Home / Journals / CMC / Vol.69, No.2, 2021
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Classification of Epileptic Electroencephalograms Using Time-Frequency and Back Propagation Methods

    Sengul Bayrak1,2,*, Eylem Yucel2, Hidayet Takci3, Ruya Samli2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1427-1446, 2021, DOI:10.32604/cmc.2021.015524
    (This article belongs to this Special Issue: Intelligent Decision Support Systems for Complex Healthcare Applications)
    Abstract Today, electroencephalography is used to measure brain activity by creating signals that are viewed on a monitor. These signals are frequently used to obtain information about brain neurons and may detect disorders that affect the brain, such as epilepsy. Electroencephalogram (EEG) signals are however prone to artefacts. These artefacts must be removed to obtain accurate and meaningful signals. Currently, computer-aided systems have been used for this purpose. These systems provide high computing power, problem-specific development, and other advantages. In this study, a new clinical decision support system was developed for individuals to detect epileptic seizures using EEG signals. Comprehensive classification… More >

  • Open AccessOpen Access

    ARTICLE

    ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network

    Sundresan Perumal1, Mujahid Tabassum1, Ganthan Narayana2, Suresh Ponnan3,*, Chinmay Chakraborty4, Saju Mohanan5, Zeeshan Basit5, Mohammad Tabrez Quasim6
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1447-1462, 2021, DOI:10.32604/cmc.2021.014854
    (This article belongs to this Special Issue: Machine Learning for Data Analytics)
    Abstract A wireless sensor network (WSN) consists of several tiny sensor nodes to monitor, collect, and transmit the physical information from an environment through the wireless channel. The node failure is considered as one of the main issues in the WSN which creates higher packet drop, delay, and energy consumption during the communication. Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets. In this paper, Artificial Neural Network (ANN) based Node Failure Detection (NFD) is developed with cognitive radio for detecting the location of the node failure. The ad hoc on-demand distance vector (AODV)… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Implementation of Photovoltaic and Battery Energy Storage in Distribution Networks

    Hussein Abdel-Mawgoud1, Salah Kamel1, Hegazy Rezk2,3, Tahir Khurshaid4, Sang-Bong Rhee4,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1463-1481, 2021, DOI:10.32604/cmc.2021.017995
    Abstract Recently, implementation of Battery Energy Storage (BES) with photovoltaic (PV) array in distribution networks is becoming very popular in overall the world. Integrating PV alone in distribution networks generates variable output power during 24-hours as it depends on variable natural source. PV can be able to generate constant output power during 24-hours by installing BES with it. Therefore, this paper presents a new application of a recent metaheuristic algorithm, called Slime Mould Algorithm (SMA), to determine the best size, and location of photovoltaic alone or with battery energy storage in the radial distribution system (RDS). This algorithm is modeled from… More >

  • Open AccessOpen Access

    ARTICLE

    Development of a Smart Technique for Mobile Web Services Discovery

    Mohamed Eb-Saad1, Yunyoung Nam2,*, Hazem M. El-bakry1, Samir Abdelrazek1
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1483-1501, 2021, DOI:10.32604/cmc.2021.017783
    (This article belongs to this Special Issue: Blockchain Driven Secure Cyber-Physical Systems)
    Abstract Web service (WS) presents a good solution to the interoperability of different types of systems that aims to reduce the overhead of high processing in a resource-limited environment. With the increasing demand for mobile WS (MWS), the WS discovery process has become a significant challenging point in the WS lifecycle that aims to identify the relevant MWSs that best match the service requests. This discovery process is a resource-consuming task that cannot be performed efficiently in a mobile computing environment due to the limitations of mobile devices. Meanwhile, a cloud computing can provide rich computing resources for mobile environments given… More >

  • Open AccessOpen Access

    ARTICLE

    Small Object Detection via Precise Region-Based Fully Convolutional Networks

    Dengyong Zhang1,2, Jiawei Hu1,2, Feng Li1,2,*, Xiangling Ding3, Arun Kumar Sangaiah4, Victor S. Sheng5
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1503-1517, 2021, DOI:10.32604/cmc.2021.017089
    Abstract In the past several years, remarkable achievements have been made in the field of object detection. Although performance is generally improving, the accuracy of small object detection remains low compared with that of large object detection. In addition, localization misalignment issues are common for small objects, as seen in GoogLeNets and residual networks (ResNets). To address this problem, we propose an improved region-based fully convolutional network (R-FCN). The presented technique improves detection accuracy and eliminates localization misalignment by replacing position-sensitive region of interest (PS-RoI) pooling with position-sensitive precise region of interest (PS-Pr-RoI) pooling, which avoids coordinate quantization and directly calculates… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques

    Fahd N. Al-Wesabi1,2,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1519-1536, 2021, DOI:10.32604/cmc.2021.018202
    Abstract In this paper, the text analysis-based approach RTADZWA (Reliable Text Analysis and Digital Zero-Watermarking Approach) has been proposed for transferring and receiving authentic English text via the internet. Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it. Text analysis and text zero-watermarking techniques have been integrated by… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel AlphaSRGAN for Underwater Image Super Resolution

