Home / Journals / CMC / Vol.59, No.3, 2019
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Development of Cloud Based Air Pollution Information System Using Visualization

    SangWook Han1, JungYeon Seo1, Dae-Young Kim2, SeokHoon Kim3, HwaMin Lee3,*
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 697-711, 2019, DOI:10.32604/cmc.2019.06071
    Abstract Air pollution caused by fine dust is a big problem all over the world and fine dust has a fatal impact on human health. But there are too few fine dust measuring stations and the installation cost of fine dust measuring station is very expensive. In this paper, we propose Cloud-based air pollution information system using R. To measure fine dust, we have developed an inexpensive measuring device and studied the technique to accurately measure the concentration of fine dust at the user’s location. And we have developed the smartphone application to provide air pollution information. In our system, we… More >

  • Open AccessOpen Access

    ARTICLE

    A Learning Based Brain Tumor Detection System

    Sultan Noman Qasem1,2, Amar Nazar3, Attia Qamar4, Shahaboddin Shamshirband5,6,*, Ahmad Karim4
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 713-727, 2019, DOI:10.32604/cmc.2019.05617
    Abstract Brain tumor is one of the most dangerous disease that causes due to uncontrollable and abnormal cell partition. In this paper, we have used MRI brain scan in comparison with CT brain scan as it is less harmful to detect brain tumor. We considered watershed segmentation technique for brain tumor detection. The proposed methodology is divided as follows: pre-processing, computing foreground applying watershed, extract and supply features to machine learning algorithms. Consequently, this study is tested on big data set of images and we achieved acceptable accuracy from K-NN classification algorithm in detection of brain tumor. More >

  • Open AccessOpen Access

    ARTICLE

    Shape, Color and Texture Based CBIR System Using Fuzzy Logic Classifier

    D. Yuvaraj1, M. Sivaram2, B. Karthikeyan3,*, Jihan Abdulazeez4
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 729-739, 2019, DOI:10.32604/cmc.2019.05945
    Abstract The perfect image retrieval and retrieval time are the two major challenges in CBIR systems. To improve the retrieval accuracy, the whole database is searched based on many image characteristics such as color, shape, texture and edge information which leads to more time consumption. This paper presents a new fuzzy based CBIR method, which utilizes colour, shape and texture attributes of the image. Fuzzy rule based system is developed by combining color, shape, and texture feature for enhanced image recovery. In this approach, DWT is used to pull out the texture characteristics and the region based moment invariant is utilized… More >

  • Open AccessOpen Access

    ARTICLE

    LRV: A Tool for Academic Text Visualization to Support the Literature Review Process

    Tahani Almutairi1,*, Maha Al-yahya2
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 741-751, 2019, DOI:10.32604/cmc.2019.06239
    Abstract Text visualization is concerned with the representation of text in a graphical form to facilitate comprehension of large textual data. Its aim is to improve the ability to understand and utilize the wealth of text-based information available. An essential task in any scientific research is the study and review of previous works in the specified domain, a process that is referred to as the literature survey process. This process involves the identification of prior work and evaluating its relevance to the research question. With the enormous number of published studies available online in digital form, this becomes a cumbersome task… More >

  • Open AccessOpen Access

    ARTICLE

    Application of Image Compression to Multiple-Shot Pictures Using Similarity Norms With Three Level Blurring

    Mohammed Omari1,*, Souleymane Ouled Jaafri1
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 753-775, 2019, DOI:10.32604/cmc.2019.06576
    Abstract Image compression is a process based on reducing the redundancy of the image to be stored or transmitted in an efficient form. In this work, a new idea is proposed, where we take advantage of the redundancy that appears in a group of images to be all compressed together, instead of compressing each image by itself. In our proposed technique, a classification process is applied, where the set of the input images are classified into groups based on existing technique like L1 and L2 norms, color histograms. All images that belong to the same group are compressed based on dividing… More >

  • Open AccessOpen Access

    ARTICLE

    On Harmonic and Ev-Degree Molecular Topological Properties of DOX, RTOX and DSL Networks

