Home / Journals / CMC / Vol.70, No.3, 2022
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Design of Latency-Aware IoT Modules in Heterogeneous Fog-Cloud Computing Networks

    Syed Rizwan Hassan1, Ishtiaq Ahmad1, Jamel Nebhen2, Ateeq Ur Rehman3, Muhammad Shafiq4, Jin-Ghoo Choi4,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6057-6072, 2022, DOI:10.32604/cmc.2022.020428
    Abstract The modern paradigm of the Internet of Things (IoT) has led to a significant increase in demand for latency-sensitive applications in Fog-based cloud computing. However, such applications cannot meet strict quality of service (QoS) requirements. The large-scale deployment of IoT requires more effective use of network infrastructure to ensure QoS when processing big data. Generally, cloud-centric IoT application deployment involves different modules running on terminal devices and cloud servers. Fog devices with different computing capabilities must process the data generated by the end device, so deploying latency-sensitive applications in a heterogeneous fog computing environment is a difficult task. In addition,… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Pneumonia Model via Efficient Computing Techniques

    Kamaledin Abodayeh1, Ali Raza2,3,*, Muhammad Rafiq4, Muhammad Shoaib Arif5, Muhammad Naveed5, Zunir Zeb3, Syed Zaheer Abbas3, Kiran Shahzadi3, Sana Sarwar3, Qasim Naveed3, Badar Ul Zaman3, Muhammad Mohsin6
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6073-6088, 2022, DOI:10.32604/cmc.2022.020732
    (This article belongs to the Special Issue: Emerging Trends and Real-World Applications of Intelligent Computing Techniques)
    Abstract Pneumonia is a highly transmissible disease in children. According to the World Health Organization (WHO), the most affected regions include south Asia and sub-Saharan Africa. Worldwide, 15% of pediatric deaths can be attributed to pneumonia. Computing techniques have a significant role in science, engineering, and many other fields. In this study, we focused on the efficiency of numerical techniques via computer programs. We studied the dynamics of the pneumonia-like infections of epidemic models using numerical techniques. We discuss two types of analysis: dynamical and numerical. The dynamical analysis included positivity, boundedness, local stability, reproduction number, and equilibria of the model.… More >

  • Open AccessOpen Access

    ARTICLE

    Incentive-Driven Approach for Misbehavior Avoidance in Vehicular Networks

    Shahid Sultan1, Qaisar Javaid1, Eid Rehman2,*, Ahmad Aziz Alahmadi3, Nasim Ullah3, Wakeel Khan4
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6089-6106, 2022, DOI:10.32604/cmc.2022.021374
    Abstract For efficient and robust information exchange in the vehicular ad-hoc network, a secure and trusted incentive reward is needed to avoid and reduce the intensity of misbehaving nodes and congestion especially in the case where the periodic beacons exploit the channel. In addition, we cannot be sure that all vehicular nodes eagerly share their communication assets to the system for message dissemination without any rewards. Unfortunately, there may be some misbehaving nodes and due to their selfish and greedy approach, these nodes may not help others on the network. To deal with this challenge, trust-based misbehavior avoidance schemes are generally… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Deep-Learning-Based Autoencoder Denoising Approach for Medical Image Diagnosis

    Walid El-Shafai1, Samy Abd El-Nabi1,2, El-Sayed M. El-Rabaie1, Anas M. Ali1,2, Naglaa F. Soliman3,*, Abeer D. Algarni3, Fathi E. Abd El-Samie1,3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6107-6125, 2022, DOI:10.32604/cmc.2022.020698
    Abstract Effective medical diagnosis is dramatically expensive, especially in third-world countries. One of the common diseases is pneumonia, and because of the remarkable similarity between its types and the limited number of medical images for recent diseases related to pneumonia, the medical diagnosis of these diseases is a significant challenge. Hence, transfer learning represents a promising solution in transferring knowledge from generic tasks to specific tasks. Unfortunately, experimentation and utilization of different models of transfer learning do not achieve satisfactory results. In this study, we suggest the implementation of an automatic detection model, namely CADTra, to efficiently diagnose pneumonia-related diseases. This… More >

  • Open AccessOpen Access

    ARTICLE

    Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

    Mohamed Ali1, Ibrahim A. Abd El-Moghith2, Mohamed N. El-Derini3, Saad M. Darwish2,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6127-6140, 2022, DOI:10.32604/cmc.2022.021305
    Abstract Routing is a key function in Wireless Sensor Networks (WSNs) since it facilitates data transfer to base stations. Routing attacks have the potential to destroy and degrade the functionality of WSNs. A trustworthy routing system is essential for routing security and WSN efficiency. Numerous methods have been implemented to build trust between routing nodes, including the use of cryptographic methods and centralized routing. Nonetheless, the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities. At the moment, there is no effective way to avoid malicious node attacks. As a consequence… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System

