Home / Journals / CMC / Vol.74, No.1, 2023
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Modified Differential Evolution Algorithm for Solving Dynamic Optimization with Existence of Infeasible Environments

    Mohamed A. Meselhi*, Saber M. Elsayed, Daryl L. Essam, Ruhul A. Sarker
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1-17, 2023, DOI:10.32604/cmc.2023.027448
    Abstract Dynamic constrained optimization is a challenging research topic in which the objective function and/or constraints change over time. In such problems, it is commonly assumed that all problem instances are feasible. In reality some instances can be infeasible due to various practical issues, such as a sudden change in resource requirements or a big change in the availability of resources. Decision-makers have to determine whether a particular instance is feasible or not, as infeasible instances cannot be solved as there are no solutions to implement. In this case, locating the nearest feasible solution would be valuable information for the decision-makers.… More >

  • Open AccessOpen Access

    ARTICLE

    Using BlazePose on Spatial Temporal Graph Convolutional Networks for Action Recognition

    Motasem S. Alsawadi1,*, El-Sayed M. El-kenawy2,3, Miguel Rio1
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 19-36, 2023, DOI:10.32604/cmc.2023.032499
    Abstract The ever-growing available visual data (i.e., uploaded videos and pictures by internet users) has attracted the research community's attention in the computer vision field. Therefore, finding efficient solutions to extract knowledge from these sources is imperative. Recently, the BlazePose system has been released for skeleton extraction from images oriented to mobile devices. With this skeleton graph representation in place, a Spatial-Temporal Graph Convolutional Network can be implemented to predict the action. We hypothesize that just by changing the skeleton input data for a different set of joints that offers more information about the action of interest, it is possible to… More >

  • Open AccessOpen Access

    ARTICLE

    Privacy Data Management Mechanism Based on Blockchain and Federated Learning

    Mingsen Mo1, Shan Ji2, Xiaowan Wang3,*, Ghulam Mohiuddin4, Yongjun Ren1
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 37-53, 2023, DOI:10.32604/cmc.2023.028843
    Abstract Due to the extensive use of various intelligent terminals and the popularity of network social tools, a large amount of data in the field of medical emerged. How to manage these massive data safely and reliably has become an important challenge for the medical network community. This paper proposes a data management framework of medical network community based on Consortium Blockchain (CB) and Federated learning (FL), which realizes the data security sharing between medical institutions and research institutions. Under this framework, the data security sharing mechanism of medical network community based on smart contract and the data privacy protection mechanism… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Evaluation of Composite Electrolyte with GQD for All-Solid-State Lithium Batteries

    Sung Won Hwang, Dae-Ki Hong*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 55-66, 2023, DOI:10.32604/cmc.2023.028845
    Abstract The use a stabilized lithium structure as cathode material for batteries could be a fundamental alternative in the development of next-generation energy storage devices. However, the lithium structure severely limits battery life causes safety concerns due to the growth of lithium (Li) dendrites during rapid charge/discharge cycles. Solid electrolytes, which are used in high-density energy storage devices and avoid the instability of liquid electrolytes, can be a promising alternative for next-generation batteries. Nevertheless, poor lithium ion conductivity and structural defects at room temperature have been pointed out as limitations. In this study, through the application of a low-dimensional graphene quantum… More >

  • Open AccessOpen Access

    ARTICLE

    Application of Time Serial Model in Water Quality Predicting

    Jiang Wu1, Jianjun Zhang1, Wenwu Tan1, Hao Lan1,*, Sirao Zhang1, Ke Xiao2, Li Wang2, Haijun Lin1, Guang Sun3, Peng Guo4
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 67-82, 2023, DOI:10.32604/cmc.2023.030703
    Abstract Water resources are an indispensable and valuable resource for human survival and development. Water quality predicting plays an important role in the protection and development of water resources. It is difficult to predict water quality due to its random and trend changes. Therefore, a method of predicting water quality which combines Auto Regressive Integrated Moving Average (ARIMA) and clustering model was proposed in this paper. By taking the water quality monitoring data of a certain river basin as a sample, the water quality Total Phosphorus (TP) index was selected as the prediction object. Firstly, the sample data was cleaned, stationary… More >

  • Open AccessOpen Access

    ARTICLE

    Feature Fusion-Based Deep Learning Network to Recognize Table Tennis Actions

    Chih-Ta Yen1,*, Tz-Yun Chen2, Un-Hung Chen3, Guo-Chang Wang3, Zong-Xian Chen3
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 83-99, 2023, DOI:10.32604/cmc.2023.032739
    Abstract A system for classifying four basic table tennis strokes using wearable devices and deep learning networks is proposed in this study. The wearable device consisted of a six-axis sensor, Raspberry Pi 3, and a power bank. Multiple kernel sizes were used in convolutional neural network (CNN) to evaluate their performance for extracting features. Moreover, a multiscale CNN with two kernel sizes was used to perform feature fusion at different scales in a concatenated manner. The CNN achieved recognition of the four table tennis strokes. Experimental data were obtained from 20 research participants who wore sensors on the back of their… More >

