Home / Journals / CMC / Vol.69, No.2, 2021
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Classification of Epileptic Electroencephalograms Using Time-Frequency and Back Propagation Methods

    Sengul Bayrak1,2,*, Eylem Yucel2, Hidayet Takci3, Ruya Samli2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1427-1446, 2021, DOI:10.32604/cmc.2021.015524
    (This article belongs to this Special Issue: Intelligent Decision Support Systems for Complex Healthcare Applications)
    Abstract Today, electroencephalography is used to measure brain activity by creating signals that are viewed on a monitor. These signals are frequently used to obtain information about brain neurons and may detect disorders that affect the brain, such as epilepsy. Electroencephalogram (EEG) signals are however prone to artefacts. These artefacts must be removed to obtain accurate and meaningful signals. Currently, computer-aided systems have been used for this purpose. These systems provide high computing power, problem-specific development, and other advantages. In this study, a new clinical decision support system was developed for individuals to detect epileptic seizures using EEG signals. Comprehensive classification… More >

  • Open AccessOpen Access

    ARTICLE

    ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network

    Sundresan Perumal1, Mujahid Tabassum1, Ganthan Narayana2, Suresh Ponnan3,*, Chinmay Chakraborty4, Saju Mohanan5, Zeeshan Basit5, Mohammad Tabrez Quasim6
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1447-1462, 2021, DOI:10.32604/cmc.2021.014854
    (This article belongs to this Special Issue: Machine Learning for Data Analytics)
    Abstract A wireless sensor network (WSN) consists of several tiny sensor nodes to monitor, collect, and transmit the physical information from an environment through the wireless channel. The node failure is considered as one of the main issues in the WSN which creates higher packet drop, delay, and energy consumption during the communication. Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets. In this paper, Artificial Neural Network (ANN) based Node Failure Detection (NFD) is developed with cognitive radio for detecting the location of the node failure. The ad hoc on-demand distance vector (AODV)… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Implementation of Photovoltaic and Battery Energy Storage in Distribution Networks

    Hussein Abdel-Mawgoud1, Salah Kamel1, Hegazy Rezk2,3, Tahir Khurshaid4, Sang-Bong Rhee4,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1463-1481, 2021, DOI:10.32604/cmc.2021.017995
    Abstract Recently, implementation of Battery Energy Storage (BES) with photovoltaic (PV) array in distribution networks is becoming very popular in overall the world. Integrating PV alone in distribution networks generates variable output power during 24-hours as it depends on variable natural source. PV can be able to generate constant output power during 24-hours by installing BES with it. Therefore, this paper presents a new application of a recent metaheuristic algorithm, called Slime Mould Algorithm (SMA), to determine the best size, and location of photovoltaic alone or with battery energy storage in the radial distribution system (RDS). This algorithm is modeled from… More >

  • Open AccessOpen Access

    ARTICLE

    Development of a Smart Technique for Mobile Web Services Discovery

    Mohamed Eb-Saad1, Yunyoung Nam2,*, Hazem M. El-bakry1, Samir Abdelrazek1
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1483-1501, 2021, DOI:10.32604/cmc.2021.017783
    (This article belongs to this Special Issue: Blockchain Driven Secure Cyber-Physical Systems)
    Abstract Web service (WS) presents a good solution to the interoperability of different types of systems that aims to reduce the overhead of high processing in a resource-limited environment. With the increasing demand for mobile WS (MWS), the WS discovery process has become a significant challenging point in the WS lifecycle that aims to identify the relevant MWSs that best match the service requests. This discovery process is a resource-consuming task that cannot be performed efficiently in a mobile computing environment due to the limitations of mobile devices. Meanwhile, a cloud computing can provide rich computing resources for mobile environments given… More >

