Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Efficient Body-Transfer Wheelchair for Assisting Functionally Impaired People

    Chyi-Yeu Lin1,2,3, Bahrudin1, Salman Masroor1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4881-4900, 2023, DOI:10.32604/cmc.2023.032837 - 28 December 2022

    Abstract Functionally impaired people always have difficulty accomplishing activities of daily living. In this regard, tasks including toileting and bathing have a higher prevalence rate of injuries and greater risk of falling. In this study, a body-transfer wheelchair was developed to assist people in transferring from bed to wheelchair for bathing, and toileting. The body-transfer wheelchair is a semi-automatic wheelchair that has features such as a controlled leg and backrest, linkage commode slot, and height adjustment. The wheelchair consists of a seat and a main frame that can be detached to enable bathtub transfer. This mechanism… More >

  • Open Access

    ARTICLE

    Shared Cache Based on Content Addressable Memory in a Multi-Core Architecture

    Allam Abumwais*, Mahmoud Obaid

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4951-4963, 2023, DOI:10.32604/cmc.2023.032822 - 28 December 2022

    Abstract Modern shared-memory multi-core processors typically have shared Level 2 (L2) or Level 3 (L3) caches. Cache bottlenecks and replacement strategies are the main problems of such architectures, where multiple cores try to access the shared cache simultaneously. The main problem in improving memory performance is the shared cache architecture and cache replacement. This paper documents the implementation of a Dual-Port Content Addressable Memory (DPCAM) and a modified Near-Far Access Replacement Algorithm (NFRA), which was previously proposed as a shared L2 cache layer in a multi-core processor. Standard Performance Evaluation Corporation (SPEC) Central Processing Unit (CPU)… More >

  • Open Access

    ARTICLE

    IoT Based Smart Framework Monitoring System for Power Station

    Arodh Lal Karn1, Panneer Selvam Manickam2, R. Saravanan3,*, Roobaea Alroobaea4, Jasem Almotiri4, Sudhakar Sengan5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6019-6037, 2023, DOI:10.32604/cmc.2023.032791 - 28 December 2022

    Abstract Power Station (PS) monitoring systems are becoming critical, ensuring electrical safety through early warning, and in the event of a PS fault, the power supply is quickly disconnected. Traditional technologies are based on relays and don’t have a way to capture and store user data when there is a problem. The proposed framework is designed with the goal of providing smart environments for protecting electrical types of equipment. This paper proposes an Internet of Things (IoT)-based Smart Framework (SF) for monitoring the Power Devices (PD) which are being used in power substations. A Real-Time Monitoring… More >

  • Open Access

    ARTICLE

    Automated Autism Spectral Disorder Classification Using Optimal Machine Learning Model

    Hanan Abdullah Mengash1, Hamed Alqahtani2, Mohammed Maray3, Mohamed K. Nour4, Radwa Marzouk1, Mohammed Abdullah Al-Hagery5, Heba Mohsen6, Mesfer Al Duhayyim7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5251-5265, 2023, DOI:10.32604/cmc.2023.032729 - 28 December 2022

    Abstract Autism Spectrum Disorder (ASD) refers to a neuro-disorder where an individual has long-lasting effects on communication and interaction with others. Advanced information technology which employs artificial intelligence (AI) model has assisted in early identify ASD by using pattern detection. Recent advances of AI models assist in the automated identification and classification of ASD, which helps to reduce the severity of the disease. This study introduces an automated ASD classification using owl search algorithm with machine learning (ASDC-OSAML) model. The proposed ASDC-OSAML model majorly focuses on the identification and classification of ASD. To attain this, the More >

  • Open Access

    ARTICLE

    Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment

    Fatma S. Alrayes1, Nuha Alshuqayran2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Abdullah Mohamed5, Amgad Atta Abdelmageed Mohammed6, Gouse Pasha Mohammed6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6737-6753, 2023, DOI:10.32604/cmc.2023.032591 - 28 December 2022