  • Open AccessOpen Access

    ARTICLE

    RBEBT: A ResNet-Based BA-ELM for Brain Tumor Classification

    Ziquan Zhu1, Muhammad Attique Khan2, Shui-Hua Wang1, Yu-Dong Zhang1,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 101-111, 2023, DOI:10.32604/cmc.2023.030790
    Abstract Brain tumor refers to the formation of abnormal cells in the brain. It can be divided into benign and malignant. The main diagnostic methods for brain tumors are plain X-ray film, Magnetic resonance imaging (MRI), and so on. However, these artificial diagnosis methods are easily affected by external factors. Scholars have made such impressive progress in brain tumors classification by using convolutional neural network (CNN). However, there are still some problems: (i) There are many parameters in CNN, which require much calculation. (ii) The brain tumor data sets are relatively small, which may lead to the overfitting problem in CNN.… More >

  • Open AccessOpen Access

    ARTICLE

    Estimating Construction Material Indices with ARIMA and Optimized NARNETs

    Ümit Işıkdağ1, Aycan Hepsağ2, Süreyya İmre Bıyıklı3, Derya Öz4, Gebrail Bekdaş5, Zong Woo Geem6,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 113-129, 2023, DOI:10.32604/cmc.2023.032502
    Abstract Construction Industry operates relying on various key economic indicators. One of these indicators is material prices. On the other hand, cost is a key concern in all operations of the construction industry. In the uncertain conditions, reliable cost forecasts become an important source of information. Material cost is one of the key components of the overall cost of construction. In addition, cost overrun is a common problem in the construction industry, where nine out of ten construction projects face cost overrun. In order to carry out a successful cost management strategy and prevent cost overruns, it is very important to… More >

  • Open AccessOpen Access

    ARTICLE

    Employment Quality Evaluation Model Based on Hybrid Intelligent Algorithm

    Xianhui Gu1,*, Xiaokan Wang1, Shuang Liang2
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 131-139, 2023, DOI:10.32604/cmc.2023.028756
    Abstract In order to solve the defect of large error in current employment quality evaluation, an employment quality evaluation model based on grey correlation degree method and fuzzy C-means (FCM) is proposed. Firstly, it analyzes the related research work of employment quality evaluation, establishes the employment quality evaluation index system, collects the index data, and normalizes the index data; Then, the weight value of employment quality evaluation index is determined by Grey relational analysis method, and some unimportant indexes are removed; Finally, the employment quality evaluation model is established by using fuzzy cluster analysis algorithm, and compared with other employment quality… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Aquila Optimization Algorithm-Based Node Localization Scheme for Wireless Sensor Networks

    Nidhi Agarwal1,2, M. Gokilavani3, S. Nagarajan4, S. Saranya5, Hadeel Alsolai6, Sami Dhahbi7,*, Amira Sayed Abdelaziz8
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 141-152, 2023, DOI:10.32604/cmc.2023.030074
    Abstract In recent times, wireless sensor network (WSN) finds their suitability in several application areas, ranging from military to commercial ones. Since nodes in WSN are placed arbitrarily in the target field, node localization (NL) becomes essential where the positioning of the nodes can be determined by the aid of anchor nodes. The goal of any NL scheme is to improve the localization accuracy and reduce the localization error rate. With this motivation, this study focuses on the design of Intelligent Aquila Optimization Algorithm Based Node Localization Scheme (IAOAB-NLS) for WSN. The presented IAOAB-NLS model makes use of anchor nodes to… More >

  • Open AccessOpen Access

    ARTICLE

    Impact of Portable Executable Header Features on Malware Detection Accuracy

    Hasan H. Al-Khshali1,*, Muhammad Ilyas2
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 153-178, 2023, DOI:10.32604/cmc.2023.032182
    Abstract One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an exclusive set of 29 features was collected from trusted implementations, this set was used as a baseline to analyze the presented work in this research. A Decision Tree (DT) and Neural Network Multi-Layer Perceptron (NN-MLPC) algorithms were utilized during this work. Both algorithms were chosen after testing a few diverse procedures. This work implements a method of subgrouping features to answer questions such… More >

  • Open AccessOpen Access

    ARTICLE

    Skill Optimization Algorithm: A New Human-Based Metaheuristic Technique

    Hadi Givi1, Marie Hubalovska2,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 179-202, 2023, DOI:10.32604/cmc.2023.030379
    Abstract Metaheuristic algorithms are widely used in solving optimization problems. In this paper, a new metaheuristic algorithm called Skill Optimization Algorithm (SOA) is proposed to solve optimization problems. The fundamental inspiration in designing SOA is human efforts to acquire and improve skills. Various stages of SOA are mathematically modeled in two phases, including: (i) exploration, skill acquisition from experts and (ii) exploitation, skill improvement based on practice and individual effort. The efficiency of SOA in optimization applications is analyzed through testing this algorithm on a set of twenty-three standard benchmark functions of a variety of unimodal, high-dimensional multimodal, and fixed-dimensional multimodal… More >

