Home / Journals / CMC / Vol.81, No.3, 2024
Special Issues
Table of Content
  • Open AccessOpen Access

    TECHNICAL REPORT

    User Instructions for the Dynamic Database of Solid-State Electrolyte 2.0 (DDSE 2.0)

    Fangling Yang, Qian Wang, Eric Jianfeng Cheng, Di Zhang, Hao Li*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3413-3419, 2024, DOI:10.32604/cmc.2024.060288 - 19 December 2024
    Abstract The Dynamic Database of Solid-State Electrolyte (DDSE) is an advanced online platform offering a comprehensive suite of tools for solid-state battery research and development. Its key features include statistical analysis of both experimental and computational solid-state electrolyte (SSE) data, interactive visualization through dynamic charts, user data assessment, and literature analysis powered by a large language model. By facilitating the design and optimization of novel SSEs, DDSE serves as a critical resource for advancing solid-state battery technology. This Technical Report provides detailed tutorials and practical examples to guide users in effectively utilizing the platform. More >

  • Open AccessOpen Access

    REVIEW

    Blockchain-Assisted Electronic Medical Data-Sharing: Developments, Approaches and Perspectives

    Chenquan Gan1,*, Xinghai Xiao2, Qingyi Zhu1, Deepak Kumar Jain3,4, Akanksha Saini5
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3421-3450, 2024, DOI:10.32604/cmc.2024.059359 - 19 December 2024
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract Medical blockchain data-sharing is a technique that employs blockchain technology to facilitate the sharing of electronic medical data. The blockchain is a decentralized digital ledger that ensures data-sharing security, transparency, and traceability through cryptographic technology and consensus algorithms. Consequently, medical blockchain data-sharing methods have garnered significant attention and research efforts. Nevertheless, current methods have different storage and transmission measures for original data in the medical blockchain, resulting in large differences in performance and privacy. Therefore, we divide the medical blockchain data-sharing method into on-chain sharing and off-chain sharing according to the original data storage location. More >

  • Open AccessOpen Access

    REVIEW

    The Metaverse Review: Exploring the Boundless Ream of Digital Reality

    Shi Dong*, Mengke Liu, Khushnood Abbas
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3451-3498, 2024, DOI:10.32604/cmc.2024.055575 - 19 December 2024
    Abstract The metaverse has emerged as a prominent topic with growing interest fueled by advancements in Web 3.0, blockchain, and immersive technologies. This paper presents a thorough analysis of the metaverse, showcasing its evolution from a conceptual phase rooted in science fiction to a dynamic and transformative digital environment impacting various sectors including gaming, education, healthcare, and entertainment. The paper introduces the metaverse, details its historical development, and introduces key technologies that enable its existence such as virtual and augmented reality, blockchain, and artificial intelligence. Further this work explores diverse application scenarios, future trends, and critical More >

  • Open AccessOpen Access

    REVIEW

    Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity

    Ali Hassan1, N. Nizam-Uddin2, Asim Quddus3, Syed Rizwan Hassan4, Ateeq Ur Rehman5,*, Salil Bharany6
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3499-3559, 2024, DOI:10.32604/cmc.2024.057877 - 19 December 2024
    Abstract Enhancing the interconnection of devices and systems, the Internet of Things (IoT) is a paradigm-shifting technology. IoT security concerns are still a substantial concern despite its extraordinary advantages. This paper offers an extensive review of IoT security, emphasizing the technology’s architecture, important security elements, and common attacks. It highlights how important artificial intelligence (AI) is to bolstering IoT security, especially when it comes to addressing risks at different IoT architecture layers. We systematically examined current mitigation strategies and their effectiveness, highlighting contemporary challenges with practical solutions and case studies from a range of industries, such More >

  • Open AccessOpen Access

    REVIEW

    A Survey on Supervised, Unsupervised, and Semi-Supervised Approaches in Crowd Counting

    Jianyong Wang1, Mingliang Gao1, Qilei Li2, Hyunbum Kim3, Gwanggil Jeon3,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3561-3582, 2024, DOI:10.32604/cmc.2024.058637 - 19 December 2024
    Abstract Quantifying the number of individuals in images or videos to estimate crowd density is a challenging yet crucial task with significant implications for fields such as urban planning and public safety. Crowd counting has attracted considerable attention in the field of computer vision, leading to the development of numerous advanced models and methodologies. These approaches vary in terms of supervision techniques, network architectures, and model complexity. Currently, most crowd counting methods rely on fully supervised learning, which has proven to be effective. However, this approach presents challenges in real-world scenarios, where labeled data and ground-truth… More >

  • Open AccessOpen Access

    REVIEW

    A Review of Knowledge Graph in Traditional Chinese Medicine: Analysis, Construction, Application and Prospects

    Xiaolong Qu1,2,3, Ziwei Tian1,3, Jinman Cui1,3, Ruowei Li1,3, Dongmei Li1,3,*, Xiaoping Zhang2,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3583-3616, 2024, DOI:10.32604/cmc.2024.055671 - 19 December 2024
    Abstract As an advanced data science technology, the knowledge graph systematically integrates and displays the knowledge framework within the field of traditional Chinese medicine (TCM). This not only contributes to a deeper comprehension of traditional Chinese medical theories but also provides robust support for the intelligent decision systems and medical applications of TCM. Against this backdrop, this paper aims to systematically review the current status and development trends of TCM knowledge graphs, offering theoretical and technical foundations to facilitate the inheritance, innovation, and integrated development of TCM. Firstly, we introduce the relevant concepts and research status… More >

