Home / Journals / CMC / Vol.74, No.3, 2023
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    A Novel Design of Antenna Array with Two K-Band Circularly Polarized Antenna

    Xiao Liu1,2, Anqi Li1,*, Zhongjun Yu1,2, Ting Lv3, Meng Li4, Zhen Zhang5
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6411-6427, 2023, DOI:10.32604/cmc.2023.027124
    Abstract As an important part of phased array system, the research on phased array antenna is very necessary. The phased array antenna achieves the scanning beam adaptively by regulating the phase difference between each array element. In this paper, a dual K-band circularly polarized antenna with high broadband, broadband beam, wide axial ratio bandwidth and high radiation efficiency is designed. We combine with the advantages of slot antenna and aperture antenna, use multimode waveguide cavity structure to design an aperture antenna, which is fed to waveguide circular polarizer by slot coupling in order to realize circular polarization radiation. Meanwhile, it has… More >

  • Open AccessOpen Access

    ARTICLE

    DNA Computing with Water Strider Based Vector Quantization for Data Storage Systems

    A. Arokiaraj Jovith1, S. Rama Sree2, Gudikandhula Narasimha Rao3, K. Vijaya Kumar4, Woong Cho5, Gyanendra Prasad Joshi6, Sung Won Kim7,*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6429-6444, 2023, DOI:10.32604/cmc.2023.031817
    Abstract The exponential growth of data necessitates an effective data storage scheme, which helps to effectively manage the large quantity of data. To accomplish this, Deoxyribonucleic Acid (DNA) digital data storage process can be employed, which encodes and decodes binary data to and from synthesized strands of DNA. Vector quantization (VQ) is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency. This article introduces a new DNA Computing with Water Strider Algorithm based Vector Quantization (DNAC-WSAVQ) technique for Data Storage Systems. The proposed DNAC-WSAVQ technique enables encoding data using… More >

  • Open AccessOpen Access

    ARTICLE

    Six Generation Load Cells Solution Based Congestion Management Control Purpose

    Chafaa Hamrouni1,2,*, Aarif Alutaybi1
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6445-6460, 2023, DOI:10.32604/cmc.2023.026441
    Abstract Several assessing efforts are approved making both communication and information technologies available. In addition to being a part of universal access and service, we aim at assessing the impact of radio access technologies on universal access indicators. The proposed work demonstrates the possibility of inter-working of all existing Radio Access Technologies (RATs), in a limited area presented in the Six Generation Radio Resources Allocation (6 G-A) network. We propose a solution for the Vertical hand Over (VHO) in 6 G-A heterogeneous system, that adopts Media Independent Handover (MIH) protocol to benefit between different used technologies in a direct communication firstly… More >

  • Open AccessOpen Access

    ARTICLE

    Optimization Techniques in University Timetabling Problem: Constraints, Methodologies, Benchmarks, and Open Issues

    Abeer Bashab1, Ashraf Osman Ibrahim2,*, Ibrahim Abakar Tarigo Hashem3, Karan Aggarwal4, Fadhil Mukhlif5, Fuad A. Ghaleb5, Abdelzahir Abdelmaboud6
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6461-6484, 2023, DOI:10.32604/cmc.2023.034051
    Abstract University timetabling problems are a yearly challenging task and are faced repeatedly each semester. The problems are considered non-polynomial time (NP) and combinatorial optimization problems (COP), which means that they can be solved through optimization algorithms to produce the aspired optimal timetable. Several techniques have been used to solve university timetabling problems, and most of them use optimization techniques. This paper provides a comprehensive review of the most recent studies dealing with concepts, methodologies, optimization, benchmarks, and open issues of university timetabling problems. The comprehensive review starts by presenting the essence of university timetabling as NP-COP, defining and clarifying the… More >

  • Open AccessOpen Access

    ARTICLE

    Bridge Crack Segmentation Method Based on Parallel Attention Mechanism and Multi-Scale Features Fusion