    Bander Alzahrani1, Ahmed Barnawi1, Azeem Irshad2, Areej Alhothali1, Reem Alotaibi1, Muhammad Shafiq3,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6141-6158, 2022, DOI:10.32604/cmc.2022.020774
    Abstract Unmanned aerial vehicles (UAVs) have recently attracted widespread attention in civil and commercial applications. For example, UAVs (or drone) technology is increasingly used in crowd monitoring solutions due to its wider air footprint and the ability to capture data in real time. However, due to the open atmosphere, drones can easily be lost or captured by attackers when reporting information to the crowd management center. In addition, the attackers may initiate malicious detection to disrupt the crowd-sensing communication network. Therefore, security and privacy are one of the most significant challenges faced by drones or the Internet of Drones (IoD) that… More >

  • Open AccessOpen Access

    ARTICLE

    Data Wipe-Off Technique for Tracking Weak GPS Signals

    Dah-Jing Jwo*, Sheng-Feng Chiu
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6159-6176, 2022, DOI:10.32604/cmc.2022.020793
    Abstract In this paper, the data wipe-off (DWO) algorithm is incorporated into the vector tracking loop of the Global Positioning System (GPS) receiver for improving signal tracking performance. The navigation data, which contains information that is necessary to perform navigation computations, are binary phase-shift keying (BPSK) modulated onto the GPS carrier phase with the bit duration of 20 ms (i.e., 50 bits per second). To continuously track the satellite’s signal in weak signal environment, the DWO algorithm on the basis of pre-detection method is adopted to detect data bit sign reversal every 20 ms. Tracking accuracy of a weak GPS signal… More >

  • Open AccessOpen Access

    ARTICLE

    Ultra-wideband Frequency Selective Surface for Communication Applications

    Shahid Habib1, Ghaffer Iqbal Kiani2, Muhammad Fasih Uddin Butt1,3,*, Syed Muzahir Abbas4,5, Abdulah Jeza Aljohani2, Soon Xin Ng3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6177-6187, 2022, DOI:10.32604/cmc.2022.021644
    (This article belongs to the Special Issue: Advances in 5G Antenna Designs and Systems)
    Abstract A low-profile ultra-wideband (UWB) band-stop frequency selective surface (FSS) is designed for S-, C-, X- and Ku-bands communication applications. The FSS is constructed by using square and circular loop elements printed on the top and bottom sides of the RO3210 substrate. The FSS has been designed to reduce the electromagnetic interference (EMI) as well as to mitigate the harmful effects of electromagnetic radiation on the human body caused by different radio devices. The dimension and size of the UWB FSS have been reduced to 0.12 λ × 0.12 λ and 90%, respectively, as compared to the reported literature. The other… More >

  • Open AccessOpen Access

    ARTICLE

    Estimating Fuel-Efficient Air Plane Trajectories Using Machine Learning

    Jaiteg Singh1, Gaurav Goyal1, Farman Ali2, Babar Shah3, Sangheon Pack4,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6189-6204, 2022, DOI:10.32604/cmc.2022.021657
    (This article belongs to the Special Issue: Machine Learning Empowered Secure Computing for Intelligent Systems)
    Abstract Airline industry has witnessed a tremendous growth in the recent past. Percentage of people choosing air travel as first choice to commute is continuously increasing. Highly demanding and congested air routes are resulting in inadvertent delays, additional fuel consumption and high emission of greenhouse gases. Trajectory planning involves creation identification of cost-effective flight plans for optimal utilization of fuel and time. This situation warrants the need of an intelligent system for dynamic planning of optimized flight trajectories with least human intervention required. In this paper, an algorithm for dynamic planning of optimized flight trajectories has been proposed. The proposed algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    Educational Videos Subtitles’ Summarization Using Latent Dirichlet Allocation and Length Enhancement

    Sarah S. Alrumiah*, Amal A. Al-Shargabi
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6205-6221, 2022, DOI:10.32604/cmc.2022.021780
    (This article belongs to the Special Issue: Machine Learning Applications in Medical, Finance, Education and Cyber Security)
    Abstract Nowadays, people use online resources such as educational videos and courses. However, such videos and courses are mostly long and thus, summarizing them will be valuable. The video contents (visual, audio, and subtitles) could be analyzed to generate textual summaries, i.e., notes. Videos’ subtitles contain significant information. Therefore, summarizing subtitles is effective to concentrate on the necessary details. Most of the existing studies used Term Frequency–Inverse Document Frequency (TF-IDF) and Latent Semantic Analysis (LSA) models to create lectures’ summaries. This study takes another approach and applies Latent Dirichlet Allocation (LDA), which proved its effectiveness in document summarization. Specifically, the proposed… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Intelligence Enabled Apple Leaf Disease Classification for Precision Agriculture