  • Open AccessOpen Access

    REVIEW

    Recent Technology Advancements in Smart City Management: A Review

    Chiranjeevi Karri1,2,*, José J. M. Machado3, João Manuel R. S. Tavares1, Deepak Kumar Jain4, Suresh Dannana5, Santosh Kumar Gottapu6, Amir H. Gandomi7,8
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3617-3663, 2024, DOI:10.32604/cmc.2024.058461 - 19 December 2024
    (This article belongs to the Special Issue: Security and Privacy in IoT and Smart City: Current Challenges and Future Directions)
    Abstract The rapid population growth, insecure lifestyle, wastage of natural resources, indiscipline behavior of human beings, urgency in the medical field, security of patient information, agricultural-related problems, and automation requirements in industries are the reasons for invention of technologies. Smart cities aim to address these challenges through the integration of technology, data, and innovative practices. Building a smart city involves integrating advanced technologies and data-driven solutions to enhance urban living, improve resource efficiency, and create sustainable environments. This review presents five of the most critical technologies for smart and/or safe cities, addressing pertinent topics such as More >

  • Open AccessOpen Access

    ARTICLE

    Mechanical Properties of Copper with Dendritic Silver Inclusions: Insights from Molecular Dynamics Simulations

    Nicolás Amigo*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3665-3678, 2024, DOI:10.32604/cmc.2024.059895 - 19 December 2024
    Abstract This study explores the mechanical behavior of single-crystal copper with silver inclusions, focusing on the effects of dendritic and spherical geometries using molecular dynamics simulations. Uniaxial tensile tests reveal that dendritic inclusions lead to an earlier onset of plasticity due to the presence of high-strain regions at the complex inclusion/matrix interfaces, whereas spherical inclusions exhibit delayed plasticity associated with their symmetric geometry and homogeneous strain distribution. During the plastic regime, the dislocation density is primarily influenced by the volume fraction of silver inclusions rather than their shape, with spherical inclusions showing the highest densities due… More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach

    Kithmini Godewatte Arachchige1, Mohsin Murtaza2, Chi-Tsun Cheng2, Bader M. Albahlal3,*, Cheng-Chi Lee4,5,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3679-3705, 2024, DOI:10.32604/cmc.2024.059378 - 19 December 2024
    (This article belongs to the Special Issue: Security and Privacy in IoT and Smart City: Current Challenges and Future Directions)
    Abstract Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats, with Internet of Things (IoT) security gaining particular attention due to its role in data communication across various industries. However, IoT devices, typically low-powered, are susceptible to cyber threats. Conversely, blockchain has emerged as a robust solution to secure these devices due to its decentralised nature. Nevertheless, the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks, network scalability limitations, and blockchain-specific security vulnerabilities. Blockchain, on the other hand, is a recently emerged information… More >

  • Open AccessOpen Access

    ARTICLE

    A Scalable and Generalized Deep Ensemble Model for Road Anomaly Detection in Surveillance Videos

    Sarfaraz Natha1,2,*, Fareed A. Jokhio1, Mehwish Laghari1, Mohammad Siraj3,*, Saif A. Alsaif3, Usman Ashraf4, Asghar Ali5
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3707-3729, 2024, DOI:10.32604/cmc.2024.057684 - 19 December 2024
    (This article belongs to the Special Issue: Computer Vision for Smart Cities)
    Abstract Surveillance cameras have been widely used for monitoring in both private and public sectors as a security measure. Close Circuits Television (CCTV) Cameras are used to surveillance and monitor the normal and anomalous incidents. Real-world anomaly detection is a significant challenge due to its complex and diverse nature. It is difficult to manually analyze because vast amounts of video data have been generated through surveillance systems, and the need for automated techniques has been raised to enhance detection accuracy. This paper proposes a novel deep-stacked ensemble model integrated with a data augmentation approach called Stack… More >

  • Open AccessOpen Access

    ARTICLE

    Advancing Breast Cancer Diagnosis: The Development and Validation of the HERA-Net Model for Thermographic Analysis

    S. Ramacharan1,*, Martin Margala1, Amjan Shaik2, Prasun Chakrabarti3, Tulika Chakrabarti4
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3731-3760, 2024, DOI:10.32604/cmc.2024.058488 - 19 December 2024
    Abstract Breast cancer remains a significant global health concern, with early detection being crucial for effective treatment and improved survival rates. This study introduces HERA-Net (Hybrid Extraction and Recognition Architecture), an advanced hybrid model designed to enhance the diagnostic accuracy of breast cancer detection by leveraging both thermographic and ultrasound imaging modalities. The HERA-Net model integrates powerful deep learning architectures, including VGG19, U-Net, GRU (Gated Recurrent Units), and ResNet-50, to capture multi-dimensional features that support robust image segmentation, feature extraction, and temporal analysis. For thermographic imaging, a comprehensive dataset of 3534 infrared (IR) images from the… More >

  • Open AccessOpen Access

    ARTICLE

    Contribution Tracking Feature Selection (CTFS) Based on the Fusion of Sparse Autoencoder and Mutual Information

    Yifan Yu, Dazhi Wang*, Yanhua Chen, Hongfeng Wang, Min Huang
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3761-3780, 2024, DOI:10.32604/cmc.2024.057103 - 19 December 2024
    Abstract For data mining tasks on large-scale data, feature selection is a pivotal stage that plays an important role in removing redundant or irrelevant features while improving classifier performance. Traditional wrapper feature selection methodologies typically require extensive model training and evaluation, which cannot deliver desired outcomes within a reasonable computing time. In this paper, an innovative wrapper approach termed Contribution Tracking Feature Selection (CTFS) is proposed for feature selection of large-scale data, which can locate informative features without population-level evolution. In other words, fewer evaluations are needed for CTFS compared to other evolutionary methods. We initially More >

  • Open AccessOpen Access

    ARTICLE

    A Location Trajectory Privacy Protection Method Based on Generative Adversarial Network and Attention Mechanism

