Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    An Optimized Deep Residual Network with a Depth Concatenated Block for Handwritten Characters Classification

    Gibrael Abosamra*, Hadi Oqaibi

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1-28, 2021, DOI:10.32604/cmc.2021.015318

    Abstract Even though much advancements have been achieved with regards to the recognition of handwritten characters, researchers still face difficulties with the handwritten character recognition problem, especially with the advent of new datasets like the Extended Modified National Institute of Standards and Technology dataset (EMNIST). The EMNIST dataset represents a challenge for both machine-learning and deep-learning techniques due to inter-class similarity and intra-class variability. Inter-class similarity exists because of the similarity between the shapes of certain characters in the dataset. The presence of intra-class variability is mainly due to different shapes written by different writers for the same character. In this… More >

  • Open Access

    ARTICLE

    Network Log-Based SSH Brute-Force Attack Detection Model

    Jeonghoon Park1, Jinsu Kim1, B. B. Gupta2, Namje Park1,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 887-901, 2021, DOI:10.32604/cmc.2021.015172

    Abstract The rapid advancement of IT technology has enabled the quick discovery, sharing and collection of quality information, but has also increased cyberattacks at a fast pace at the same time. There exists no means to block these cyberattacks completely, and all security policies need to consider the possibility of external attacks. Therefore, it is crucial to reduce external attacks through preventative measures. In general, since routers located in the upper part of a firewall can hardly be protected by security systems, they are exposed to numerous unblocked cyberattacks. Routers block unnecessary services and accept necessary ones while taking appropriate measures… More >

  • Open Access

    ARTICLE

    Deep Learning and Improved Particle Swarm Optimization Based Multimodal Brain Tumor Classification

    Ayesha Bin T. Tahir1, Muhamamd Attique Khan1, Majed Alhaisoni2, Junaid Ali Khan1, Yunyoung Nam3,*, Shui-Hua Wang4, Kashif Javed5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1099-1116, 2021, DOI:10.32604/cmc.2021.015154

    Abstract Background: A brain tumor reflects abnormal cell growth. Challenges: Surgery, radiation therapy, and chemotherapy are used to treat brain tumors, but these procedures are painful and costly. Magnetic resonance imaging (MRI) is a non-invasive modality for diagnosing tumors, but scans must be interpretated by an expert radiologist. Methodology: We used deep learning and improved particle swarm optimization (IPSO) to automate brain tumor classification. MRI scan contrast is enhanced by ant colony optimization (ACO); the scans are then used to further train a pretrained deep learning model, via transfer learning (TL), and to extract features from two dense layers. We fused… More >

  • Open Access

    ARTICLE

    Power System Resiliency and Wide Area Control Employing Deep Learning Algorithm

    Pandia Rajan Jeyaraj1, Aravind Chellachi Kathiresan1, Siva Prakash Asokan1, Edward Rajan Samuel Nadar1, Hegazy Rezk2,3,*, Thanikanti Sudhakar Babu4

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 553-567, 2021, DOI:10.32604/cmc.2021.015128

    Abstract The power transfer capability of the smart transmission grid-connected networks needs to be reduced by inter-area oscillations. Due to the fact that inter-area modes of oscillations detain and make instability of power transmission networks. This fact is more noticeable in smart grid-connected systems. The smart grid infrastructure has more renewable energy resources installed for its operation. To overcome this problem, a deep learning wide-area controller is proposed for real-time parameter control and smart power grid resilience on oscillations inter-area modes. The proposed Deep Wide Area Controller (DWAC) uses the Deep Belief Network (DBN). The network weights are updated based on… More >

  • Open Access

    ARTICLE

    A New BEM for Fractional Nonlinear Generalized Porothermoelastic Wave Propagation Problems

    Mohamed Abdelsabour Fahmy1,2,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 59-76, 2021, DOI:10.32604/cmc.2021.015115