  • Open AccessOpen Access

    ARTICLE

    Small Object Detection via Precise Region-Based Fully Convolutional Networks

    Dengyong Zhang1,2, Jiawei Hu1,2, Feng Li1,2,*, Xiangling Ding3, Arun Kumar Sangaiah4, Victor S. Sheng5
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1503-1517, 2021, DOI:10.32604/cmc.2021.017089
    Abstract In the past several years, remarkable achievements have been made in the field of object detection. Although performance is generally improving, the accuracy of small object detection remains low compared with that of large object detection. In addition, localization misalignment issues are common for small objects, as seen in GoogLeNets and residual networks (ResNets). To address this problem, we propose an improved region-based fully convolutional network (R-FCN). The presented technique improves detection accuracy and eliminates localization misalignment by replacing position-sensitive region of interest (PS-RoI) pooling with position-sensitive precise region of interest (PS-Pr-RoI) pooling, which avoids coordinate quantization and directly calculates… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques

    Fahd N. Al-Wesabi1,2,*
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1519-1536, 2021, DOI:10.32604/cmc.2021.018202
    Abstract In this paper, the text analysis-based approach RTADZWA (Reliable Text Analysis and Digital Zero-Watermarking Approach) has been proposed for transferring and receiving authentic English text via the internet. Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it. Text analysis and text zero-watermarking techniques have been integrated by… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel AlphaSRGAN for Underwater Image Super Resolution

    Aswathy K. Cherian*, E. Poovammal
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1537-1552, 2021, DOI:10.32604/cmc.2021.018213
    (This article belongs to this Special Issue: Computational Models for Pro-Smart Environments in Data Science Assisted IoT Systems)
    Abstract Obtaining clear images of underwater scenes with descriptive details is an arduous task. Conventional imaging techniques fail to provide clear cut features and attributes that ultimately result in object recognition errors. Consequently, a need for a system that produces clear images for underwater image study has been necessitated. To overcome problems in resolution and to make better use of the Super-Resolution (SR) method, this paper introduces a novel method that has been derived from the Alpha Generative Adversarial Network (AlphaGAN) model, named Alpha Super Resolution Generative Adversarial Network (AlphaSRGAN). The model put forth in this paper helps in enhancing the… More >

  • Open AccessOpen Access

    ARTICLE

    Location-Aware Personalized Traveler Recommender System (LAPTA) Using Collaborative Filtering KNN

    Mohanad Al-Ghobari1, Amgad Muneer2,*, Suliman Mohamed Fati3
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1553-1570, 2021, DOI:10.32604/cmc.2021.016348
    (This article belongs to this Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract Many tourists who travel to explore different cultures and cities worldwide aim to find the best tourist sites, accommodation, and food according to their interests. This objective makes it harder for tourists to decide and plan where to go and what to do. Aside from hiring a local guide, an option which is beyond most travelers’ budgets, the majority of sojourners nowadays use mobile devices to search for or recommend interesting sites on the basis of user reviews. Therefore, this work utilizes the prevalent recommender systems and mobile app technologies to overcome this issue. Accordingly, this study proposes location-aware personalized… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics

    Naglaa F. Soliman1,2, Abeer D. Algarni1,*, Walid El-Shafai3, Fathi E. Abd El-Samie1,3, Ghada M. El Banby4
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1571-1595, 2021, DOI:10.32604/cmc.2021.016980
    Abstract Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things (IoT) networks. The objective of using cancelable biometrics is to save the original ones from hacking attempts. A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications. The original biometric is blurred with two co-prime operators. Hence, it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions. Minimal changes if induced in the biometric… More >

  • Open AccessOpen Access

    ARTICLE

    A Time-Domain Comparator Based Skipping-Window SAR ADC

    Liangbo Xie1, Yan Ren1, Mu Zhou1, Xiaolong Yang1,*, Zhengwen Huang2
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1597-1609, 2021, DOI:10.32604/cmc.2021.018502
    Abstract This paper presents an energy efficient successive-approximation register (SAR) analog-to-digital converter (ADC) for low-power applications. To improve the overall energy-efficiency, a skipping-window technique is used to bypass corresponding conversion steps when the input falls in a window indicated by a time-domain comparator, which can provide not only the polarity of the input, but also the amount information of the input. The time-domain comparator, which is based on the edge pursing principle, consists of delay cells, two NAND gates, two D-flip-flop register-based phase detectors and a counter. The digital characteristic of the comparator makes the design more flexible, and the comparator… More >

Per Page:

Share Link

WeChat scan