  • Open AccessOpen Access

    ARTICLE

    Image-Based Automatic Energy Meter Reading Using Deep Learning

    Muhammad Imran1,*, Hafeez Anwar2, Muhammad Tufail1, Abdullah Khan1, Murad Khan3, Dzati Athiar Ramli4
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 203-216, 2023, DOI:10.32604/cmc.2023.029834
    Abstract We propose to perform an image-based framework for electrical energy meter reading. Our aim is to extract the image region that depicts the digits and then recognize them to record the consumed units. Combining the readings of serial numbers and energy meter units, an automatic billing system using the Internet of Things and a graphical user interface is deployable in a real-time setup. However, such region extraction and character recognition become challenging due to image variations caused by several factors such as partial occlusion due to dust on the meter display, orientation and scale variations caused by camera positioning, and… More >

  • Open AccessOpen Access

    ARTICLE

    Sailfish Optimizer with EfficientNet Model for Apple Leaf Disease Detection

    Mazen Mushabab Alqahtani1, Ashit Kumar Dutta2, Sultan Almotairi3, M. Ilayaraja4, Amani Abdulrahman Albraikan5, Fahd N. Al-Wesabi6,7,*, Mesfer Al Duhayyim8
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 217-233, 2023, DOI:10.32604/cmc.2023.025280
    Abstract Recent developments in digital cameras and electronic gadgets coupled with Machine Learning (ML) and Deep Learning (DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives to traditional visual inspection models. In this background, the current paper devises an Effective Sailfish Optimizer with EfficientNet-based Apple Leaf disease detection (ESFO-EALD) model. The goal of the proposed ESFO-EALD technique is to identify the occurrence of plant leaf diseases automatically. In this scenario, Median Filtering (MF) approach is utilized to boost the quality of apple plant leaf images. Moreover, SFO with Kapur's entropy-based segmentation technique is also utilized for the… More >

  • Open AccessOpen Access

    ARTICLE

    Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks

    Binhui Tang1,3, Junfeng Wang2,*, Huanran Qiu3, Jian Yu2, Zhongkun Yu2, Shijia Liu2,4
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 235-252, 2023, DOI:10.32604/cmc.2023.029135
    Abstract The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats (APT). Extracting attack behaviors, i.e., Tactics, Techniques, Procedures (TTP) from Cyber Threat Intelligence (CTI) can facilitate APT actors’ profiling for an immediate response. However, it is difficult for traditional manual methods to analyze attack behaviors from cyber threat intelligence due to its heterogeneous nature. Based on the Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) of threat behavior description, this paper proposes a threat behavioral knowledge extraction framework that integrates Heterogeneous Text Network (HTN) and Graph Convolutional Network (GCN) to solve this… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment

    Salaheddine Kably1,2,*, Tajeddine Benbarrad1, Nabih Alaoui2, Mounir Arioua1
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 253-278, 2023, DOI:10.32604/cmc.2023.032220
    Abstract Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion… More >

  • Open AccessOpen Access

    ARTICLE

    A Service Level Agreement Aware Online Algorithm for Virtual Machine Migration

    Iftikhar Ahmad1,*, Ambreen Shahnaz2, Muhammad Asfand-e-Yar3, Wajeeha Khalil1, Yasmin Bano1
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 279-291, 2023, DOI:10.32604/cmc.2023.031344
    Abstract The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be… More >

  • Open AccessOpen Access

    ARTICLE

    Fast Verification of Network Configuration Updates

    Jiangyuan Yao1, Zheng Jiang2, Kaiwen Zou2, Shuhua Weng1, Yaxin Li3, Deshun Li1, Yahui Li4,*, Xingcan Cao5
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 293-311, 2023, DOI:10.32604/cmc.2023.031282
    Abstract With the expansion of network services, large-scale networks have progressively become common. The network status changes rapidly in response to customer needs and configuration changes, so network configuration changes are also very frequent. However, no matter what changes, the network must ensure the correct conditions, such as isolating tenants from each other or guaranteeing essential services. Once changes occur, it is necessary to verify the after-changed network. Whereas, for the verification of large-scale network configuration changes, many current verifiers show poor efficiency. In order to solve the problem of multiple global verifications caused by frequent updates of local configurations in… More >

  • Open AccessOpen Access

    ARTICLE

    Triple-Band Circularly Polarized Dielectric Resonator Antenna (DRA) for Wireless Applications

    Azuwa Ali1, Mohd Najib Mohd Yasin2,*, Ismahayati Adam2, Ali H. Rambe3, Mohd Haizal Jamaludin4, Hasliza A Rahim2, Corhan Cengiz5, Mohd Ibrahim Shapiai Abd. Razak6
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 313-325, 2023, DOI:10.32604/cmc.2023.031706
    Abstract This paper proposes a new dielectric resonator antenna (DRA) design that can generate circularly polarized (CP) triple-band signals. A triple-band CP DRA antenna fed by a probe feed system is achieved with metal strips structure on side of DRA structure. The design start with conventional rectangular DRA with F shaped metal strips on DRA structure alongside the feed. Then, the F metal strip is enhanced by extending the length of the metal strip to obtain wider impedance bandwidth. Further improvement on the antenna performance is observed by improvised the conventional DRA structure. The method of removing part of DRA bottom… More >