    Jianwei Yuan1, Xinli Song1,*, Huaijian Pu2, Zhixiong Zheng3, Ziyang Niu3
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6485-6503, 2023, DOI:10.32604/cmc.2023.035165
    Abstract Regular inspection of bridge cracks is crucial to bridge maintenance and repair. The traditional manual crack detection methods are time-consuming, dangerous and subjective. At the same time, for the existing mainstream vision-based automatic crack detection algorithms, it is challenging to detect fine cracks and balance the detection accuracy and speed. Therefore, this paper proposes a new bridge crack segmentation method based on parallel attention mechanism and multi-scale features fusion on top of the DeeplabV3+ network framework. First, the improved lightweight MobileNet-v2 network and dilated separable convolution are integrated into the original DeeplabV3+ network to improve the original backbone network Xception… More >

  • Open AccessOpen Access

    ARTICLE

    Lightning Search Algorithm with Deep Transfer Learning-Based Vehicle Classification

    Mrim M. Alnfiai*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6505-6521, 2023, DOI:10.32604/cmc.2023.033422
    Abstract There is a drastic increase experienced in the production of vehicles in recent years across the globe. In this scenario, vehicle classification system plays a vital part in designing Intelligent Transportation Systems (ITS) for automatic highway toll collection, autonomous driving, and traffic management. Recently, computer vision and pattern recognition models are useful in designing effective vehicle classification systems. But these models are trained using a small number of hand-engineered features derived from small datasets. So, such models cannot be applied for real-time road traffic conditions. Recent developments in Deep Learning (DL)-enabled vehicle classification models are highly helpful in resolving the… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Scheme for Robust Confusion Component Selection Based on Pythagorean Fuzzy Set

    Nabilah Abughazalah1, Mohsin Iqbal2, Majid Khan3,*, Iqtadar Hussain4,5
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6523-6534, 2023, DOI:10.32604/cmc.2022.031859
    Abstract The substitution box, often known as an S-box, is a nonlinear component that is a part of several block ciphers. Its purpose is to protect cryptographic algorithms from a variety of cryptanalytic assaults. A MultiCriteria Decision Making (MCDM) problem has a complex selection procedure because of having many options and criteria to choose from. Because of this, statistical methods are necessary to assess the performance score of each S-box and decide which option is the best one available based on this score. Using the Pythagorean Fuzzy-based Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method, the major… More >

  • Open AccessOpen Access

    ARTICLE

    A Query-Based Greedy Approach for Authentic Influencer Discovery in SIoT

    Farah Batool1, Abdul Rehman2, Dongsun Kim2,*, Assad Abbas1, Raheel Nawaz3, Tahir Mustafa Madni1
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6535-6553, 2023, DOI:10.32604/cmc.2023.033832
    Abstract The authors propose an informed search greedy approach that efficiently identifies the influencer nodes in the social Internet of Things with the ability to provide legitimate information. Primarily, the proposed approach minimizes the network size and eliminates undesirable connections. For that, the proposed approach ranks each of the nodes and prioritizes them to identify an authentic influencer. Therefore, the proposed approach discards the nodes having a rank (α) lesser than 0.5 to reduce the network complexity. α is the variable value represents the rank of each node that varies between 0 to 1. Node with the higher value of α… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption

    Yongsheng Hu*, Liyong Nan
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6555-6571, 2023, DOI:10.32604/cmc.2023.036090
    Abstract The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem. The classical chaotic map has simple dynamic behavior and few control parameters, so it is not suitable for modern cryptography. In this paper, we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map (2D-SSCDB). The 2D-SSCDB has a simple structure but has complex dynamic behavior. The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior, and the parameter space in the hyperchaotic state is extensive and continuous. Trajectory analysis and some randomness tests verify that… More >

  • Open AccessOpen Access

    ARTICLE

    Explainable Anomaly Detection Using Vision Transformer Based SVDD

    Ji-Won Baek1, Kyungyong Chung2,*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6573-6586, 2023, DOI:10.32604/cmc.2023.035246
    Abstract Explainable AI extracts a variety of patterns of data in the learning process and draws hidden information through the discovery of semantic relationships. It is possible to offer the explainable basis of decision-making for inference results. Through the causality of risk factors that have an ambiguous association in big medical data, it is possible to increase transparency and reliability of explainable decision-making that helps to diagnose disease status. In addition, the technique makes it possible to accurately predict disease risk for anomaly detection. Vision transformer for anomaly detection from image data makes classification through MLP. Unfortunately, in MLP, a vector… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment

    Mohammed Maray1, Haya Mesfer Alshahrani2, Khalid A. Alissa3, Najm Alotaibi4, Abdulbaset Gaddah5, Ali Meree1,6, Mahmoud Othman7, Manar Ahmed Hamza8,*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6587-6604, 2023, DOI:10.32604/cmc.2023.034176
    Abstract In recent years, wireless networks are widely used in different domains. This phenomenon has increased the number of Internet of Things (IoT) devices and their applications. Though IoT has numerous advantages, the commonly-used IoT devices are exposed to cyber-attacks periodically. This scenario necessitates real-time automated detection and the mitigation of different types of attacks in high-traffic networks. The Software-Defined Networking (SDN) technique and the Machine Learning (ML)-based intrusion detection technique are effective tools that can quickly respond to different types of attacks in the IoT networks. The Intrusion Detection System (IDS) models can be employed to secure the SDN-enabled IoT… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Secure Scan Design Based on Delayed Physical Unclonable Function

    Weizheng Wang1,2, Xingxing Gong1, Xiangqi Wang3, Gwang-jun Kim4,*, Fayez Alqahtani5, Amr Tolba6
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6605-6622, 2023, DOI:10.32604/cmc.2023.031617
    Abstract The advanced integrated circuits have been widely used in various situations including the Internet of Things, wireless communication, etc. But its manufacturing process exists unreliability, so cryptographic chips must be rigorously tested. Due to scan testing provides high test coverage, it is applied to the testing of cryptographic integrated circuits. However, while providing good controllability and observability, it also provides attackers with a backdoor to steal keys. In the text, a novel protection scheme is put forward to resist scan-based attacks, in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuse-antifuse structures… More >

  • Open AccessOpen Access

    ARTICLE

    Telepresence Robots and Controlling Techniques in Healthcare System

    Fawad Naseer1,*, Muhammad Nasir Khan1, Zubair Nawaz2, Qasim Awais3
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6623-6639, 2023, DOI:10.32604/cmc.2023.035218
    Abstract In this era of post-COVID-19, humans are psychologically restricted to interact less with other humans. According to the world health organization (WHO), there are many scenarios where human interactions cause severe multiplication of viruses from human to human and spread worldwide. Most healthcare systems shifted to isolation during the pandemic and a very restricted work environment. Investigations were done to overcome the remedy, and the researcher developed different techniques and recommended solutions. Telepresence robot was the solution achieved by all industries to continue their operations but with almost zero physical interaction with other humans. It played a vital role in… More >

  • Open AccessOpen Access

    ARTICLE

    Measuring Reliability of A Web Portal Based on Testing Profile

    Malik Muhammad Ali Shahid1, Shahida Sulaiman2, Mohammed Al-Sarem3,4, Aqeel Ur Rahman1, Salman Iqbal1, Rab Nawaz Bashir1, Arfat Ahmad Khan5,6, Momen M. Alrawi7, Rashiq R. Marie8, Settawit Poochaya5,*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6641-6663, 2023, DOI:10.32604/cmc.2023.031459
    Abstract

    Conventionally, the reliability of a web portal is validated with generalized conventional methods, but they fail to provide the desired results. Therefore, we need to include other quality factors that affect reliability such as usability for improving the reliability in addition to the conventional reliability testing. Actually, the primary objectives of web portals are to provide interactive integration of multiple functions confirming diverse requirements in an efficient way. In this paper, we employ testing profiles to measure the reliability through software operational profile, input space profile and usability profile along with qualitative measures of reliability and usability. Moreover, the case… More >

  • Open AccessOpen Access

    ARTICLE

    EsECC_SDN: Attack Detection and Classification Model for MANET

    Veera Ankalu Vuyyuru1, Youseef Alotaibi2, Neenavath Veeraiah3,*, Saleh Alghamdi4, Korimilli Sirisha5
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6665-6688, 2023, DOI:10.32604/cmc.2023.032140
    Abstract Mobile Ad Hoc Networks (MANET) is the framework for social networking with a realistic framework. In the MANET environment, based on the query, information is transmitted between the sender and receiver. In the MANET network, the nodes within the communication range are involved in data transmission. Even the nodes that lie outside of the communication range are involved in the transmission of relay messages. However, due to the openness and frequent mobility of nodes, they are subjected to the vast range of security threats in MANET. Hence, it is necessary to develop an appropriate security mechanism for the data MANET… More >

