Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Multi Criteria Decision Making for Evaluation and Ranking of Cancer Information

    Shahid Mahmood1,*, Muhammad Amin2, Mubashir Baig Mirza1, Salem Abu-Ghumsan1, Muhammad Akram3, Zahid Mahmood Janjua4, Arslan Shahid5, Usman Shahid6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4469-4481, 2023, DOI:10.32604/cmc.2023.030728 - 31 October 2022

    Abstract Cancer is a disease that is rapidly expanding in prevalence all over the world. Cancer cells can metastasize, or spread, across the body and impact several different cell types. Additionally, the incidence rates of several subtypes of cancer have been on the rise in India. The countermeasures for the cancer disease can be taken by determining the specific expansion rate of each type. To rank the various forms of cancer’s rate of progression, we used some of the available data. Numerous studies are available in the literature which show the growth rate of cancer by… More >

  • Open Access

    ARTICLE

    Age and Gender Classification Using Backpropagation and Bagging Algorithms

    Ammar Almomani1,2,*, Mohammed Alweshah3, Waleed Alomoush4, Mohammad Alauthman5, Aseel Jabai2, Anwar Abbass2, Ghufran Hamad2, Meral Abdalla2, Brij B. Gupta1,6,7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3045-3062, 2023, DOI:10.32604/cmc.2023.030567 - 31 October 2022

    Abstract Voice classification is important in creating more intelligent systems that help with student exams, identifying criminals, and security systems. The main aim of the research is to develop a system able to predicate and classify gender, age, and accent. So, a new system called Classifying Voice Gender, Age, and Accent (CVGAA) is proposed. Backpropagation and bagging algorithms are designed to improve voice recognition systems that incorporate sensory voice features such as rhythm-based features used to train the device to distinguish between the two gender categories. It has high precision compared to other algorithms used in More >

  • Open Access

    ARTICLE

    Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment

    Pooja Dhiman1, Santosh Kumar Henge1, Sartaj Singh1, Avinash Kaur2, Parminder Singh2,3, Mustapha Hadabou3,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3297-3313, 2023, DOI:10.32604/cmc.2023.030558 - 31 October 2022

    Abstract This research paper puts emphasis on using cloud computing with Blockchain (BC) to improve the security and privacy in a cloud. The security of data is not guaranteed as there is always a risk of leakage of users’ data. Blockchain can be used in a multi-tenant cloud environment (MTCE) to improve the security of data, as it is a decentralized approach. Data is saved in unaltered form. Also, Blockchain is not owned by a single organization. The encryption process can be done using a Homomorphic encryption (HE) algorithm along with hashing technique, hereby allowing computations… More >

  • Open Access

    ARTICLE

    Ontological Model for Cohesive Smart Health Services Management

    Muhammad Raza Naqvi1, Muhammad Waseem Iqbal2,*, Syed Khuram Shahzad3, M. Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3679-3695, 2023, DOI:10.32604/cmc.2023.030340 - 31 October 2022

    Abstract Health care has become an essential social-economic concern for all stakeholders (e.g., patients, doctors, hospitals etc.), health needs, private care and the elderly class of society. The massive increase in the usage of health care Internet of things (IoT) applications has great technological evolvement in human life. There are various smart health care services like remote patient monitoring, diagnostic, disease-specific remote treatments and telemedicine. These applications are available in a split fashion and provide solutions for variant diseases, medical resources and remote service management. The main objective of this research is to provide a management… More >

  • Open Access

    ARTICLE

    Big Data Testing Techniques: Taxonomy, Challenges and Future Trends

    Iram Arshad1,*, Saeed Hamood Alsamhi1, Wasif Afzal2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2739-2770, 2023, DOI:10.32604/cmc.2023.030266 - 31 October 2022

    Abstract Big Data is reforming many industrial domains by providing decision support through analyzing large data volumes. Big Data testing aims to ensure that Big Data systems run smoothly and error-free while maintaining the performance and quality of data. However, because of the diversity and complexity of data, testing Big Data is challenging. Though numerous research efforts deal with Big Data testing, a comprehensive review to address testing techniques and challenges of Big Data is not available as yet. Therefore, we have systematically reviewed the Big Data testing techniques’ evidence occurring in the period 2010–2021. This… More >