    Murat Cancan1, *
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 777-786, 2019, DOI:10.32604/cmc.2019.06596
    Abstract Topological indices enable to gather information for the underlying topology of chemical structures and networks. Novel harmonic indices have been defined recently. All degree based topological indices are defined by using the classical degree concept. Recently two novel degree concept have been defined in graph theory: ve-degree and ev-degree. Ve-degree Zagreb indices have been defined by using ve-degree concept. The prediction power of the ve-degree Zagreb indices is stronger than the classical Zagreb indices. Dominating oxide, silicate and oxygen networks are important network models in view of chemistry, physics and information science. Physical and mathematical properties of dominating oxide, silicate… More >

  • Open AccessOpen Access

    ARTICLE

    A Reliable Stochastic Numerical Analysis for Typhoid Fever Incorporating With Protection Against Infection

    Muhammad Shoaib Arif1,*, Ali Raza1, Muhammad Rafiq2, Mairaj Bibi3, Rabia Fayyaz3, Mehvish Naz3, Umer Javed4
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 787-804, 2019, DOI:10.32604/cmc.2019.04655
    Abstract In this paper, a reliable stochastic numerical analysis for typhoid fever incorporating with protection against infection has been considered. We have compared the solutions of stochastic and deterministic typhoid fever model. It has been shown that the stochastic typhoid fever model is more realistic as compared to the deterministic typhoid fever model. The effect of threshold number T* hold in stochastic typhoid fever model. The proposed framework of the stochastic non-standard finite difference scheme (SNSFD) preserves all dynamical properties like positivity, bounded-ness and dynamical consistency defined by Mickens, R. E. The stochastic numerical simulation of the model showed that increase… More >

  • Open AccessOpen Access

    ARTICLE

    A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

    Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848
    Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of a machine learning algorithm to… More >

  • Open AccessOpen Access

    ARTICLE

    Defense Against Poisoning Attack via Evaluating Training Samples Using Multiple Spectral Clustering Aggregation Method

    Wentao Zhao1, Pan Li1,*, Chengzhang Zhu1,2, Dan Liu1, Xiao Liu1
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 817-832, 2019, DOI:10.32604/cmc.2019.05957
    Abstract The defense techniques for machine learning are critical yet challenging due to the number and type of attacks for widely applied machine learning algorithms are significantly increasing. Among these attacks, the poisoning attack, which disturbs machine learning algorithms by injecting poisoning samples, is an attack with the greatest threat. In this paper, we focus on analyzing the characteristics of positioning samples and propose a novel sample evaluation method to defend against the poisoning attack catering for the characteristics of poisoning samples. To capture the intrinsic data characteristics from heterogeneous aspects, we first evaluate training data by multiple criteria, each of… More >

  • Open AccessOpen Access

    ARTICLE

    Dynamics Modeling and Stability Analysis of Tilt Wing Unmanned Aerial Vehicle During Transition

    Yonghong Zhang1,*, Yunfei Deng1, Yunping Liu1, Lihua Wang1
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 833-851, 2019, DOI:10.32604/cmc.2019.04078
    Abstract In the transition mode of quad tilt wing-unmanned aerial vehicle (QTW-UAV), the system stability of UAV will change with the tilt angle changes, which will cause serious head drop down. Meanwhile, with the complex air flow and other disturbances, the system is prone to side bias, frying, stall and other kinetic stability problems, hence the system stability analysis has become an urgent problem to be solved. To solve the stability problem, we need the quantitative criteria of system stability and effective tool of stability analysis, and can improve the stability of the motion control by optimizing the structural parameters of… More >

  • Open AccessOpen Access

    ARTICLE

    Dynamic Response Solution of Multi-Layered Pavement Structure Under FWD Load Appling the Precise Integration Algorithm

    Zejun Han1, Hongyuan Fang2,3,4,*, Juan Zhang5, Fuming Wang2,3,4
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 853-871, 2019, DOI:10.32604/cmc.2019.03839
    Abstract The pavement layered structures are composed of surface layer, road base and multi-layered soil foundation. They can be undermined over time by repeated vehicle loads. In this study, a hybrid numerical method which can evaluate the displacement responses of pavement structures under dynamic falling weight deflectometer (FWD) loads. The proposed method consists of two parts: (a) the dynamic stiffness matrices of the points at the surface in the frequency domain which is based on the domain-transformation and dual vector form equation, and (b) interpolates the dynamic stiffness matrices by a continues rational function of frequency. The mixed variables formulation (MVF)… More >