    Fahd N. Al-Wesabi1,2,*, Amani Abdulrahman Albraikan3, Anwer Mustafa Hilal4, Majdy M. Eltahir1, Manar Ahmed Hamza4, Abu Sarwar Zamani4
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6223-6238, 2022, DOI:10.32604/cmc.2022.021299
    Abstract Precision agriculture enables the recent technological advancements in farming sector to observe, measure, and analyze the requirements of individual fields and crops. The recent developments of computer vision and artificial intelligence (AI) techniques find a way for effective detection of plants, diseases, weeds, pests, etc. On the other hand, the detection of plant diseases, particularly apple leaf diseases using AI techniques can improve productivity and reduce crop loss. Besides, earlier and precise apple leaf disease detection can minimize the spread of the disease. Earlier works make use of traditional image processing techniques which cannot assure high detection rate on apple… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Binary Emperor Penguin Optimizer for Feature Selection Tasks

    Minakshi Kalra1, Vijay Kumar2, Manjit Kaur3, Sahar Ahmed Idris4, Şaban Öztürk5, Hammam Alshazly6,*
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6239-6255, 2022, DOI:10.32604/cmc.2022.020682
    Abstract Nowadays, due to the increase in information resources, the number of parameters and complexity of feature vectors increases. Optimization methods offer more practical solutions instead of exact solutions for the solution of this problem. The Emperor Penguin Optimizer (EPO) is one of the highest performing meta-heuristic algorithms of recent times that imposed the gathering behavior of emperor penguins. It shows the superiority of its performance over a wide range of optimization problems thanks to its equal chance to each penguin and its fast convergence features. Although traditional EPO overcomes the optimization problems in continuous search space, many problems today shift… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks

    Mesfer Al Duhayyim1, Haya Mesfer Alshahrani2, Fahd N. Al-Wesabi3, Mohammed Alamgeer4, Anwer Mustafa Hilal5,*, Mohammed Rizwanullah5
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6257-6270, 2022, DOI:10.32604/cmc.2022.021212
    Abstract Cybersecurity encompasses various elements such as strategies, policies, processes, and techniques to accomplish availability, confidentiality, and integrity of resource processing, network, software, and data from attacks. In this scenario, the rising popularity of Online Social Networks (OSN) is under threat from spammers for which effective spam bot detection approaches should be developed. Earlier studies have developed different approaches for the detection of spam bots in OSN. But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning (DL) models needs to be explored. With this motivation, the current research article… More >

  • Open AccessOpen Access

    ARTICLE

    ATS: A Novel Time-Sharing CPU Scheduling Algorithm Based on Features Similarities

    Samih M. Mostafa1,*, Sahar Ahmed Idris2, Manjit Kaur3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6271-6288, 2022, DOI:10.32604/cmc.2022.021978
    (This article belongs to the Special Issue: Recent Advances in Metaheuristic Techniques and Their Real-World Applications)
    Abstract Minimizing time cost in time-shared operating systems is considered basic and essential task, and it is the most significant goal for the researchers who interested in CPU scheduling algorithms. Waiting time, turnaround time, and number of context switches are the most time cost criteria used to compare between CPU scheduling algorithms. CPU scheduling algorithms are divided into non-preemptive and preemptive. Round Robin (RR) algorithm is the most famous as it is the basis for all the algorithms used in time-sharing. In this paper, the authors proposed a novel CPU scheduling algorithm based on RR. The proposed algorithm is called Adjustable… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Intelligence Based Optimal Functional Link Neural Network for Financial Data Science

    Anwer Mustafa Hilal1, Hadeel Alsolai2, Fahd N. Al-Wesabi3, Mohammed Abdullah Al-Hagery4, Manar Ahmed Hamza1,*, Mesfer Al Duhayyim5
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6289-6304, 2022, DOI:10.32604/cmc.2022.021522
    Abstract In present digital era, data science techniques exploit artificial intelligence (AI) techniques who start and run small and medium-sized enterprises (SMEs) to have an impact and develop their businesses. Data science integrates the conventions of econometrics with the technological elements of data science. It make use of machine learning (ML), predictive and prescriptive analytics to effectively understand financial data and solve related problems. Smart technologies for SMEs enable allows the firm to get smarter with their processes and offers efficient operations. At the same time, it is needed to develop an effective tool which can assist small to medium sized… More >