    Xirui Yang, Chen Zhang*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3781-3804, 2024, DOI:10.32604/cmc.2024.057131 - 19 December 2024
    (This article belongs to the Special Issue: Privacy-Preserving Deep Learning and its Advanced Applications)
    Abstract User location trajectory refers to the sequence of geographic location information that records the user’s movement or stay within a period of time and is usually used in mobile crowd sensing networks, in which the user participates in the sensing task, the process of sensing data collection faces the problem of privacy leakage. To address the privacy leakage issue of trajectory data during uploading, publishing, and sharing when users use location services on mobile smart group sensing terminal devices, this paper proposes a privacy protection method based on generative adversarial networks and attention mechanisms (BiLS-A-GAN).… More >

  • Open AccessOpen Access

    ARTICLE

    Design and Develop Function for Research Based Application of Intelligent Internet-of-Vehicles Model Based on Fog Computing

    Abduladheem Fadhil Khudhur*, Ayça Kurnaz Türkben, Sefer Kurnaz
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3805-3824, 2024, DOI:10.32604/cmc.2024.056941 - 19 December 2024
    (This article belongs to the Special Issue: Advanced Communication and Networking Technologies for Internet of Things and Internet of Vehicles)
    Abstract The fast growth in Internet-of-Vehicles (IoV) applications is rendering energy efficiency management of vehicular networks a highly important challenge. Most of the existing models are failing to handle the demand for energy conservation in large-scale heterogeneous environments. Based on Large Energy-Aware Fog (LEAF) computing, this paper proposes a new model to overcome energy-inefficient vehicular networks by simulating large-scale network scenarios. The main inspiration for this work is the ever-growing demand for energy efficiency in IoV-most particularly with the volume of generated data and connected devices. The proposed LEAF model enables researchers to perform simulations of… More >

  • Open AccessOpen Access

    ARTICLE

    A DDoS Identification Method for Unbalanced Data CVWGG

    Haizhen Wang1,2,*, Na Jia1,2, Yang He1, Pan Tan1,2
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3825-3851, 2024, DOI:10.32604/cmc.2024.055497 - 19 December 2024
    Abstract As the popularity and dependence on the Internet increase, DDoS (distributed denial of service) attacks seriously threaten network security. By accurately distinguishing between different types of DDoS attacks, targeted defense strategies can be formulated, significantly improving network protection efficiency. DDoS attacks usually manifest as an abnormal increase in network traffic, and their diverse types of attacks, along with a severe data imbalance, make it difficult for traditional classification methods to effectively identify a small number of attack types. To solve this problem, this paper proposes a DDoS recognition method CVWGG (Conditional Variational Autoencoder-Wasserstein Generative Adversarial… More >

  • Open AccessOpen Access

    ARTICLE

    RE-SMOTE: A Novel Imbalanced Sampling Method Based on SMOTE with Radius Estimation

    Dazhi E1, Jiale Liu2, Ming Zhang1,*, Huiyuan Jiang2, Keming Mao2
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3853-3880, 2024, DOI:10.32604/cmc.2024.057538 - 19 December 2024
    Abstract Imbalance is a distinctive feature of many datasets, and how to make the dataset balanced become a hot topic in the machine learning field. The Synthetic Minority Oversampling Technique (SMOTE) is the classical method to solve this problem. Although much research has been conducted on SMOTE, there is still the problem of synthetic sample singularity. To solve the issues of class imbalance and diversity of generated samples, this paper proposes a hybrid resampling method for binary imbalanced data sets, RE-SMOTE, which is designed based on the improvements of two oversampling methods parameter-free SMOTE (PF-SMOTE) and… More >

  • Open AccessOpen Access

    ARTICLE

    YOLO-DEI: Enhanced Information Fusion Model for Defect Detection in LCD

    Shi Luo, Sheng Zheng*, Yuxin Zhao
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3881-3901, 2024, DOI:10.32604/cmc.2024.056773 - 19 December 2024
    Abstract In the age of smart technology, the widespread use of small LCD (Liquid Crystal Display) necessitates pre-market defect detection to ensure quality and reduce the incidence of defective products. Manual inspection is both time-consuming and labor-intensive. Existing methods struggle with accurately detecting small targets, such as point defects, and handling defects with significant scale variations, such as line defects, especially in complex background conditions. To address these challenges, this paper presents the YOLO-DEI (Deep Enhancement Information) model, which integrates DCNv2 (Deformable convolution) into the backbone network to enhance feature extraction under geometric transformations. The model More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Optimized Deep Convolutional Neural Network for Efficient Seizure Stage Classification

    Umapathi Krishnamoorthy1,*, Shanmugam Jagan2, Mohammed Zakariah3, Abdulaziz S. Almazyad4,*, K. Gurunathan5
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3903-3926, 2024, DOI:10.32604/cmc.2024.055910 - 19 December 2024
    Abstract Brain signal analysis from electroencephalogram (EEG) recordings is the gold standard for diagnosing various neural disorders especially epileptic seizure. Seizure signals are highly chaotic compared to normal brain signals and thus can be identified from EEG recordings. In the current seizure detection and classification landscape, most models primarily focus on binary classification—distinguishing between seizure and non-seizure states. While effective for basic detection, these models fail to address the nuanced stages of seizures and the intervals between them. Accurate identification of per-seizure or interictal stages and the timing between seizures is crucial for an effective seizure… More >

  • Open AccessOpen Access

    ARTICLE

    UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems

    Ting Chen1, Shujiao Wang2, Xin Fan3,*, Xiujuan Zhang2, Chuanwen Luo3, Yi Hong3
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3927-3950, 2024, DOI:10.32604/cmc.2024.056961 - 19 December 2024
    Abstract This paper investigates an unmanned aerial vehicle (UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything (V2X) systems. Due to the presence of an eavesdropper (Eve), the system’s communication links may be insecure. This paper proposes deploying an intelligent reflecting surface (IRS) on the UAV to enhance the communication performance of mobile vehicles, improve system flexibility, and alleviate eavesdropping on communication links. The links for uploading task data from vehicles to a base station (BS) are protected by IRS-assisted physical layer security (PLS). Upon receiving task data, the computing resources provided by the edge computing servers (MEC)… More >

