Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,113)
  • Open Access

    ARTICLE

    Graphene-Based RFID Tag Antenna for Vehicular Smart Border Passings

    Prach Asavanarakul, Amnoiy Ruengwaree*, Suwat Sakulchat

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4737-4748, 2022, DOI:10.32604/cmc.2022.023743

    Abstract Globalization has opened practically every country in the globe to tourism and commerce today. In every region, the volume of vehicles traveling through border crossings has increased significantly. Smartcards and radio frequency identification (RFID) have been proposed as a new method of identifying and authenticating passengers, products, and vehicles. However, the usage of smartcards and RFID tag cards for vehicular border crossings continues to suffer security and flexibility challenges. Providing a vehicle's driver a smartcard or RFID tag card may result in theft, loss, counterfeit, imitation, or vehicle transmutation. RFID sticker tags would replace RFID tags as vehicle border passes… More >

  • Open Access

    ARTICLE

    5G Smart Mobility Management Based Fuzzy Logic Controller Unit

    Chafaa Hamrouni1,*, Slim Chaoui2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4941-4953, 2022, DOI:10.32604/cmc.2022.023732

    Abstract In the paper, we propose a fuzzy logic controller system to be implemented for smart mobility management in the 5G wireless communication network. Mobility management is considered as a main issue for all-IP mobile networks future generation. As a network-based mobility management protocol, Internet Engineering Task Force developed the Proxy Mobile IPv6 (PMIPv6) in order to support the mobility of IP devices, and many other results were presented to reduce latency handover and the amount of PMIPv6 signaling, but it is not enough for the application needs in real-time. The present paper describes an approach based on the IEEE 802.21… More >

  • Open Access

    ARTICLE

    Enhancing Task Assignment in Crowdsensing Systems Based on Sensing Intervals and Location

    Rasha Sleem1, Nagham Mekky1, Shaker El-Sappagh2,3, Louai Alarabi4,*, Noha A. Hikal1, Mohammed Elmogy1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5619-5638, 2022, DOI:10.32604/cmc.2022.023716

    Abstract The popularity of mobile devices with sensors is captivating the attention of researchers to modern techniques, such as the internet of things (IoT) and mobile crowdsensing (MCS). The core concept behind MCS is to use the power of mobile sensors to accomplish a difficult task collaboratively, with each mobile user completing much simpler micro-tasks. This paper discusses the task assignment problem in mobile crowdsensing, which is dependent on sensing time and path planning with the constraints of participant travel distance budgets and sensing time intervals. The goal is to minimize aggregate sensing time for mobile users, which reduces energy consumption… More >

  • Open Access

    ARTICLE

    Robust Authentication and Session Key Agreement Protocol for Satellite Communications

    Somayeh Soltani1, Seyed Amin Hosseini Seno1, Juli Rejito2, Rahmat Budiarto3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5891-5910, 2022, DOI:10.32604/cmc.2022.023697

    Abstract Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities. Moreover, we propose a robust… More >

  • Open Access

    ARTICLE

    Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security

    Sumaira Azhar1, Naveed Ahmed Azam2,*, Umar Hayat1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4971-4988, 2022, DOI:10.32604/cmc.2022.023685

    Abstract The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks. We propose a novel three-step text encryption scheme that has provable security against computation attacks such as key attack and statistical attack. The proposed scheme is based on the Pell sequence and elliptic curves, where at the first step the plain text is diffused to get a meaningless plain text by applying a cyclic shift on the symbol set. In the second step, we hide the elements of the diffused plain text from the attackers. For this purpose, we use… More >

  • Open Access

    ARTICLE

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner. Recent… More >

  • Open Access

    ARTICLE

    SSABA: Search Step Adjustment Based Algorithm

    Fatemeh Ahmadi Zeidabadi1, Ali Dehghani2, Mohammad Dehghani3, Zeinab Montazeri4, Štěpán Hubálovský5, Pavel Trojovský3,*, Gaurav Dhiman6

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4237-4256, 2022, DOI:10.32604/cmc.2022.023682

    Abstract Finding the suitable solution to optimization problems is a fundamental challenge in various sciences. Optimization algorithms are one of the effective stochastic methods in solving optimization problems. In this paper, a new stochastic optimization algorithm called Search Step Adjustment Based Algorithm (SSABA) is presented to provide quasi-optimal solutions to various optimization problems. In the initial iterations of the algorithm, the step index is set to the highest value for a comprehensive search of the search space. Then, with increasing repetitions in order to focus the search of the algorithm in achieving the optimal solution closer to the global optimal, the… More >

  • Open Access

    ARTICLE

    Transfer Learning-based Computer-aided Diagnosis System for Predicting Grades of Diabetic Retinopathy

    Qaisar Abbas1,*, Mostafa E. A. Ibrahim1,2, Abdul Rauf Baig1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4573-4590, 2022, DOI:10.32604/cmc.2022.023670

    Abstract Diabetic retinopathy (DR) diagnosis through digital fundus images requires clinical experts to recognize the presence and importance of many intricate features. This task is very difficult for ophthalmologists and time-consuming. Therefore, many computer-aided diagnosis (CAD) systems were developed to automate this screening process of DR. In this paper, a CAD-DR system is proposed based on preprocessing and a pre-train transfer learning-based convolutional neural network (PCNN) to recognize the five stages of DR through retinal fundus images. To develop this CAD-DR system, a preprocessing step is performed in a perceptual-oriented color space to enhance the DR-related lesions and then a standard… More >

  • Open Access

    ARTICLE

    Energy-Efficient Scheduling for a Cognitive IoT-Based Early Warning System

    Saeed Ahmed1,2, Noor Gul1,3, Jahangir Khan4, Junsu Kim1, Su Min Kim1,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5061-5082, 2022, DOI:10.32604/cmc.2022.023639

    Abstract Flash floods are deemed the most fatal and disastrous natural hazards globally due to their prompt onset that requires a short prime time for emergency response. Cognitive Internet of things (CIoT) technologies including inherent characteristics of cognitive radio (CR) are potential candidates to develop a monitoring and early warning system (MEWS) that helps in efficiently utilizing the short response time to save lives during flash floods. However, most CIoT devices are battery-limited and thus, it reduces the lifetime of the MEWS. To tackle these problems, we propose a CIoT-based MEWS to slash the fatalities of flash floods. To extend the… More >

  • Open Access

    ARTICLE

    Efficient Computer Aided Diagnosis System for Hepatic Tumors Using Computed Tomography Scans

    Yasmeen Al-Saeed1,2, Wael A. Gab-Allah1, Hassan Soliman1, Maysoon F. Abulkhair3, Wafaa M. Shalash4, Mohammed Elmogy1,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4871-4894, 2022, DOI:10.32604/cmc.2022.023638

    Abstract One of the leading causes of mortality worldwide is liver cancer. The earlier the detection of hepatic tumors, the lower the mortality rate. This paper introduces a computer-aided diagnosis system to extract hepatic tumors from computed tomography scans and classify them into malignant or benign tumors. Segmenting hepatic tumors from computed tomography scans is considered a challenging task due to the fuzziness in the liver pixel range, intensity values overlap between the liver and neighboring organs, high noise from computed tomography scanner, and large variance in tumors shapes. The proposed method consists of three main stages; liver segmentation using Fast… More >

Displaying 9211-9220 on page 922 of 22113. Per Page