    Abstract Recently, Internet of Things (IoT) devices have developed at a faster rate and utilization of devices gets considerably increased in day to day lives. Despite the benefits of IoT devices, security issues remain challenging owing to the fact that most devices do not include memory and computing resources essential for satisfactory security operation. Consequently, IoT devices are vulnerable to different kinds of attacks. A single attack on networking system/device could result in considerable data to data security and privacy. But the emergence of artificial intelligence (AI) techniques can be exploited for attack detection and classification… More >

  • Open Access

    ARTICLE

    A Novel Efficient Patient Monitoring FER System Using Optimal DL-Features

    Mousa Alhajlah*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6161-6175, 2023, DOI:10.32604/cmc.2023.032505 - 28 December 2022

    Abstract Automated Facial Expression Recognition (FER) serves as the backbone of patient monitoring systems, security, and surveillance systems. Real-time FER is a challenging task, due to the uncontrolled nature of the environment and poor quality of input frames. In this paper, a novel FER framework has been proposed for patient monitoring. Preprocessing is performed using contrast-limited adaptive enhancement and the dataset is balanced using augmentation. Two lightweight efficient Convolution Neural Network (CNN) models MobileNetV2 and Neural search Architecture Network Mobile (NasNetMobile) are trained, and feature vectors are extracted. The Whale Optimization Algorithm (WOA) is utilized to More >

  • Open Access

    ARTICLE

    Process Mining Discovery Techniques for Software Architecture Lightweight Evaluation Framework

    Mahdi Sahlabadi, Ravie Chandren Muniyandi, Zarina Shukur, Faizan Qamar*, Syed Hussain Ali Kazmi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5777-5797, 2023, DOI:10.32604/cmc.2023.032504 - 28 December 2022

    Abstract This research recognizes the limitation and challenges of adapting and applying Process Mining as a powerful tool and technique in the Hypothetical Software Architecture (SA) Evaluation Framework with the features and factors of lightweightness. Process mining deals with the large-scale complexity of security and performance analysis, which are the goals of SA evaluation frameworks. As a result of these conjectures, all Process Mining researches in the realm of SA are thoroughly reviewed, and nine challenges for Process Mining Adaption are recognized. Process mining is embedded in the framework and to boost the quality of the… More >

  • Open Access

    ARTICLE

    Photovoltaic Models Parameters Estimation Based on Weighted Mean of Vectors

    Mohamed Elnagi1, Salah Kamel2, Abdelhady Ramadan2, Mohamed F. Elnaggar3,4,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5229-5250, 2023, DOI:10.32604/cmc.2023.032469 - 28 December 2022

    Abstract Renewable energy sources are gaining popularity, particularly photovoltaic energy as a clean energy source. This is evident in the advancement of scientific research aimed at improving solar cell performance. Due to the non-linear nature of the photovoltaic cell, modeling solar cells and extracting their parameters is one of the most important challenges in this discipline. As a result, the use of optimization algorithms to solve this problem is expanding and evolving at a rapid rate. In this paper, a weIghted meaN oF vectOrs algorithm (INFO) that calculates the weighted mean for a set of vectors… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373 - 28 December 2022

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom… More >

  • Open Access

    ARTICLE

    Novel Computer-Aided Diagnosis System for the Early Detection of Alzheimer’s Disease

    Meshal Alharbi, Shabana R. Ziyad*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5483-5505, 2023, DOI:10.32604/cmc.2023.032341 - 28 December 2022

    Abstract Aging is a natural process that leads to debility, disease, and dependency. Alzheimer’s disease (AD) causes degeneration of the brain cells leading to cognitive decline and memory loss, as well as dependence on others to fulfill basic daily needs. AD is the major cause of dementia. Computer-aided diagnosis (CADx) tools aid medical practitioners in accurately identifying diseases such as AD in patients. This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop (IWD) algorithm and the Random Forest (RF) classifier. The IWD algorithm an efficient feature… More >

Displaying 10911-10920 on page 1092 of 31561. Per Page