Open Access
ARTICLE
Mohammad Arefi1, Masoud Mohammadi1, Ali Tabatabaeian1, Timon Rabczuk2, *
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1001-1023, 2020, DOI:10.32604/cmc.2020.08052
Abstract This study focuses on vibration analysis of cylindrical pressure vessels
constructed by functionally graded carbon nanotube reinforced composites (FG-CNTRC).
The vessel is under internal pressure and surrounded by a Pasternak foundation. This
investigation was founded based on two-dimensional elastic analysis and used
Hamilton’s principle to drive the governing equations. The deformations and effectivemechanical properties of the reinforced structure were elicited from the first-order shear
theory (FSDT) and rule of mixture, respectively. The main goal of this study is to show
the effects of various design parameters such as boundary conditions, reinforcement
distribution, foundation parameters, and aspect ratio on the free… More >
Open Access
ARTICLE
Abeer I. Alhujaylan1, 2, *, Manar I. Hosny1
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1025-1051, 2020, DOI:10.32604/cmc.2020.08742
Abstract Mobile commerce (m-commerce) contributes to increasing the popularity of
electronic commerce (e-commerce), allowing anybody to sell or buy goods using a
mobile device or tablet anywhere and at any time. As demand for e-commerce increases
tremendously, the pressure on delivery companies increases to organise their
transportation plans to achieve profits and customer satisfaction. One important planning
problem in this domain is the multi-vehicle profitable pickup and delivery problem
(MVPPDP), where a selected set of pickup and delivery customers need to be served
within certain allowed trip time. In this paper, we proposed hybrid clustering algorithms
with the greedy randomised adaptive… More >
Open Access
ARTICLE
Jinlin Wang1, Xing Wang1, *, Yuchen Yang1, Hongli Zhang1, Binxing Fang1
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1053-1075, 2020, DOI:10.32604/cmc.2020.08675
Abstract Web information system (WIS) is frequently-used and indispensable in daily
social life. WIS provides information services in many scenarios, such as electronic
commerce, communities, and edutainment. Data cleaning plays an essential role in
various WIS scenarios to improve the quality of data service. In this paper, we present a
review of the state-of-the-art methods for data cleaning in WIS. According to the
characteristics of data cleaning, we extract the critical elements of WIS, such as
interactive objects, application scenarios, and core technology, to classify the existing
works. Then, after elaborating and analyzing each category, we summarize the
descriptions and challenges… More >
Open Access
ARTICLE
J. Vijila1, *, A. Albert Raj2
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1077-1096, 2020, DOI:10.32604/cmc.2020.08534
Abstract Software Defined Network (SDN) deals with huge data processing units which
possess network management. However, due to centralization behavior ensuring security
in SDN is the major concern. In this work to ensure security, a security server has been
at its aid to check the vulnerability of the networks and to keep an eye on the packet
according to the screening policies. A Secure Shell Connection (SSH) is established by
the security server which does a frequent inspection of the network’s logs. Malware
detection and the Intrusion Detection System policies are also incorporated in the server
for the effective scanning of… More >
Open Access
ARTICLE
R. Mythili1, *, P. Kalpana2
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1097-1107, 2020, DOI:10.32604/cmc.2020.08396
Abstract NIDS (Network Intrusion Detection Systems) plays a vital role in security
threats to computers and networks. With the onset of gigabit networks, hardware-based
Intrusion Detection System gains popularity because of its high performance when
compared to the software-based NIDS. The software-based system limits parallel
execution, which in turn confines the performance of a modern network. This paper
presents a signature-based lookup technique using reconfigurable hardware. Content
Addressable Memory (CAM) is used as a lookup table architecture to improve the speed
instead of search algorithms. To minimize the power and to increase the speed, precomputation based CAM (PBCAM) can be used,… More >
Open Access
ARTICLE
T. Vu-Huu1, 2, C. Le-Thanh3, H. Nguyen-Xuan4, M. Abdel-Wahab5, 6, *
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1109-1123, 2020, DOI:10.32604/cmc.2020.07989
Abstract This paper presents an adapted stabilisation method for the equal-order mixed
scheme of finite elements on convex polygonal meshes to analyse the high velocity and
pressure gradient of incompressible fluid flows that are governed by Stokes equations
system. This technique is constructed by a local pressure projection which is extremely
simple, yet effective, to eliminate the poor or even non-convergence as well as the
instability of equal-order mixed polygonal technique. In this research, some numerical
examples of incompressible Stokes fluid flow that is coded and programmed by MATLAB
will be presented to examine the effectiveness of the proposed stabilised method. More >
Open Access
ARTICLE
Kamaleldin Abodayeh1, Ali Raza2, *, Muhammad Shoaib Arif2, Muhammad Rafiq3, Mairaj Bibi4, Muhammad Mohsin5
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1125-1142, 2020, DOI:10.32604/cmc.2020.08885
Abstract This paper aims to perform a comparison of deterministic and stochastic
models. The stochastic modelling is a more realistic way to study the dynamics of
gonorrhoea infection as compared to its corresponding deterministic model. Also, the
deterministic solution is itself mean of the stochastic solution of the model. For numerical
analysis, first, we developed some explicit stochastic methods, but unfortunately, they do
not remain consistent in certain situations. Then we proposed an implicitly driven explicit
method for stochastic heavy alcohol epidemic model. The proposed method is
independent of the choice of parameters and behaves well in all scenarios. So, some… More >
Open Access
ARTICLE
Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1143-1159, 2020, DOI:10.32604/cmc.2020.04949
Abstract Nowadays, the scale of the user’s personal social network (personal network, a
network of the user and their friends, where the user we call “center user”) is becoming
larger and more complex. It is difficult to find a suitable way to manage them
automatically. In order to solve this problem, we propose an access control model for
social network to protect the privacy of the central users, which achieves the access
control accurately and automatically. Based on the hybrid friend circle detection
algorithm, we consider the aspects of direct judgment, indirect trust judgment and
malicious users, a set of multi-angle… More >
Open Access
ARTICLE
Kun Zhu1, Shi Ying1, *, Nana Zhang1, Rui Wang1, Yutong Wu1, Gongjin Lan2, Xu Wang2
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1161-1185, 2020, DOI:10.32604/cmc.2020.05247
Abstract SaaS software that provides services through cloud platform has been more
widely used nowadays. However, when SaaS software is running, it will suffer from
performance fault due to factors such as the software structural design or complex
environments. It is a major challenge that how to diagnose software quickly and accurately
when the performance fault occurs. For this challenge, we propose a novel performance
fault diagnosis method for SaaS software based on GBDT (Gradient Boosting Decision
Tree) algorithm. In particular, we leverage the monitoring mean to obtain the performance
log and warning log when the SaaS software system runs, and… More >
Open Access
ARTICLE
Jian Liu1, Wantao Wang1, Jie Chen2, *, Guozhong Sun3, Alan Yang4
CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1187-1200, 2020, DOI:10.32604/cmc.2020.05883
Abstract Classification of skin lesions is a complex identification challenge. Due to the
wide variety of skin lesions, doctors need to spend a lot of time and effort to judge the
lesion image which zoomed through the dermatoscopy. The diagnosis which the
algorithm of identifying pathological images assists doctors gets more and more attention.
With the development of deep learning, the field of image recognition has made longterm progress. The effect of recognizing images through convolutional neural network
models is better than traditional image recognition technology. In this work, we try to
classify seven kinds of lesion images by various models… More >