  • Open AccessOpen Access

    ARTICLE

    Real and Altered Fingerprint Classification Based on Various Features and Classifiers

    Saif Saad Hameed, Ismail Taha Ahmed*, Omar Munthir Al Okashi
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 327-340, 2023, DOI:10.32604/cmc.2023.031622
    Abstract Biometric recognition refers to the identification of individuals through their unique behavioral features (e.g., fingerprint, face, and iris). We need distinguishing characteristics to identify people, such as fingerprints, which are world-renowned as the most reliable method to identify people. The recognition of fingerprints has become a standard procedure in forensics, and different techniques are available for this purpose. Most current techniques lack interest in image enhancement and rely on high-dimensional features to generate classification models. Therefore, we proposed an effective fingerprint classification method for classifying the fingerprint image as authentic or altered since criminals and hackers routinely change their fingerprints… More >

  • Open AccessOpen Access

    ARTICLE

    Modelling of Wideband Concentric Ring Frequency Selective Surface for 5G Devices

    Ankush Kapoor1, Pradeep Kumar2,*, Ranjan Mishra3
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 341-361, 2023, DOI:10.32604/cmc.2023.028874
    Abstract Frequency selective surfaces (FSSs) play an important role in wireless systems as these can be used as filters, in isolating the unwanted radiation, in microstrip patch antennas for improving the performance of these antennas and in other 5G applications. The analysis and design of the double concentric ring frequency selective surface (DCRFSS) is presented in this research. In the sub-6 GHz 5G FR1 spectrum, a computational synthesis technique for creating DCRFSS based spatial filters is proposed. The analytical tools presented in this study can be used to gain a better understanding of filtering processes and for constructing the spatial filters.… More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Evaluation of Mobile Base Station by Modern Topological Invariants

    Khalid Hamid1, Muhammad Waseem Iqbal2,*, Muhammad Usman Ashraf3, Ahmed Mohammed Alghamdi4, Adel A. Bahaddad5, Khalid Ali Almarhabi6
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 363-378, 2023, DOI:10.32604/cmc.2023.032271
    Abstract Due to a tremendous increase in mobile traffic, mobile operators have started to restructure their networks to offload their traffic. New research directions will lead to fundamental changes in the design of future Fifth-generation (5G) cellular networks. For the formal reason, the study solves the physical network of the mobile base station for the prediction of the best characteristics to develop an enhanced network with the help of graph theory. Any number that can be uniquely calculated by a graph is known as a graph invariant. During the last two decades, innumerable numerical graph invariants have been portrayed and used… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Hybrid Indoor Positioning Algorithm via QPSO and MLP Signal Weighting

    Edgar Scavino1,*, Mohd Amiruddin Abd Rahman1, Zahid Farid2
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 379-397, 2023, DOI:10.32604/cmc.2023.023824
    Abstract Accurate location or positioning of people and self-driven devices in large indoor environments has become an important necessity The application of increasingly automated self-operating moving transportation units, in large indoor spaces demands a precise knowledge of their positions. Technologies like WiFi and Bluetooth, despite their low-cost and availability, are sensitive to signal noise and fading effects. For these reasons, a hybrid approach, which uses two different signal sources, has proven to be more resilient and accurate for the positioning determination in indoor environments. Hence, this paper proposes an improved hybrid technique to implement a fingerprinting based indoor positioning, using Received… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Machine Learning Enabled Retinal Blood Vessel Segmentation and Classification

    Nora Abdullah Alkhaldi1,*, Hanan T. Halawani2
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 399-414, 2023, DOI:10.32604/cmc.2023.030872
    Abstract Automated segmentation of blood vessels in retinal fundus images is essential for medical image analysis. The segmentation of retinal vessels is assumed to be essential to the progress of the decision support system for initial analysis and treatment of retinal disease. This article develops a new Grasshopper Optimization with Fuzzy Edge Detection based Retinal Blood Vessel Segmentation and Classification (GOFED-RBVSC) model. The proposed GOFED-RBVSC model initially employs contrast enhancement process. Besides, GOAFED approach is employed to detect the edges in the retinal fundus images in which the use of GOA adjusts the membership functions. The ORB (Oriented FAST and Rotated… More >

  • Open AccessOpen Access

    ARTICLE

    Replication Strategy with Comprehensive Data Center Selection Method in Cloud Environments

    M. A. Fazlina, Rohaya Latip*, Hamidah Ibrahim, Azizol Abdullah
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 415-433, 2023, DOI:10.32604/cmc.2023.020764
    Abstract As the amount of data continues to grow rapidly, the variety of data produced by applications is becoming more affluent than ever. Cloud computing is the best technology evolving today to provide multi-services for the mass and variety of data. The cloud computing features are capable of processing, managing, and storing all sorts of data. Although data is stored in many high-end nodes, either in the same data centers or across many data centers in cloud, performance issues are still inevitable. The cloud replication strategy is one of best solutions to address risk of performance degradation in the cloud environment.… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Mobile Cloud Computing Architecture with Load Balancing for Healthcare Systems