  • Open AccessOpen Access

    ARTICLE

    Image Captioning Using Multimodal Deep Learning Approach

    Rihem Farkh1,*, Ghislain Oudinet1, Yasser Foued2
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3951-3968, 2024, DOI:10.32604/cmc.2024.053245 - 19 December 2024
    (This article belongs to the Special Issue: Metaheuristics, Soft Computing, and Machine Learning in Image Processing and Computer Vision)
    Abstract The process of generating descriptive captions for images has witnessed significant advancements in last years, owing to the progress in deep learning techniques. Despite significant advancements, the task of thoroughly grasping image content and producing coherent, contextually relevant captions continues to pose a substantial challenge. In this paper, we introduce a novel multimodal method for image captioning by integrating three powerful deep learning architectures: YOLOv8 (You Only Look Once) for robust object detection, EfficientNetB7 for efficient feature extraction, and Transformers for effective sequence modeling. Our proposed model combines the strengths of YOLOv8 in detecting objects,… More >

  • Open AccessOpen Access

    ARTICLE

    EGSNet: An Efficient Glass Segmentation Network Based on Multi-Level Heterogeneous Architecture and Boundary Awareness

    Guojun Chen*, Tao Cui, Yongjie Hou, Huihui Li
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3969-3987, 2024, DOI:10.32604/cmc.2024.056093 - 19 December 2024
    (This article belongs to the Special Issue: Research on Deep Learning-based Object Detection and Its Derivative Key Technologies)
    Abstract Existing glass segmentation networks have high computational complexity and large memory occupation, leading to high hardware requirements and time overheads for model inference, which is not conducive to efficiency-seeking real-time tasks such as autonomous driving. The inefficiency of the models is mainly due to employing homogeneous modules to process features of different layers. These modules require computationally intensive convolutions and weight calculation branches with numerous parameters to accommodate the differences in information across layers. We propose an efficient glass segmentation network (EGSNet) based on multi-level heterogeneous architecture and boundary awareness to balance the model performance… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved YOLO Detection Approach for Pinpointing Cucumber Diseases and Pests

    Ji-Yuan Ding1, Wang-Su Jeon2, Sang-Yong Rhee2,*, Chang-Man Zou1,3
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3989-4014, 2024, DOI:10.32604/cmc.2024.057473 - 19 December 2024
    Abstract In complex agricultural environments, cucumber disease identification is confronted with challenges like symptom diversity, environmental interference, and poor detection accuracy. This paper presents the DM-YOLO model, which is an enhanced version of the YOLOv8 framework designed to enhance detection accuracy for cucumber diseases. Traditional detection models have a tough time identifying small-scale and overlapping symptoms, especially when critical features are obscured by lighting variations, occlusion, and background noise. The proposed DM-YOLO model combines three innovative modules to enhance detection performance in a collective way. First, the MultiCat module employs a multi-scale feature processing strategy with… More >

  • Open AccessOpen Access

    ARTICLE

    Effective Controller Placement in Software-Defined Internet-of-Things Leveraging Deep Q-Learning (DQL)

    Jehad Ali1,*, Mohammed J. F. Alenazi2
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4015-4032, 2024, DOI:10.32604/cmc.2024.058480 - 19 December 2024
    Abstract The controller is a main component in the Software-Defined Networking (SDN) framework, which plays a significant role in enabling programmability and orchestration for 5G and next-generation networks. In SDN, frequent communication occurs between network switches and the controller, which manages and directs traffic flows. If the controller is not strategically placed within the network, this communication can experience increased delays, negatively affecting network performance. Specifically, an improperly placed controller can lead to higher end-to-end (E2E) delay, as switches must traverse more hops or encounter greater propagation delays when communicating with the controller. This paper introduces… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling and Predictive Analytics of Breast Cancer Using Ensemble Learning Techniques: An Explainable Artificial Intelligence Approach

    Avi Deb Raha1, Fatema Jannat Dihan2, Mrityunjoy Gain1, Saydul Akbar Murad3, Apurba Adhikary2, Md. Bipul Hossain2, Md. Mehedi Hassan1, Taher Al-Shehari4, Nasser A. Alsadhan5, Mohammed Kadrie4, Anupam Kumar Bairagi1,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4033-4048, 2024, DOI:10.32604/cmc.2024.057415 - 19 December 2024
    (This article belongs to the Special Issue: Emerging Trends and Applications of Deep Learning for Biomedical Signal and Image Processing)
    Abstract Breast cancer stands as one of the world’s most perilous and formidable diseases, having recently surpassed lung cancer as the most prevalent cancer type. This disease arises when cells in the breast undergo unregulated proliferation, resulting in the formation of a tumor that has the capacity to invade surrounding tissues. It is not confined to a specific gender; both men and women can be diagnosed with breast cancer, although it is more frequently observed in women. Early detection is pivotal in mitigating its mortality rate. The key to curbing its mortality lies in early detection.… More >

  • Open AccessOpen Access

    ARTICLE

    ML-SPAs: Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks

    Saad Awadh Alanazi*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4049-4080, 2024, DOI:10.32604/cmc.2024.057211 - 19 December 2024
    Abstract Spear Phishing Attacks (SPAs) pose a significant threat to the healthcare sector, resulting in data breaches, financial losses, and compromised patient confidentiality. Traditional defenses, such as firewalls and antivirus software, often fail to counter these sophisticated attacks, which target human vulnerabilities. To strengthen defenses, healthcare organizations are increasingly adopting Machine Learning (ML) techniques. ML-based SPA defenses use advanced algorithms to analyze various features, including email content, sender behavior, and attachments, to detect potential threats. This capability enables proactive security measures that address risks in real-time. The interpretability of ML models fosters trust and allows security… More >

  • Open AccessOpen Access

    ARTICLE

    A Fusion Model for Personalized Adaptive Multi-Product Recommendation System Using Transfer Learning and Bi-GRU

