Home / Journals / CMC / Vol.75, No.1, 2023
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    License Plate Recognition via Attention Mechanism

    Longjuan Wang1,2, Chunjie Cao1,2, Binghui Zou1,2, Jun Ye1,2,*, Jin Zhang3
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1801-1814, 2023, DOI:10.32604/cmc.2023.032785
    Abstract License plate recognition technology use widely in intelligent traffic management and control. Researchers have been committed to improving the speed and accuracy of license plate recognition for nearly 30 years. This paper is the first to propose combining the attention mechanism with YOLO-v5 and LPRnet to construct a new license plate recognition model (LPR-CBAM-Net). Through the attention mechanism CBAM (Convolutional Block Attention Module), the importance of different feature channels in license plate recognition can be re-calibrated to obtain proper attention to features. Force information to achieve the purpose of improving recognition speed and accuracy. Experimental results show that the model… More >

  • Open AccessOpen Access

    ARTICLE

    Weighted De-Synchronization Based Resource Allocation in Wireless Networks

    Kimchheang Chhea1, Dara Ron1, Jung-Ryun Lee1,2,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1815-1826, 2023, DOI:10.32604/cmc.2023.032376
    Abstract Considering the exponential growth of wireless devices with data-starving applications fused with artificial intelligence, the significance of wireless network scalability using distributed behavior and fairness among users is a crucial feature in guaranteeing reliable service to numerous users in the network environment. The Kuramoto model is described as nonlinear self-sustained phase oscillators spinning at varying intrinsic frequencies connected through the sine of their phase differences and displays a phase transition at a specific coupling strength, in which a mutual behavior is accomplished. In this work, we apply the Kuramoto model to achieve a weighted fair resource allocation in a wireless… More >

  • Open AccessOpen Access

    ARTICLE

    Combined Effect of Concept Drift and Class Imbalance on Model Performance During Stream Classification

    Abdul Sattar Palli1,6,*, Jafreezal Jaafar1,2, Manzoor Ahmed Hashmani1,3, Heitor Murilo Gomes4,5, Aeshah Alsughayyir7, Abdul Rehman Gilal1
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1827-1845, 2023, DOI:10.32604/cmc.2023.033934
    Abstract Every application in a smart city environment like the smart grid, health monitoring, security, and surveillance generates non-stationary data streams. Due to such nature, the statistical properties of data changes over time, leading to class imbalance and concept drift issues. Both these issues cause model performance degradation. Most of the current work has been focused on developing an ensemble strategy by training a new classifier on the latest data to resolve the issue. These techniques suffer while training the new classifier if the data is imbalanced. Also, the class imbalance ratio may change greatly from one input stream to another,… More >

  • Open AccessOpen Access

    ARTICLE

    Faster Metallic Surface Defect Detection Using Deep Learning with Channel Shuffling

    Siddiqui Muhammad Yasir1, Hyunsik Ahn2,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1847-1861, 2023, DOI:10.32604/cmc.2023.035698
    Abstract Deep learning has been constantly improving in recent years, and a significant number of researchers have devoted themselves to the research of defect detection algorithms. Detection and recognition of small and complex targets is still a problem that needs to be solved. The authors of this research would like to present an improved defect detection model for detecting small and complex defect targets in steel surfaces. During steel strip production, mechanical forces and environmental factors cause surface defects of the steel strip. Therefore, the detection of such defects is key to the production of high-quality products. Moreover, surface defects of… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Method to Detect the Road Cracks and Potholes for Smart Cities

    Hong-Hu Chu1, Muhammad Rizwan Saeed2, Javed Rashid3,4,*, Muhammad Tahir Mehmood5, Israr Ahmad6, Rao Sohail Iqbal4, Ghulam Ali1
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1863-1881, 2023, DOI:10.32604/cmc.2023.035287
    Abstract The increasing global population at a rapid pace makes road traffic dense; managing such massive traffic is challenging. In developing countries like Pakistan, road traffic accidents (RTA) have the highest mortality percentage among other Asian countries. The main reasons for RTAs are road cracks and potholes. Understanding the need for an automated system for the detection of cracks and potholes, this study proposes a decision support system (DSS) for an autonomous road information system for smart city development with the use of deep learning. The proposed DSS works in layers where initially the image of roads is captured and coordinates… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Dynamic Dipper Throated Optimization for Feature Selection in Medical Data