    Ahyoung Lee1, Jui Mhatre1, Rupak Kumar Das2, Min Hong3,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 435-452, 2023, DOI:10.32604/cmc.2023.029340
    Abstract Healthcare is a fundamental part of every individual’s life. The healthcare industry is developing very rapidly with the help of advanced technologies. Many researchers are trying to build cloud-based healthcare applications that can be accessed by healthcare professionals from their premises, as well as by patients from their mobile devices through communication interfaces. These systems promote reliable and remote interactions between patients and healthcare professionals. However, there are several limitations to these innovative cloud computing-based systems, namely network availability, latency, battery life and resource availability. We propose a hybrid mobile cloud computing (HMCC) architecture to address these challenges. Furthermore, we… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling and Analysis of UAV-Assisted Mobile Network with Imperfect Beam Alignment

    Mohamed Amine Ouamri1,2, Reem Alkanhel3,*, Cedric Gueguen1, Manal Abdullah Alohali4, Sherif S. M. Ghoneim5
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 453-467, 2023, DOI:10.32604/cmc.2023.031450
    Abstract With the rapid development of emerging 5G and beyond (B5G), Unmanned Aerial Vehicles (UAVs) are increasingly important to improve the performance of dense cellular networks. As a conventional metric, coverage probability has been widely studied in communication systems due to the increasing density of users and complexity of the heterogeneous environment. In recent years, stochastic geometry has attracted more attention as a mathematical tool for modeling mobile network systems. In this paper, an analytical approach to the coverage probability analysis of UAV-assisted cellular networks with imperfect beam alignment has been proposed. An assumption was considered that all users are distributed… More >

  • Open AccessOpen Access

    ARTICLE

    Internet of Cultural Things: Current Research, Challenges and Opportunities

    Xiaoting Liang1, Fang Liu1,*, Linqi Wang1, Baoying Zheng1, Yiyuan Sun2
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 469-488, 2023, DOI:10.32604/cmc.2023.029641
    Abstract Driven by the visions of the Internet of Things (IoT), Artificial Intelligence (AI), and 5G communications, the Internet of Cultural Things (IoCT) realize the comprehensive interconnection among cultural products, cultural services, cultural resources, and cultural platforms, bringing individuals with richer humanistic experience, increasing economic benefits for the cultural sector, and promoting the development of cultural heritage protection and education. At present, IoCT has received widespread attention in both industry and academia. To explore new research opportunities and assist users in constructing suitable IoCT systems for specific applications, this survey provides a comprehensive overview of the IoCT components and key technologies.… More >

  • Open AccessOpen Access

    ARTICLE

    Big Data Analytics Using Graph Signal Processing

    Farhan Amin1, Omar M. Barukab2, Gyu Sang Choi1,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 489-502, 2023, DOI:10.32604/cmc.2023.030615
    Abstract The networks are fundamental to our modern world and they appear throughout science and society. Access to a massive amount of data presents a unique opportunity to the researcher’s community. As networks grow in size the complexity increases and our ability to analyze them using the current state of the art is at severe risk of failing to keep pace. Therefore, this paper initiates a discussion on graph signal processing for large-scale data analysis. We first provide a comprehensive overview of core ideas in Graph signal processing (GSP) and their connection to conventional digital signal processing (DSP). We then summarize… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Magnetic Conductor as Planar Antenna for 5G Evolution

    Komsan Kanjanasit1, Pracha Osklang2,*, Terapass Jariyanorawiss3, Akkarat Boonpoonga4, Chuwong Phongcharoenpanich5
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 503-522, 2023, DOI:10.32604/cmc.2023.032427
    Abstract A 5G wireless system requests a high-performance compact antenna device. This research work aims to report the characterization and verification of the artificial magnetic conductor (AMC) metamaterial for a high-gain planar antenna. The configuration is formed by a double-side structure on an intrinsic dielectric slab. The 2-D periodic pattern as an impedance surface is mounted on the top surface, whereas at the bottom surface the ground plane with an inductive narrow aperture source is embedded. The characteristic of the resonant transmission is illustrated based on the electromagnetic virtual object of the AMC resonant structure to reveal the unique property of… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Action Transformer Network for Hybrid Multimodal Sign Language Recognition

    Sameena Javaid*, Safdar Rizvi
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 523-537, 2023, DOI:10.32604/cmc.2023.031924
    Abstract Sign language fills the communication gap for people with hearing and speaking ailments. It includes both visual modalities, manual gestures consisting of movements of hands, and non-manual gestures incorporating body movements including head, facial expressions, eyes, shoulder shrugging, etc. Previously both gestures have been detected; identifying separately may have better accuracy, but much communicational information is lost. A proper sign language mechanism is needed to detect manual and non-manual gestures to convey the appropriate detailed message to others. Our novel proposed system contributes as Sign Language Action Transformer Network (SLATN), localizing hand, body, and facial gestures in video sequences. Here… More >