    Aswathy K. Cherian*, E. Poovammal
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1537-1552, 2021, DOI:10.32604/cmc.2021.018213
    (This article belongs to this Special Issue: Computational Models for Pro-Smart Environments in Data Science Assisted IoT Systems)
    Abstract Obtaining clear images of underwater scenes with descriptive details is an arduous task. Conventional imaging techniques fail to provide clear cut features and attributes that ultimately result in object recognition errors. Consequently, a need for a system that produces clear images for underwater image study has been necessitated. To overcome problems in resolution and to make better use of the Super-Resolution (SR) method, this paper introduces a novel method that has been derived from the Alpha Generative Adversarial Network (AlphaGAN) model, named Alpha Super Resolution Generative Adversarial Network (AlphaSRGAN). The model put forth in this paper helps in enhancing the… More >

  • Open AccessOpen Access

    ARTICLE

    Location-Aware Personalized Traveler Recommender System (LAPTA) Using Collaborative Filtering KNN

    Mohanad Al-Ghobari1, Amgad Muneer2,*, Suliman Mohamed Fati3
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1553-1570, 2021, DOI:10.32604/cmc.2021.016348
    (This article belongs to this Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract Many tourists who travel to explore different cultures and cities worldwide aim to find the best tourist sites, accommodation, and food according to their interests. This objective makes it harder for tourists to decide and plan where to go and what to do. Aside from hiring a local guide, an option which is beyond most travelers’ budgets, the majority of sojourners nowadays use mobile devices to search for or recommend interesting sites on the basis of user reviews. Therefore, this work utilizes the prevalent recommender systems and mobile app technologies to overcome this issue. Accordingly, this study proposes location-aware personalized… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics

    Naglaa F. Soliman1,2, Abeer D. Algarni1,*, Walid El-Shafai3, Fathi E. Abd El-Samie1,3, Ghada M. El Banby4
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1571-1595, 2021, DOI:10.32604/cmc.2021.016980
    Abstract Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things (IoT) networks. The objective of using cancelable biometrics is to save the original ones from hacking attempts. A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications. The original biometric is blurred with two co-prime operators. Hence, it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions. Minimal changes if induced in the biometric… More >

  • Open AccessOpen Access

    ARTICLE

    A Time-Domain Comparator Based Skipping-Window SAR ADC

    Liangbo Xie1, Yan Ren1, Mu Zhou1, Xiaolong Yang1,*, Zhengwen Huang2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1597-1609, 2021, DOI:10.32604/cmc.2021.018502
    Abstract This paper presents an energy efficient successive-approximation register (SAR) analog-to-digital converter (ADC) for low-power applications. To improve the overall energy-efficiency, a skipping-window technique is used to bypass corresponding conversion steps when the input falls in a window indicated by a time-domain comparator, which can provide not only the polarity of the input, but also the amount information of the input. The time-domain comparator, which is based on the edge pursing principle, consists of delay cells, two NAND gates, two D-flip-flop register-based phase detectors and a counter. The digital characteristic of the comparator makes the design more flexible, and the comparator… More >

  • Open AccessOpen Access

    ARTICLE

    GUI-Based DL-Network Designer for KISTI’s Supercomputer Users

    Jaegwang Lee, Jongsuk R. Lee, Sunil Ahn*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1611-1629, 2021, DOI:10.32604/cmc.2021.016803
    (This article belongs to this Special Issue: Deep Learning Trends in Intelligent Systems)
    Abstract With the increase in research on AI (Artificial Intelligence), the importance of DL (Deep Learning) in various fields, such as materials, biotechnology, genomes, and new drugs, is increasing significantly, thereby increasing the number of deep-learning framework users. However, to design a deep neural network, a considerable understanding of the framework is required. To solve this problem, a GUI (Graphical User Interface)-based DNN (Deep Neural Network) design tool is being actively researched and developed. The GUI-based DNN design tool can design DNNs quickly and easily. However, the existing GUI-based DNN design tool has certain limitations such as poor usability, framework dependency,… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Fingerprinting Based Indoor Positioning Using Machine Learning

    Muhammad Waleed Pasha1, Mir Yasir Umair1, Alina Mirza1,*, Faizan Rao1, Abdul Wakeel1, Safia Akram1, Fazli Subhan2, Wazir Zada Khan3
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1631-1652, 2021, DOI:10.32604/cmc.2021.018205
    (This article belongs to this Special Issue: Reinforcement Learning Based solutions for Next-Generation Wireless Networks Coexistence)
    Abstract Due to the inability of the Global Positioning System (GPS) signals to penetrate through surfaces like roofs, walls, and other objects in indoor environments, numerous alternative methods for user positioning have been presented. Amongst those, the Wi-Fi fingerprinting method has gained considerable interest in Indoor Positioning Systems (IPS) as the need for line-of-sight measurements is minimal, and it achieves better efficiency in even complex indoor environments. Offline and online are the two phases of the fingerprinting method. Many researchers have highlighted the problems in the offline phase as it deals with huge datasets and validation of Fingerprints without pre-processing of… More >

  • Open AccessOpen Access

    ARTICLE

    Adapted Long Short-Term Memory (LSTM) for Concurrent\\ Human Activity Recognition

    Keshav Thapa, Zubaer Md. Abdhulla AI, Yang Sung-Hyun*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1653-1670, 2021, DOI:10.32604/cmc.2021.015660
    Abstract In this era, deep learning methods offer a broad spectrum of efficient and original algorithms to recognize or predict an output when given a sequence of inputs. In current trends, deep learning methods using recent long short-term memory (LSTM) algorithms try to provide superior performance, but they still have limited effectiveness when detecting sequences of complex human activity. In this work, we adapted the LSTM algorithm into a synchronous algorithm (sync-LSTM), enabling the model to take multiple parallel input sequences to produce multiple parallel synchronized output sequences. The proposed method is implemented for simultaneous human activity recognition (HAR) using heterogeneous… More >