    Abstract The main purpose of the current article is to develop a novel boundary element model for solving fractional-order nonlinear generalized porothermoelastic wave propagation problems in the context of temperature-dependent functionally graded anisotropic (FGA) structures. The system of governing equations of the considered problem is extremely very difficult or impossible to solve analytically due to nonlinearity, fractional order diffusion and strongly anisotropic mechanical and physical properties of considered porous structures. Therefore, an efficient boundary element method (BEM) has been proposed to overcome this difficulty, where, the nonlinear terms were treated using the Kirchhoff transformation and the domain integrals were treated using… More >

  • Open Access

    ARTICLE

    Deep Trajectory Classification Model for Congestion Detection in Human Crowds

    Emad Felemban1, Sultan Daud Khan2, Atif Naseer3, Faizan Ur Rehman4,*, Saleh Basalamah1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 705-725, 2021, DOI:10.32604/cmc.2021.015085

    Abstract In high-density gatherings, crowd disasters frequently occur despite all the safety measures. Timely detection of congestion in human crowds using automated analysis of video footage can prevent crowd disasters. Recent work on the prevention of crowd disasters has been based on manual analysis of video footage. Some methods also measure crowd congestion by estimating crowd density. However, crowd density alone cannot provide reliable information about congestion. This paper proposes a deep learning framework for automated crowd congestion detection that leverages pedestrian trajectories. The proposed framework divided the input video into several temporal segments. We then extracted dense trajectories from each… More >

  • Open Access

    ARTICLE

    Evaluating the Risk of Disclosure and Utility in a Synthetic Dataset

    Kang-Cheng Chen1, Chia-Mu Yu2,*, Tooska Dargahi3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 761-787, 2021, DOI:10.32604/cmc.2021.014984

    Abstract The advancement of information technology has improved the delivery of financial services by the introduction of Financial Technology (FinTech). To enhance their customer satisfaction, Fintech companies leverage artificial intelligence (AI) to collect fine-grained data about individuals, which enables them to provide more intelligent and customized services. However, although visions thereof promise to make customers’ lives easier, they also raise major security and privacy concerns for their users. Differential privacy (DP) is a common privacy-preserving data publishing technique that is proved to ensure a high level of privacy preservation. However, an important concern arises from the trade-off between the data utility… More >

  • Open Access

    ARTICLE

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    Muhammad Adil1, Jehad Ali2, Muhammad Sajjad Khan3, Junsu Kim3, Ryan Alturki4, Mohammad Zakarya4, Mukhtaj Khan4, Rahim Khan4, Su Min Kim3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967

    Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and round-trip time (RTT) information to… More >

  • Open Access

    ARTICLE

    Down to Zero Size of VoIP Packet Payload

    Mosleh M. Abualhaj*, Qusai Y. Shambour, Abdelrahman H. Hussein, Qasem M. Kharma

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1271-1283, 2021, DOI:10.32604/cmc.2021.014928

    Abstract Voice over Internet Protocol (VoIP) is widely used by companies, schools, universities, and other institutions. However, VoIP faces many issues that slow down its propagation. An important issue is poor utilization of the VoIP service network bandwidth, which results from the large header of the VoIP packet. The objective of this study is to handle this poor utilization of the network bandwidth. Therefore, this study proposes a novel method to address this large header overhead problem. The proposed method is called zero size payload (ZSP), which aims to reemploy and use the header information (fields) of the VoIP packet that… More >

  • Open Access

    ARTICLE

    A Machine Learning Based Algorithm to Process Partial Shading Effects in PV Arrays

    Kamran Sadiq Awan1, Tahir Mahmood1, Mohammad Shorfuzzaman2, Rashid Ali3, Raja Majid Mehmood4,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 29-43, 2021, DOI:10.32604/cmc.2021.014824

    Abstract Solar energy is a widely used type of renewable energy. Photovoltaic arrays are used to harvest solar energy. The major goal, in harvesting the maximum possible power, is to operate the system at its maximum power point (MPP). If the irradiation conditions are uniform, the P-V curve of the PV array has only one peak that is called its MPP. But when the irradiation conditions are non-uniform, the P-V curve has multiple peaks. Each peak represents an MPP for a specific irradiation condition. The highest of all the peaks is called Global Maximum Power Point (GMPP). Under uniform irradiation conditions,… More >

Displaying 12511-12520 on page 1252 of 22212. Per Page