Home / Journals / CMC / Vol.66, No.3, 2021
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Analytic Hierarchy Process for Evaluating Flipped Classroom Learning

    Husam Jasim Mohammed1,*, Hajem Ati Daham2
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2229-2239, 2021, DOI:10.32604/cmc.2021.014445
    (This article belongs to this Special Issue: Wireless Sensors Networks Application in Healthcare and Medical Internet of Things (Miot) in Bio-Medical Sensors Networks)
    Abstract In reality, the flipped classroom has gained popularity as a modern way of structuring teaching, where lectures move from in-class procedures to digitally-based assignments, freeing up the debate, and practice exercises class time. Therefore, it is essential to implement and analyze a way of teaching that will improve student performance. The paper aims to develop a model of the method of teaching science in Iraqi schools, and to assess whether teaching flipped classroom affects the achievement, motivation, and creative thinking of students by using the methodology of Multi-Criteria Decision Making (MCDM) in the Analytic Hierarchy Process (AHP). The AHP approach… More >

  • Open AccessOpen Access

    ARTICLE

    Quintuple Band Antenna for Wireless Applications with Small Form Factor

    Amir Haider1, Tayyaba Khan2, MuhibUr Rahman3, Byung Moo Lee1, Hyung Seok Kim1,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2241-2251, 2021, DOI:10.32604/cmc.2021.013908
    Abstract A coplanar waveguide-fed quintuple band antenna with a slotted circular-shaped radiator for wireless applications with a high isolation between adjacent bands is presented in this paper. The proposed antenna resonates at multiple frequencies with corresponding center frequencies of 2.35, 4.92, 5.75, 6.52, and 8.46 GHz. The intended functionality is achieved by introducing a circular disc radiator with five slots and a U-shaped slot in the feed. The proposed antenna exhibits coverage of the maximum set of wireless applications, such as satellite communication, worldwide interoperability for microwave access, wireless local area network (WLAN), long-distance radio telecommunications, and X-band/Satcom wireless applications. The… More >

  • Open AccessOpen Access

    ARTICLE

    Two-Phase Flow of Blood with Magnetic Dusty Particles in Cylindrical Region: A Caputo Fabrizio Fractional Model

    Anees Imitaz1, Aamina Aamina1, Farhad Ali2,3,*, Ilyas Khan4, Kottakkaran Sooppy Nisar5
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2253-2264, 2021, DOI:10.32604/cmc.2021.012470
    Abstract The present study is focused on the unsteady two-phase flow of blood in a cylindrical region. Blood is taken as a counter-example of Brinkman type fluid containing magnetic (dust) particles. The oscillating pressure gradient has been considered because for blood flow it is necessary to investigate in the form of a diastolic and systolic pressure. The transverse magnetic field has been applied externally to the cylindrical tube to study its impact on both fluids as well as particles. The system of derived governing equations based on Navier Stoke’s, Maxwell and heat equations has been generalized using the well-known Caputo–Fabrizio (C–F)… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction of COVID-19 Cases Using Machine Learning for Effective Public Health Management

    Fahad Ahmad1,*, Saleh N. Almuayqil2, Mamoona Humayun2, Shahid Naseem3, Wasim Ahmad Khan4, Kashaf Junaid5
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2265-2282, 2021, DOI:10.32604/cmc.2021.013067
    (This article belongs to this Special Issue: Mathematical aspects of the Coronavirus Disease 2019 (COVID-19): Analysis and Control)
    Abstract COVID-19 is a pandemic that has affected nearly every country in the world. At present, sustainable development in the area of public health is considered vital to securing a promising and prosperous future for humans. However, widespread diseases, such as COVID-19, create numerous challenges to this goal, and some of those challenges are not yet defined. In this study, a Shallow Single-Layer Perceptron Neural Network (SSLPNN) and Gaussian Process Regression (GPR) model were used for the classification and prediction of confirmed COVID-19 cases in five geographically distributed regions of Asia with diverse settings and environmental conditions: namely, China, South Korea,… More >

  • Open AccessOpen Access

    ARTICLE

    Evaluating the Impact of Software Security Tactics: A Design Perspective

    Mamdouh Alenezi1, Abhishek Kumar Pandey2, Richa Verma3, Mohd Faizan2, Shalini Chandra3, Alka Agrawal2, Rajeev Kumar2,4,*, Raees Ahmad Khan2
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2283-2299, 2021, DOI:10.32604/cmc.2021.013579
    Abstract Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP) and fuzzy technique for order… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient False-Positive Reduction System for Cerebral Microbleeds Detection

    Sitara Afzal1, Muazzam Maqsood1,*, Irfan Mehmood2, Muhammad Tabish Niaz3, Sanghyun Seo4
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2301-2315, 2021, DOI:10.32604/cmc.2021.013966
    (This article belongs to this Special Issue: Artificial Intelligence and IoT based intelligent systems using high performance computing for Medical applications.)
    Abstract Cerebral Microbleeds (CMBs) are microhemorrhages caused by certain abnormalities of brain vessels. CMBs can be found in people with Traumatic Brain Injury (TBI), Alzheimer’s disease, and in old individuals having a brain injury. Current research reveals that CMBs can be highly dangerous for individuals having dementia and stroke. The CMBs seriously impact individuals’ life which makes it crucial to recognize the CMBs in its initial phase to stop deterioration and to assist individuals to have a normal life. The existing work report good results but often ignores false-positive’s perspective for this research area. In this paper, an efficient approach is… More >