    Ghada Atteia1, El-Sayed M. El-kenawy2,3, Nagwan Abdel Samee1,*, Mona M. Jamjoom4, Abdelhameed Ibrahim5, Abdelaziz A. Abdelhamid6,7, Ahmad Taher Azar8,9, Nima Khodadadi10,11, Reham A. Ghanem12, Mahmoud Y. Shams13
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1883-1900, 2023, DOI:10.32604/cmc.2023.031723
    Abstract The rapid population growth results in a crucial problem in the early detection of diseases in medical research. Among all the cancers unveiled, breast cancer is considered the second most severe cancer. Consequently, an exponential rising in death cases incurred by breast cancer is expected due to the rapid population growth and the lack of resources required for performing medical diagnoses. Utilizing recent advances in machine learning could help medical staff in diagnosing diseases as they offer effective, reliable, and rapid responses, which could help in decreasing the death risk. In this paper, we propose a new algorithm for feature… More >

  • Open AccessOpen Access

    ARTICLE

    Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things

    Ahmad O. Aseeri1, Sajjad Hussain Chauhdary2,*, Mohammed Saeed Alkatheiri3, Mohammed A. Alqarni4, Yu Zhuang5
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1901-1918, 2023, DOI:10.32604/cmc.2023.028777
    Abstract IoT devices rely on authentication mechanisms to render secure message exchange. During data transmission, scalability, data integrity, and processing time have been considered challenging aspects for a system constituted by IoT devices. The application of physical unclonable functions (PUFs) ensures secure data transmission among the internet of things (IoT) devices in a simplified network with an efficient time-stamped agreement. This paper proposes a secure, lightweight, cost-efficient reinforcement machine learning framework (SLCR-MLF) to achieve decentralization and security, thus enabling scalability, data integrity, and optimized processing time in IoT devices. PUF has been integrated into SLCR-MLF to improve the security of the… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning Based Classifiers for QoE Prediction Framework in Video Streaming over 5G Wireless Networks

    K. B. Ajeyprasaath, P. Vetrivelan*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1919-1939, 2023, DOI:10.32604/cmc.2023.036013
    Abstract Recently, the combination of video services and 5G networks have been gaining attention in the wireless communication realm. With the brisk advancement in 5G network usage and the massive popularity of three-dimensional video streaming, the quality of experience (QoE) of video in 5G systems has been receiving overwhelming significance from both customers and service provider ends. Therefore, effectively categorizing QoE-aware video streaming is imperative for achieving greater client satisfaction. This work makes the following contribution: First, a simulation platform based on NS-3 is introduced to analyze and improve the performance of video services. The simulation is formulated to offer real-time… More >

  • Open AccessOpen Access

    ARTICLE

    Relative-Position Estimation Based on Loosely Coupled UWB–IMU Fusion for Wearable IoT Devices

    A. S. M. Sharifuzzaman Sagar1, Taein Kim1, Soyoung Park1, Hee Seh Lee2, Hyung Seok Kim1,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1941-1961, 2023, DOI:10.32604/cmc.2023.035360
    Abstract Relative positioning is one of the important techniques in collaborative robotics, autonomous vehicles, and virtual/augmented reality (VR/AR) applications. Recently, ultra-wideband (UWB) has been utilized to calculate relative position as it does not require a line of sight compared to a camera to calculate the range between two objects with centimeter-level accuracy. However, the single UWB range measurement cannot provide the relative position and attitude of any device in three dimensions (3D) because of lacking bearing information. In this paper, we have proposed a UWB-IMU fusion-based relative position system to provide accurate relative position and attitude between wearable Internet of Things… More >

  • Open AccessOpen Access

    ARTICLE

    Accelerating Falcon Post-Quantum Digital Signature Algorithm on Graphic Processing Units

    Seog Chung Seo1, Sang Woo An2, Dooho Choi3,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1963-1980, 2023, DOI:10.32604/cmc.2023.033910
    Abstract Since 2016, the National Institute of Standards and Technology (NIST) has been performing a competition to standardize post-quantum cryptography (PQC). Although Falcon has been selected in the competition as one of the standard PQC algorithms because of its advantages in short key and signature sizes, its performance overhead is larger than that of other lattice-based cryptosystems. This study presents multiple methodologies to accelerate the performance of Falcon using graphics processing units (GPUs) for server-side use. Direct GPU porting significantly degrades performance because the Falcon reference codes require recursive functions in its sampling process. Thus, an iterative sampling approach for efficient… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Model Ensemble for the Accuracy of Classification Degenerative Arthritis