    Buchi Reddy Ramakantha Reddy, Ramasamy Lokesh Kumar*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4081-4107, 2024, DOI:10.32604/cmc.2024.057071 - 19 December 2024
    Abstract Traditional e-commerce recommendation systems often struggle with dynamic user preferences and a vast array of products, leading to suboptimal user experiences. To address this, our study presents a Personalized Adaptive Multi-Product Recommendation System (PAMR) leveraging transfer learning and Bi-GRU (Bidirectional Gated Recurrent Units). Using a large dataset of user reviews from Amazon and Flipkart, we employ transfer learning with pre-trained models (AlexNet, GoogleNet, ResNet-50) to extract high-level attributes from product data, ensuring effective feature representation even with limited data. Bi-GRU captures both spatial and sequential dependencies in user-item interactions. The innovation of this study lies… More >

  • Open AccessOpen Access

    ARTICLE

    Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks

    Brij B. Gupta1,2,3,4,*, Akshat Gaurav5, Varsha Arya6,7, Razaz Waheeb Attar8, Shavi Bansal9, Ahmed Alhomoud10, Kwok Tai Chui11
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4109-4124, 2024, DOI:10.32604/cmc.2024.056476 - 19 December 2024
    Abstract Phishing attacks seriously threaten information privacy and security within the Internet of Things (IoT) ecosystem. Numerous phishing attack detection solutions have been developed for IoT; however, many of these are either not optimally efficient or lack the lightweight characteristics needed for practical application. This paper proposes and optimizes a lightweight deep-learning model for phishing attack detection. Our model employs a two-fold optimization approach: first, it utilizes the analysis of the variance (ANOVA) F-test to select the optimal features for phishing detection, and second, it applies the Cuckoo Search algorithm to tune the hyperparameters (learning rate… More >

  • Open AccessOpen Access

    ARTICLE

    MDD: A Unified Multimodal Deep Learning Approach for Depression Diagnosis Based on Text and Audio Speech

    Farah Mohammad1,2,*, Khulood Mohammed Al Mansoor3
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4125-4147, 2024, DOI:10.32604/cmc.2024.056666 - 19 December 2024
    Abstract Depression is a prevalent mental health issue affecting individuals of all age groups globally. Similar to other mental health disorders, diagnosing depression presents significant challenges for medical practitioners and clinical experts, primarily due to societal stigma and a lack of awareness and acceptance. Although medical interventions such as therapies, medications, and brain stimulation therapy provide hope for treatment, there is still a gap in the efficient detection of depression. Traditional methods, like in-person therapies, are both time-consuming and labor-intensive, emphasizing the necessity for technological assistance, especially through Artificial Intelligence. Alternative to this, in most cases… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Network Security: A Deep Learning Approach to Intrusion Detection in IoT

    Ammar Odeh*, Anas Abu Taleb
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4149-4169, 2024, DOI:10.32604/cmc.2024.058052 - 19 December 2024
    (This article belongs to the Special Issue: Fortifying the Foundations: IoT Intrusion Detection Systems in Cloud-Edge-End Architecture)
    Abstract The proliferation of Internet of Things (IoT) technology has exponentially increased the number of devices interconnected over networks, thereby escalating the potential vectors for cybersecurity threats. In response, this study rigorously applies and evaluates deep learning models—namely Convolutional Neural Networks (CNN), Autoencoders, and Long Short-Term Memory (LSTM) networks—to engineer an advanced Intrusion Detection System (IDS) specifically designed for IoT environments. Utilizing the comprehensive UNSW-NB15 dataset, which encompasses 49 distinct features representing varied network traffic characteristics, our methodology focused on meticulous data preprocessing including cleaning, normalization, and strategic feature selection to enhance model performance. A robust… More >

  • Open AccessOpen Access

    ARTICLE

    CHART: Intelligent Crime Hotspot Detection and Real-Time Tracking Using Machine Learning

    Rashid Ahmad1, Asif Nawaz1,*, Ghulam Mustafa1, Tariq Ali1, Mehdi Tlija2, Mohammed A. El-Meligy3,4, Zohair Ahmed5
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4171-4194, 2024, DOI:10.32604/cmc.2024.056971 - 19 December 2024
    Abstract Crime hotspot detection is essential for law enforcement agencies to allocate resources effectively, predict potential criminal activities, and ensure public safety. Traditional methods of crime analysis often rely on manual, time-consuming processes that may overlook intricate patterns and correlations within the data. While some existing machine learning models have improved the efficiency and accuracy of crime prediction, they often face limitations such as overfitting, imbalanced datasets, and inadequate handling of spatiotemporal dynamics. This research proposes an advanced machine learning framework, CHART (Crime Hotspot Analysis and Real-time Tracking), designed to overcome these challenges. The proposed methodology… More >

  • Open AccessOpen Access

    ARTICLE

    Adjusted Reasoning Module for Deep Visual Question Answering Using Vision Transformer

    Christine Dewi1,3, Hanna Prillysca Chernovita2, Stephen Abednego Philemon1, Christian Adi Ananta1, Abbott Po Shun Chen4,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4195-4216, 2024, DOI:10.32604/cmc.2024.057453 - 19 December 2024
    Abstract Visual Question Answering (VQA) is an interdisciplinary artificial intelligence (AI) activity that integrates computer vision and natural language processing. Its purpose is to empower machines to respond to questions by utilizing visual information. A VQA system typically takes an image and a natural language query as input and produces a textual answer as output. One major obstacle in VQA is identifying a successful method to extract and merge textual and visual data. We examine “Fusion” Models that use information from both the text encoder and picture encoder to efficiently perform the visual question-answering challenge. For More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Class Skin Cancer Detection Using Fusion of Textural Features Based CAD Tool