  • Open AccessOpen Access

    ARTICLE

    Predicting the Type of Crime: Intelligence Gathering and Crime Analysis

    Saleh Albahli1, Anadil Alsaqabi1, Fatimah Aldhubayi1, Hafiz Tayyab Rauf2,*, Muhammad Arif3, Mazin Abed Mohammed4
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2317-2341, 2021, DOI:10.32604/cmc.2021.014113
    (This article belongs to this Special Issue: Intelligent techniques for energy efficient service management in Edge computing)
    Abstract Crimes are expected to rise with an increase in population and the rising gap between society’s income levels. Crimes contribute to a significant portion of the socioeconomic loss to any society, not only through its indirect damage to the social fabric and peace but also the more direct negative impacts on the economy, social parameters, and reputation of a nation. Policing and other preventive resources are limited and have to be utilized. The conventional methods are being superseded by more modern approaches of machine learning algorithms capable of making predictions where the relationships between the features and the outcomes are… More >

  • Open AccessOpen Access

    ARTICLE

    Ordering Cost Depletion in Inventory Policy with Imperfect Products and Backorder Rebate

    Sandeep Kumar1, Teekam Singh1,2, Kamaleldin Abodayeh3, Wasfi Shatanawi3,4,5,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2343-2357, 2021, DOI:10.32604/cmc.2021.014224
    Abstract This study presents an inventory model for imperfect products with depletion in ordering costs and constant lead time where the price discount in the backorder is permitted. The imperfect products are refused or modified or if they reached to the customer, returned and thus some extra costs are experienced. Lately some of the researchers explicitly present on the significant association between size of lot and quality imperfection. In practical situations, the unsatisfied demands increase the period of lead time and decrease the backorders. To control customers' problems and losses, the supplier provides a price discount in backorders during shortages. Also,… More >

  • Open AccessOpen Access

    ARTICLE

    A Holistic, Proactive and Novel Approach for Pre, During and Post Migration Validation from Subversion to Git

    Vinay Singh1, Mohammed Alshehri2,*, Alok Aggarwal3, Osama Alfarraj4, Purushottam Sharma5, K. R. Pardasani6
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2359-2371, 2021, DOI:10.32604/cmc.2021.013272
    (This article belongs to this Special Issue: Emerging Computational Intelligence Technologies for Software Engineering: Paradigms, Principles and Applications)
    Abstract Software development is getting a transition from centralized version control systems (CVCSs) like Subversion to decentralized version control systems (DVCDs) like Git due to lesser efficiency of former in terms of branching, fusion, time, space, merging, offline commits & builds and repository, etc. Git is having a share of 77% of total VCS, followed by Subversion with a share of 13.5%. The majority of software industries are getting a migration from Subversion to Git. Only a few migration tools are available in the software industry. Still, these too lack in many features like lack of identifying the empty directories as… More >

  • Open AccessOpen Access

    ARTICLE

    Automotive Lighting Systems Based on Luminance/Intensity Grids: A Proposal Based on Real-Time Monitoring and Control for Safer Driving

    Antonio Peña-García1,*, Huchang Liao2
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2373-2383, 2021, DOI:10.32604/cmc.2021.013151
    (This article belongs to this Special Issue: Current trends and Advancements for next-generation secure Industrial IoT)
    Abstract The requirements for automotive lighting systems, especially the light patterns ensuring driver perception, are based on criteria related to the headlamps, rather than the light perceived by drivers and road users. Consequently, important factors such as pavement reflectance, driver age, or time of night, are largely ignored. Other factors such as presence of other vehicles, vehicle speed and weather conditions are considered by the Adaptive Driving Beam (ADB) and Adaptive Front-lighting System (AFS) respectively, though with no information regarding the visual perception of drivers and other road users. Evidently, it is simpler to simulate and measure the light emitted by… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Semi-Quantum Private Comparison Scheme Using Bell Entangle States

    Yuhua Sun1, Lili Yan1,*, Zhibin Sun2, Shibin Zhang1, Jiazhong Lu1
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2385-2395, 2021, DOI:10.32604/cmc.2021.012696
    Abstract

    Private comparison is the basis of many encryption technologies, and several related Quantum Private Comparison (QPC) protocols have been published in recent years. In these existing protocols, secret information is encoded by using conjugate coding or orthogonal states, and all users are quantum participants. In this paper, a novel semi-quantum private comparison scheme is proposed, which employs Bell entangled states as quantum resources. Two semi-quantum participants compare the equivalence of their private information with the help of a semi-honest third party (TP). Compared with the previous classical protocols, these two semi-quantum users can only make some particular action, such as… More >

  • Open AccessOpen Access

    ARTICLE

    Modelling and Simulation of COVID-19 Outbreak Prediction Using Supervised Machine Learning

    Rachid Zagrouba1, Muhammad Adnan Khan2,*, Atta-ur-Rahman1, Muhammad Aamer Saleem3, Muhammad Faheem Mushtaq4, Abdur Rehman5, Muhammad Farhan Khan6
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2397-2407, 2021, DOI:10.32604/cmc.2021.014042
    (This article belongs to this Special Issue: Mathematical aspects of the Coronavirus Disease 2019 (COVID-19): Analysis and Control)
    Abstract Novel Coronavirus-19 (COVID-19) is a newer type of coronavirus that has not been formally detected in humans. It is established that this disease often affects people of different age groups, particularly those with body disorders, blood pressure, diabetes, heart problems, or weakened immune systems. The epidemic of this infection has recently had a huge impact on people around the globe with rising mortality rates. Rising levels of mortality are attributed to their transmitting behavior through physical contact between humans. It is extremely necessary to monitor the transmission of the infection and also to anticipate the early stages of the disease… More >

