Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,097)
  • Open Access

    ARTICLE

    Cloud Security Service for Identifying Unauthorized User Behaviour

    D. Stalin David1, Mamoona Anam2, Chandraprabha Kaliappan3, S. Arun Mozhi Selvi4, Dilip Kumar Sharma5, Pankaj Dadheech6, Sudhakar Sengan7,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2581-2600, 2022, DOI:10.32604/cmc.2022.020213

    Abstract Recently, an innovative trend like cloud computing has progressed quickly in Information Technology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system’s virtualization accomplished using resource pooling, cloud computing resources become more accessible. The attempt to design and develop a solution that assures reliable and protected authentication and authorization service in such cloud environments… More >

  • Open Access

    ARTICLE

    Sustainable Supplier Selection Model in Supply Chains During the COVID-19 Pandemic

    Chia-Nan Wang1, Chao-Fen Pan1,*, Viet Tinh Nguyen2, Syed Tam Husain2

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3005-3019, 2022, DOI:10.32604/cmc.2022.020206

    Abstract As global supply chains become more developed and complicated, supplier quality has become increasingly influential on the competitiveness of businesses during the Covid-19 pandemic. Consequently, supplier selection is an increasingly important process for any business around the globe. Choosing a supplier is a complex decision that can result in lower procurement costs and increased profits without increasing the cost or lowering the quality of the product. However, these decision-making problems can be complicated in cases with multiple potential suppliers. Vietnam's textile and garment industry, for example, has made rapid progress in recent years but is still facing great difficulties as… More >

  • Open Access

    ARTICLE

    Unified Detection of Obfuscated and Native Android Malware

    Pagnchakneat C. Ouk1, Wooguil Pak2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3099-3116, 2022, DOI:10.32604/cmc.2022.020202

    Abstract The Android operating system has become a leading smartphone platform for mobile and other smart devices, which in turn has led to a diversity of malware applications. The amount of research on Android malware detection has increased significantly in recent years and many detection systems have been proposed. Despite these efforts, however, most systems can be thwarted by sophisticated Android malware adopting obfuscation or native code to avoid discovery by anti-virus tools. In this paper, we propose a new static analysis technique to address the problems of obfuscating and native malware applications. The proposed system provides a unified technique for… More >

  • Open Access

    ARTICLE

    AI Based Traffic Flow Prediction Model for Connected and Autonomous Electric Vehicles

    P. Thamizhazhagan1,*, M. Sujatha2, S. Umadevi3, K. Priyadarshini4, Velmurugan Subbiah Parvathy5, Irina V. Pustokhina6, Denis A. Pustokhin7

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3333-3347, 2022, DOI:10.32604/cmc.2022.020197

    Abstract There is a paradigm shift happening in automotive industry towards electric vehicles as environment and sustainability issues gained momentum in the recent years among potential users. Connected and Autonomous Electric Vehicle (CAEV) technologies are fascinating the automakers and inducing them to manufacture connected autonomous vehicles with self-driving features such as autopilot and self-parking. Therefore, Traffic Flow Prediction (TFP) is identified as a major issue in CAEV technologies which needs to be addressed with the help of Deep Learning (DL) techniques. In this view, the current research paper presents an artificial intelligence-based parallel autoencoder for TFP, abbreviated as AIPAE-TFP model in… More >

  • Open Access

    ARTICLE

    Data Fusion-Based Machine Learning Architecture for Intrusion Detection

    Muhammad Adnan Khan, Taher M. Ghazal2,3, Sang-Woong Lee1,*, Abdur Rehman4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3399-3413, 2022, DOI:10.32604/cmc.2022.020173

    Abstract In recent years, the infrastructure of Wireless Internet of Sensor Networks (WIoSNs) has been more complicated owing to developments in the internet and devices’ connectivity. To effectively prepare, control, hold and optimize wireless sensor networks, a better assessment needs to be conducted. The field of artificial intelligence has made a great deal of progress with deep learning systems and these techniques have been used for data analysis. This study investigates the methodology of Real Time Sequential Deep Extreme Learning Machine (RTS-DELM) implemented to wireless Internet of Things (IoT) enabled sensor networks for the detection of any intrusion activity. Data fusion… More >

