARTICLE

    A New BEM Modeling Algorithm for Size-Dependent Thermopiezoelectric Problems in Smart Nanostructures

    Mohamed Abdelsabour Fahmy1,2,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 931-944, 2021, DOI:10.32604/cmc.2021.018191

    Abstract The main objective of this paper is to introduce a new theory called size-dependent thermopiezoelectricity for smart nanostructures. The proposed theory includes the combination of thermoelastic and piezoelectric influences which enable us to describe the deformation and mechanical behaviors of smart nanostructures subjected to thermal, and piezoelectric loadings. Because of difficulty of experimental research problems associated with the proposed theory. Therefore, we propose a new boundary element method (BEM) formulation and algorithm for the solution of such problems, which involve temperatures, normal heat fluxes, displacements, couple-tractions, rotations, force-tractions, electric displacement, and normal electric displacement as primary variables within the BEM… More >

  • Open Access

    ARTICLE

    An Optimized Data Fusion Paradigm for WSN Based on Neural Networks

    Moath Alsafasfeh1,*, Zaid A. Arida2, Omar A. Saraereh3, Qais Alsafasfeh4, Salem Alemaishat5

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1097-1108, 2021, DOI:10.32604/cmc.2021.018187

    Abstract Wireless sensor networks (WSNs) have gotten a lot of attention as useful tools for gathering data. The energy problem has been a fundamental constraint and challenge faced by many WSN applications due to the size and cost constraints of the sensor nodes. This paper proposed a data fusion model based on the back propagation neural network (BPNN) model to address the problem of a large number of invalid or redundant data. Using three layered-based BPNNs and a TEEN threshold, the proposed model describes the cluster structure and filters out unnecessary details. During the information transmission process, the neural network’s output… More >

  • Open Access

    ARTICLE

    A Soft Tissue Acupuncture Model Based on Mass-Spring Force Net

    Xiaorui Zhang1,2,*, Tong Xu1, Wei Sun2, Jiali Duan1, Sunil Kumar Jha3

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 727-745, 2021, DOI:10.32604/cmc.2021.018182

    Abstract In the simulation of acupuncture manipulation, it is necessary to accurately capture the information of acupuncture points and particles around them. Therefore, a soft tissue modeling method that can accurately track model particles is needed. In this paper, a soft tissue acupuncture model based on the mass-spring force net is designed. MSM is used as the auxiliary model and the SHF model is combined. SHF is used to establish a three-layer soft tissue model of skin, fat, and muscle, and a layer of the MSM based force network is covered on the surface of soft tissue to realize the complementary… More >

  • Open Access

    ARTICLE

    A Joint Algorithm for Resource Allocation in D2D 5G Wireless Networks

    Fahd N. Al-Wesabi1,2,*, Imran Khan3, Mohammad Alamgeer4, Ali M. Al-Sharafi5, Bong Jun Choi6, Abdallah Aldosary7, Ehab Mahmoud Mohamed8,9

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 301-317, 2021, DOI:10.32604/cmc.2021.018122

    Abstract With the rapid development of Internet technology, users have an increasing demand for data. The continuous popularization of traffic-intensive applications such as high-definition video, 3D visualization, and cloud computing has promoted the rapid evolution of the communications industry. In order to cope with the huge traffic demand of today’s users, 5G networks must be fast, flexible, reliable and sustainable. Based on these research backgrounds, the academic community has proposed D2D communication. The main feature of D2D communication is that it enables direct communication between devices, thereby effectively improve resource utilization and reduce the dependence on base stations, so it can… More >

  • Open Access

    ARTICLE

    Early COVID-19 Symptoms Identification Using Hybrid Unsupervised Machine Learning Techniques

    Omer Ali1,2, Mohamad Khairi Ishak1,*, Muhammad Kamran Liaquat Bhatti2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 747-766, 2021, DOI:10.32604/cmc.2021.018098