  • Open AccessOpen Access

    ARTICLE

    An Abstractive Summarization Technique with Variable Length Keywords as per Document Diversity

    Muhammad Yahya Saeed1, Muhammad Awais1, Muhammad Younas1, Muhammad Arif Shah2,*, Atif Khan3, M. Irfan Uddin4, Marwan Mahmoud5
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2409-2423, 2021, DOI:10.32604/cmc.2021.014330
    Abstract Text Summarization is an essential area in text mining, which has procedures for text extraction. In natural language processing, text summarization maps the documents to a representative set of descriptive words. Therefore, the objective of text extraction is to attain reduced expressive contents from the text documents. Text summarization has two main areas such as abstractive, and extractive summarization. Extractive text summarization has further two approaches, in which the first approach applies the sentence score algorithm, and the second approach follows the word embedding principles. All such text extractions have limitations in providing the basic theme of the underlying documents.… More >

  • Open AccessOpen Access

    ARTICLE

    An Advanced Analysis of Cloud Computing Concepts Based on the Computer Science Ontology

    Paweł Lula1, Octavian Dospinescu2,*, Daniel Homocianu2, Napoleon-Alexandru Sireteanu2
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2425-2443, 2021, DOI:10.32604/cmc.2021.013771
    Abstract Our primary research hypothesis stands on a simple idea: The evolution of top-rated publications on a particular theme depends heavily on the progress and maturity of related topics. And this even when there are no clear relations or some concepts appear to cease to exist and leave place for newer ones starting many years ago. We implemented our model based on Computer Science Ontology (CSO) and analyzed 44 years of publications. Then we derived the most important concepts related to Cloud Computing (CC) from the scientific collection offered by Clarivate Analytics. Our methodology includes data extraction using advanced web crawling… More >

  • Open AccessOpen Access

    ARTICLE

    Entanglement and Entropy Squeezing for Moving Two Two-Level Atoms Interaction with a Radiation Field

    S. Abdel-Khalek1,2,*, E. M. Khalil1,3, Beida Alsubei1, A. Al-Barakaty4, S. M. Abo Dahab5
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2445-2456, 2021, DOI:10.32604/cmc.2021.013830
    Abstract In this paper, we analyzed squeezing in the information entropy, quantum state fidelity, and qubit-qubit entanglement in a time-dependent system. The proposed model consists of two qubits that interact with a two-mode electromagnetic field under the dissipation effect. An analytical solution is calculated by considering the constants for the equations of motion. The effect of the general form of the time-dependent for qubit-field coupling and the dissipation term on the temporal behavior of the qubit-qubit entanglement, quantum state fidelity, entropy, and variance squeezing are examined. It is shown that the intervals of entanglement caused more squeezing for the case of… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852
    (This article belongs to this Special Issue: Current trends and Advancements for next-generation secure Industrial IoT)
    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

  • Open AccessOpen Access

    ARTICLE

    E-Learning during COVID-19 Outbreak: Cloud Computing Adoption in Indian Public Universities

    Amit Kumar Bhardwaj1, Lalit Garg2,*, Arunesh Garg1, Yuvraj Gajpal3
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2471-2492, 2021, DOI:10.32604/cmc.2021.014099
    (This article belongs to this Special Issue: COVID-19 impacts on Software Engineering industry and research community)
    Abstract In the COVID-19 pandemic situation, the need to adopt cloud computing (CC) applications by education institutions, in general, and higher education (HE) institutions, in particular, has especially increased to engage students in an online mode and remotely carrying out research. The adoption of CC across various sectors, including HE, has been picking momentum in the developing countries in the last few years. In the Indian context, the CC adaptation in the HE sector (HES) remains a less thoroughly explored sector, and no comprehensive study is reported in the literature. Therefore, the aim of the present study is to overcome this… More >

  • Open AccessOpen Access

    ARTICLE

    Defect-Detection Model for Underground Parking Lots Using Image Object-Detection Method

    Hyun Kyu Shin1, Si Woon Lee2, Goo Pyo Hong3, Lee Sael2, Sang Hyo Lee4, Ha Young Kim5,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2493-2507, 2021, DOI:10.32604/cmc.2021.014170
    Abstract The demand for defect diagnoses is gradually gaining ground owing to the growing necessity to implement safe inspection methods to ensure the durability and quality of structures. However, conventional manpower-based inspection methods not only incur considerable cost and time, but also cause frequent disputes regarding defects owing to poor inspections. Therefore, the demand for an effective and efficient defect-diagnosis model for concrete structures is imminent, as the reduction in maintenance costs is significant from a long-term perspective. Thus, this paper proposes a deep learning-based image object-identification method to detect the defects of paint peeling, leakage peeling, and leakage traces that… More >

  • Open AccessOpen Access

    ARTICLE

    Energy-Efficient and Blockchain-Enabled Model for Internet of Things (IoT) in Smart Cities

