Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,113)
  • Open Access

    ARTICLE

    E-mail Spam Classification Using Grasshopper Optimization Algorithm and Neural Networks

    Sanaa A. A. Ghaleb1,3,4, Mumtazimah Mohamad1, Syed Abdullah Fadzli1, Waheed A.H.M. Ghanem2,3,4,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4749-4766, 2022, DOI:10.32604/cmc.2022.020472

    Abstract Spam has turned into a big predicament these days, due to the increase in the number of spam emails, as the recipient regularly receives piles of emails. Not only is spam wasting users’ time and bandwidth. In addition, it limits the storage space of the email box as well as the disk space. Thus, spam detection is a challenge for individuals and organizations alike. To advance spam email detection, this work proposes a new spam detection approach, using the grasshopper optimization algorithm (GOA) in training a multilayer perceptron (MLP) classifier for categorizing emails as ham and spam. Hence, MLP and… More >

  • Open Access

    ARTICLE

    Hybrid In-Vehicle Background Noise Reduction for Robust Speech Recognition: The Possibilities of Next Generation 5G Data Networks

    Radek Martinek1, Jan Baros1, Rene Jaros1, Lukas Danys1,*, Jan Nedoma2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4659-4676, 2022, DOI:10.32604/cmc.2022.019904

    Abstract This pilot study focuses on employment of hybrid LMS-ICA system for in-vehicle background noise reduction. Modern vehicles are nowadays increasingly supporting voice commands, which are one of the pillars of autonomous and SMART vehicles. Robust speaker recognition for context-aware in-vehicle applications is limited to a certain extent by in-vehicle background noise. This article presents the new concept of a hybrid system, which is implemented as a virtual instrument. The highly modular concept of the virtual car used in combination with real recordings of various driving scenarios enables effective testing of the investigated methods of in-vehicle background noise reduction. The study… More >

  • Open Access

    ARTICLE

    Building a Trust Model for Secure Data Sharing (TM-SDS) in Edge Computing Using HMAC Techniques

    K. Karthikeyan*, P. Madhavan

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4183-4197, 2022, DOI:10.32604/cmc.2022.019802

    Abstract With the rapid growth of Internet of Things (IoT) based models, and the lack amount of data makes cloud computing resources insufficient. Hence, edge computing-based techniques are becoming more popular in present research domains that makes data storage, and processing effective at the network edges. There are several advanced features like parallel processing and data perception are available in edge computing. Still, there are some challenges in providing privacy and data security over networks. To solve the security issues in Edge Computing, Hash-based Message Authentication Code (HMAC) algorithm is used to provide solutions for preserving data from various attacks that… More >

  • Open Access

    ARTICLE

    Profiling Casualty Severity Levels of Road Accident Using Weighted Majority Voting

    Saba Awan1, Zahid Mehmood2,*, Hassan Nazeer Chaudhry3, Usman Tariq4, Amjad Rehman5, Tanzila Saba5, Muhammad Rashid6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4609-4626, 2022, DOI:10.32604/cmc.2022.019404

    Abstract To determine the individual circumstances that account for a road traffic accident, it is crucial to consider the unplanned connections amongst various factors related to a crash that results in high casualty levels. Analysis of the road accident data concentrated mainly on categorizing accidents into different types using individually built classification methods which limit the prediction accuracy and fitness of the model. In this article, we proposed a multi-model hybrid framework of the weighted majority voting (WMV) scheme with parallel structure, which is designed by integrating individually implemented multinomial logistic regression (MLR) and multilayer perceptron (MLP) classifiers using three different… More >

  • Open Access

    ARTICLE

    Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

    Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5039-5059, 2022, DOI:10.32604/cmc.2022.019289

    Abstract Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive companies use the “patch and… More >

  • Open Access

    ARTICLE

    Location Prediction for Improved Human Safety at Complex Environments

    S. G. Siddharth1,*, G. M. Tamilselvan2, C. Venkatesh3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5219-5234, 2022, DOI:10.32604/cmc.2022.019252

    Abstract In underground operation, primary consideration is safety. In recent decades, for minimizing accident and for preventing major economic losses and casualties, wireless sensors are used by various large mineral countries through early warning. The Improved DV-Hop Localization Algorithm (IDVHLA) is used in existing works for doing this. However, accurate anchor node detection is impossible in existing works with the malicious nodes presence, where there won't be any accurate sharing of anchor node's location information. In case of emergency situation, faster communication is a highly complex one. A technique called Modified Distance Vector Hop based Multipath Routing Protocol (MDVHMRP) is introduced… More >