    Khushmeen Kaur Brar1, Bhawna Goyal1, Ayush Dogra2, Sampangi Rama Reddy3, Ahmed Alkhayyat4, Rajesh Singh5, Manob Jyoti Saikia6,7,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4217-4263, 2024, DOI:10.32604/cmc.2024.052548 - 19 December 2024
    Abstract Skin cancer has been recognized as one of the most lethal and complex types of cancer for over a decade. The diagnosis of skin cancer is of paramount importance, yet the process is intricate and challenging. The analysis and modeling of human skin pose significant difficulties due to its asymmetrical nature, the visibility of dense hair, and the presence of various substitute characteristics. The texture of the epidermis is notably different from that of normal skin, and these differences are often evident in cases of unhealthy skin. As a consequence, the development of an effective… More >

  • Open AccessOpen Access

    ARTICLE

    IoT-CDS: Internet of Things Cyberattack Detecting System Based on Deep Learning Models

    Monir Abdullah*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4265-4283, 2024, DOI:10.32604/cmc.2024.059271 - 19 December 2024
    (This article belongs to the Special Issue: Distributed Computing with Applications to IoT and BlockChain)
    Abstract The rapid growth and pervasive presence of the Internet of Things (IoT) have led to an unparalleled increase in IoT devices, thereby intensifying worries over IoT security. Deep learning (DL)-based intrusion detection (ID) has emerged as a vital method for protecting IoT environments. To rectify the deficiencies of current detection methodologies, we proposed and developed an IoT cyberattacks detection system (IoT-CDS) based on DL models for detecting bot attacks in IoT networks. The DL models—long short-term memory (LSTM), gated recurrent units (GRUs), and convolutional neural network-LSTM (CNN-LSTM) were suggested to detect and classify IoT attacks.… More >

  • Open AccessOpen Access

    ARTICLE

    Advancing Deepfake Detection Using Xception Architecture: A Robust Approach for Safeguarding against Fabricated News on Social Media

    Dunya Ahmed Alkurdi1,2,*, Mesut Cevik2, Abdurrahim Akgundogdu3
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4285-4305, 2024, DOI:10.32604/cmc.2024.057029 - 19 December 2024
    Abstract Deepfake has emerged as an obstinate challenge in a world dominated by light. Here, the authors introduce a new deepfake detection method based on Xception architecture. The model is tested exhaustively with millions of frames and diverse video clips; accuracy levels as high as 99.65% are reported. These are the main reasons for such high efficacy: superior feature extraction capabilities and stable training mechanisms, such as early stopping, characterizing the Xception model. The methodology applied is also more advanced when it comes to data preprocessing steps, making use of state-of-the-art techniques applied to ensure constant… More >

  • Open AccessOpen Access

    ARTICLE

    MMDistill: Multi-Modal BEV Distillation Framework for Multi-View 3D Object Detection

    Tianzhe Jiao, Yuming Chen, Zhe Zhang, Chaopeng Guo, Jie Song*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4307-4325, 2024, DOI:10.32604/cmc.2024.058238 - 19 December 2024
    Abstract Multi-modal 3D object detection has achieved remarkable progress, but it is often limited in practical industrial production because of its high cost and low efficiency. The multi-view camera-based method provides a feasible solution due to its low cost. However, camera data lacks geometric depth, and only using camera data to obtain high accuracy is challenging. This paper proposes a multi-modal Bird-Eye-View (BEV) distillation framework (MMDistill) to make a trade-off between them. MMDistill is a carefully crafted two-stage distillation framework based on teacher and student models for learning cross-modal knowledge and generating multi-modal features. It can… More >

  • Open AccessOpen Access

    ARTICLE

    Weather Classification for Autonomous Vehicles under Adverse Conditions Using Multi-Level Knowledge Distillation

    Parthasarathi Manivannan1, Palaniyappan Sathyaprakash1, Vaithiyashankar Jayakumar2, Jayakumar Chandrasekaran3, Bragadeesh Srinivasan Ananthanarayanan4, Md Shohel Sayeed5,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4327-4347, 2024, DOI:10.32604/cmc.2024.055628 - 19 December 2024
    Abstract Achieving reliable and efficient weather classification for autonomous vehicles is crucial for ensuring safety and operational effectiveness. However, accurately classifying diverse and complex weather conditions remains a significant challenge. While advanced techniques such as Vision Transformers have been developed, they face key limitations, including high computational costs and limited generalization across varying weather conditions. These challenges present a critical research gap, particularly in applications where scalable and efficient solutions are needed to handle weather phenomena’ intricate and dynamic nature in real-time. To address this gap, we propose a Multi-level Knowledge Distillation (MLKD) framework, which leverages… More >

  • Open AccessOpen Access

    ARTICLE

    Context-Aware Feature Extraction Network for High-Precision UAV-Based Vehicle Detection in Urban Environments

    Yahia Said1,*, Yahya Alassaf2, Taoufik Saidani3, Refka Ghodhbani3, Olfa Ben Rhaiem4, Ali Ahmad Alalawi1
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4349-4370, 2024, DOI:10.32604/cmc.2024.058903 - 19 December 2024
    (This article belongs to the Special Issue: The Next-generation Deep Learning Approaches to Emerging Real-world Applications)
    Abstract The integration of Unmanned Aerial Vehicles (UAVs) into Intelligent Transportation Systems (ITS) holds transformative potential for real-time traffic monitoring, a critical component of emerging smart city infrastructure. UAVs offer unique advantages over stationary traffic cameras, including greater flexibility in monitoring large and dynamic urban areas. However, detecting small, densely packed vehicles in UAV imagery remains a significant challenge due to occlusion, variations in lighting, and the complexity of urban landscapes. Conventional models often struggle with these issues, leading to inaccurate detections and reduced performance in practical applications. To address these challenges, this paper introduces CFEMNet,… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Approach for Android Malware Detection Based on Intelligent Computing