  • Open AccessOpen Access

    ARTICLE

    Impediments of Cognitive System Engineering in Machine-Human Modeling

    Fayaz Ahmad Fayaz1,2, Arun Malik2, Isha Batra2, Akber Abid Gardezi3, Syed Immamul Ansarullah4, Shafiq Ahmad5, Mejdal Alqahtani5, Muhammad Shafiq6,*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6689-6701, 2023, DOI:10.32604/cmc.2023.032998
    Abstract A comprehensive understanding of human intelligence is still an ongoing process, i.e., human and information security are not yet perfectly matched. By understanding cognitive processes, designers can design humanized cognitive information systems (CIS). The need for this research is justified because today’s business decision makers are faced with questions they cannot answer in a given amount of time without the use of cognitive information systems. The researchers aim to better strengthen cognitive information systems with more pronounced cognitive thresholds by demonstrating the resilience of cognitive resonant frequencies to reveal possible responses to improve the efficiency of human-computer interaction (HCI). A… More >

  • Open AccessOpen Access

    ARTICLE

    Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map

    K. Priyadarsini1, Arun Kumar Sivaraman2, Abdul Quadir Md2, Areej Malibari3,*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6703-6717, 2023, DOI:10.32604/cmc.2023.030648
    Abstract With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts of data. The major concerns in this domain are security and privacy. Therefore, attaining a reliable level of confidentiality in the fog computing environment is a pivotal task. Among different types of data stored in the fog, the 3D point and mesh fog data are increasingly popular in recent days, due to the growth of 3D modelling and 3D printing technologies. Hence, in this research, we propose a novel scheme for preserving the privacy of 3D point and mesh fog data. Chaotic… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Transfer Learning Driven Automated Fall Detection for Quality of Living of Disabled Persons

    Nabil Almalki1,2, Mrim M. Alnfiai1,3, Fahd N. Al-Wesabi4, Mesfer Alduhayyem5, Anwer Mustafa Hilal6,*, Manar Ahmed Hamza6
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6719-6736, 2023, DOI:10.32604/cmc.2023.034417
    Abstract Mobile communication and the Internet of Things (IoT) technologies have recently been established to collect data from human beings and the environment. The data collected can be leveraged to provide intelligent services through different applications. It is an extreme challenge to monitor disabled people from remote locations. It is because day-to-day events like falls heavily result in accidents. For a person with disabilities, a fall event is an important cause of mortality and post-traumatic complications. Therefore, detecting the fall events of disabled persons in smart homes at early stages is essential to provide the necessary support and increase their survival… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment

    Fatma S. Alrayes1, Nuha Alshuqayran2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Abdullah Mohamed5, Amgad Atta Abdelmageed Mohammed6, Gouse Pasha Mohammed6, Ishfaq Yaseen6
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6737-6753, 2023, DOI:10.32604/cmc.2023.032591
    Abstract Recently, Internet of Things (IoT) devices have developed at a faster rate and utilization of devices gets considerably increased in day to day lives. Despite the benefits of IoT devices, security issues remain challenging owing to the fact that most devices do not include memory and computing resources essential for satisfactory security operation. Consequently, IoT devices are vulnerable to different kinds of attacks. A single attack on networking system/device could result in considerable data to data security and privacy. But the emergence of artificial intelligence (AI) techniques can be exploited for attack detection and classification in the IoT environment. In… More >

  • Open AccessOpen Access

    ARTICLE

    Fault Coverage-Based Test Case Prioritization and Selection Using African Buffalo Optimization

    Shweta Singhal1, Nishtha Jatana2, Ahmad F Subahi3, Charu Gupta4,*, Osamah Ibrahim Khalaf5, Youseef Alotaibi6
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6755-6774, 2023, DOI:10.32604/cmc.2023.032308
    Abstract Software needs modifications and requires revisions regularly. Owing to these revisions, retesting software becomes essential to ensure that the enhancements made, have not affected its bug-free functioning. The time and cost incurred in this process, need to be reduced by the method of test case selection and prioritization. It is observed that many nature-inspired techniques are applied in this area. African Buffalo Optimization is one such approach, applied to regression test selection and prioritization. In this paper, the proposed work explains and proves the applicability of the African Buffalo Optimization approach to test case selection and prioritization. The proposed algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    Salp Swarm Algorithm with Multilevel Thresholding Based Brain Tumor Segmentation Model

