Open Access
ARTICLE
SangWook Han1, JungYeon Seo1, Dae-Young Kim2, SeokHoon Kim3, HwaMin Lee3,*
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 697-711, 2019, DOI:10.32604/cmc.2019.06071
Abstract Air pollution caused by fine dust is a big problem all over the world and fine dust has a fatal impact on human health. But there are too few fine dust measuring stations and the installation cost of fine dust measuring station is very expensive. In this paper, we propose Cloud-based air pollution information system using R. To measure fine dust, we have developed an inexpensive measuring device and studied the technique to accurately measure the concentration of fine dust at the user’s location. And we have developed the smartphone application to provide air pollution information. In our system, we… More >
Open Access
ARTICLE
Sultan Noman Qasem1,2, Amar Nazar3, Attia Qamar4, Shahaboddin Shamshirband5,6,*, Ahmad Karim4
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 713-727, 2019, DOI:10.32604/cmc.2019.05617
Abstract Brain tumor is one of the most dangerous disease that causes due to uncontrollable and abnormal cell partition. In this paper, we have used MRI brain scan in comparison with CT brain scan as it is less harmful to detect brain tumor. We considered watershed segmentation technique for brain tumor detection. The proposed methodology is divided as follows: pre-processing, computing foreground applying watershed, extract and supply features to machine learning algorithms. Consequently, this study is tested on big data set of images and we achieved acceptable accuracy from K-NN classification algorithm in detection of brain tumor. More >
Open Access
ARTICLE
D. Yuvaraj1, M. Sivaram2, B. Karthikeyan3,*, Jihan Abdulazeez4
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 729-739, 2019, DOI:10.32604/cmc.2019.05945
Abstract The perfect image retrieval and retrieval time are the two major challenges in CBIR systems. To improve the retrieval accuracy, the whole database is searched based on many image characteristics such as color, shape, texture and edge information which leads to more time consumption. This paper presents a new fuzzy based CBIR method, which utilizes colour, shape and texture attributes of the image. Fuzzy rule based system is developed by combining color, shape, and texture feature for enhanced image recovery. In this approach, DWT is used to pull out the texture characteristics and the region based moment invariant is utilized… More >
Open Access
ARTICLE
Tahani Almutairi1,*, Maha Al-yahya2
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 741-751, 2019, DOI:10.32604/cmc.2019.06239
Abstract Text visualization is concerned with the representation of text in a graphical form to facilitate comprehension of large textual data. Its aim is to improve the ability to understand and utilize the wealth of text-based information available. An essential task in any scientific research is the study and review of previous works in the specified domain, a process that is referred to as the literature survey process. This process involves the identification of prior work and evaluating its relevance to the research question. With the enormous number of published studies available online in digital form, this becomes a cumbersome task… More >
Open Access
ARTICLE
Mohammed Omari1,*, Souleymane Ouled Jaafri1
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 753-775, 2019, DOI:10.32604/cmc.2019.06576
Abstract Image compression is a process based on reducing the redundancy of the image to be stored or transmitted in an efficient form. In this work, a new idea is proposed, where we take advantage of the redundancy that appears in a group of images to be all compressed together, instead of compressing each image by itself. In our proposed technique, a classification process is applied, where the set of the input images are classified into groups based on existing technique like L1 and L2 norms, color histograms. All images that belong to the same group are compressed based on dividing… More >
Open Access
ARTICLE
Murat Cancan1, *
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 777-786, 2019, DOI:10.32604/cmc.2019.06596
Abstract Topological indices enable to gather information for the underlying topology of chemical structures and networks. Novel harmonic indices have been defined recently. All degree based topological indices are defined by using the classical degree concept. Recently two novel degree concept have been defined in graph theory: ve-degree and ev-degree. Ve-degree Zagreb indices have been defined by using ve-degree concept. The prediction power of the ve-degree Zagreb indices is stronger than the classical Zagreb indices. Dominating oxide, silicate and oxygen networks are important network models in view of chemistry, physics and information science. Physical and mathematical properties of dominating oxide, silicate… More >
Open Access
ARTICLE
Muhammad Shoaib Arif1,*, Ali Raza1, Muhammad Rafiq2, Mairaj Bibi3, Rabia Fayyaz3, Mehvish Naz3, Umer Javed4
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 787-804, 2019, DOI:10.32604/cmc.2019.04655
Abstract In this paper, a reliable stochastic numerical analysis for typhoid fever incorporating with protection against infection has been considered. We have compared the solutions of stochastic and deterministic typhoid fever model. It has been shown that the stochastic typhoid fever model is more realistic as compared to the deterministic typhoid fever model. The effect of threshold number T* hold in stochastic typhoid fever model. The proposed framework of the stochastic non-standard finite difference scheme (SNSFD) preserves all dynamical properties like positivity, bounded-ness and dynamical consistency defined by Mickens, R. E. The stochastic numerical simulation of the model showed that increase… More >
Open Access
ARTICLE
Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848
Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of a machine learning algorithm to… More >
Open Access
ARTICLE
Wentao Zhao1, Pan Li1,*, Chengzhang Zhu1,2, Dan Liu1, Xiao Liu1
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 817-832, 2019, DOI:10.32604/cmc.2019.05957
Abstract The defense techniques for machine learning are critical yet challenging due to the number and type of attacks for widely applied machine learning algorithms are significantly increasing. Among these attacks, the poisoning attack, which disturbs machine learning algorithms by injecting poisoning samples, is an attack with the greatest threat. In this paper, we focus on analyzing the characteristics of positioning samples and propose a novel sample evaluation method to defend against the poisoning attack catering for the characteristics of poisoning samples. To capture the intrinsic data characteristics from heterogeneous aspects, we first evaluate training data by multiple criteria, each of… More >