    Manh Vu Minh*, Cho Do Xuan
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4371-4396, 2024, DOI:10.32604/cmc.2024.058168 - 19 December 2024
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract Detecting malware on mobile devices using the Android operating system has become a critical challenge in the field of cybersecurity, in the context of the rapid increase in the number of malware variants and the frequency of attacks targeting Android devices. In this paper, we propose a novel intelligent computational method to enhance the effectiveness of Android malware detection models. The proposed method combines two main techniques: (1) constructing a malware behavior profile and (2) extracting features from the malware behavior profile using graph neural networks. Specifically, to effectively construct an Android malware behavior profile,… More >

  • Open AccessOpen Access

    ARTICLE

    Dual-Modal Drowsiness Detection to Enhance Driver Safety

    Yi Xuan Chew, Siti Fatimah Abdul Razak*, Sumendra Yogarayan, Sharifah Noor Masidayu Sayed Ismail
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4397-4417, 2024, DOI:10.32604/cmc.2024.056367 - 19 December 2024
    Abstract In the modern world, the increasing prevalence of driving poses a risk to road safety and necessitates the development and implementation of effective monitoring systems. This study aims to enhance road safety by proposing a dual-modal solution for detecting driver drowsiness, which combines heart rate monitoring and face recognition technologies. The research objectives include developing a non-contact method for detecting driver drowsiness, training and assessing the proposed system using pre-trained machine learning models, and implementing a real-time alert feature to trigger warnings when drowsiness is detected. Deep learning models based on convolutional neural networks (CNNs),… More >

  • Open AccessOpen Access

    ARTICLE

    A Real-Time Semantic Segmentation Method Based on Transformer for Autonomous Driving

    Weiyu Hao1, Jingyi Wang2, Huimin Lu3,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4419-4433, 2024, DOI:10.32604/cmc.2024.055478 - 19 December 2024
    (This article belongs to the Special Issue: Recognition Tasks with Transformers)
    Abstract While traditional Convolutional Neural Network (CNN)-based semantic segmentation methods have proven effective, they often encounter significant computational challenges due to the requirement for dense pixel-level predictions, which complicates real-time implementation. To address this, we introduce an advanced real-time semantic segmentation strategy specifically designed for autonomous driving, utilizing the capabilities of Visual Transformers. By leveraging the self-attention mechanism inherent in Visual Transformers, our method enhances global contextual awareness, refining the representation of each pixel in relation to the overall scene. This enhancement is critical for quickly and accurately interpreting the complex elements within driving scenarios—a fundamental… More >

  • Open AccessOpen Access

    ARTICLE

    Secure Image Communication Using Galois Field, Hyper 3D Logistic Map, and B92 Quantum Protocol

    De Rosal Ignatius Moses Setiadi1,2, Nova Rijati2,*, Ahmad Rofiqul Muslikh3, Bonifacius Vicky Indriyono4, Aceng Sambas5,6
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4435-4463, 2024, DOI:10.32604/cmc.2024.058478 - 19 December 2024
    Abstract In this paper, we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext encryption. Specifically, we leverage the B92 Quantum Key Distribution (QKD) protocol to secure the distribution of encryption keys, which are further processed through Galois Field (GF(28)) operations for increased security. The encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map (H3LM), a chaotic system that generates complex and unpredictable sequences, thereby ensuring strong confusion and diffusion in the encryption process. This hybrid approach More >

  • Open AccessOpen Access

    ARTICLE

    An Asynchronous Data Transmission Policy for Task Offloading in Edge-Computing Enabled Ultra-Dense IoT

    Dayong Wang1,*, Kamalrulnizam Bin Abu Bakar1, Babangida Isyaku2, Liping Lei3
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4465-4483, 2024, DOI:10.32604/cmc.2024.059616 - 19 December 2024
    (This article belongs to the Special Issue: Edge-based IoT Systems with Cross-Designs of Communication, Computing, and Control)
    Abstract In recent years, task offloading and its scheduling optimization have emerged as widely discussed and significant topics. The multi-objective optimization problems inherent in this domain, particularly those related to resource allocation, have been extensively investigated. However, existing studies predominantly focus on matching suitable computational resources for task offloading requests, often overlooking the optimization of the task data transmission process. This inefficiency in data transmission leads to delays in the arrival of task data at computational nodes within the edge network, resulting in increased service times due to elevated network transmission latencies and idle computational resources.… More >

  • Open AccessOpen Access

    ARTICLE

    Reverse Analysis Method and Process for Improving Malware Detection Based on XAI Model

    Ki-Pyoung Ma1, Dong-Ju Ryu2, Sang-Joon Lee3,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4485-4502, 2024, DOI:10.32604/cmc.2024.059116 - 19 December 2024
    Abstract With the advancements in artificial intelligence (AI) technology, attackers are increasingly using sophisticated techniques, including ChatGPT. Endpoint Detection & Response (EDR) is a system that detects and responds to strange activities or security threats occurring on computers or endpoint devices within an organization. Unlike traditional antivirus software, EDR is more about responding to a threat after it has already occurred than blocking it. This study aims to overcome challenges in security control, such as increased log size, emerging security threats, and technical demands faced by control staff. Previous studies have focused on AI detection models,… More >

  • Open AccessOpen Access

    ARTICLE

    Evaluation of Modern Generative Networks for EchoCG Image Generation

    Sabina Rakhmetulayeva1,*, Zhandos Zhanabekov2, Aigerim Bolshibayeva3
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4503-4523, 2024, DOI:10.32604/cmc.2024.057974 - 19 December 2024
    Abstract The applications of machine learning (ML) in the medical domain are often hindered by the limited availability of high-quality data. To address this challenge, we explore the synthetic generation of echocardiography images (echoCG) using state-of-the-art generative models. We conduct a comprehensive evaluation of three prominent methods: Cycle-consistent generative adversarial network (CycleGAN), Contrastive Unpaired Translation (CUT), and Stable Diffusion 1.5 with Low-Rank Adaptation (LoRA). Our research presents the data generation methodology, image samples, and evaluation strategy, followed by an extensive user study involving licensed cardiologists and surgeons who assess the perceived quality and medical soundness of More >