    Hanan T. Halawani*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6775-6788, 2023, DOI:10.32604/cmc.2023.030814
    Abstract Biomedical image processing acts as an essential part of several medical applications in supporting computer aided disease diagnosis. Magnetic Resonance Image (MRI) is a commonly utilized imaging tool used to save glioma for clinical examination. Biomedical image segmentation plays a vital role in healthcare decision making process which also helps to identify the affected regions in the MRI. Though numerous segmentation models are available in the literature, it is still needed to develop effective segmentation models for BT. This study develops a salp swarm algorithm with multi-level thresholding based brain tumor segmentation (SSAMLT-BTS) model. The presented SSAMLT-BTS model initially employs… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Test Case Minimization Technique Using Genetic Algorithm for Regression Testing

    Rubab Sheikh1, Muhammad Imran Babar2,*, Rawish Butt3, Abdelzahir Abdelmaboud4, Taiseer Abdalla Elfadil Eisa4
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6789-6806, 2023, DOI:10.32604/cmc.2023.028625
    Abstract Regression testing is a widely used approach to confirm the correct functionality of the software in incremental development. The use of test cases makes it easier to test the ripple effect of changed requirements. Rigorous testing may help in meeting the quality criteria that is based on the conformance to the requirements as given by the intended stakeholders. However, a minimized and prioritized set of test cases may reduce the efforts and time required for testing while focusing on the timely delivery of the software application. In this research, a technique named TestReduce has been presented to get a minimal… More >

  • Open AccessOpen Access

    ARTICLE

    Optimization of Coronavirus Pandemic Model Through Artificial Intelligence

    Manal. M. Alqarni1, Arooj Nasir2,3, Dumitru Baleanu4,5,6, Ali Raza7, Tahir Nawaz Cheema8,*, Nauman Ahmed9, Muhammad Rafiq10, Umbreen Fatima11, Emad E. Mahmoud12
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6807-6822, 2023, DOI:10.32604/cmc.2023.033283
    Abstract Artificial intelligence is demonstrated by machines, unlike the natural intelligence displayed by animals, including humans. Artificial intelligence research has been defined as the field of study of intelligent agents, which refers to any system that perceives its environment and takes actions that maximize its chance of achieving its goals. The techniques of intelligent computing solve many applications of mathematical modeling. The research work was designed via a particular method of artificial neural networks to solve the mathematical model of coronavirus. The representation of the mathematical model is made via systems of nonlinear ordinary differential equations. These differential equations are established… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Resource Planning for AI Workloads with Variable Real-Time Tasks

    Sunhwa Annie Nam1, Kyungwoon Cho2, Hyokyung Bahn3,*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6823-6833, 2023, DOI:10.32604/cmc.2023.035481
    Abstract AI (Artificial Intelligence) workloads are proliferating in modern real-time systems. As the tasks of AI workloads fluctuate over time, resource planning policies used for traditional fixed real-time tasks should be re-examined. In particular, it is difficult to immediately handle changes in real-time tasks without violating the deadline constraints. To cope with this situation, this paper analyzes the task situations of AI workloads and finds the following two observations. First, resource planning for AI workloads is a complicated search problem that requires much time for optimization. Second, although the task set of an AI workload may change over time, the possible… More >

  • Open AccessOpen Access

    ARTICLE

    Topic Modelling and Sentimental Analysis of Students’ Reviews

    Omer S. Alkhnbashi1, Rasheed Mohammad Nassr2,*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6835-6848, 2023, DOI:10.32604/cmc.2023.034987
    Abstract Globally, educational institutions have reported a dramatic shift to online learning in an effort to contain the COVID-19 pandemic. The fundamental concern has been the continuance of education. As a result, several novel solutions have been developed to address technical and pedagogical issues. However, these were not the only difficulties that students faced. The implemented solutions involved the operation of the educational process with less regard for students’ changing circumstances, which obliged them to study from home. Students should be asked to provide a full list of their concerns. As a result, student reflections, including those from Saudi Arabia, have… More >