    Norah Saleh Alghamdi1,*, Mohammad Ayoub Khan2
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2509-2524, 2021, DOI:10.32604/cmc.2021.014180
    Abstract Wireless sensor networks (WSNs) and Internet of Things (IoT) have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities. The data generated from these sensors are used by smart cities to strengthen their infrastructure, utilities, and public services. WSNs are suitable for long periods of data acquisition in smart cities. To make the networks of smart cities more reliable for sensitive information, the blockchain mechanism has been proposed. The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources; leading to extending the network lifetime of sensors.… More >

  • Open AccessOpen Access

    ARTICLE

    Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm

    Mohammed Alshehri1,*, Purushottam Sharma2, Richa Sharma2, Osama Alfarraj3
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2525-2538, 2021, DOI:10.32604/cmc.2021.012469
    (This article belongs to this Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract Sensors and physical activity evaluation are quite limited for motion-based commercial devices. Sometimes the accelerometer of the smartwatch is utilized; walking is investigated. The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones, i.e., accelerometer and gyroscope. For biometric efficiency, some of the diverse activities of daily routine have been evaluated, also with biometric authentication. The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities. This indicates that the high feasibility and results… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Collective User Web Behavior Simulation Method

    Hongri Liu1,2,3, Xu Zhang1,3, Jingjing Li1,3, Bailing Wang1,3,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2539-2553, 2021, DOI:10.32604/cmc.2021.012213
    Abstract

    A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range. Existing studies almost focus on individual web behavior analysis and prediction, which cannot simulate human dynamics that widely exist in large-scale users’ behaviors. To address these issues, we propose a novel collective user web behavior simulation method, in which an algorithm for constructing a connected virtual social network is proposed, and then a collective user web behavior simulation algorithm is designed on the virtual social network. In the simulation method, a new epidemic information dissemination algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Based Optimal Multimodal Fusion Framework for Intrusion Detection Systems for Healthcare Data

    Phong Thanh Nguyen1, Vy Dang Bich Huynh2, Khoa Dang Vo1, Phuong Thanh Phan1, Mohamed Elhoseny3, Dac-Nhuong Le4,5,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2555-2571, 2021, DOI:10.32604/cmc.2021.012941
    (This article belongs to this Special Issue: Intelligent Decision Support Systems for Complex Healthcare Applications)
    Abstract Data fusion is a multidisciplinary research area that involves different domains. It is used to attain minimum detection error probability and maximum reliability with the help of data retrieved from multiple healthcare sources. The generation of huge quantity of data from medical devices resulted in the formation of big data during which data fusion techniques become essential. Securing medical data is a crucial issue of exponentially-pacing computing world and can be achieved by Intrusion Detection Systems (IDS). In this regard, since singular-modality is not adequate to attain high detection rate, there is a need exists to merge diverse techniques using… More >

  • Open AccessOpen Access

    ARTICLE

    An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference

    Yichao Zang1,*, Tairan Hu2, Tianyang Zhou2, Wanjiang Deng3
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2573-2585, 2021, DOI:10.32604/cmc.2021.012220
    Abstract Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration testing. Associative rule mining, a data mining technique, has been studied and explored for a long time. However, few studies have focused on knowledge discovery in the penetration testing area. The experimental result reveals that the long-tail distribution of penetration testing data nullifies the effectiveness of associative rule mining algorithms that are based on frequent pattern. To address this problem, a Bayesian inference based penetration semantic knowledge mining algorithm is proposed. First, a directed bipartite graph model, a kind… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning in DXA Image Segmentation

    Dildar Hussain1, Rizwan Ali Naqvi2, Woong-Kee Loh3, Jooyoung Lee1,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2587-2598, 2021, DOI:10.32604/cmc.2021.013031
    Abstract Many existing techniques to acquire dual-energy X-ray absorptiometry (DXA) images are unable to accurately distinguish between bone and soft tissue. For the most part, this failure stems from bone shape variability, noise and low contrast in DXA images, inconsistent X-ray beam penetration producing shadowing effects, and person-to-person variations. This work explores the feasibility of using state-of-the-art deep learning semantic segmentation models, fully convolutional networks (FCNs), SegNet, and U-Net to distinguish femur bone from soft tissue. We investigated the performance of deep learning algorithms with reference to some of our previously applied conventional image segmentation techniques (i.e., a decision-tree-based method using… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications

    Fahad A. Alzahrani*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2599-2625, 2021, DOI:10.32604/cmc.2021.013124
    Abstract Usability and security are often considered contradictory in nature. One has a negative impact on the other. In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished. Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications. In the same league, the present research endeavour is premised on the usable-security of healthcare web applications. For a compatible blend of usability and security that would fulfill the users’ requirments, this research proposes an integration… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Viewport-Dependent 360 VR System Based on Adaptive Tiled Streaming

    Tuan Thanh Le1, Jong-Beom Jeong2, SangSoon Lee1, Jaehyoun Kim2, Eun-Seok Ryu2,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2627-2643, 2021, DOI:10.32604/cmc.2021.013399
    Abstract Recent advances in 360 video streaming technologies have enhanced the immersive experience of video streaming services. Particularly, there is immense potential for the application of 360 video encoding formats to achieve highly immersive virtual reality (VR) systems. However, 360 video streaming requires considerable bandwidth, and its performance depends on several factors. Consequently, the optimization of 360 video bitstreams according to viewport texture is crucial. Therefore, we propose an adaptive solution for VR systems using viewport-dependent tiled 360 video streaming. To increase the degrees of freedom of users, the moving picture experts group (MPEG) recently defined three degrees plus of freedom… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Electronic Document Management System Based on Cloud Computing

