Home / Journals / CMC / Vol.70, No.3, 2022
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Polygonal Finite Element for Two-Dimensional Lid-Driven Cavity Flow

    T. Vu-Huu1, C. Le-Thanh2, H. Nguyen-Xuan3,4, M. Abdel-Wahab3,5,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4217-4239, 2022, DOI:10.32604/cmc.2022.020889
    Abstract This paper investigates a polygonal finite element (PFE) to solve a two-dimensional (2D) incompressible steady fluid problem in a cavity square. It is a well-known standard benchmark (i.e., lid-driven cavity flow)-to evaluate the numerical methods in solving fluid problems controlled by the Navier–Stokes (N–S) equation system. The approximation solutions provided in this research are based on our developed equal-order mixed PFE, called Pe1Pe1. It is an exciting development based on constructing the mixed scheme method of two equal-order discretisation spaces for both fluid pressure and velocity fields of flows and our proposed stabilisation technique. In this research, to handle the… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks

    Abrar M. Alajlan*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4241-4259, 2022, DOI:10.32604/cmc.2022.020585
    Abstract Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over the wireless sensor networks (WSNs). Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs. The distributed passive nature of these attacks makes them enormously challenging to detect. The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment. And further to detect the serious routing-disruption attack “Wormhole Attack” step by step through the different network mechanisms. In this paper, a… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML

    S. Ranjithkumar1,*, S. Chenthur Pandian2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4261-4277, 2022, DOI:10.32604/cmc.2022.019031
    Abstract The growth of cloud in modern technology is drastic by provisioning services to various industries where data security is considered to be common issue that influences the intrusion detection system (IDS). IDS are considered as an essential factor to fulfill security requirements. Recently, there are diverse Machine Learning (ML) approaches that are used for modeling effectual IDS. Most IDS are based on ML techniques and categorized as supervised and unsupervised. However, IDS with supervised learning is based on labeled data. This is considered as a common drawback and it fails to identify the attack patterns. Similarly, unsupervised learning fails to… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Detection and Classification of Human Knee Osteoarthritis Using Convolutional Neural Networks

    Mohamed Yacin Sikkandar1,*, S. Sabarunisha Begum2, Abdulaziz A. Alkathiry3, Mashhor Shlwan N. Alotaibi1, Md Dilsad Manzar4
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4279-4291, 2022, DOI:10.32604/cmc.2022.020571
    Abstract Knee Osteoarthritis (KOA) is a degenerative knee joint disease caused by ‘wear and tear’ of ligaments between the femur and tibial bones. Clinically, KOA is classified into four grades ranging from 1 to 4 based on the degradation of the ligament in between these two bones and causes suffering from impaired movement. Identifying this space between bones through the anterior view of a knee X-ray image is solely subjective and challenging. Automatic classification of this process helps in the selection of suitable treatment processes and customized knee implants. In this research, a new automatic classification of KOA images based on… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Proxy Blind Signcryption Scheme for IoT

    Aamer Khan1, Insaf Ullah2,*, Fahad Algarni3, Muhammad Naeem1, M. Irfan Uddin4, Muhammad Asghar Khan2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4293-4306, 2022, DOI:10.32604/cmc.2022.017318
    (This article belongs to this Special Issue: Deep Learning and Parallel Computing for Intelligent and Efficient IoT)
    Abstract Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry 4.0, agriculture, ecological data management, and other various domains. IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages. However, due to the wide-open nature of the Internet, it is important to ensure the anonymity, untraceably, confidentiality, and unforgeability of communication with efficient computational complexity and low bandwidth. We designed a light weight and secure proxy blind signcryption for multi-digital messages based… More >

  • Open AccessOpen Access

    An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments

    Insaf Ullah1,*, Hira Zahid2 , Fahad Algarni3, Muhammad Asghar Khan1
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4307-4321, 2022, DOI:10.32604/cmc.2022.017380
    (This article belongs to this Special Issue: Machine Learning for Data Analytics)
    Abstract

