Open Access
ARTICLE
T. Vu-Huu1, C. Le-Thanh2, H. Nguyen-Xuan3,4, M. Abdel-Wahab3,5,*
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4217-4239, 2022, DOI:10.32604/cmc.2022.020889
Abstract This paper investigates a polygonal finite element (PFE) to solve a two-dimensional (2D) incompressible steady fluid problem in a cavity square. It is a well-known standard benchmark (i.e., lid-driven cavity flow)-to evaluate the numerical methods in solving fluid problems controlled by the Navier–Stokes (N–S) equation system. The approximation solutions provided in this research are based on our developed equal-order mixed PFE, called Pe1Pe1. It is an exciting development based on constructing the mixed scheme method of two equal-order discretisation spaces for both fluid pressure and velocity fields of flows and our proposed stabilisation technique. In this research, to handle the… More >
Open Access
ARTICLE
Abrar M. Alajlan*
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4241-4259, 2022, DOI:10.32604/cmc.2022.020585
Abstract Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over the wireless sensor networks (WSNs). Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs. The distributed passive nature of these attacks makes them enormously challenging to detect. The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment. And further to detect the serious routing-disruption attack “Wormhole Attack” step by step through the different network mechanisms. In this paper, a… More >
Open Access
ARTICLE
S. Ranjithkumar1,*, S. Chenthur Pandian2
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4261-4277, 2022, DOI:10.32604/cmc.2022.019031
Abstract The growth of cloud in modern technology is drastic by provisioning services to various industries where data security is considered to be common issue that influences the intrusion detection system (IDS). IDS are considered as an essential factor to fulfill security requirements. Recently, there are diverse Machine Learning (ML) approaches that are used for modeling effectual IDS. Most IDS are based on ML techniques and categorized as supervised and unsupervised. However, IDS with supervised learning is based on labeled data. This is considered as a common drawback and it fails to identify the attack patterns. Similarly, unsupervised learning fails to… More >
Open Access
ARTICLE
Mohamed Yacin Sikkandar1,*, S. Sabarunisha Begum2, Abdulaziz A. Alkathiry3, Mashhor Shlwan N. Alotaibi1, Md Dilsad Manzar4
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4279-4291, 2022, DOI:10.32604/cmc.2022.020571
Abstract Knee Osteoarthritis (KOA) is a degenerative knee joint disease caused by ‘wear and tear’ of ligaments between the femur and tibial bones. Clinically, KOA is classified into four grades ranging from 1 to 4 based on the degradation of the ligament in between these two bones and causes suffering from impaired movement. Identifying this space between bones through the anterior view of a knee X-ray image is solely subjective and challenging. Automatic classification of this process helps in the selection of suitable treatment processes and customized knee implants. In this research, a new automatic classification of KOA images based on… More >
Open Access
ARTICLE
Aamer Khan1, Insaf Ullah2,*, Fahad Algarni3, Muhammad Naeem1, M. Irfan Uddin4, Muhammad Asghar Khan2
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4293-4306, 2022, DOI:10.32604/cmc.2022.017318
(This article belongs to this Special Issue: Deep Learning and Parallel Computing for Intelligent and Efficient IoT)
Abstract Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry 4.0, agriculture, ecological data management, and other various domains. IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages. However, due to the wide-open nature of the Internet, it is important to ensure the anonymity, untraceably, confidentiality, and unforgeability of communication with efficient computational complexity and low bandwidth. We designed a light weight and secure proxy blind signcryption for multi-digital messages based… More >
Open Access
Insaf Ullah1,*, Hira Zahid2
, Fahad Algarni3, Muhammad Asghar Khan1
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4307-4321, 2022, DOI:10.32604/cmc.2022.017380
(This article belongs to this Special Issue: Machine Learning for Data Analytics)
Abstract
When the Wireless Sensor Network (WSN) is combined with the Internet of Things (IoT), it can be employed in a wide range of applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing the big data generated by these applications in Cloud Servers (CSs), requires higher levels of authenticity and confidentiality during communication conducted through the Internet. Signcryption is one of the most promising approaches nowadays for overcoming such obstacles, due to its combined nature, i.e., signature and encryption. A number of researchers have developed schemes to address issues related to access control in the IoT literature,… More >
Open Access
ARTICLE
Talha Ahmed Khan, Khizar Abbas, Afaq Muhammad, Wang-Cheol Song*
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4323-4340, 2022, DOI:10.32604/cmc.2022.017118
(This article belongs to this Special Issue: Intelligent Software-defined Networking (SDN) Technologies for Future Generation Networks)
Abstract The scope of the 5G network is not only limited to the enhancements in the form of the quality of service (QoS), but it also includes a wide range of services with various requirements. Besides this, many approaches and platforms are under the umbrella of 5G to achieve the goals of end-to-end service provisioning. However, the management of multiple services over heterogeneous platforms is a complex task. Each platform and service have various requirements to be handled by domain experts. Still, if the next-generation network management is dependent on manual updates, it will become impossible to provide seamless service provisioning… More >
Open Access
ARTICLE
Abid. A. Memon1, M. Asif Memon1, Kaleemullah Bhatti1, Kamsing Nonlaopon2,*, Ilyas Khan3
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4341-4355, 2022, DOI:10.32604/cmc.2022.019407
(This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
Abstract This article is intended to examine the fluid flow patterns and heat transfer in a rectangular channel embedded with three semi-circular cylinders comprised of steel at the boundaries. Such an organization is used to generate the heat exchangers with tube and shell because of the production of more turbulence due to zigzag path which is in favor of rapid heat transformation. Because of little maintenance, the heat exchanger of such type is extensively used. Here, we generate simulation of flow and heat transfer using non-isothermal flow interface in the Comsol multiphysics 5.4 which executes the Reynolds averaged Navier stokes equation… More >
Open Access
ARTICLE
Talha Saeed, Chu Kiong Loo*, Muhammad Shahreeza Safiruz Kassim
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4357-4372, 2022, DOI:10.32604/cmc.2022.019076
(This article belongs to this Special Issue: Recent Advances in Deep Learning for Medical Image Analysis)
Abstract
Abnormalities of the gastrointestinal tract are widespread worldwide today. Generally, an effective way to diagnose these life-threatening diseases is based on endoscopy, which comprises a vast number of images. However, the main challenge in this area is that the process is time-consuming and fatiguing for a gastroenterologist to examine every image in the set. Thus, this led to the rise of studies on designing AI-based systems to assist physicians in the diagnosis. In several medical imaging tasks, deep learning methods, especially convolutional neural networks (CNNs), have contributed to the state-of-the-art outcomes, where the complicated nonlinear relation between target classes and… More >
Open Access
ARTICLE
Walid El-Shafai1,2,*, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Mohammed Abd-Elnaby3, Fathi E. Abd El-Samie1,4
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4373-4391, 2022, DOI:10.32604/cmc.2022.019354
Abstract Coronavirus (COVID-19) infection was initially acknowledged as a global pandemic in Wuhan in China. World Health Organization (WHO) stated that the COVID-19 is an epidemic that causes a 3.4% death rate. Chest X-Ray (CXR) and Computerized Tomography (CT) screening of infected persons are essential in diagnosis applications. There are numerous ways to identify positive COVID-19 cases. One of the fundamental ways is radiology imaging through CXR, or CT images. The comparison of CT and CXR scans revealed that CT scans are more effective in the diagnosis process due to their high quality. Hence, automated classification techniques are required to facilitate… More >