    Jin Han1, Cheng Wang2, Jie Miao3, Mingxin Lu3, Yingchun Wang4, Jin Shi3,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2645-2654, 2021, DOI:10.32604/cmc.2021.014371
    Abstract With the development of information technology, cloud computing technology has brought many conveniences to all aspects of work and life. With the continuous promotion, popularization and vigorous development of e-government and e-commerce, the number of documents in electronic form is getting larger and larger. Electronic document is an indispensable main tool and real record of e-government and business activities. How to scientifically and effectively manage electronic documents? This is an important issue faced by governments and enterprises in improving management efficiency, protecting state secrets or business secrets, and reducing management costs. This paper discusses the application of cloud computing technology… More >

  • Open AccessOpen Access

    ARTICLE

    Understanding Research Trends in Android Malware Research Using Information Modelling Techniques

    Jaiteg Singh1, Tanya Gera1, Farman Ali2, Deepak Thakur1, Karamjeet Singh3, Kyung-sup Kwak4,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2655-2670, 2021, DOI:10.32604/cmc.2021.014504
    (This article belongs to this Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8% of the market share. Such popularity of Android has drawn the attention of cybercriminals and malware developers. The malicious applications can steal sensitive information like contacts, read personal messages, record calls, send messages to premium-rate numbers, cause financial loss, gain access to the gallery and can access the user’s geographic location. Numerous surveys on Android security have primarily focused on types of malware attack, their propagation, and techniques to mitigate them. To the best of our knowledge, Android malware literature has never… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Virtual Cloud Learning Model during the COVID-19 Pandemic

    Shaymaa E. Sorour1,*, Tamer M. Kamel2, Hanan E. Abdelkader3
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2671-2689, 2021, DOI:10.32604/cmc.2021.014395
    Abstract The COVID-19 pandemic has affected the educational systems worldwide, leading to the near-total closures of schools, universities, and colleges. Universities need to adapt to changes to face this crisis without negatively affecting students’ performance. Accordingly, the purpose of this study is to identify and help solve to critical challenges and factors that influence the e-learning system for Computer Maintenance courses during the COVID-19 pandemic. The paper examines the effect of a hybrid modeling approach that uses Cloud Computing Services (CCS) and Virtual Reality (VR) in a Virtual Cloud Learning Environment (VCLE) system. The VCLE system provides students with various utilities… More >

  • Open AccessOpen Access

    ARTICLE

    Dealing with Imbalanced Dataset Leveraging Boundary Samples Discovered by Support Vector Data Description

    Zhengbo Luo1, Hamïd Parvïn2,3,4,*, Harish Garg5, Sultan Noman Qasem6,7, Kim-Hung Pho8, Zulkefli Mansor9
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2691-2708, 2021, DOI:10.32604/cmc.2021.012547
    Abstract These days, imbalanced datasets, denoted throughout the paper by ID, (a dataset that contains some (usually two) classes where one contains considerably smaller number of samples than the other(s)) emerge in many real world problems (like health care systems or disease diagnosis systems, anomaly detection, fraud detection, stream based malware detection systems, and so on) and these datasets cause some problems (like under-training of minority class(es) and over-training of majority class(es), bias towards majority class(es), and so on) in classification process and application. Therefore, these datasets take the focus of many researchers in any science and there are several solutions… More >

  • Open AccessOpen Access

    ARTICLE

    Trade-Off between Efficiency and Effectiveness: A Late Fusion Multi-View Clustering Algorithm

    Yunping Zhao1, Weixuan Liang1, Jianzhuang Lu1,*, Xiaowen Chen1, Nijiwa Kong2
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2709-2722, 2021, DOI:10.32604/cmc.2021.013389
    Abstract Late fusion multi-view clustering (LFMVC) algorithms aim to integrate the base partition of each single view into a consensus partition. Base partitions can be obtained by performing kernel k-means clustering on all views. This type of method is not only computationally efficient, but also more accurate than multiple kernel k-means, and is thus widely used in the multi-view clustering context. LFMVC improves computational efficiency to the extent that the computational complexity of each iteration is reduced from O(n3) to O(n) (where n is the number of samples). However, LFMVC also limits the search space of the optimal solution, meaning that… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594
    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to keep the system in the… More >

  • Open AccessOpen Access

    ARTICLE

    A New Decision-Making Model Based on Plithogenic Set for Supplier Selection

    Mohamed Abdel-Basset1,*, Rehab Mohamed1, Florentin Smarandache2, Mohamed Elhoseny3
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2751-2769, 2021, DOI:10.32604/cmc.2021.013092
    (This article belongs to this Special Issue: Intelligent Decision Support Systems for Complex Healthcare Applications)
    Abstract Supplier selection is a common and relevant phase to initialize the supply chain processes and ensure its sustainability. The choice of supplier is a multi-criteria decision making (MCDM) to obtain the optimal decision based on a group of criteria. The health care sector faces several types of problems, and one of the most important is selecting an appropriate supplier that fits the desired performance level. The development of service/product quality in health care facilities in a country will improve the quality of the life of its population. This paper proposes an integrated multi-attribute border approximation area comparison (MABAC) based on… More >