    Sang-min Lee*, Namgi Kim
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1981-1994, 2023, DOI:10.32604/cmc.2023.035245
    Abstract Artificial intelligence technologies are being studied to provide scientific evidence in the medical field and developed for use as diagnostic tools. This study focused on deep learning models to classify degenerative arthritis into Kellgren–Lawrence grades. Specifically, degenerative arthritis was assessed by X-ray radiographic images and classified into five classes. Subsequently, the use of various deep learning models was investigated for automating the degenerative arthritis classification process. Although research on the classification of osteoarthritis using deep learning has been conducted in previous studies, only local models have been used, and an ensemble of deep learning models has never been applied to… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning for Image Segmentation: A Focus on Medical Imaging

    Ali F. Khalifa1, Eman Badr1,2,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1995-2024, 2023, DOI:10.32604/cmc.2023.035888
    Abstract Image segmentation is crucial for various research areas. Many computer vision applications depend on segmenting images to understand the scene, such as autonomous driving, surveillance systems, robotics, and medical imaging. With the recent advances in deep learning (DL) and its confounding results in image segmentation, more attention has been drawn to its use in medical image segmentation. This article introduces a survey of the state-of-the-art deep convolution neural network (CNN) models and mechanisms utilized in image segmentation. First, segmentation models are categorized based on their model architecture and primary working principle. Then, CNN categories are described, and various models are… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Consistent Management to Prevent System Collapse on Shared Object Manipulation in Mixed Reality

    Jun Lee1, Hyun Kwon2,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2025-2042, 2023, DOI:10.32604/cmc.2023.036051
    Abstract A concurrency control mechanism for collaborative work is a key element in a mixed reality environment. However, conventional locking mechanisms restrict potential tasks or the support of non-owners, thus increasing the working time because of waiting to avoid conflicts. Herein, we propose an adaptive concurrency control approach that can reduce conflicts and work time. We classify shared object manipulation in mixed reality into detailed goals and tasks. Then, we model the relationships among goal, task, and ownership. As the collaborative work progresses, the proposed system adapts the different concurrency control mechanisms of shared object manipulation according to the modeling of… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things

    Chaoyang Li1, Yanbu Guo1, Mianxiong Dong2,*, Gang Xu3, Xiu-Bo Chen4, Jian Li4, Kaoru Ota2
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2043-2059, 2023, DOI:10.32604/cmc.2023.033670
    Abstract Internet of Medical Things (IoMT) plays an essential role in collecting and managing personal medical data. In recent years, blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data. However, some problems in the information transfer process between wireless medical devices and mobile medical apps, such as information leakage and privacy disclosure. This paper first designs a cross-device key agreement model for blockchain-enabled IoMT. This model can establish a key agreement mechanism for secure medical data sharing. Meanwhile, a certificateless authenticated key agreement (KA) protocol has been… More >

  • Open AccessOpen Access

    ARTICLE

    JShellDetector: A Java Fileless Webshell Detector Based on Program Analysis

    Xuyan Song, Yiting Qin, Xinyao Liu, Baojiang Cui*, Junsong Fu
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.034505
    Abstract Fileless webshell attacks against Java web applications have become more frequent in recent years as Java has gained market share. Webshell is a malicious script that can remotely execute commands and invade servers. It is widely used in attacks against web applications. In contrast to traditional file-based webshells, fileless webshells leave no traces on the hard drive, which means they are invisible to most antivirus software. To make matters worse, although there are some studies on fileless webshells, almost all of them are aimed at web applications developed in the PHP language. The complex mechanism of Java makes researchers face… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Strategies Trajectory with Multi-Local-Worlds Graph