    Abstract The COVID-19 virus exhibits pneumonia-like symptoms, including fever, cough, and shortness of breath, and may be fatal. Many COVID-19 contraction experiments require comprehensive clinical procedures at medical facilities. Clinical studies help to make a correct diagnosis of COVID-19, where the disease has already spread to the organs in most cases. Prompt and early diagnosis is indispensable for providing patients with the possibility of early clinical diagnosis and slowing down the disease spread. Therefore, clinical investigations in patients with COVID-19 have revealed distinct patterns of breathing relative to other diseases such as flu and cold, which are worth investigating. Current supervised… More >

  • Open Access

    ARTICLE

    Two-Phase Bidirectional Dual-Relay Selection Strategy for Wireless Relay Networks

    Samer Alabed*, Issam Maaz, Mohammad Al-Rabayah

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 539-553, 2021, DOI:10.32604/cmc.2021.018061

    Abstract In this article, we introduce a new bi-directional dual-relay selection strategy with its bit error rate (BER) performance analysis. During the first step of the proposed strategy, two relays out of a set of N relay-nodes are selected in a way to optimize the system performance in terms of BER, based on the suggested algorithm which checks if the selected relays using the max-min criterion are the best ones. In the second step, the chosen relay-nodes perform an orthogonal space-time coding scheme using the two-phase relaying protocol to establish a bi-directional communication between the communicating terminals, leading to a significant… More >

  • Open Access

    ARTICLE

    Competency Driven Resource Evaluation Method for Business Process Intelligence

    Abid Sohail1,*, Dhanapal Durai Dominic2, Mohammad Hijji3, Muhammad Arif Butt4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1141-1157, 2021, DOI:10.32604/cmc.2021.018023

    Abstract Enterprises are continuously aiming at improving the execution of processes to achieve a competitive edge. One of the established ways of improving process performance is to assign the most appropriate resources to each task of the process. However, evaluations of business process improvement approaches have established that a method that can guide decision-makers to identify the most appropriate resources for a task of process improvement in a structured way, is missing. It is because the relationship between resources and tasks is less understood and advancement in business process intelligence is also ignored. To address this problem an integrated resource classification… More >

  • Open Access

    ARTICLE

    Implications COVID-19 on Performance and Energy Management in the Production Electricity

    Noor Shakir Mahmood1, Ahmed Ali Ajmi1, Shamsul Sarip2,*, Khairur Rijal Jamaludin2, Hazilah Mad Kaidi2, Hayati Abdul Talib2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 895-911, 2021, DOI:10.32604/cmc.2021.018012

    Abstract The COVID-19 pandemic has directly impacted the electric power industry; the energy sector has experienced huge losses in electricity production. These losses have also affected the reliability of communication and employees’ performance, hence destabilizing the electric power system. This article aims at achieving two objectives. First, analyzing the impact of the COVID-19 pandemic on the communication of performance (human error and human factors) and energy management in electricity production. Second, to develop a conceptual framework model to alleviate effects of the pandemic on the power sector and then improve energy management and human performance. This paper involves investigating the influence… More >

  • Open Access

    ARTICLE

    Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller

    Mohammad Aladaileh1, Mohammed Anbar1,*, Iznan H. Hasbullah1, Yousef K. Sanjalawe1,2, Yung-Wey Chong1

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 373-391, 2021, DOI:10.32604/cmc.2021.017972

    Abstract The Software-Defined Networking (SDN) technology improves network management over existing technology via centralized network control. The SDN provides a perfect platform for researchers to solve traditional network’s outstanding issues. However, despite the advantages of centralized control, concern about its security is rising. The more traditional network switched to SDN technology, the more attractive it becomes to malicious actors, especially the controller, because it is the network’s brain. A Distributed Denial of Service (DDoS) attack on the controller could cripple the entire network. For that reason, researchers are always looking for ways to detect DDoS attacks against the controller with higher… More >

Displaying 11631-11640 on page 1164 of 22115. Per Page