  • Open AccessOpen Access

    ARTICLE

    A Coprocessor Architecture for 80/112-bit Security Related Applications

    Muhammad Rashid*, Majid Alotaibi
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6849-6865, 2023, DOI:10.32604/cmc.2023.032849
    Abstract We have proposed a flexible coprocessor key-authentication architecture for 80/112-bit security-related applications over field by employing Elliptic-curve Diffie Hellman (ECDH) protocol. Towards flexibility, a serial input/output interface is used to load/produce secret, public, and shared keys sequentially. Moreover, to reduce the hardware resources and to achieve a reasonable time for cryptographic computations, we have proposed a finite field digit-serial multiplier architecture using combined shift and accumulate techniques. Furthermore, two finite-state-machine controllers are used to perform efficient control functionalities. The proposed coprocessor architecture over and is programmed using Verilog and then implemented on Xilinx Virtex-7 FPGA (field-programmable-gate-array) device. For and ,… More >

  • Open AccessOpen Access

    ARTICLE

    IoMT-Based Healthcare Framework for Ambient Assisted Living Using a Convolutional Neural Network

    Waleed T. Al-Sit1, Nidal A. Al-Dmour2, Taher M. Ghazal3,4,*, Ghassan F. Issa3
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6867-6878, 2023, DOI:10.32604/cmc.2023.034952
    Abstract In the age of universal computing, human life is becoming smarter owing to the recent developments in the Internet of Medical Things (IoMT), wearable sensors, and telecommunication innovations, which provide more effective and smarter healthcare facilities. IoMT has the potential to shape the future of clinical research in the healthcare sector. Wearable sensors, patients, healthcare providers, and caregivers can connect through an IoMT network using software, information, and communication technology. Ambient assisted living (AAL) allows the incorporation of emerging innovations into the routine life events of patients. Machine learning (ML) teaches machines to learn from human experiences and to use… More >

  • Open AccessOpen Access

    ARTICLE

    Aspect Extraction Approach for Sentiment Analysis Using Keywords

    Nafees Ayub1, Muhammad Ramzan Talib1,*, Muhammad Kashif Hanif1, Muhammad Awais2
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6879-6892, 2023, DOI:10.32604/cmc.2023.034214
    Abstract Sentiment Analysis deals with consumer reviews available on blogs, discussion forums, E-commerce websites, and App Store. These online reviews about products are also becoming essential for consumers and companies as well. Consumers rely on these reviews to make their decisions about products and companies are also very interested in these reviews to judge their products and services. These reviews are also a very precious source of information for requirement engineers. But companies and consumers are not very satisfied with the overall sentiment; they like fine-grained knowledge about consumer reviews. Owing to this, many researchers have developed approaches for aspect-based sentiment… More >

  • Open AccessOpen Access

    ARTICLE

    Mathematical Morphology View of Topological Rough Sets and Its Applications

    Ibrahim Noaman1, Abd El Fattah El Atik2, Tamer Medhat3,*, Manal E. Ali4
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6893-6908, 2023, DOI:10.32604/cmc.2023.033539
    Abstract This article focuses on the relationship between mathematical morphology operations and rough sets, mainly based on the context of image retrieval and the basic image correspondence problem. Mathematical morphological procedures and set approximations in rough set theory have some clear parallels. Numerous initiatives have been made to connect rough sets with mathematical morphology. Numerous significant publications have been written in this field. Others attempt to show a direct connection between mathematical morphology and rough sets through relations, a pair of dual operations, and neighborhood systems. Rough sets are used to suggest a strategy to approximate mathematical morphology within the general… More >

  • Open AccessOpen Access

    ARTICLE

    Xception-Fractalnet: Hybrid Deep Learning Based Multi-Class Classification of Alzheimer’s Disease

    Mudiyala Aparna, Battula Srinivasa Rao*
    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6909-6932, 2023, DOI:10.32604/cmc.2023.034796
    Abstract Neurological disorders such as Alzheimer’s disease (AD) are very challenging to treat due to their sensitivity, technical challenges during surgery, and high expenses. The complexity of the brain structures makes it difficult to distinguish between the various brain tissues and categorize AD using conventional classification methods. Furthermore, conventional approaches take a lot of time and might not always be precise. Hence, a suitable classification framework with brain imaging may produce more accurate findings for early diagnosis of AD. Therefore in this paper, an effective hybrid Xception and Fractalnet-based deep learning framework are implemented to classify the stages of AD into… More >

Per Page:

Share Link