    Xiang Yu1, Chonghua Wang2, Xiaojing Zheng3,*, Chaoyu Zeng4, Brij B. Gupta5,6,7
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2079-2099, 2023, DOI:10.32604/cmc.2023.034118
    Abstract This paper constructs a non-cooperative/cooperative stochastic differential game model to prove that the optimal strategies trajectory of agents in a system with a topological configuration of a Multi-Local-World graph would converge into a certain attractor if the system’s configuration is fixed. Due to the economics and management property, almost all systems are divided into several independent Local-Worlds, and the interaction between agents in the system is more complex. The interaction between agents in the same Local-World is defined as a stochastic differential cooperative game; conversely, the interaction between agents in different Local-Worlds is defined as a stochastic differential non-cooperative game.… More >

  • Open AccessOpen Access

    ARTICLE

    Edge Computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet

    Yanping Chen1,2,3, Xuyang Bai1,2,3,*, Xiaomin Jin1,2,3, Zhongmin Wang1,2,3, Fengwei Wang4, Li Ling4
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2101-2117, 2023, DOI:10.32604/cmc.2023.035530
    Abstract Deploying task caching at edge servers has become an effective way to handle compute-intensive and latency-sensitive tasks on the industrial internet. However, how to select the task scheduling location to reduce task delay and cost while ensuring the data security and reliable communication of edge computing remains a challenge. To solve this problem, this paper establishes a task scheduling model with joint blockchain and task caching in the industrial internet and designs a novel blockchain-assisted caching mechanism to enhance system security. In this paper, the task scheduling problem, which couples the task scheduling decision, task caching decision, and blockchain reward,… More >

  • Open AccessOpen Access

    ARTICLE

    Internet of Things Intrusion Detection System Based on Convolutional Neural Network

    Jie Yin1,2,3,*, Yuxuan Shi1, Wen Deng1, Chang Yin1, Tiannan Wang1, Yuchen Song1, Tianyao Li1, Yicheng Li1
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2119-2135, 2023, DOI:10.32604/cmc.2023.035077
    Abstract In recent years, the Internet of Things (IoT) technology has developed by leaps and bounds. However, the large and heterogeneous network structure of IoT brings high management costs. In particular, the low cost of IoT devices exposes them to more serious security concerns. First, a convolutional neural network intrusion detection system for IoT devices is proposed. After cleaning and preprocessing the NSL-KDD dataset, this paper uses feature engineering methods to select appropriate features. Then, based on the combination of DCNN and machine learning, this paper designs a cloud-based loss function, which adopts a regularization method to prevent overfitting. The model… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Lightweight Image Encryption Scheme

    Rawia Abdulla Mohammed1,*, Maisa’a Abid Ali Khodher1, Ashwak Alabaichi2
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2137-2153, 2023, DOI:10.32604/cmc.2023.036861
    Abstract Encryption algorithms are one of the methods to protect data during its transmission through an unsafe transmission medium. But encryption methods need a lot of time during encryption and decryption, so it is necessary to find encryption algorithms that consume little time while preserving the security of the data. In this paper, more than one algorithm was combined to obtain high security with a short implementation time. A chaotic system, DNA computing, and Salsa20 were combined. A proposed 5D chaos system was used to generate more robust keys in a Salsa algorithm and DNA computing. Also, the confusion is performed… More >

  • Open AccessOpen Access

    ARTICLE

    Numerical Computation of SEIR Model for the Zika Virus Spreading

    Suthep Suantai1,2, Zulqurnain Sabir3,4, Muhammad Asif Zahoor Raja5, Watcharaporn Cholamjiak6,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2155-2170, 2023, DOI:10.32604/cmc.2023.034699
    Abstract The purpose of this study is to present the numerical performances and interpretations of the SEIR nonlinear system based on the Zika virus spreading by using the stochastic neural networks based intelligent computing solver. The epidemic form of the nonlinear system represents the four dynamics of the patients, susceptible patients S(y), exposed patients hospitalized in hospital E(y), infected patients I(y), and recovered patients R(y), i.e., SEIR model. The computing numerical outcomes and performances of the system are examined by using the artificial neural networks (ANNs) and the scaled conjugate gradient (SCG) for the training of the networks, i.e., ANNs-SCG. The… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility

    Rupali Gangarde1,2,*, Amit Sharma3, Ambika Pawar4
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2171-2190, 2023, DOI:10.32604/cmc.2023.035559
    Abstract Online Social Networks (OSN) sites allow end-users to share a great deal of information, which may also contain sensitive information, that may be subject to commercial or non-commercial privacy attacks. As a result, guaranteeing various levels of privacy is critical while publishing data by OSNs. The clustering-based solutions proved an effective mechanism to achieve the privacy notions in OSNs. But fixed clustering limits the performance and scalability. Data utility degrades with increased privacy, so balancing the privacy utility trade-off is an open research issue. The research has proposed a novel privacy preservation model using the enhanced clustering mechanism to overcome… More >

  • Open AccessOpen Access

    ARTICLE

    Fast Detection and Classification of Dangerous Urban Sounds Using Deep Learning

    Zeinel Momynkulov1, Zhandos Dosbayev2,3,*, Azizah Suliman4, Bayan Abduraimova5, Nurzhigit Smailov2, Maigul Zhekambayeva2, Dusmat Zhamangarin6
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2191-2208, 2023, DOI:10.32604/cmc.2023.036205
    Abstract Video analytics is an integral part of surveillance cameras. Compared to video analytics, audio analytics offers several benefits, including less expensive equipment and upkeep expenses. Additionally, the volume of the audio datastream is substantially lower than the video camera datastream, especially concerning real-time operating systems, which makes it less demanding of the data channel’s bandwidth needs. For instance, automatic live video streaming from the site of an explosion and gunshot to the police console using audio analytics technologies would be exceedingly helpful for urban surveillance. Technologies for audio analytics may also be used to analyze video recordings and identify occurrences.… More >

  • Open AccessOpen Access

    ARTICLE

    Nondestructive Testing of Bridge Stay Cable Surface Defects Based on Computer Vision

    Fengyu Xu1,2, Masoud Kalantari3, Bangjian Li2, Xingsong Wang2,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2209-2226, 2023, DOI:10.32604/cmc.2023.027102
    Abstract The automatically defect detection method using vision inspection is a promising direction. In this paper, an efficient defect detection method for detecting surface damage to cables on a cable-stayed bridge automatically is developed. A mechanism design method for the protective layer of cables of a bridge based on vision inspection and diameter measurement is proposed by combining computer vision and diameter measurement techniques. A detection system for the surface damages of cables is de-signed. Images of cable surfaces are then enhanced and subjected to threshold segmentation by utilizing the improved local grey contrast enhancement method and the improved maximum correlation… More >

  • Open AccessOpen Access

    ARTICLE

    Gastrointestinal Diseases Classification Using Deep Transfer Learning and Features Optimization

    Mousa Alhajlah1, Muhammad Nouman Noor2, Muhammad Nazir2, Awais Mahmood1,*, Imran Ashraf3, Tehmina Karamat4
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2227-2245, 2023, DOI:10.32604/cmc.2023.031890
    Abstract Gastrointestinal diseases like ulcers, polyps’, and bleeding are increasing rapidly in the world over the last decade. On average 0.7 million cases are reported worldwide every year. The main cause of gastrointestinal diseases is a Helicobacter Pylori (H. Pylori) bacterium that presents in more than 50% of people around the globe. Many researchers have proposed different methods for gastrointestinal disease using computer vision techniques. Few of them focused on the detection process and the rest of them performed classification. The major challenges that they faced are the similarity of infected and healthy regions that misleads the correct classification accuracy. In… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Vision Based Fish Cutting Point Prediction for Target Weight

    Yonghun Jang, Yeong-Seok Seo*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2247-2263, 2023, DOI:10.32604/cmc.2023.027882
    Abstract Food processing companies pursue the distribution of ingredients that were packaged according to a certain weight. Particularly, foods like fish are highly demanded and supplied. However, despite the high quantity of fish to be supplied, most seafood processing companies have yet to install automation equipment. Such absence of automation equipment for seafood processing incurs a considerable cost regarding labor force, economy, and time. Moreover, workers responsible for fish processing are exposed to risks because fish processing tasks require the use of dangerous tools, such as power saws or knives. To solve these problems observed in the fish processing field, this… More >

  • Open AccessOpen Access

    ARTICLE

    Blood Vessel Segmentation with Classification Model for Diabetic Retinopathy Screening