  • Open AccessOpen Access

    ARTICLE

    An Algorithm to Reduce Compression Ratio in Multimedia Applications

    Dur-e-Jabeen1,*, Tahmina Khan2, Rumaisa Iftikhar1, Ali Akbar Siddique1, Samiya Asghar1
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 539-557, 2023, DOI:10.32604/cmc.2023.032393
    Abstract In recent years, it has been evident that internet is the most effective means of transmitting information in the form of documents, photographs, or videos around the world. The purpose of an image compression method is to encode a picture with fewer bits while retaining the decompressed image’s visual quality. During transmission, this massive data necessitates a lot of channel space. In order to overcome this problem, an effective visual compression approach is required to resize this large amount of data. This work is based on lossy image compression and is offered for static color images. The quantization procedure determines… More >

  • Open AccessOpen Access

    ARTICLE

    Stochastic Investigations for the Fractional Vector-Host Diseased Based Saturated Function of Treatment Model

    Thongchai Botmart1, Qusain Hiader2, Zulqurnain Sabir3, Muhammad Asif Zahoor Raja4, Wajaree Weera1,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 559-573, 2023, DOI:10.32604/cmc.2023.031871
    Abstract The goal of this research is to introduce the simulation studies of the vector-host disease nonlinear system (VHDNS) along with the numerical treatment of artificial neural networks (ANNs) techniques supported by Levenberg-Marquardt backpropagation (LMQBP), known as ANNs-LMQBP. This mechanism is physically appropriate, where the number of infected people is increasing along with the limited health services. Furthermore, the biological effects have fading memories and exhibit transition behavior. Initially, the model is developed by considering the two and three categories for the humans and the vector species. The VHDNS is constructed with five classes, susceptible humans , infected humans , recovered… More >

  • Open AccessOpen Access

    ARTICLE

    Analyzing the ZnO and CH3NH3PbI3 as Emitter Layer for Silicon Based Heterojunction Solar Cells

    Jasurbek Gulomov1,*, Oussama Accouche2, Rayimjon Aliev1, Marc AZAB2, Irodakhon Gulomova1
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 575-590, 2023, DOI:10.32604/cmc.2023.031289
    Abstract Today, it has become an important task to modify existing traditional silicon-based solar cell factory to produce high-efficiency silicon-based heterojunction solar cells, at a lower cost. Therefore, the aim of this paper is to analyze CH3NH3PbI3 and ZnO materials as an emitter layer for p-type silicon wafer-based heterojunction solar cells. CH3NH3PbI3 and ZnO can be synthesized using the cheap Sol-Gel method and can form n-type semiconductor. We propose to combine these two materials since CH3NH3PbI3 is a great light absorber and ZnO has an optimal complex refractive index which can be used as antireflection material. The photoelectric parameters of n-CH3NH3PbI3/p-Si,… More >

  • Open AccessOpen Access

    ARTICLE

    Vertical Pod Autoscaling in Kubernetes for Elastic Container Collaborative Framework

    Mushtaq Niazi1, Sagheer Abbas1, Abdel-Hamid Soliman2, Tahir Alyas3, Shazia Asif4, Tauqeer Faiz5,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 591-606, 2023, DOI:10.32604/cmc.2023.032474
    Abstract Kubernetes is an open-source container management tool which automates container deployment, container load balancing and container(de)scaling, including Horizontal Pod Autoscaler (HPA), Vertical Pod Autoscaler (VPA). HPA enables flawless operation, interactively scaling the number of resource units, or pods, without downtime. Default Resource Metrics, such as CPU and memory use of host machines and pods, are monitored by Kubernetes. Cloud Computing has emerged as a platform for individuals beside the corporate sector. It provides cost-effective infrastructure, platform and software services in a shared environment. On the other hand, the emergence of industry 4.0 brought new challenges for the adaptability and infusion… More >

  • Open AccessOpen Access

    ARTICLE

    Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Heba G. Mohamed3, Mohamed K. Nour4, Mashael M. Asiri5, Ali M. Al-Sharafi6, Mahmoud Othman7, Abdelwahed Motwakel2
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 607-621, 2023, DOI:10.32604/cmc.2023.031371
    Abstract Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems. This may result in compromised security of the systems, scams, and other such cyberattacks. These attacks hijack huge quantities of the available data, incurring heavy financial loss. At the same time, Machine Learning (ML) and Deep Learning (DL) models paved the way for designing models that can detect malicious URLs accurately and classify them. With this motivation,… More >

  • Open AccessOpen Access

    ARTICLE

    Epileptic Seizures Diagnosis Using Amalgamated Extremely Focused EEG Signals and Brain MRI

    Farah Mohammad*, Saad Al-Ahmadi
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 623-639, 2023, DOI:10.32604/cmc.2023.032552
    Abstract

    There exists various neurological disorder based diseases like tumor, sleep disorder, headache, dementia and Epilepsy. Among these, epilepsy is the most common neurological illness in humans, comparable to stroke. Epilepsy is a severe chronic neurological illness that can be discovered through analysis of the signals generated by brain neurons and brain Magnetic resonance imaging (MRI). Neurons are intricately coupled in order to communicate and generate signals from human organs. Due to the complex nature of electroencephalogram (EEG) signals and MRI’s the epileptic seizures detection and brain related problems diagnosis becomes a challenging task. Computer based techniques and machine learning models… More >

