Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,113)
  • Open Access

    ARTICLE

    An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET

    Safiullah Khan1, Ali Raza2,3, Seong Oun Hwang4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3703-3719, 2022, DOI:10.32604/cmc.2022.023476

    Abstract Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety and comfort for travelers on roads. However, wireless communications over open-access environments face many security and privacy issues that may affect deployment of large-scale VANETs. Researchers have proposed different protocols to address security and privacy issues in a VANET, and in this study we cryptanalyze some of the privacy preserving protocols to show that all existing protocols are vulnerable to the Sybil attack. The Sybil attack can be used by malicious actors to create fake… More >

  • Open Access

    ARTICLE

    Continuous Tracking of GPS Signals with Data Wipe-Off Method

    Dah-Jing Jwo*, Kun-Chan Lee

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3803-3820, 2022, DOI:10.32604/cmc.2022.023442

    Abstract The decentralized pre-filter based vector tracking loop (VTL) configuration with data wipe-off (DWO) method of the Global Positioning System (GPS) receiver is proposed for performance enhancement. It is a challenging task to continuously track the satellites’ signals in weak signal environment for the GPS receiver. VTL is a very attractive technique as it can provide tracking capability in signal-challenged environments. In the VTL, each channel will not form a loop independently. On the contrary, the signals in the channels of VTL are shared with each other; the navigation processor in turn predicts the code phases. Thus, the receiver can successfully… More >

  • Open Access

    ARTICLE

    An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks

    Abdelwahed Berguiga*, Ahlem Harchay

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3839-3851, 2022, DOI:10.32604/cmc.2022.023399

    Abstract The success of Internet of Things (IoT) deployment has emerged important smart applications. These applications are running independently on different platforms, almost everywhere in the world. Internet of Medical Things (IoMT), also referred as the healthcare Internet of Things, is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems. Indeed, with the impact of the COVID-19 pandemic, a large number of interconnected devices designed to create smart networks. These networks monitor patients from remote locations as well as tracking medication orders. However, IoT may be jeopardized by attacks… More >

  • Open Access

    ARTICLE

    Image Dehazing Based on Pixel Guided CNN with PAM via Graph Cut

    Fayadh Alenezi*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3425-3443, 2022, DOI:10.32604/cmc.2022.023339

    Abstract Image dehazing is still an open research topic that has been undergoing a lot of development, especially with the renewed interest in machine learning-based methods. A major challenge of the existing dehazing methods is the estimation of transmittance, which is the key element of haze-affected imaging models. Conventional methods are based on a set of assumptions that reduce the solution search space. However, the multiplication of these assumptions tends to restrict the solutions to particular cases that cannot account for the reality of the observed image. In this paper we reduce the number of simplified hypotheses in order to attain… More >

  • Open Access

    ARTICLE

    Object Detection for Cargo Unloading System Based on Fuzzy C Means

    Sunwoo Hwang1, Jaemin Park1, Jongun Won2, Yongjang Kwon3, Youngmin Kim1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4167-4181, 2022, DOI:10.32604/cmc.2022.023295

    Abstract With the recent increase in the utilization of logistics and courier services, it is time for research on logistics systems fused with the fourth industry sector. Algorithm studies related to object recognition have been actively conducted in convergence with the emerging artificial intelligence field, but so far, algorithms suitable for automatic unloading devices that need to identify a number of unstructured cargoes require further development. In this study, the object recognition algorithm of the automatic loading device for cargo was selected as the subject of the study, and a cargo object recognition algorithm applicable to the automatic loading device is… More >

  • Open Access

    ARTICLE

    Correlation Analysis of Energy Consumption of Agricultural Rotorcraft

    Lihua Zhu1,*, Zhijian Xu1, Yu Wang1, Cheire Cheng2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3179-3192, 2022, DOI:10.32604/cmc.2022.023293