  • Open Access

    ARTICLE

    PSO Based Multi-Objective Approach for Controlling PID Controller

    Harsh Goud1, Prakash Chandra Sharma2, Kashif Nisar3, Ag. Asri Ag. Ibrahim3,*, Muhammad Reazul Haque4, Narendra Singh Yadav2, Pankaj Swarnkar5, Manoj Gupta6, Laxmi Chand6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4409-4423, 2022, DOI:10.32604/cmc.2022.019217

    Abstract CSTR (Continuous stirred tank reactor) is employed in process control and chemical industries to improve response characteristics and system efficiency. It has a highly nonlinear characteristic that includes complexities in its control and design. Dynamic performance is compassionate to change in system parameters which need more effort for planning a significant controller for CSTR. The reactor temperature changes in either direction from the defined reference value. It is important to note that the intensity of chemical actions inside the CSTR is dependent on the various levels of temperature, and deviation from reference values may cause degradation of biomass quality. Design… More >

  • Open Access

    ARTICLE

    Nuclear Stress-Strain State over Micropillars: A Mechanical In silico Study

    Rachele Allena1,*, Denis Aubry2

    Molecular & Cellular Biomechanics, Vol.19, No.1, pp. 1-16, 2022, DOI:10.32604/mcb.2022.018958

    Abstract Cells adapt to their environment and stimuli of different origin. During confined migration through sub-cellular and sub-nuclear pores, they can undergo large strains and the nucleus, the most voluminous and the stiffest organelle, plays a critical role. Recently, patterned microfluidic devices have been employed to analyze the cell mechanical behavior and the nucleus self-deformations. In this paper, we present an in silico model to simulate the interactions between the cell and the underneath microstructured substrate under the effect of the sole gravity. The model lays on mechanical features only and it has the potential to assess the contribution of the… More >

  • Open Access

    ARTICLE

    Effect of Resistance Training and Spirulina platensis on Expression of IL-6, Gp130 Cytokines, JAK-STAT Signaling in Male Rats Skeletal Muscle

    Abdossaleh Zar1, Fatemeh Ahmadi1, Forouzan Karimi2,*, Mozhgan Ahmadi3, Roger Ramsbottom4

    Molecular & Cellular Biomechanics, Vol.19, No.1, pp. 51-59, 2022, DOI:10.32604/mcb.2022.018345

    Abstract The effect of resistance training and a herbal supplement on muscular signaling pathways are limited. We investigated the expression of IL-6, Gp130, JAK and STAT after resistance training, and Spirulina platensis supplementation in animal muscle. Thirty-two male Sprague Dawley rats (weight: 290 ± 20 g, and 9 weeks of age) were divided into four groups: control (CO; n = 8), Spirulina platensis supplementation (SP; n = 8), resistance exercise (RE; n = 8), and Spirulina platensis + resistance exercise (SP + RE; n = 8). The resistance exercise group trained five sessions each week for eight weeks. Spirulina 200 mg… More >

  • Open Access

    ARTICLE

    Lung Nodule Detection Based on YOLOv3 Deep Learning with Limited Datasets

    Zhaohui Bu1, Xuejun Zhang2,3,*, Jianxiang Lu4, Huan Lao5, Chan Liang2, Xianfu Xu2, Yini Wei2, Hongjie Zeng2

    Molecular & Cellular Biomechanics, Vol.19, No.1, pp. 17-28, 2022, DOI:10.32604/mcb.2022.018318

    Abstract The early symptom of lung tumor is always appeared as nodule on CT scans, among which 30% to 40% are malignant according to statistics studies. Therefore, early detection and classification of lung nodules are crucial to the treatment of lung cancer. With the increasing prevalence of lung cancer, large amount of CT images waiting for diagnosis are huge burdens to doctors who may missed or false detect abnormalities due to fatigue. Methods: In this study, we propose a novel lung nodule detection method based on YOLOv3 deep learning algorithm with only one preprocessing step is needed. In order to overcome… More >

Displaying 9281-9290 on page 929 of 22113. Per Page