    When the Wireless Sensor Network (WSN) is combined with the Internet of Things (IoT), it can be employed in a wide range of applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing the big data generated by these applications in Cloud Servers (CSs), requires higher levels of authenticity and confidentiality during communication conducted through the Internet. Signcryption is one of the most promising approaches nowadays for overcoming such obstacles, due to its combined nature, i.e., signature and encryption. A number of researchers have developed schemes to address issues related to access control in the IoT literature,… More >

  • Open AccessOpen Access

    ARTICLE

    An Intent-Driven Closed-Loop Platform for 5G Network Service Orchestration

    Talha Ahmed Khan, Khizar Abbas, Afaq Muhammad, Wang-Cheol Song*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4323-4340, 2022, DOI:10.32604/cmc.2022.017118
    (This article belongs to this Special Issue: Intelligent Software-defined Networking (SDN) Technologies for Future Generation Networks)
    Abstract The scope of the 5G network is not only limited to the enhancements in the form of the quality of service (QoS), but it also includes a wide range of services with various requirements. Besides this, many approaches and platforms are under the umbrella of 5G to achieve the goals of end-to-end service provisioning. However, the management of multiple services over heterogeneous platforms is a complex task. Each platform and service have various requirements to be handled by domain experts. Still, if the next-generation network management is dependent on manual updates, it will become impossible to provide seamless service provisioning… More >

  • Open AccessOpen Access

    ARTICLE

    Simulation of Non-Isothermal Turbulent Flows Through Circular Rings of Steel

    Abid. A. Memon1, M. Asif Memon1, Kaleemullah Bhatti1, Kamsing Nonlaopon2,*, Ilyas Khan3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4341-4355, 2022, DOI:10.32604/cmc.2022.019407
    (This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
    Abstract This article is intended to examine the fluid flow patterns and heat transfer in a rectangular channel embedded with three semi-circular cylinders comprised of steel at the boundaries. Such an organization is used to generate the heat exchangers with tube and shell because of the production of more turbulence due to zigzag path which is in favor of rapid heat transformation. Because of little maintenance, the heat exchanger of such type is extensively used. Here, we generate simulation of flow and heat transfer using non-isothermal flow interface in the Comsol multiphysics 5.4 which executes the Reynolds averaged Navier stokes equation… More >

  • Open AccessOpen Access

    ARTICLE

    Ensembles of Deep Learning Framework for Stomach Abnormalities Classification

    Talha Saeed, Chu Kiong Loo*, Muhammad Shahreeza Safiruz Kassim
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4357-4372, 2022, DOI:10.32604/cmc.2022.019076
    (This article belongs to this Special Issue: Recent Advances in Deep Learning for Medical Image Analysis)
    Abstract

    Abnormalities of the gastrointestinal tract are widespread worldwide today. Generally, an effective way to diagnose these life-threatening diseases is based on endoscopy, which comprises a vast number of images. However, the main challenge in this area is that the process is time-consuming and fatiguing for a gastroenterologist to examine every image in the set. Thus, this led to the rise of studies on designing AI-based systems to assist physicians in the diagnosis. In several medical imaging tasks, deep learning methods, especially convolutional neural networks (CNNs), have contributed to the state-of-the-art outcomes, where the complicated nonlinear relation between target classes and… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Deep CNN Model for COVID-19 Classification

    Walid El-Shafai1,2,*, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Mohammed Abd-Elnaby3, Fathi E. Abd El-Samie1,4
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4373-4391, 2022, DOI:10.32604/cmc.2022.019354
    Abstract Coronavirus (COVID-19) infection was initially acknowledged as a global pandemic in Wuhan in China. World Health Organization (WHO) stated that the COVID-19 is an epidemic that causes a 3.4% death rate. Chest X-Ray (CXR) and Computerized Tomography (CT) screening of infected persons are essential in diagnosis applications. There are numerous ways to identify positive COVID-19 cases. One of the fundamental ways is radiology imaging through CXR, or CT images. The comparison of CT and CXR scans revealed that CT scans are more effective in the diagnosis process due to their high quality. Hence, automated classification techniques are required to facilitate… More >

Per Page:

Share Link

WeChat scan