  • Open AccessOpen Access

    ARTICLE

    Energy Optimization in Multi-UAV-Assisted Edge Data Collection System

    Bin Xu1,2,3, Lu Zhang1, Zipeng Xu1, Yichuan Liu1, Jinming Chai1, Sichong Qin4, Yanfei Sun1,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1671-1686, 2021, DOI:10.32604/cmc.2021.018395
    Abstract In the IoT (Internet of Things) system, the introduction of UAV (Unmanned Aerial Vehicle) as a new data collection platform can solve the problem that IoT devices are unable to transmit data over long distances due to the limitation of their battery energy. However, the unreasonable distribution of UAVs will still lead to the problem of the high total energy consumption of the system. In this work, to deal with the problem, a deployment model of a mobile edge computing (MEC) system based on multi-UAV is proposed. The goal of the model is to minimize the energy consumption of the… More >

  • Open AccessOpen Access

    ARTICLE

    Advanced Community Identification Model for Social Networks

    Farhan Amin1, Jin-Ghoo Choi2, Gyu Sang Choi2,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1687-1707, 2021, DOI:10.32604/cmc.2021.017870
    (This article belongs to this Special Issue: Big Data Analytics and Artificial Intelligence Techniques for Complex Systems)
    Abstract Community detection in social networks is a hard problem because of the size, and the need of a deep understanding of network structure and functions. While several methods with significant effort in this direction have been devised, an outstanding open problem is the unknown number of communities, it is generally believed that the role of influential nodes that are surrounded by neighbors is very important. In addition, the similarity among nodes inside the same cluster is greater than among nodes from other clusters. Lately, the global and local methods of community detection have been getting more attention. Therefore, in this… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic PV Grid Fault Detection System with IoT and LabVIEW as Data Logger

    Rohit Samkria1, Mohammed Abd-Elnaby2, Rajesh Singh3, Anita Gehlot3, Mamoon Rashid4,*, Moustafa H. Aly5, Walid El-Shafai6
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1709-1723, 2021, DOI:10.32604/cmc.2021.018525
    (This article belongs to this Special Issue: Big Data Analytics and Artificial Intelligence Techniques for Complex Systems)
    Abstract Fault detection of the photovoltaic (PV) grid is necessary to detect serious output power reduction to avoid PV modules’ damage. To identify the fault of the PV arrays, there is a necessity to implement an automatic system. In this IoT and LabVIEW-based automatic fault detection of 3 × 3 solar array, a PV system is proposed to control and monitor Internet connectivity remotely. Hardware component to automatically reconfigure the solar PV array from the series-parallel (SP) to the complete cross-linked array underneath partial shading conditions (PSC) is centered on the Atmega328 system to achieve maximum power. In the LabVIEW environment,… More >

  • Open AccessOpen Access

    ARTICLE

    EA-RDSP: Energy Aware Rapidly Deployable Wireless Ad hoc System for Post Disaster Management

    Ajmal Khan1, Mubashir Mukhtar1, Farman Ullah1, Muhammad Bilal2, Kyung-Sup Kwak3,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1725-1746, 2021, DOI:10.32604/cmc.2021.017952
    (This article belongs to this Special Issue: Green IoT Networks using Machine Learning, Deep Learning Models)
    Abstract In post disaster scenarios such as war zones floods and earthquakes, the cellular communication infrastructure can be lost or severely damaged. In such emergency situations, remaining in contact with other rescue response teams in order to provide inputs for both headquarters and disaster survivors becomes very necessary. Therefore, in this research work, a design, implementation and evaluation of energy aware rapidly deployable system named EA-RDSP is proposed. The proposed research work assists the early rescue workers and victims to transmit their location information towards the remotely located servers. In EA-RDSP, two algorithms are proposed i.e., Hop count Assignment (HCA) algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation

    Yong-Woon Hwang, Im-Yeong Lee*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1747-1764, 2021, DOI:10.32604/cmc.2021.018549
    Abstract Recently, with the advancement of Information and Communications Technology (ICT), Internet of Things (IoT) has been connected to the cloud and used in industrial sectors, medical environments, and smart grids. However, if data is transmitted in plain text when collecting data in an IoT-cloud environment, it can be exposed to various security threats such as replay attacks and data forgery. Thus, digital signatures are required. Data integrity is ensured when a user (or a device) transmits data using a signature. In addition, the concept of data aggregation is important to efficiently collect data transmitted from multiple users (or a devices)… More >

  • Open AccessOpen Access

    ARTICLE

    Outlier Detection of Mixed Data Based on Neighborhood Combinatorial Entropy

    Lina Wang1,2,*, Qixiang Zhang1, Xiling Niu1, Yongjun Ren3, Jinyue Xia4
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1765-1781, 2021, DOI:10.32604/cmc.2021.017516
    Abstract Outlier detection is a key research area in data mining technologies, as outlier detection can identify data inconsistent within a data set. Outlier detection aims to find an abnormal data size from a large data size and has been applied in many fields including fraud detection, network intrusion detection, disaster prediction, medical diagnosis, public security, and image processing. While outlier detection has been widely applied in real systems, its effectiveness is challenged by higher dimensions and redundant data attributes, leading to detection errors and complicated calculations. The prevalence of mixed data is a current issue for outlier detection algorithms. An… More >