  • Open AccessOpen Access

    ARTICLE

    A Frame Breaking Based Hybrid Algorithm for UHF RFID Anti-Collision

    Xinyan Wang1,*, Minjun Zhang2, Zengwang Lu3
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 873-883, 2019, DOI:10.32604/cmc.2019.05230
    Abstract Multi-tag collision imposes a vital detrimental effect on reading performance of an RFID system. In order to ameliorate such collision problem and to improve the reading performance, this paper proposes an efficient tag identification algorithm termed as the Enhanced Adaptive Tree Slotted Aloha (EATSA). The key novelty of EATSA is to identify the tags using grouping strategy. Specifically, the whole tag set is divided into groups by a frame of size F. In cases multiple tags fall into a group, the tags of the group are recognized by the improved binary splitting (IBS) method whereas the rest tags are waiting… More >

  • Open AccessOpen Access

    ARTICLE

    An Algorithm for Mining Gradual Moving Object Clusters Pattern From Trajectory Streams

    Yujie Zhang1, Genlin Ji1,*, Bin Zhao1, Bo Sheng2
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 885-901, 2019, DOI:10.32604/cmc.2019.05612
    Abstract The discovery of gradual moving object clusters pattern from trajectory streams allows characterizing movement behavior in real time environment, which leverages new applications and services. Since the trajectory streams is rapidly evolving, continuously created and cannot be stored indefinitely in memory, the existing approaches designed on static trajectory datasets are not suitable for discovering gradual moving object clusters pattern from trajectory streams. This paper proposes a novel algorithm of gradual moving object clusters pattern discovery from trajectory streams using sliding window models. By processing the trajectory data in current window, the mining algorithm can capture the trend and evolution of… More >

  • Open AccessOpen Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309
    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) is proposed in this paper.… More >

  • Open AccessOpen Access

    ARTICLE

    Reversible Data Hiding Based on Pixel-Value-Ordering and Pixel Block Merging Strategy

    Wengui Su1,2, Xiang Wang3,*, Yulong Shen1
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 925-941, 2019, DOI:10.32604/cmc.2019.04842
    Abstract With the reversible data hiding method based on pixel-value-ordering, data are embedded through the modification of the maximum and minimum values of a block. A significant relationship exists between the embedding performance and the block size. Traditional pixel-value-ordering methods utilize pixel blocks with a fixed size to embed data; the smaller the pixel blocks, greater is the embedding capacity. However, it tends to result in the deterioration of the quality of the marked image. Herein, a novel reversible data hiding method is proposed by incorporating a block merging strategy into Li et al.’s pixel-value-ordering method, which realizes the dynamic control… More >

  • Open AccessOpen Access

    ARTICLE

    Distortion Function for Emoji Image Steganography

    Lina Shi1, Zichi Wang1, Zhenxing Qian1,*, Nannan Huang1, Pauline Puteaux2, Xinpeng Zhang1
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 943-953, 2019, DOI:10.32604/cmc.2019.05768
    Abstract Nowadays, emoji image is widely used in social networks. To achieve covert communication in emoji images, this paper proposes a distortion function for emoji images steganography. The profile of image content, the intra- and inter-frame correlation are taken into account in the proposed distortion function to fit the unique properties of emoji image. The three parts are combined together to measure the risks of detection due to the modification on the cover data. With the popular syndrome trellis coding (STC), the distortion of stego emoji image is minimized using the proposed distortion function. As a result, less detectable artifacts could… More >

  • Open AccessOpen Access

    ARTICLE

    Analyzing the Structure and Connectivity of Continent-Level Internet Topology

    Xionglve Li1, Junhua Xi1, Zhiping Cai1,*, Tao Yang1, Chak Fong Cheang2
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 955-964, 2019, DOI:10.32604/cmc.2019.05769
    Abstract The research and analysis of Internet topology is hot in the field of network measurement, which have important applications in network security, traffic scheduling and many other fields. Most of the existing works are focused on the AS-level and router-level topology, but few works are about the IP-level topology. In fact, obtaining the topology of each continent and knowing how the topologies of the continents are connected to each other can help us understanding the Internet around the world more thoroughly. In this paper, we obtained data sets from RIPE, constructed and analyzed network topologies of all the continents. By… More >