  • Open AccessOpen Access

    ARTICLE

    Extremal Coalitions for Influence Games Through Swarm Intelligence-Based Methods

    Fabián Riquelme1,*, Rodrigo Olivares1, Francisco Muñoz1, Xavier Molinero3, Maria Serna2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6305-6321, 2022, DOI:10.32604/cmc.2022.021804
    (This article belongs to the Special Issue: Recent Advances in Metaheuristic Techniques and Their Real-World Applications)
    Abstract An influence game is a simple game represented over an influence graph (i.e., a labeled, weighted graph) on which the influence spread phenomenon is exerted. Influence games allow applying different properties and parameters coming from cooperative game theory to the contexts of social network analysis, decision-systems, voting systems, and collective behavior. The exact calculation of several of these properties and parameters is computationally hard, even for a small number of players. Two examples of these parameters are the length and the width of a game. The length of a game is the size of its smaller winning coalition, while the… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Based Intelligent Industrial Fault Diagnosis Model

    R. Surendran1,*, Osamah Ibrahim Khalaf2, Carlos Andres Tavera Romero3
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6323-6338, 2022, DOI:10.32604/cmc.2022.021716
    Abstract In the present industrial revolution era, the industrial mechanical system becomes incessantly highly intelligent and composite. So, it is necessary to develop data-driven and monitoring approaches for achieving quick, trustable, and high-quality analysis in an automated way. Fault diagnosis is an essential process to verify the safety and reliability operations of rotating machinery. The advent of deep learning (DL) methods employed to diagnose faults in rotating machinery by extracting a set of feature vectors from the vibration signals. This paper presents an Intelligent Industrial Fault Diagnosis using Sailfish Optimized Inception with Residual Network (IIFD-SOIR) Model. The proposed model operates on… More >

  • Open AccessOpen Access

    ARTICLE

    Swarm-Based Extreme Learning Machine Models for Global Optimization

    Mustafa Abdul Salam1,*, Ahmad Taher Azar2, Rana Hussien2
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6339-6363, 2022, DOI:10.32604/cmc.2022.020583
    (This article belongs to the Special Issue: Role of Machine Learning and Evolutionary Algorithms for Cancer Detection and Prediction)
    Abstract Extreme Learning Machine (ELM) is popular in batch learning, sequential learning, and progressive learning, due to its speed, easy integration, and generalization ability. While, Traditional ELM cannot train massive data rapidly and efficiently due to its memory residence, high time and space complexity. In ELM, the hidden layer typically necessitates a huge number of nodes. Furthermore, there is no certainty that the arrangement of weights and biases within the hidden layer is optimal. To solve this problem, the traditional ELM has been hybridized with swarm intelligence optimization techniques. This paper displays five proposed hybrid Algorithms “Salp Swarm Algorithm (SSA-ELM), Grasshopper… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Deep Learning Model for Emotion Classification in Tweets

    Chinu Singla1, Fahd N. Al-Wesabi2,3, Yash Singh Pathania1, Badria Sulaiman Alfurhood4, Anwer Mustafa Hilal5,*, Mohammed Rizwanullah5, Manar Ahmed Hamza5, Mohammad Mahzari6
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6365-6380, 2022, DOI:10.32604/cmc.2022.020480
    Abstract The task of automatically analyzing sentiments from a tweet has more use now than ever due to the spectrum of emotions expressed from national leaders to the average man. Analyzing this data can be critical for any organization. Sentiments are often expressed with different intensity and topics which can provide great insight into how something affects society. Sentiment analysis in Twitter mitigates the various issues of analyzing the tweets in terms of views expressed and several approaches have already been proposed for sentiment analysis in twitter. Resources used for analyzing tweet emotions are also briefly presented in literature survey section.… More >

  • Open AccessOpen Access

    ARTICLE

    Spark Spectrum Allocation for D2D Communication in Cellular Networks

    Tanveer Ahmad1, Imran Khan2, Azeem Irshad3, Shafiq Ahmad4, Ahmed T. Soliman4, Akber Abid Gardezi5, Muhammad Shafiq6,*, Jin-Ghoo Choi6
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6381-6394, 2022, DOI:10.32604/cmc.2022.019787
    Abstract The device-to-device (D2D) technology performs explicit communication between the terminal and the base station (BS) terminal, so there is no need to transmit data through the BS system. The establishment of a short-distance D2D communication link can greatly reduce the burden on the BS server. At present, D2D is one of the key technologies in 5G technology and has been studied in depth. D2D communication reuses the resources of cellular users to improve system key parameters like utilization and throughput. However, repeated use of the spectrum and coexistence of cellular users can cause co-channel interference. Aiming at the interference problem… More >

Per Page:

Share Link