  • Open AccessOpen Access

    ARTICLE

    Optimization of Sentiment Analysis Using Teaching-Learning Based Algorithm

    Abdullah Muhammad, Salwani Abdullah, Nor Samsiah Sani*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1783-1799, 2021, DOI:10.32604/cmc.2021.018593
    Abstract Feature selection and sentiment analysis are two common studies that are currently being conducted; consistent with the advancements in computing and growing the use of social media. High dimensional or large feature sets is a key issue in sentiment analysis as it can decrease the accuracy of sentiment classification and make it difficult to obtain the optimal subset of the features. Furthermore, most reviews from social media carry a lot of noise and irrelevant information. Therefore, this study proposes a new text-feature selection method that uses a combination of rough set theory (RST) and teaching-learning based optimization (TLBO), which is… More >

  • Open AccessOpen Access

    ARTICLE

    Towards Machine Learning Based Intrusion Detection in IoT Networks

    Nahida Islam1, Fahiba Farhin1, Ishrat Sultana1, M. Shamim Kaiser1, Md. Sazzadur Rahman1, Mufti Mahmud2, A. S. M. Sanwar Hosen3, Gi Hwan Cho3,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1801-1821, 2021, DOI:10.32604/cmc.2021.018466
    (This article belongs to this Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract The Internet of Things (IoT) integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience in many applications including healthcare, agriculture, supply chain, education, transportation and traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one of the most complicated issues on the IoT. Implementing security measures, including encryption, access control, and authentication for the IoT devices are ineffective in achieving security. In this paper, we identified various types of IoT threats and shallow (such as decision… More >

  • Open AccessOpen Access

    ARTICLE

    Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks

    Merna Gamal1, Hala M. Abbas2, Nour Moustafa3,*, Elena Sitnikova3, Rowayda A. Sadek1
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1823-1837, 2021, DOI:10.32604/cmc.2021.012877
    (This article belongs to this Special Issue: Security and Computing in Internet of Things)
    Abstract Intrusion Detection Systems (IDSs) have a great interest these days to discover complex attack events and protect the critical infrastructures of the Internet of Things (IoT) networks. Existing IDSs based on shallow and deep network architectures demand high computational resources and high volumes of data to establish an adaptive detection engine that discovers new families of attacks from the edge of IoT networks. However, attackers exploit network gateways at the edge using new attacking scenarios (i.e., zero-day attacks), such as ransomware and Distributed Denial of Service (DDoS) attacks. This paper proposes new IDS based on Few-Shot Deep Learning, named CNN-IDS,… More >

  • Open AccessOpen Access

    ARTICLE

    A 3D Measurement Method Based on Coded Image

    Jinxing Niu1,*, Yayun Fu1, Qingsheng Hu1, Shaojie Yang1, Tao Zhang1, Sunil Kumar Jha2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1839-1849, 2021, DOI:10.32604/cmc.2021.017797
    Abstract The binocular stereo vision system is often used to reconstruct 3D point clouds of an object. However, it is challenging to find effective matching points in two object images with similar color or less texture. This will lead to mismatching by using the stereo matching algorithm to calculate the disparity map. In this context, the object can’t be reconstructed precisely. As a countermeasure, this study proposes to combine the Gray code fringe projection with the binocular camera as well as to generate denser point clouds by projecting an active light source to increase the texture of the object, which greatly… More >

  • Open AccessOpen Access

    ARTICLE

    Mathematical Morphology-Based Artificial Technique for Renewable Power Application

    Buddhadeva Sahoo1,*, Sangram Keshari Routray2, Pravat Kumar Rout2, Mohammed M. Alhaider3
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1851-1875, 2021, DOI:10.32604/cmc.2021.018535
    Abstract This paper suggests a combined novel control strategy for DFIG based wind power systems (WPS) under both nonlinear and unbalanced load conditions. The combined control approach is designed by coordinating the machine side converter (MSC) and the load side converter (LSC) control approaches. The proposed MSC control approach is designed by using a model predictive control (MPC) approach to generate appropriate real and reactive power. The MSC controller selects an appropriate rotor voltage vector by using a minimized optimization cost function for the converter operation. It shows its superiority by eliminating the requirement of transformation, switching table, and the PWM… More >

  • Open AccessOpen Access

    ARTICLE

    AF-Net: A Medical Image Segmentation Network Based on Attention Mechanism and Feature Fusion

    Guimin Hou1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Neal N. Xiong2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1877-1891, 2021, DOI:10.32604/cmc.2021.017481
    Abstract Medical image segmentation is an important application field of computer vision in medical image processing. Due to the close location and high similarity of different organs in medical images, the current segmentation algorithms have problems with mis-segmentation and poor edge segmentation. To address these challenges, we propose a medical image segmentation network (AF-Net) based on attention mechanism and feature fusion, which can effectively capture global information while focusing the network on the object area. In this approach, we add dual attention blocks (DA-block) to the backbone network, which comprises parallel channels and spatial attention branches, to adaptively calibrate and weigh… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Error Curve Learning Ensemble Model for Improving Energy Consumption Forecasting

    Prince Waqas Khan, Yung-Cheol Byun*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1893-1913, 2021, DOI:10.32604/cmc.2021.018523
    (This article belongs to this Special Issue: Emerging Trends in Artificial Intelligence and Machine Learning)
    Abstract Despite the advancement within the last decades in the field of smart grids, energy consumption forecasting utilizing the metrological features is still challenging. This paper proposes a genetic algorithm-based adaptive error curve learning ensemble (GA-ECLE) model. The proposed technique copes with the stochastic variations of improving energy consumption forecasting using a machine learning-based ensembled approach. A modified ensemble model based on a utilizing error of model as a feature is used to improve the forecast accuracy. This approach combines three models, namely CatBoost (CB), Gradient Boost (GB), and Multilayer Perceptron (MLP). The ensembled CB-GB-MLP model’s inner mechanism consists of generating… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Framework for Multi-Classification of Guava Disease