  • Open AccessOpen Access

    ARTICLE

    SWRR: The Link Scheduling Algorithm Based on Weighted Round-Robin

    Tianbo Lu1,2,*, Ru Yan1,2, Chao Li3,*, Lihua Yin3, Hao Chen1, Xieyu Zou4
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 965-982, 2019, DOI:10.32604/cmc.2019.05635
    Abstract With the rapid development of the Internet, people pay more and more attention to the protection of privacy. The second-generation onion routing system Tor is the most commonly used among anonymous communication systems, which can be used to protect user privacy effectively. In recent years, Tor’s congestion problem has become the focus of attention, and it can affect Tor’s performance even user experience. Firstly, we investigate the causes of Tor network congestion and summarize some link scheduling algorithms proposed in recent years. Then we propose the link scheduling algorithm SWRR based on WRR (Weighted Round Robin). In this process, we… More >

  • Open AccessOpen Access

    ARTICLE

    Location Privacy in Device-Dependent Location-Based Services: Challenges and Solution

    Yuhang Wang1, Yanbin Sun1,*, Shen Su1, Zhihong Tian1, Mohan Li1, Jing Qiu1, Xianzhi Wang2
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 983-993, 2019, DOI:10.32604/cmc.2019.05547
    Abstract With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the… More >

  • Open AccessOpen Access

    ARTICLE

    The Algorithm of Chemical Species Analysis for Ab Intio Molecular Dynamics Simulations and Its Application

    Zhiyi Han1, Yugai Huang2,3, Xiaoqiang Xie1, Ying Mei1, Bin Gu1,*
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 995-1003, 2019, DOI:10.32604/cmc.2019.02181
    Abstract In ab initio molecular dynamics (AIMD) simulations of chemical reactions, it is important but difficult to identify the chemical species in the trajectory automatically and quickly. In this paper, based on the chemical graph theory, an algorithm for molecular species identification, according to the molecular coordinates and empirical bond length database, is presented. As an example, the chemical species in condensed glycine at room temperature are investigated with our algorithm in detail. The chemical species, including canonical and zwitterionic glycine, their protonated and de-protonated states, and the free protons, are all identified, counted and recorded correctly. Potential applications and further… More >

  • Open AccessOpen Access

    ARTICLE

    A Quantum Authorization Management Protocol Based on EPR-Pairs

    Yan Chang1,*, Shibin Zhang1, Lili Yan1, Guihua Han1, Haiquan Song1, Yan Zhang1, Xueyang Li1, Qirun Wang2
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1005-1014, 2019, DOI:10.32604/cmc.2019.06297
    Abstract Quantum authorization management (QAM) is the quantum scheme for privilege management infrastructure (PMI) problem. Privilege management (authorization management) includes authentication and authorization. Authentication is to verify a user’s identity. Authorization is the process of verifying that a authenticated user has the authority to perform a operation, which is more fine-grained. In most classical schemes, the authority management center (AMC) manages the resources permissions for all network nodes within the jurisdiction. However, the existence of AMC may be the weakest link of the whole scheme. In this paper, a protocol for QAM without AMC is proposed based on entanglement swapping. In… More >

  • Open AccessOpen Access

    ARTICLE

    Stability Analysis of Transfer Alignment Filter Based on the μ Theory

    Lihua Zhu1, Yu Wang1, Lei Wang2, Zhiqiang Wu1,*
    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1015-1026, 2019, DOI:10.32604/cmc.2019.05656
    Abstract The performance of the transfer alignment has great impact on inertial navigation systems. As the transfer alignment is generally implemented using a filter to compensate the errors, its accuracy, rapidity and anti-disturbance capability are key properties to evaluate the filtering process. In terms of the superiority in dealing with the noise, H∞ filtering has been used to improve the anti-disturbance capability of the transfer alignment. However, there is still a need to incorporate system uncertainty due to various dynamic conditions. Based on the structural value theory, a robustness stability analysis method has been proposed for the transfer alignment to evaluate… More >

Per Page:

Share Link