    Graphic Abstract

    Evaluation of Modern Generative Networks for EchoCG Image Generation

  • Open AccessOpen Access

    ARTICLE

    Fake News Detection on Social Media Using Ensemble Methods

    Muhammad Ali Ilyas1, Abdul Rehman2, Assad Abbas1, Dongsun Kim3,*, Muhammad Tahir Naseem4,*, Nasro Min Allah5
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4525-4549, 2024, DOI:10.32604/cmc.2024.056291 - 19 December 2024
    (This article belongs to the Special Issue: Recent Advances in Ensemble Framework of Meta-heuristics and Machine Learning: Methods and Applications)
    Abstract In an era dominated by information dissemination through various channels like newspapers, social media, radio, and television, the surge in content production, especially on social platforms, has amplified the challenge of distinguishing between truthful and deceptive information. Fake news, a prevalent issue, particularly on social media, complicates the assessment of news credibility. The pervasive spread of fake news not only misleads the public but also erodes trust in legitimate news sources, creating confusion and polarizing opinions. As the volume of information grows, individuals increasingly struggle to discern credible content from false narratives, leading to widespread… More >

  • Open AccessOpen Access

    ARTICLE

    Uncovering Causal Relationships for Debiased Repost Prediction Using Deep Generative Models

    Wu-Jiu Sun1, Xiao Fan Liu1,2,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4551-4573, 2024, DOI:10.32604/cmc.2024.057714 - 19 December 2024
    Abstract Microblogging platforms like X (formerly Twitter) and Sina Weibo have become key channels for spreading information online. Accurately predicting information spread, such as users’ reposting activities, is essential for applications including content recommendation and analyzing public sentiment. Current advanced models rely on deep representation learning to extract features from various inputs, such as users’ social connections and repost history, to forecast reposting behavior. Nonetheless, these models frequently ignore intrinsic confounding factors, which may cause the models to capture spurious relationships, ultimately impacting prediction performance. To address this limitation, we propose a novel Debiased Reposting Prediction… More >

  • Open AccessOpen Access

    ARTICLE

    Transforming Healthcare: AI-NLP Fusion Framework for Precision Decision-Making and Personalized Care Optimization in the Era of IoMT

    Soha Rawas1, Cerine Tafran1, Duaa AlSaeed2, Nadia Al-Ghreimil2,*
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4575-4601, 2024, DOI:10.32604/cmc.2024.055307 - 19 December 2024
    Abstract In the rapidly evolving landscape of healthcare, the integration of Artificial Intelligence (AI) and Natural Language Processing (NLP) holds immense promise for revolutionizing data analytics and decision-making processes. Current techniques for personalized medicine, disease diagnosis, treatment recommendations, and resource optimization in the Internet of Medical Things (IoMT) vary widely, including methods such as rule-based systems, machine learning algorithms, and data-driven approaches. However, many of these techniques face limitations in accuracy, scalability, and adaptability to complex clinical scenarios. This study investigates the synergistic potential of AI-driven optimization techniques and NLP applications in the context of the… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Software Cost Estimation Using Feature Selection and Machine Learning Techniques

    Fizza Mansoor1, Muhammad Affan Alim2,5,*, Muhammad Taha Jilani3, Muhammad Monsoor Alam4,5, Mazliham Mohd Su’ud5
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4603-4624, 2024, DOI:10.32604/cmc.2024.057979 - 19 December 2024
    Abstract Software cost estimation is a crucial aspect of software project management, significantly impacting productivity and planning. This research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset, which comprises data from 93 unique software projects with 24 attributes. By applying multiple machine learning algorithms alongside three feature selection methods, this study aims to reduce data redundancy and enhance model accuracy. Our findings reveal that the principal component analysis (PCA)-based feature selection technique achieved the highest performance, underscoring the importance of optimal feature selection in improving software More >

  • Open AccessOpen Access

    ARTICLE

    SEF: A Smart and Energy-Aware Forwarding Strategy for NDN-Based Internet of Healthcare

    Naeem Ali Askar1,*, Adib Habbal1,*, Hassen Hamouda2, Abdullah Mohammad Alnajim3, Sheroz Khan4
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4625-4658, 2024, DOI:10.32604/cmc.2024.058607 - 19 December 2024
    Abstract Named Data Networking (NDN) has emerged as a promising communication paradigm, emphasizing content-centric access rather than location-based access. This model offers several advantages for Internet of Healthcare Things (IoHT) environments, including efficient content distribution, built-in security, and natural support for mobility and scalability. However, existing NDN-based IoHT systems face inefficiencies in their forwarding strategy, where identical Interest packets are forwarded across multiple nodes, causing broadcast storms, increased collisions, higher energy consumption, and delays. These issues negatively impact healthcare system performance, particularly for individuals with disabilities and chronic diseases requiring continuous monitoring. To address these challenges,… More >

  • Open AccessOpen Access

    ARTICLE

    A Multi-Objective Clustered Input Oriented Salp Swarm Algorithm in Cloud Computing

    Juliet A. Murali1,*, Brindha T.2
    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4659-4690, 2024, DOI:10.32604/cmc.2024.058115 - 19 December 2024
    Abstract Infrastructure as a Service (IaaS) in cloud computing enables flexible resource distribution over the Internet, but achieving optimal scheduling remains a challenge. Effective resource allocation in cloud-based environments, particularly within the IaaS model, poses persistent challenges. Existing methods often struggle with slow optimization, imbalanced workload distribution, and inefficient use of available assets. These limitations result in longer processing times, increased operational expenses, and inadequate resource deployment, particularly under fluctuating demands. To overcome these issues, a novel Clustered Input-Oriented Salp Swarm Algorithm (CIOSSA) is introduced. This approach combines two distinct strategies: Task Splitting Agglomerative Clustering (TSAC)… More >

Per Page:

Share Link