    Omar Almutiry1, Muhammad Ayaz2, Tariq Sadad3, Ikram Ullah Lali4, Awais Mahmood1,*, Najam Ul Hassan5, Habib Dhahri1
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1915-1926, 2021, DOI:10.32604/cmc.2021.017702
    (This article belongs to this Special Issue: Artificial Intelligence based Smart precision agriculture with analytic pattern in sustainable environments using IoT)
    Abstract Guava is one of the most important fruits in Pakistan, and is gradually boosting the economy of Pakistan. Guava production can be interrupted due to different diseases, such as anthracnose, algal spot, fruit fly, styler end rot and canker. These diseases are usually detected and identified by visual observation, thus automatic detection is required to assist formers. In this research, a new technique was created to detect guava plant diseases using image processing techniques and computer vision. An automated system is developed to support farmers to identify major diseases in guava. We collected healthy and unhealthy images of different guava… More >

  • Open AccessOpen Access

    ARTICLE

    Image Authenticity Detection Using DWT and Circular Block-Based LTrP Features

    Marriam Nawaz1, Zahid Mehmood2,*, Tahira Nazir1, Momina Masood1, Usman Tariq3, Asmaa Mahdi Munshi4, Awais Mehmood1, Muhammad Rashid5
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1927-1944, 2021, DOI:10.32604/cmc.2021.018052
    Abstract Copy-move forgery is the most common type of digital image manipulation, in which the content from the same image is used to forge it. Such manipulations are performed to hide the desired information. Therefore, forgery detection methods are required to identify forged areas. We have introduced a novel method for features computation by employing a circular block-based method through local tetra pattern (LTrP) features to detect the single and multiple copy-move attacks from the images. The proposed method is applied over the circular blocks to efficiently and effectively deal with the post-processing operations. It also uses discrete wavelet transform (DWT)… More >

  • Open AccessOpen Access

    ARTICLE

    Cluster Analysis for IR and NIR Spectroscopy: Current Practices to Future Perspectives

    Simon Crase1,2, Benjamin Hall2, Suresh N. Thennadil3,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1945-1965, 2021, DOI:10.32604/cmc.2021.018517
    Abstract Supervised machine learning techniques have become well established in the study of spectroscopy data. However, the unsupervised learning technique of cluster analysis hasn’t reached the same level maturity in chemometric analysis. This paper surveys recent studies which apply cluster analysis to NIR and IR spectroscopy data. In addition, we summarize the current practices in cluster analysis of spectroscopy and contrast these with cluster analysis literature from the machine learning and pattern recognition domain. This includes practices in data pre-processing, feature extraction, clustering distance metrics, clustering algorithms and validation techniques. Special consideration is given to the specific characteristics of IR and… More >

  • Open AccessOpen Access

    ARTICLE

    Driving Style Recognition System Using Smartphone Sensors Based on Fuzzy Logic

    Nidhi Kalra1,*, Raman Kumar Goyal1, Anshu Parashar1, Jaskirat Singh1, Gagan Singla2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1967-1978, 2021, DOI:10.32604/cmc.2021.018732
    (This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
    Abstract Every 24 seconds, someone dies on the road due to road accidents and it is the 8th leading cause of death and the first among children aged 15–29 years. 1.35 million people globally die every year due to road traffic crashes. An additional 20–50 million suffer from non-fatal injuries, often resulting in long-term disabilities. This costs around 3% of Gross Domestic Product to most countries, and it is a considerable economic loss. The governments have taken various measures such as better road infrastructures and strict enforcement of motor-vehicle laws to reduce these accidents. However, there is still no remarkable reduction… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Design of Antenna Arrays for the Smart Antenna Systems

    Fahd N. Al-Wesabi1,2,*, Murad A. A. Almekhlafi3, Huda G. Iskandar2,4, Adnan Zain5, Saleh Alzahrani6, Mohammed Alamgeer6, Nadhem Nemri6, Sami Dhabi6, Mohammad Medani6, Ali. M. Al-Sharafi2,7
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1979-1994, 2021, DOI:10.32604/cmc.2021.018390
    Abstract In recent years, there has been an increasing demand to improve cellular communication services in several aspects. The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas. this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation (MATLAB) which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides, ordinary End-fire, and increasing directivity End-fire which is typically used in smart antennas. The method of analysis… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis and Assessment of Wind Energy Potential of Al-Hodeidah in Yemen

    Fahd N. Al-Wesabi1,2,*, Murad A. Almekhlafi3, Mohammed Abdullah Al-Hagery4, Mohammad Alamgeer5, Khalid Mahmood5, Majdy M. Eltahir5, Ali M. Al-Sharafi2,6, Amin M. El-Kustaban7
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1995-2011, 2021, DOI:10.32604/cmc.2021.018644
    Abstract Renewable energy is one of the essential elements of the social and economic development in any civilized country. The use of fossil fuels and the non-renewable form of energy has many adverse effects on the most of ecosystems. Given the high potential of renewable energy sources in Yemen and the absence of similar studies in the region, this study aimed to examine the wind energy potential of Hodeidah-Yemen Republic by analyzing wind characteristics and assessment, determining the available power density, and calculate the wind energy extracted at different heights. The average wind speed of Hodeidah was obtained only for the… More >