  • Open AccessOpen Access

    REVIEW

    Detection and Grading of Diabetic Retinopathy in Retinal Images Using Deep Intelligent Systems: A Comprehensive Review

    H. Asha Gnana Priya1, J. Anitha1, Daniela Elena Popescu2, Anju Asokan1, D. Jude Hemanth1, Le Hoang Son3,4,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2771-2786, 2021, DOI:10.32604/cmc.2021.012907
    (This article belongs to this Special Issue: Deep Learning Trends in Intelligent Systems)
    Abstract Diabetic Retinopathy (DR) is an eye disease that mainly affects people with diabetes. People affected by DR start losing their vision from an early stage even though the symptoms are identified only at the later stage. Once the vision is lost, it cannot be regained but can be prevented from causing any further damage. Early diagnosis of DR is required for preventing vision loss, for which a trained ophthalmologist is required. The clinical practice is time-consuming and is not much successful in identifying DR at early stages. Hence, Computer-Aided Diagnosis (CAD) system is a suitable alternative for screening and grading… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Neural Networks for Prediction of COVID-19 in Saudi Arabia

    Nawaf N. Hamadneh1, Waqar A. Khan2, Waqar Ashraf3, Samer H. Atawneh4, Ilyas Khan5,*, Bandar N. Hamadneh6
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2787-2796, 2021, DOI:10.32604/cmc.2021.013228
    (This article belongs to this Special Issue: Machine Learning and Computational Methods for COVID-19 Disease Detection and Prediction)
    Abstract In this study, we have proposed an artificial neural network (ANN) model to estimate and forecast the number of confirmed and recovered cases of COVID-19 in the upcoming days until September 17, 2020. The proposed model is based on the existing data (training data) published in the Saudi Arabia Coronavirus disease (COVID-19) situation—Demographics. The Prey-Predator algorithm is employed for the training. Multilayer perceptron neural network (MLPNN) is used in this study. To improve the performance of MLPNN, we determined the parameters of MLPNN using the prey-predator algorithm (PPA). The proposed model is called the MLPNN–PPA. The performance of the proposed… More >

  • Open AccessOpen Access

    ARTICLE

    Statistical Inference of Chen Distribution Based on Two Progressive Type-II Censoring Schemes

    Hassan M. Aljohani*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2797-2814, 2021, DOI:10.32604/cmc.2021.013489
    Abstract An inverse problem in practical scientific investigations is the process of computing unknown parameters from a set of observations where the observations are only recorded indirectly, such as monitoring and controlling quality in industrial process control. Linear regression can be thought of as linear inverse problems. In other words, the procedure of unknown estimation parameters can be expressed as an inverse problem. However, maximum likelihood provides an unstable solution, and the problem becomes more complicated if unknown parameters are estimated from different samples. Hence, researchers search for better estimates. We study two joint censoring schemes for lifetime products in industrial… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimal Deep Learning Based Computer-Aided Diagnosis System for Diabetic Retinopathy

    Phong Thanh Nguyen1, Vy Dang Bich Huynh2, Khoa Dang Vo1, Phuong Thanh Phan1, Eunmok Yang3,*, Gyanendra Prasad Joshi4
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2815-2830, 2021, DOI:10.32604/cmc.2021.012315
    (This article belongs to this Special Issue: Intelligent Decision Support Systems for Complex Healthcare Applications)
    Abstract Diabetic Retinopathy (DR) is a significant blinding disease that poses serious threat to human vision rapidly. Classification and severity grading of DR are difficult processes to accomplish. Traditionally, it depends on ophthalmoscopically-visible symptoms of growing severity, which is then ranked in a stepwise scale from no retinopathy to various levels of DR severity. This paper presents an ensemble of Orthogonal Learning Particle Swarm Optimization (OPSO) algorithm-based Convolutional Neural Network (CNN) Model EOPSO-CNN in order to perform DR detection and grading. The proposed EOPSO-CNN model involves three main processes such as preprocessing, feature extraction, and classification. The proposed model initially involves… More >

  • Open AccessOpen Access

    REVIEW

    Toward 6G Communication Networks: Terahertz Frequency Challenges and Open Research Issues

    Mohammed H. Alsharif1, Mahmoud A. M. Albreem2, Ahmad A. A. Solyman3, Sunghwan Kim4,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2831-2842, 2021, DOI:10.32604/cmc.2021.013176
    (This article belongs to this Special Issue: Advanced 5G Communication System for Transforming Health Care)
    Abstract Future networks communication scenarios by the 2030s will include notable applications are three-dimensional (3D) calls, haptics communications, unmanned mobility, tele-operated driving, bio-internet of things, and the Nano-internet of things. Unlike the current scenario in which megahertz bandwidth are sufficient to drive the audio and video components of user applications, the future networks of the 2030s will require bandwidths in several gigahertzes (GHz) (from tens of gigahertz to 1 terahertz [THz]) to perform optimally. Based on the current radio frequency allocation chart, it is not possible to obtain such a wide contiguous radio spectrum below 90 GHz (0.09 THz). Interestingly, these… More >

  • Open AccessOpen Access

    ARTICLE

    Experimental Investigation on the Performance of Heat Pump Operating with Copper and Alumina Nanofluids