  • Open AccessOpen Access

    ARTICLE

    Combing Type-Aware Attention and Graph Convolutional Networks for Event Detection

    Kun Ding1, Lu Xu2, Ming Liu1, Xiaoxiong Zhang1, Liu Liu1, Daojian Zeng2,*, Yuting Liu1,3, Chen Jin4
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 641-654, 2023, DOI:10.32604/cmc.2023.031052
    Abstract Event detection (ED) is aimed at detecting event occurrences and categorizing them. This task has been previously solved via recognition and classification of event triggers (ETs), which are defined as the phrase or word most clearly expressing event occurrence. Thus, current approaches require both annotated triggers as well as event types in training data. Nevertheless, triggers are non-essential in ED, and it is time-wasting for annotators to identify the “most clearly” word from a sentence, particularly in longer sentences. To decrease manual effort, we evaluate event detection without triggers. We propose a novel framework that combines Type-aware Attention and Graph… More >

  • Open AccessOpen Access

    ARTICLE

    Secure and Optimal LOADng Routing for IoT with Composite Routing Metric

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 655-669, 2023, DOI:10.32604/cmc.2023.032207
    Abstract Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things (IoT) network. To overcome this challenge, a secure Lightweight On-demand Ad hoc Distance-vector—Next Generation (LOADng) Routing Protocol is proposed in this paper. As the LOADng protocol is the second version of Ad Hoc On-Demand Distance Vector (AODV) protocol, it retains most of the basic functionality and characteristics of AODV. During the route discovery process, the cyclic shift transposition algorithm (CSTA) is used to encrypt the control packets of the LOADng protocol to improve its security. CSTA approach only… More >

  • Open AccessOpen Access

    ARTICLE

    Sentiment Analysis and Classification Using Deep Semantic Information and Contextual Knowledge

    Ahmed Abdulhakim Al-Absi1, Dae-Ki Kang2,*, Mohammed Abdulhakim Al-Absi3
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 671-691, 2023, DOI:10.32604/cmc.2023.030262
    Abstract Sentiment analysis (AS) is one of the basic research directions in natural language processing (NLP), it is widely adopted for news, product review, and politics. Aspect-based sentiment analysis (ABSA) aims at identifying the sentiment polarity of a given target context, previous existing model of sentiment analysis possesses the issue of the insufficient exaction of features which results in low accuracy. Hence this research work develops a deep-semantic and contextual knowledge networks (DSCNet). DSCNet tends to exploit the semantic and contextual knowledge to understand the context and enhance the accuracy based on given aspects. At first temporal relationships are established then… More >

  • Open AccessOpen Access

    ARTICLE

    BotSward: Centrality Measures for Graph-Based Bot Detection Using Machine Learning

    Khlood Shinan1,2, Khalid Alsubhi2, M. Usman Ashraf3,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 693-714, 2023, DOI:10.32604/cmc.2023.031641
    Abstract The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet. Bot detection using machine learning (ML) with flow-based features has been extensively studied in the literature. Existing flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features of malicious hosts. Recently, Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations, as graphs provide a real representation of network communications. The purpose of this study is to build a botnet… More >

  • Open AccessOpen Access

    ARTICLE

    Wind Power Prediction Based on Machine Learning and Deep Learning Models

    Zahraa Tarek1, Mahmoud Y. Shams2,*, Ahmed M. Elshewey3, El-Sayed M. El-kenawy4,5, Abdelhameed Ibrahim6, Abdelaziz A. Abdelhamid7,8, Mohamed A. El-dosuky1,9
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 715-732, 2023, DOI:10.32604/cmc.2023.032533
    Abstract Wind power is one of the sustainable ways to generate renewable energy. In recent years, some countries have set renewables to meet future energy needs, with the primary goal of reducing emissions and promoting sustainable growth, primarily the use of wind and solar power. To achieve the prediction of wind power generation, several deep and machine learning models are constructed in this article as base models. These regression models are Deep neural network (DNN), k-nearest neighbor (KNN) regressor, long short-term memory (LSTM), averaging model, random forest (RF) regressor, bagging regressor, and gradient boosting (GB) regressor. In addition, data cleaning and… More >

  • Open AccessOpen Access

    ARTICLE

    Cancellable Multi-Biometric Feature Veins Template Generation Based on SHA-3 Hashing

    Salwa M. Serag Eldin1,*, Ahmed Sedik2, Sultan S. Alshamrani3, Ahmed M. Ayoup4
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 733-749, 2023, DOI:10.32604/cmc.2023.030789
    Abstract In this paper, a novel cancellable biometrics technique called Multi-Biometric-Feature-Hashing (MBFH) is proposed. The MBFH strategy is utilized to actualize a single direction (non-invertibility) biometric shape. MBFH is a typical model security conspire that is distinguished in the utilization of this protection insurance framework in numerous sorts of biometric feature strategies (retina, palm print, Hand Dorsum, fingerprint). A more robust and accurate multilingual biological structure in expressing human loneliness requires a different format to record clients with inseparable comparisons from individual biographical sources. This may raise worries about their utilization and security when these spread out designs are subverted as… More >