  • Open AccessOpen Access

    ARTICLE

    Energy Efficient Cluster Based Clinical Decision Support System in IoT Environment

    C. Rajinikanth1, P. Selvaraj2, Mohamed Yacin Sikkandar3, T. Jayasankar4, Seifedine Kadry5, Yunyoung Nam6,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2013-2029, 2021, DOI:10.32604/cmc.2021.018719
    Abstract Internet of Things (IoT) has become a major technological development which offers smart infrastructure for the cloud-edge services by the interconnection of physical devices and virtual things among mobile applications and embedded devices. The e-healthcare application solely depends on the IoT and cloud computing environment, has provided several characteristics and applications. Prior research works reported that the energy consumption for transmission process is significantly higher compared to sensing and processing, which led to quick exhaustion of energy. In this view, this paper introduces a new energy efficient cluster enabled clinical decision support system (EEC-CDSS) for embedded IoT environment. The presented… More >

  • Open AccessOpen Access

    ARTICLE

    Diagnosis of Leukemia Disease Based on Enhanced Virtual Neural Network

    K. Muthumayil1, S. Manikandan2, S. Srinivasan3, José Escorcia-Gutierrez4,*, Margarita Gamarra5, Romany F. Mansour6
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2031-2044, 2021, DOI:10.32604/cmc.2021.017116
    Abstract White Blood Cell (WBC) cancer or leukemia is one of the serious cancers that threaten the existence of human beings. In spite of its prevalence and serious consequences, it is mostly diagnosed through manual practices. The risks of inappropriate, sub-standard and wrong or biased diagnosis are high in manual methods. So, there is a need exists for automatic diagnosis and classification method that can replace the manual process. Leukemia is mainly classified into acute and chronic types. The current research work proposed a computer-based application to classify the disease. In the feature extraction stage, we use excellent physical properties to… More >

  • Open AccessOpen Access

    ARTICLE

    ECC: Edge Collaborative Caching Strategy for Differentiated Services Load-Balancing

    Fang Liu1,*, Zhenyuan Zhang2, Zunfu Wang1, Yuting Xing3
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2045-2060, 2021, DOI:10.32604/cmc.2021.018303
    Abstract Due to the explosion of network data traffic and IoT devices, edge servers are overloaded and slow to respond to the massive volume of online requests. A large number of studies have shown that edge caching can solve this problem effectively. This paper proposes a distributed edge collaborative caching mechanism for Internet online request services scenario. It solves the problem of large average access delay caused by unbalanced load of edge servers, meets users’ differentiated service demands and improves user experience. In particular, the edge cache node selection algorithm is optimized, and a novel edge cache replacement strategy considering the… More >

  • Open AccessOpen Access

    ARTICLE

    Diagnosis of Neem Leaf Diseases Using Fuzzy-HOBINM and ANFIS Algorithms

    K. K. Thyagharajan, I. Kiruba Raji*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2061-2076, 2021, DOI:10.32604/cmc.2021.017591
    Abstract This paper proposes an approach to detecting diseases in neem leaf that uses a Fuzzy-Higher Order Biologically Inspired Neuron Model (F-HOBINM) and adaptive neuro classifier (ANFIS). India exports USD 0.28-million worth of neem leaf to the UK, USA, UAE, and Europe in the form of dried leaves and powder, both of which help reduce diabetes-related issues, cardiovascular problems, and eye disorders. Diagnosing neem leaf disease is difficult through visual interpretation, owing to similarity in their color and texture patterns. The most common diseases include bacterial blight, Colletotrichum and Alternaria leaf spot, blight, damping-off, powdery mildew, Pseudocercospora leaf spot, leaf web… More >

  • Open AccessOpen Access

    ARTICLE

    Predicting the Need for ICU Admission in COVID-19 Patients Using XGBoost

    Mohamed Ezz1,2,*, Murtada K. Elbashir1,3, Hosameldeen Shabana4,5
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2077-2092, 2021, DOI:10.32604/cmc.2021.018155
    (This article belongs to this Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract It is important to determine early on which patients require ICU admissions in managing COVID-19 especially when medical resources are limited. Delay in ICU admissions is associated with negative outcomes such as mortality and cost. Therefore, early identification of patients with a high risk of respiratory failure can prevent complications, enhance risk stratification, and improve the outcomes of severely-ill hospitalized patients. In this paper, we develop a model that uses the characteristics and information collected at the time of patients’ admissions and during their early period of hospitalization to accurately predict whether they will need ICU admissions. We use the… More >

  • Open AccessOpen Access

    ARTICLE

    Brain Tumour Detection by Gamma DeNoised Wavelet Segmented Entropy Classifier

    Simy Mary Kurian1, Sujitha Juliet Devaraj1,*, Vinodh P. Vijayan2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2093-2109, 2021, DOI:10.32604/cmc.2021.018090
    (This article belongs to this Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract Magnetic resonance imaging (MRI) is an essential tool for detecting brain tumours. However, identification of brain tumours in the early stages is a very complex task since MRI images are susceptible to noise and other environmental obstructions. In order to overcome these problems, a Gamma MAP denoised Strömberg wavelet segmentation based on a maximum entropy classifier (GMDSWS-MEC) model is developed for efficient tumour detection with high accuracy and low time consumption. The GMDSWS-MEC model performs three steps, namely pre-processing, segmentation, and classification. Within the GMDSWS-MEC model, the Gamma MAP filter performs the pre-processing task and achieves a significant increase in… More >