  • Open Access

    ARTICLE

    Improved Video Steganography with Dual Cover Medium, DNA and Complex Frames

    Asma Sajjad1, Humaira Ashraf1, NZ Jhanjhi2,3,*, Mamoona Humayun4, Mehedi Masud5, Mohammed A. AlZain6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3881-3898, 2023, DOI:10.32604/cmc.2023.030197 - 31 October 2022

    Abstract The most valuable resource on the planet is no longer oil, but data. The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value. In order to transmit sensitive information securely, researchers are combining robust cryptography and steganographic approaches. The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid (DNA) for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility. In the previous approach, DNA was used only for frame selection. If this DNA is… More >

  • Open Access

    ARTICLE

    Regulatory Genes Through Robust-SNR for Binary Classification Within Functional Genomics Experiments

    Muhammad Hamraz1, Dost Muhammad Khan1, Naz Gul1, Amjad Ali1, Zardad Khan1, Shafiq Ahmad2, Mejdal Alqahtani2, Akber Abid Gardezi3, Muhammad Shafiq4,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3663-3677, 2023, DOI:10.32604/cmc.2023.030064 - 31 October 2022

    Abstract The current study proposes a novel technique for feature selection by inculcating robustness in the conventional Signal to noise Ratio (SNR). The proposed method utilizes the robust measures of location i.e., the “Median” as well as the measures of variation i.e., “Median absolute deviation (MAD) and Interquartile range (IQR)” in the SNR. By this way, two independent robust signal-to-noise ratios have been proposed. The proposed method selects the most informative genes/features by combining the minimum subset of genes or features obtained via the greedy search approach with top-ranked genes selected through the robust signal-to-noise ratio (RSNR).… More >

  • Open Access

    ARTICLE

    Robust Vehicle Detection Based on Improved You Look Only Once

    Sunil Kumar1, Manisha Jailia1, Sudeep Varshney2, Nitish Pathak3, Shabana Urooj4,*, Nouf Abd Elmunim4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3561-3577, 2023, DOI:10.32604/cmc.2023.029999 - 31 October 2022

    Abstract Vehicle detection is still challenging for intelligent transportation systems (ITS) to achieve satisfactory performance. The existing methods based on one stage and two-stage have intrinsic weakness in obtaining high vehicle detection performance. Due to advancements in detection technology, deep learning-based methods for vehicle detection have become more popular because of their higher detection accuracy and speed than the existing algorithms. This paper presents a robust vehicle detection technique based on Improved You Look Only Once (RVD-YOLOv5) to enhance vehicle detection accuracy. The proposed method works in three phases; in the first phase, the K-means algorithm… More >

  • Open Access

    ARTICLE

    Enhancing CNN for Forensics Age Estimation Using CGAN and Pseudo-Labelling

    Sultan Alkaabi1,*, Salman Yussof1, Sameera Al-Mulla2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2499-2516, 2023, DOI:10.32604/cmc.2023.029914 - 31 October 2022

    Abstract Age estimation using forensics odontology is an important process in identifying victims in criminal or mass disaster cases. Traditionally, this process is done manually by human expert. However, the speed and accuracy may vary depending on the expertise level of the human expert and other human factors such as level of fatigue and attentiveness. To improve the recognition speed and consistency, researchers have proposed automated age estimation using deep learning techniques such as Convolutional Neural Network (CNN). CNN requires many training images to obtain high percentage of recognition accuracy. Unfortunately, it is very difficult to… More >

  • Open Access

    ARTICLE

    Rooted Tree Optimization for Wind Turbine Optimum Control Based on Energy Storage System

    Billel Meghni1, Afaf Benamor2, Oussama Hachana3, Ahmad Taher Azar4,5,*, Amira Boulmaiz6, Salah Saad1, El-Sayed M. El-kenawy7,8, Nashwa Ahmad Kamal9, Suliman Mohamed Fati5, Naglaa K. Bahgaat10

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3977-3996, 2023, DOI:10.32604/cmc.2023.029838 - 31 October 2022

    Abstract The integration of wind turbines (WTs) in variable speed drive systems belongs to the main factors causing low stability in electrical networks. Therefore, in order to avoid this issue, WTs hybridization with a storage system is a mandatory. This paper investigates WT system operating at variable speed. The system contains of a permanent magnet synchronous generator (PMSG) supported by a battery storage system (BSS). To enhance the quality of active and reactive power injected into the network, direct power control (DPC) scheme utilizing space-vector modulation (SVM) technique based on proportional-integral (PI) control is proposed. Meanwhile, More >

Displaying 11391-11400 on page 1140 of 31561. Per Page