    Faizan Ahmed*, Waqar Ahmed Khan, Jamal Nayfeh
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2843-2856, 2021, DOI:10.32604/cmc.2021.012041
    Abstract In the present study, an attempt is made to enhance the performance of heat pump by utilizing two types of nanofluids namely, copper and alumina nanofluids. These nanofluids were employed around the evaporator coil of the heat pump. The nanofluids were used to enhance the heat input to the system by means of providing an external jacket around the evaporator coil. Both the nanofluids were prepared in three volume fractions 1%, 2% and 5%. Water was chosen as the base fluid. The performance of the heat pump was assessed by calculating the coefficient of performance of the system when it… More >

  • Open AccessOpen Access

    ARTICLE

    A Knowledge-Based Pilot Study on Assessing the Music Influence

    Sabin C. Buraga1, Octavian Dospinescu2,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2857-2873, 2021, DOI:10.32604/cmc.2021.014429
    Abstract A knowledge-driven approach is proposed for assessing the music influence on university students. The proposed method of modeling and conducting the interactive pilot study can be useful to convey other surveys, interviews, and experiments created in various phases of the user interface (UI) design processes, as part of a general human-computer interaction (HCI) methodology. Benefiting from existing semantic Web and linked data standards, best practices, and tools, a microservice-oriented system is developed as a testbed platform able to generate playlists in a smart way according to users’ music preferences. This novel approach could bring also benefits for user interface adaptation… More >

  • Open AccessOpen Access

    ARTICLE

    Recognition of Offline Handwritten Arabic Words Using a Few Structural Features

    Abderrahmane Saidi*, Abdelmouneim Moulay Lakhdar, Mohammed Beladgham
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2875-2889, 2021, DOI:10.32604/cmc.2021.013744
    Abstract Handwriting recognition is one of the most significant problems in pattern recognition, many studies have been proposed to improve this recognition of handwritten text for different languages. Yet, Fewer studies have been done for the Arabic language and the processing of its texts remains a particularly distinctive problem due to the variability of writing styles and the nature of Arabic scripts compared to other scripts. The present paper suggests a feature extraction technique for offline Arabic handwriting recognition. A handwriting recognition system for Arabic words using a few important structural features and based on a Radial Basis Function (RBF) neural… More >

  • Open AccessOpen Access

    ARTICLE

    A Combinatorial Optimized Knapsack Linear Space for Information Retrieval

    Varghese S. Chooralil1, Vinodh P. Vijayan2, Biju Paul1, M. M. Anishin Raj3, B. Karthikeyan4,*, G. Manikandan4
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2891-2903, 2021, DOI:10.32604/cmc.2021.012796
    Abstract Key information extraction can reduce the dimensional effects while evaluating the correct preferences of users during semantic data analysis. Currently, the classifiers are used to maximize the performance of web-page recommendation in terms of precision and satisfaction. The recent method disambiguates contextual sentiment using conceptual prediction with robustness, however the conceptual prediction method is not able to yield the optimal solution. Context-dependent terms are primarily evaluated by constructing linear space of context features, presuming that if the terms come together in certain consumer-related reviews, they are semantically reliant. Moreover, the more frequently they coexist, the greater the semantic dependency is.… More >

  • Open AccessOpen Access

    ARTICLE

    OTS Scheme Based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure

    Sushil Kumar Singh1, Yi Pan2, Jong Hyuk Park1,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2905-2922, 2021, DOI:10.32604/cmc.2021.014151
    (This article belongs to this Special Issue: Intelligent techniques for energy efficient service management in Edge computing)
    Abstract For the past few decades, the Internet of Things (IoT) has been one of the main pillars wielding significant impact on various advanced industrial applications, including smart energy, smart manufacturing, and others. These applications are related to industrial plants, automation, and e-healthcare fields. IoT applications have several issues related to developing, planning, and managing the system. Therefore, IoT is transforming into G-IoT (Green Internet of Things), which realizes energy efficiency. It provides high power efficiency, enhances communication and networking. Nonetheless, this paradigm did not resolve all smart applications’ challenges in edge infrastructure, such as communication bandwidth, centralization, security, and privacy.… More >

  • Open AccessOpen Access

    ARTICLE

    Classification of Positive COVID-19 CT Scans Using Deep Learning

    Muhammad Attique Khan1, Nazar Hussain1, Abdul Majid1, Majed Alhaisoni2, Syed Ahmad Chan Bukhari3, Seifedine Kadry4, Yunyoung Nam5,*, Yu-Dong Zhang6
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2923-2938, 2021, DOI:10.32604/cmc.2021.013191
    (This article belongs to this Special Issue: Innovation of Blockchain Technology)
    Abstract In medical imaging, computer vision researchers are faced with a variety of features for verifying the authenticity of classifiers for an accurate diagnosis. In response to the coronavirus 2019 (COVID-19) pandemic, new testing procedures, medical treatments, and vaccines are being developed rapidly. One potential diagnostic tool is a reverse-transcription polymerase chain reaction (RT-PCR). RT-PCR, typically a time-consuming process, was less sensitive to COVID-19 recognition in the disease’s early stages. Here we introduce an optimized deep learning (DL) scheme to distinguish COVID-19-infected patients from normal patients according to computed tomography (CT) scans. In the proposed method, contrast enhancement is used to… More >

  • Open AccessOpen Access

    ARTICLE

    Recognition and Classification of Pomegranate Leaves Diseases by Image Processing and Machine Learning Techniques