    Abstract With the rapid development of unmanned aerial vehicle technology, unmanned aerial vehicles (UAVs) have been widely used in the field of agricultural plant protection. Compared with fuel-driven UAVs, electrically driven rotorcrafts have many advantages such as lower cost, simpler operation, good maneuverability and cleaner power, which them popular in the plant protection. However, electrical rotorcrafts still face battery problems in actual operation, which limits its working time and application. Aiming at this issue, this paper studied the influence of rotorcraft flight parameters on energy consumption through series of carefully designed flight experiments. First of all, the linear motion experiments have… More >

  • Open Access

    ARTICLE

    Computational Algorithms for the Analysis of Cancer Virotherapy Model

    Ali Raza1,2,*, Dumitru Baleanu3,4, Muhammad Rafiq5, Syed Zaheer Abbas6, Abubakar Siddique6, Umer Javed8, Mehvish Naz7, Arooj Fatima6, Tayyba Munawar6, Hira Batool6, Zaighum Nazir6

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3621-3634, 2022, DOI:10.32604/cmc.2022.023286

    Abstract Cancer is a common term for many diseases that can affect any part of the body. In 2020, ten million people will die due to cancer. A worldwide leading cause of death is cancer by the World Health Organization (WHO) report. Interaction of cancer cells, viral therapy, and immune response are identified in this model. Mathematical and computational modeling is an effective tool to predict the dynamics of cancer virotherapy. The cell population is categorized into three parts like uninfected cells (x), infected cells (y), virus-free cells (v), and immune cells (z). The modeling of cancer-like diseases is based on… More >

  • Open Access

    ARTICLE

    Multi-Agent Deep Q-Networks for Efficient Edge Federated Learning Communications in Software-Defined IoT

    Prohim Tam1, Sa Math1, Ahyoung Lee2, Seokhoon Kim1,3,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3319-3335, 2022, DOI:10.32604/cmc.2022.023215

    Abstract Federated learning (FL) activates distributed on-device computation techniques to model a better algorithm performance with the interaction of local model updates and global model distributions in aggregation averaging processes. However, in large-scale heterogeneous Internet of Things (IoT) cellular networks, massive multi-dimensional model update iterations and resource-constrained computation are challenging aspects to be tackled significantly. This paper introduces the system model of converging software-defined networking (SDN) and network functions virtualization (NFV) to enable device/resource abstractions and provide NFV-enabled edge FL (eFL) aggregation servers for advancing automation and controllability. Multi-agent deep Q-networks (MADQNs) target to enforce a self-learning softwarization, optimize resource allocation… More >

  • Open Access

    ARTICLE

    Evolution of Desertification Types on the North Shore of Qinghai Lake

    Wenzheng Yu1, Jintao Cui2, Yang Gao1, Mingxuan Zhu1, Li Shao3, Yanbo Shen4,5,*, Xiaozhao Zhang6, Chen Guo7, Hanxiaoya Zhang8

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3635-3646, 2022, DOI:10.32604/cmc.2022.023195

    Abstract Land desertification is a widely concerned ecological environment problem. Studying the evolution trend of desertification types is of great significance to prevent and control land desertification. In this study, we applied the decision tree classification method, to study the land area and temporal and spatial change law of different types of desertification in the North Bank of Qinghai Lake area from 1987 to 2014, based on the current land use situation and TM remote sensing image data of Haiyan County, Qinghai Province, The results show that the area of mild desertification land and moderate desertification land in the study area… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Advertisement Banner Identification Technique for Effective Piracy Website Detection Process

    Lelisa Adeba Jilcha1, Jin Kwak2,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2883-2899, 2022, DOI:10.32604/cmc.2022.023167

    Abstract In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement. Billions of dollars are lost annually because of this illegal act. The current most effective trend to tackle this problem is believed to be blocking those websites, particularly through affiliated government bodies. To do so, an effective detection mechanism is a necessary first step. Some researchers have used various approaches to analyze the possible common features of suspected piracy websites. For instance, most of these websites serve online advertisement, which is considered as their main source of revenue. In… More >

Displaying 9631-9640 on page 964 of 22113. Per Page