  • Open AccessOpen Access

    ARTICLE

    An Adaptive Lasso Grey Model for Regional FDI Statistics Prediction

    Juan Huang1, Bifang Zhou1, Huajun Huang2,*, Jianjiang Liu1, Neal N. Xiong3
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2111-2121, 2021, DOI:10.32604/cmc.2021.016770
    Abstract To overcome the deficiency of traditional mathematical statistics methods, an adaptive Lasso grey model algorithm for regional FDI (foreign direct investment) prediction is proposed in this paper, and its validity is analyzed. Firstly, the characteristics of the FDI data in six provinces of Central China are generalized, and the mixture model's constituent variables of the Lasso grey problem as well as the grey model are defined. Next, based on the influencing factors of regional FDI statistics (mean values of regional FDI and median values of regional FDI), an adaptive Lasso grey model algorithm for regional FDI was established. Then, an… More >

  • Open AccessOpen Access

    ARTICLE

    Negotiation Based Combinatorial Double Auction Mechanism in Cloud Computing

    Zakir Ullah1, Asif Umer1, Mahdi Zaree2, Jamil Ahmad1, Faisal Alanazi3,*, Noor Ul Amin1, Arif Iqbal Umar1, Ali Imran Jehangiri1, Muhammad Adnan1
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2123-2140, 2021, DOI:10.32604/cmc.2021.015445
    Abstract Cloud computing is a demanding business platform for services related to the field of IT. The goal of cloud customers is to access resources at a sustainable price, while the goal of cloud suppliers is to maximize their services utilization. Previously, the customers would bid for every single resource type, which was a limitation of cloud resources allocation. To solve these issues, researchers have focused on a combinatorial auction in which the resources are offered by the providers in bundles so that the user bids for their required bundle. Still, in this allocation mechanism, some drawbacks need to be tackled,… More >

  • Open AccessOpen Access

    ARTICLE

    A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid

    Anhao Xiang, Jun Zheng*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2141-2158, 2021, DOI:10.32604/cmc.2021.018808
    Abstract Distribution feeder microgrid (DFM) built based on existing distributed feeder (DF), is a promising solution for modern microgrid. DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency. The information-centric networking (ICN) paradigm has shown a great potential to address the communication requirements of smart grid. However, the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks. Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks. In this paper, we propose a new… More >

  • Open AccessOpen Access

    ARTICLE

    Path Planning of Quadrotors in a Dynamic Environment Using a Multicriteria Multi-Verse Optimizer

    Raja Jarray1, Mujahed Al-Dhaifallah2,*, Hegazy Rezk3,4, Soufiene Bouallègue1,5
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2159-2180, 2021, DOI:10.32604/cmc.2021.018752
    Abstract Paths planning of Unmanned Aerial Vehicles (UAVs) in a dynamic environment is considered a challenging task in autonomous flight control design. In this work, an efficient method based on a Multi-Objective Multi-Verse Optimization (MOMVO) algorithm is proposed and successfully applied to solve the path planning problem of quadrotors with moving obstacles. Such a path planning task is formulated as a multicriteria optimization problem under operational constraints. The proposed MOMVO-based planning approach aims to lead the drone to traverse the shortest path from the starting point and the target without collision with moving obstacles. The vehicle moves to the next position… More >

  • Open AccessOpen Access

    ARTICLE

    Toward Robust Classifiers for PDF Malware Detection

    Marwan Albahar*, Mohammed Thanoon, Monaj Alzilai, Alaa Alrehily, Munirah Alfaar, Maimoona Algamdi, Norah Alassaf
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2181-2202, 2021, DOI:10.32604/cmc.2021.018260
    Abstract Malicious Portable Document Format (PDF) files represent one of the largest threats in the computer security space. Significant research has been done using handwritten signatures and machine learning based on detection via manual feature extraction. These approaches are time consuming, require substantial prior knowledge, and the list of features must be updated with each newly discovered vulnerability individually. In this study, we propose two models for PDF malware detection. The first model is a convolutional neural network (CNN) integrated into a standard deviation based regularization model to detect malicious PDF documents. The second model is a support vector machine (SVM)… More >

  • Open AccessOpen Access

    ARTICLE

    Face Age Estimation Based on CSLBP and Lightweight Convolutional Neural Network

    Yang Wang1, Ying Tian1,*, Ou Tian2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2203-2216, 2021, DOI:10.32604/cmc.2021.018709
    Abstract As the use of facial attributes continues to expand, research into facial age estimation is also developing. Because face images are easily affected by factors including illumination and occlusion, the age estimation of faces is a challenging process. This paper proposes a face age estimation algorithm based on lightweight convolutional neural network in view of the complexity of the environment and the limitations of device computing ability. Improving face age estimation based on Soft Stagewise Regression Network (SSR-Net) and facial images, this paper employs the Center Symmetric Local Binary Pattern (CSLBP) method to obtain the feature image and then combines… More >

  • Open AccessOpen Access

    ARTICLE

    Real-Time Violent Action Recognition Using Key Frames Extraction and Deep Learning