    Mangena Venu Madhavan1, Dang Ngoc Hoang Thanh2, Aditya Khamparia1,*, Sagar Pande1, Rahul Malik1, Deepak Gupta3
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2939-2955, 2021, DOI:10.32604/cmc.2021.012466
    (This article belongs to this Special Issue: Intelligent Decision Support Systems for Complex Healthcare Applications)
    Abstract Disease recognition in plants is one of the essential problems in agricultural image processing. This article focuses on designing a framework that can recognize and classify diseases on pomegranate plants exactly. The framework utilizes image processing techniques such as image acquisition, image resizing, image enhancement, image segmentation, ROI extraction (region of interest), and feature extraction. An image dataset related to pomegranate leaf disease is utilized to implement the framework, divided into a training set and a test set. In the implementation process, techniques such as image enhancement and image segmentation are primarily used for identifying ROI and features. An image… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Dictionary Cracking Scheme Based on Multiple GPUs for Wi-Fi Network

    Majdi K. Qabalin1, Zaid A. Arida2, Omar A. Saraereh3, Falin Wu4,*, Imran Khan5, Peerapong Uthansakul6, Moath Alsafasfeh7
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2957-2972, 2021, DOI:10.32604/cmc.2021.013951
    Abstract The Internet has penetrated all aspects of human society and has promoted social progress. Cyber-crimes in many forms are commonplace and are dangerous to society and national security. Cybersecurity has become a major concern for citizens and governments. The Internet functions and software applications play a vital role in cybersecurity research and practice. Most of the cyber-attacks are based on exploits in system or application software. It is of utmost urgency to investigate software security problems. The demand for Wi-Fi applications is proliferating but the security problem is growing, requiring an optimal solution from researchers. To overcome the shortcomings of… More >

  • Open AccessOpen Access

    ARTICLE

    Product Spacing of Stress–Strength under Progressive Hybrid Censored for Exponentiated-Gumbel Distribution

    R. Alshenawy1,2, Mohamed A. H. Sabry3, Ehab M. Almetwally4,*, Hisham M. Elomngy2
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2973-2995, 2021, DOI:10.32604/cmc.2021.014289
    Abstract Maximum product spacing for stress–strength model based on progressive Type-II hybrid censored samples with different cases has been obtained. This paper deals with estimation of the stress strength reliability model R = P(Y < X) when the stress and strength are two independent exponentiated Gumbel distribution random variables with different shape parameters but having the same scale parameter. The stress–strength reliability model is estimated under progressive Type-II hybrid censoring samples. Two progressive Type-II hybrid censoring schemes were used, Case I: A sample size of stress is the equal sample size of strength, and same time of hybrid censoring, the product… More >

  • Open AccessOpen Access

    ARTICLE

    A Formal Testing Model for Operating Room Control System Using Internet of Things

    Moez Krichen1, Seifeddine Mechti2, Roobaea Alroobaea3, Elyes Said4, Parminder Singh5, Osamah Ibrahim Khalaf6, Mehedi Masud3,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2997-3011, 2021, DOI:10.32604/cmc.2021.014090
    Abstract Technological advances in recent years have significantly changed the way an operating room works. This work aims to create a platform to solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations. Using this system, a doctor can control all operation rooms, especially before an operation, and monitor their temperature and humidity to prepare for the operation. Also, in the event of a problem, an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved. The platform is tested using… More >

  • Open AccessOpen Access

    ARTICLE

    A New Class of L-Moments Based Calibration Variance Estimators

    Usman Shahzad1,2,*, Ishfaq Ahmad1, Ibrahim Mufrah Almanjahie3,4, Nadia H. Al Noor5, Muhammad Hanif2
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3013-3028, 2021, DOI:10.32604/cmc.2021.014101
    Abstract Variance is one of the most important measures of descriptive statistics and commonly used for statistical analysis. The traditional second-order central moment based variance estimation is a widely utilized methodology. However, traditional variance estimator is highly affected in the presence of extreme values. So this paper initially, proposes two classes of calibration estimators based on an adaptation of the estimators recently proposed by Koyuncu and then presents a new class of L-Moments based calibration variance estimators utilizing L-Moments characteristics (L-location, L-scale, L-CV) and auxiliary information. It is demonstrated that the proposed L-Moments based calibration variance estimators are more efficient than… More >

  • Open AccessOpen Access

    ARTICLE

    Brainwave Classification for Character-Writing Application Using EMD-Based GMM and KELM Approaches

    Khomdet Phapatanaburi1, Kasidit kokkhunthod2, Longbiao Wang3, Talit Jumphoo2, Monthippa Uthansakul2, Anyaporn Boonmahitthisud4, Peerapong Uthansakul2,*
    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3029-3044, 2021, DOI:10.32604/cmc.2021.014433
    Abstract A brainwave classification, which does not involve any limb movement and stimulus for character-writing applications, benefits impaired people, in terms of practical communication, because it allows users to command a device/computer directly via electroencephalogram signals. In this paper, we propose a new framework based on Empirical Mode Decomposition (EMD) features along with the Gaussian Mixture Model (GMM) and Kernel Extreme Learning Machine (KELM)-based classifiers. For this purpose, firstly, we introduce EMD to decompose EEG signals into Intrinsic Mode Functions (IMFs), which actually are used as the input features of the brainwave classification for the character-writing application. We hypothesize that EMD… More >

Per Page:

Share Link