  • Open AccessOpen Access

    ARTICLE

    A Deep Learning Approach for Detecting Covid-19 Using the Chest X-Ray Images

    Fatemeh Sadeghi1, Omid Rostami2, Myung-Kyu Yi3, Seong Oun Hwang3,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 751-768, 2023, DOI:10.32604/cmc.2023.031519
    Abstract Real-time detection of Covid-19 has definitely been the most widely-used world-wide classification problem since the start of the pandemic from 2020 until now. In the meantime, airspace opacities spreads related to lung have been of the most challenging problems in this area. A common approach to do on that score has been using chest X-ray images to better diagnose positive Covid-19 cases. Similar to most other classification problems, machine learning-based approaches have been the first/most-used candidates in this application. Many schemes based on machine/deep learning have been proposed in recent years though increasing the performance and accuracy of the system… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of LDPC Code in Hybrid Communication Systems

    Hasnain Kashif1,*, Muhammad Nasir Khan1, Zubair Nawaz2
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 769-781, 2023, DOI:10.32604/cmc.2023.032565
    Abstract Free-space optical (FSO) communication is of supreme importance for designing next-generation networks. Over the past decades, the radio frequency (RF) spectrum has been the main topic of interest for wireless technology. The RF spectrum is becoming denser and more employed, making its availability tough for additional channels. Optical communication, exploited for messages or indications in historical times, is now becoming famous and useful in combination with error-correcting codes (ECC) to mitigate the effects of fading caused by atmospheric turbulence. A free-space communication system (FSCS) in which the hybrid technology is based on FSO and RF. FSCS is a capable solution… More >

  • Open AccessOpen Access

    ARTICLE

    Empirical Analysis of Software Success Rate Forecasting During Requirement Engineering Processes

    Muhammad Hasnain1, Imran Ghani2, Seung Ryul Jeong3,*, Muhammad Fermi Pasha4, Sardar Usman5, Anjum Abbas6
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 783-799, 2023, DOI:10.32604/cmc.2023.030162
    Abstract Forecasting on success or failure of software has become an interesting and, in fact, an essential task in the software development industry. In order to explore the latest data on successes and failures, this research focused on certain questions such as is early phase of the software development life cycle better than later phases in predicting software success and avoiding high rework? What human factors contribute to success or failure of a software? What software practices are used by the industry practitioners to achieve high quality of software in their day-to-day work? In order to conduct this empirical analysis a… More >

  • Open AccessOpen Access

    ARTICLE

    Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism

    Yongjie Yang1, Shanshan Tu1, Raja Hashim Ali2, Hisham Alasmary3,4, Muhammad Waqas5,6,*, Muhammad Nouman Amjad7
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 801-815, 2023, DOI:10.32604/cmc.2023.031907
    Abstract With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed.… More >

  • Open AccessOpen Access

    ARTICLE

    Filter and Embedded Feature Selection Methods to Meet Big Data Visualization Challenges

    Kamal A. ElDahshan, AbdAllah A. AlHabshy, Luay Thamer Mohammed*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 817-839, 2023, DOI:10.32604/cmc.2023.032287
    Abstract This study focuses on meeting the challenges of big data visualization by using of data reduction methods based the feature selection methods. To reduce the volume of big data and minimize model training time (Tt) while maintaining data quality. We contributed to meeting the challenges of big data visualization using the embedded method based “Select from model (SFM)” method by using “Random forest Importance algorithm (RFI)” and comparing it with the filter method by using “Select percentile (SP)” method based chi square “Chi2” tool for selecting the most important features, which are then fed into a classification process using the… More >

  • Open AccessOpen Access

    ARTICLE

    Tracking and Analysis of Pedestrian’s Behavior in Public Places

    Mahwish Pervaiz1, Mohammad Shorfuzzaman2, Abdulmajeed Alsufyani2, Ahmad Jalal3, Suliman A. Alsuhibany4, Jeongmin Park5,*
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 841-853, 2023, DOI:10.32604/cmc.2023.029629
    Abstract Crowd management becomes a global concern due to increased population in urban areas. Better management of pedestrians leads to improved use of public places. Behavior of pedestrian’s is a major factor of crowd management in public places. There are multiple applications available in this area but the challenge is open due to complexity of crowd and depends on the environment. In this paper, we have proposed a new method for pedestrian’s behavior detection. Kalman filter has been used to detect pedestrian’s using movement based approach. Next, we have performed occlusion detection and removal using region shrinking method to isolate occluded… More >

  • Open AccessOpen Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel1,*, Ramón Alcarria1, Joaquin Chung2, Rajkumar Kettimuthu2, Tomás Robles1, Iván Armuelles3
    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787
    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in 5G networks. We categorize those… More >

Per Page:

Share Link