  • Open Access

    ARTICLE

    An Efficient Reference Free Adaptive Learning Process for Speech Enhancement Applications

    Girika Jyoshna1,*, Md. Zia Ur Rahman1, L. Koteswararao2

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3067-3080, 2022, DOI:10.32604/cmc.2022.020160

    Abstract In issues like hearing impairment, speech therapy and hearing aids play a major role in reducing the impairment. Removal of noise signals from speech signals is a key task in hearing aids as well as in speech therapy. During the transmission of speech signals, several noise components contaminate the actual speech components. This paper addresses a new adaptive speech enhancement (ASE) method based on a modified version of singular spectrum analysis (MSSA). The MSSA generates a reference signal for ASE and makes the ASE is free from feeding reference component. The MSSA adopts three key steps for generating the reference… More >

  • Open Access

    ARTICLE

    Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment

    Ahmed S. Alfakeeh1, Abdulmohsen Almalawi2, Fawaz Jaber Alsolami2, Yoosef B. Abushark2, Asif Irshad Khan2,*, Adel Aboud S. Bahaddad1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2297-2317, 2022, DOI:10.32604/cmc.2022.020146

    Abstract Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web applications, but not as the… More >

  • Open Access

    ARTICLE

    Generating Synthetic Data to Reduce Prediction Error of Energy Consumption

    Debapriya Hazra, Wafa Shafqat, Yung-Cheol Byun*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3151-3167, 2022, DOI:10.32604/cmc.2022.020143

    Abstract Renewable and nonrenewable energy sources are widely incorporated for solar and wind energy that produces electricity without increasing carbon dioxide emissions. Energy industries worldwide are trying hard to predict future energy consumption that could eliminate over or under contracting energy resources and unnecessary financing. Machine learning techniques for predicting energy are the trending solution to overcome the challenges faced by energy companies. The basic need for machine learning algorithms to be trained for accurate prediction requires a considerable amount of data. Another critical factor is balancing the data for enhanced prediction. Data Augmentation is a technique used for increasing the… More >

  • Open Access

    ARTICLE

    SIMAD: Secure Intelligent Method for IoT-Fog Environments Attacks Detection

    Wided Ben Daoud1, Sami Mahfoudhi2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2727-2742, 2022, DOI:10.32604/cmc.2022.020141

    Abstract The Internet of Thing IoT paradigm has emerged in numerous domains and it has achieved an exponential progress. Nevertheless, alongside this advancement, IoT networks are facing an ever-increasing rate of security risks because of the continuous and rapid changes in network environments. In order to overcome these security challenges, the fog system has delivered a powerful environment that provides additional resources for a more improved data security. However, because of the emerging of various breaches, several attacks are ceaselessly emerging in IoT and Fog environment. Consequently, the new emerging applications in IoT-Fog environment still require novel, distributed, and intelligent security… More >

  • Open Access

    ARTICLE

    Deep Rank-Based Average Pooling Network for Covid-19 Recognition

    Shui-Hua Wang1, Muhammad Attique Khan2, Vishnuvarthanan Govindaraj3, Steven L. Fernandes4, Ziquan Zhu5, Yu-Dong Zhang6,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2797-2813, 2022, DOI:10.32604/cmc.2022.020140

    Abstract (Aim) To make a more accurate and precise COVID-19 diagnosis system, this study proposed a novel deep rank-based average pooling network (DRAPNet) model, i.e., deep rank-based average pooling network, for COVID-19 recognition. (Methods) 521 subjects yield 1164 slice images via the slice level selection method. All the 1164 slice images comprise four categories: COVID-19 positive; community-acquired pneumonia; second pulmonary tuberculosis; and healthy control. Our method firstly introduced an improved multiple-way data augmentation. Secondly, an n-conv rank-based average pooling module (NRAPM) was proposed in which rank-based pooling—particularly, rank-based average pooling (RAP)—was employed to avoid overfitting. Third, a novel DRAPNet was proposed… More >

Displaying 10531-10540 on page 1054 of 22097. Per Page