    Abdullah O. Alamoudi1,*, Sarah Mohammed Allabun2
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2265-2281, 2023, DOI:10.32604/cmc.2023.032429
    Abstract Biomedical image processing is finding useful in healthcare sector for the investigation, enhancement, and display of images gathered by distinct imaging technologies. Diabetic retinopathy (DR) is an illness caused by diabetes complications and leads to irreversible injury to the retina blood vessels. Retinal vessel segmentation techniques are a basic element of automated retinal disease screening system. In this view, this study presents a novel blood vessel segmentation with deep learning based classification (BVS-DLC) model for DR diagnosis using retinal fundus images. The proposed BVS-DLC model involves different stages of operations such as preprocessing, segmentation, feature extraction, and classification. Primarily, the… More >

  • Open AccessOpen Access

    ARTICLE

    Automated Brain Hemorrhage Classification and Volume Analysis

    Maryam Wardah1, Muhammad Mateen1,*, Tauqeer Safdar Malik2, Mohammad Eid Alzahrani3, Adil Fahad3, Abdulmohsen Almalawi4, Rizwan Ali Naqvi5
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2283-2299, 2023, DOI:10.32604/cmc.2023.030706
    Abstract Brain hemorrhage is a serious and life-threatening condition. It can cause permanent and lifelong disability even when it is not fatal. The word hemorrhage denotes leakage of blood within the brain and this leakage of blood from capillaries causes stroke and adequate supply of oxygen to the brain is hindered. Modern imaging methods such as computed tomography (CT) and magnetic resonance imaging (MRI) are employed to get an idea regarding the extent of the damage. An early diagnosis and treatment can save lives and limit the adverse effects of a brain hemorrhage. In this case, a deep neural network (DNN)… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Bimodal Fusion Approach for Apparent Personality Analysis

    Saman Riaz1, Ali Arshad2, Shahab S. Band3,*, Amir Mosavi4
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2301-2312, 2023, DOI:10.32604/cmc.2023.028333
    Abstract Personality distinguishes individuals’ patterns of feeling, thinking, and behaving. Predicting personality from small video series is an exciting research area in computer vision. The majority of the existing research concludes preliminary results to get immense knowledge from visual and Audio (sound) modality. To overcome the deficiency, we proposed the Deep Bimodal Fusion (DBF) approach to predict five traits of personality-agreeableness, extraversion, openness, conscientiousness and neuroticism. In the proposed framework, regarding visual modality, the modified convolution neural networks (CNN), more specifically Descriptor Aggregator Model (DAN) are used to attain significant visual modality. The proposed model extracts audio representations for greater efficiency… More >

  • Open AccessOpen Access

    ARTICLE

    Energy Management System with Power Offering Strategy for a Microgrid Integrated VPP

    Yeonwoo Lee*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2313-2329, 2023, DOI:10.32604/cmc.2023.031133
    Abstract In the context of both the Virtual Power Plant (VPP) and microgrid (MG), the Energy Management System (EMS) is a key decision-maker for integrating Distributed renewable Energy Resources (DERs) efficiently. The EMS is regarded as a strong enabler of providing the optimized scheduling control in operation and management of usage of disperse DERs and Renewable Energy reSources (RES) such as a small-size wind-turbine (WT) and photovoltaic (PV) energies. The main objective to be pursued by the EMS is the minimization of the overall operating cost of the MG integrated VPP network. However, the minimization of the power peaks is a… More >

  • Open AccessOpen Access

    ARTICLE

    Home Automation-Based Health Assessment Along Gesture Recognition via Inertial Sensors

    Hammad Rustam1, Muhammad Muneeb1, Suliman A. Alsuhibany2, Yazeed Yasin Ghadi3, Tamara Al Shloul4, Ahmad Jalal1, Jeongmin Park5,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2331-2346, 2023, DOI:10.32604/cmc.2023.028712
    Abstract Hand gesture recognition (HGR) is used in a numerous applications, including medical health-care, industrial purpose and sports detection. We have developed a real-time hand gesture recognition system using inertial sensors for the smart home application. Developing such a model facilitates the medical health field (elders or disabled ones). Home automation has also been proven to be a tremendous benefit for the elderly and disabled. Residents are admitted to smart homes for comfort, luxury, improved quality of life, and protection against intrusion and burglars. This paper proposes a novel system that uses principal component analysis, linear discrimination analysis feature extraction, and… More >

Per Page:

Share Link