    Muzamil Ahmed1,2, Muhammad Ramzan3,4, Hikmat Ullah Khan2, Saqib Iqbal5, Muhammad Attique Khan6, Jung-In Choi7, Yunyoung Nam8,*, Seifedine Kadry9
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2217-2230, 2021, DOI:10.32604/cmc.2021.018103
    (This article belongs to this Special Issue: Recent Advances in Deep Learning, Information Fusion, and Features Selection for Video Surveillance Application)
    Abstract Violence recognition is crucial because of its applications in activities related to security and law enforcement. Existing semi-automated systems have issues such as tedious manual surveillances, which causes human errors and makes these systems less effective. Several approaches have been proposed using trajectory-based, non-object-centric, and deep-learning-based methods. Previous studies have shown that deep learning techniques attain higher accuracy and lower error rates than those of other methods. However, the their performance must be improved. This study explores the state-of-the-art deep learning architecture of convolutional neural networks (CNNs) and inception V4 to detect and recognize violence using video data. In the… More >

  • Open AccessOpen Access

    ARTICLE

    Towards a Dynamic Virtual IoT Network Based on User Requirements

    Faisal Mehmood1, Shabir Ahmad2,3, Israr Ullah1, Faisal Jamil1, DoHyeun Kim1,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2231-2244, 2021, DOI:10.32604/cmc.2021.017528
    (This article belongs to this Special Issue: Intelligent Software-defined Networking (SDN) Technologies for Future Generation Networks)
    Abstract The data being generated by the Internet of Things needs to be stored, monitored, and analyzed for maximum IoT resource utilization. Software Defined Networking has been extensively utilized to address issues such as heterogeneity and scalability. However, for small-scale IoT application, sometimes it is considered an inefficient approach. This paper proposes an alternate lightweight mechanism to the design and implementation of a dynamic virtual network based on user requirements. The key idea is to provide users a virtual interface that enables them to reconfigure the communication flow between the sensors and actuators at runtime. The throughput of the communication flow… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimal Lempel Ziv Markov Based Microarray Image Compression Algorithm

    R. Sowmyalakshmi1,*, Mohamed Ibrahim Waly2, Mohamed Yacin Sikkandar2, T. Jayasankar1, Sayed Sayeed Ahmad3, Rashmi Rani3, Suresh Chavhan4,5
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2245-2260, 2021, DOI:10.32604/cmc.2021.018636
    Abstract In the recent years, microarray technology gained attention for concurrent monitoring of numerous microarray images. It remains a major challenge to process, store and transmit such huge volumes of microarray images. So, image compression techniques are used in the reduction of number of bits so that it can be stored and the images can be shared easily. Various techniques have been proposed in the past with applications in different domains. The current research paper presents a novel image compression technique i.e., optimized Linde–Buzo–Gray (OLBG) with Lempel Ziv Markov Algorithm (LZMA) coding technique called OLBG-LZMA for compressing microarray images without any… More >

  • Open AccessOpen Access

    ARTICLE

    Design of Intelligent Mosquito Nets Based on Deep Learning Algorithms

    Yuzhen Liu1,3, Xiaoliang Wang1,*, Xinghui She1, Ming Yi1, Yuelong Li1, Frank Jiang2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2261-2276, 2021, DOI:10.32604/cmc.2021.015501
    Abstract An intelligent mosquito net employing deep learning has been one of the hotspots in the field of Internet of Things as it can reduce significantly the spread of pathogens carried by mosquitoes, and help people live well in mosquito-infested areas. In this study, we propose an intelligent mosquito net that can produce and transmit data through the Internet of Medical Things. In our method, decision-making is controlled by a deep learning model, and the proposed method uses infrared sensors and an array of pressure sensors to collect data. Moreover the ZigBee protocol is used to transmit the pressure map which… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning Applied to Problem-Solving in Medical Applications

    Mahmoud Ragab1,2, Ali Algarni3, Adel A. Bahaddad4, Romany F. Mansour5,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2277-2294, 2021, DOI:10.32604/cmc.2021.018000
    Abstract Physical health plays an important role in overall well-being of the human beings. It is the most observed dimension of health among others such as social, intellectual, emotional, spiritual and environmental dimensions. Due to exponential increase in the development of wireless communication techniques, Internet of Things (IoT) has effectively penetrated different aspects of human lives. Healthcare is one of the dynamic domains with ever-growing demands which can be met by IoT applications. IoT can be leveraged through several health service offerings such as remote health and monitoring services, aided living, personalized treatment, and so on. In this scenario, Deep Learning… More >

  • Open AccessOpen Access

    ARTICLE

    Lightweight Transfer Learning Models for Ultrasound-Guided Classification of COVID-19 Patients

    Mohamed Esmail Karar1,2, Omar Reyad1,3, Mohammed Abd-Elnaby4, Abdel-Haleem Abdel-Aty5,6, Marwa Ahmed Shouman7,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2295-2312, 2021, DOI:10.32604/cmc.2021.018671
    (This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
    Abstract Lightweight deep convolutional neural networks (CNNs) present a good solution to achieve fast and accurate image-guided diagnostic procedures of COVID-19 patients. Recently, advantages of portable Ultrasound (US) imaging such as simplicity and safe procedures have attracted many radiologists for scanning suspected COVID-19 cases. In this paper, a new framework of lightweight deep learning classifiers, namely COVID-LWNet is proposed to identify COVID-19 and pneumonia abnormalities in US images. Compared to traditional deep learning models, lightweight CNNs showed significant performance of real-time vision applications by using mobile devices with limited hardware resources. Four main lightweight deep learning models, namely MobileNets, ShuffleNets, MENet… More >

Per Page:

Share Link