Open Access
ARTICLE
Yonghong Zhang1,*, Yunfei Deng1, Yunping Liu1, Lihua Wang1
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 833-851, 2019, DOI:10.32604/cmc.2019.04078
Abstract In the transition mode of quad tilt wing-unmanned aerial vehicle (QTW-UAV), the system stability of UAV will change with the tilt angle changes, which will cause serious head drop down. Meanwhile, with the complex air flow and other disturbances, the system is prone to side bias, frying, stall and other kinetic stability problems, hence the system stability analysis has become an urgent problem to be solved. To solve the stability problem, we need the quantitative criteria of system stability and effective tool of stability analysis, and can improve the stability of the motion control by optimizing the structural parameters of… More >
Open Access
ARTICLE
Zejun Han1, Hongyuan Fang2,3,4,*, Juan Zhang5, Fuming Wang2,3,4
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 853-871, 2019, DOI:10.32604/cmc.2019.03839
Abstract The pavement layered structures are composed of surface layer, road base and multi-layered soil foundation. They can be undermined over time by repeated vehicle loads. In this study, a hybrid numerical method which can evaluate the displacement responses of pavement structures under dynamic falling weight deflectometer (FWD) loads. The proposed method consists of two parts: (a) the dynamic stiffness matrices of the points at the surface in the frequency domain which is based on the domain-transformation and dual vector form equation, and (b) interpolates the dynamic stiffness matrices by a continues rational function of frequency. The mixed variables formulation (MVF)… More >
Open Access
ARTICLE
Xinyan Wang1,*, Minjun Zhang2, Zengwang Lu3
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 873-883, 2019, DOI:10.32604/cmc.2019.05230
Abstract Multi-tag collision imposes a vital detrimental effect on reading performance of an RFID system. In order to ameliorate such collision problem and to improve the reading performance, this paper proposes an efficient tag identification algorithm termed as the Enhanced Adaptive Tree Slotted Aloha (EATSA). The key novelty of EATSA is to identify the tags using grouping strategy. Specifically, the whole tag set is divided into groups by a frame of size F. In cases multiple tags fall into a group, the tags of the group are recognized by the improved binary splitting (IBS) method whereas the rest tags are waiting… More >
Open Access
ARTICLE
Yujie Zhang1, Genlin Ji1,*, Bin Zhao1, Bo Sheng2
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 885-901, 2019, DOI:10.32604/cmc.2019.05612
Abstract The discovery of gradual moving object clusters pattern from trajectory streams allows characterizing movement behavior in real time environment, which leverages new applications and services. Since the trajectory streams is rapidly evolving, continuously created and cannot be stored indefinitely in memory, the existing approaches designed on static trajectory datasets are not suitable for discovering gradual moving object clusters pattern from trajectory streams. This paper proposes a novel algorithm of gradual moving object clusters pattern discovery from trajectory streams using sliding window models. By processing the trajectory data in current window, the mining algorithm can capture the trend and evolution of… More >
Open Access
ARTICLE
Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309
Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) is proposed in this paper.… More >
Open Access
ARTICLE
Wengui Su1,2, Xiang Wang3,*, Yulong Shen1
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 925-941, 2019, DOI:10.32604/cmc.2019.04842
Abstract With the reversible data hiding method based on pixel-value-ordering, data are embedded through the modification of the maximum and minimum values of a block. A significant relationship exists between the embedding performance and the block size. Traditional pixel-value-ordering methods utilize pixel blocks with a fixed size to embed data; the smaller the pixel blocks, greater is the embedding capacity. However, it tends to result in the deterioration of the quality of the marked image. Herein, a novel reversible data hiding method is proposed by incorporating a block merging strategy into Li et al.’s pixel-value-ordering method, which realizes the dynamic control… More >
Open Access
ARTICLE
Lina Shi1, Zichi Wang1, Zhenxing Qian1,*, Nannan Huang1, Pauline Puteaux2, Xinpeng Zhang1
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 943-953, 2019, DOI:10.32604/cmc.2019.05768
Abstract Nowadays, emoji image is widely used in social networks. To achieve covert communication in emoji images, this paper proposes a distortion function for emoji images steganography. The profile of image content, the intra- and inter-frame correlation are taken into account in the proposed distortion function to fit the unique properties of emoji image. The three parts are combined together to measure the risks of detection due to the modification on the cover data. With the popular syndrome trellis coding (STC), the distortion of stego emoji image is minimized using the proposed distortion function. As a result, less detectable artifacts could… More >
Open Access
ARTICLE
Xionglve Li1, Junhua Xi1, Zhiping Cai1,*, Tao Yang1, Chak Fong Cheang2
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 955-964, 2019, DOI:10.32604/cmc.2019.05769
Abstract The research and analysis of Internet topology is hot in the field of network measurement, which have important applications in network security, traffic scheduling and many other fields. Most of the existing works are focused on the AS-level and router-level topology, but few works are about the IP-level topology. In fact, obtaining the topology of each continent and knowing how the topologies of the continents are connected to each other can help us understanding the Internet around the world more thoroughly. In this paper, we obtained data sets from RIPE, constructed and analyzed network topologies of all the continents. By… More >
Open Access
ARTICLE
Tianbo Lu1,2,*, Ru Yan1,2, Chao Li3,*, Lihua Yin3, Hao Chen1, Xieyu Zou4
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 965-982, 2019, DOI:10.32604/cmc.2019.05635
Abstract With the rapid development of the Internet, people pay more and more attention to the protection of privacy. The second-generation onion routing system Tor is the most commonly used among anonymous communication systems, which can be used to protect user privacy effectively. In recent years, Tor’s congestion problem has become the focus of attention, and it can affect Tor’s performance even user experience. Firstly, we investigate the causes of Tor network congestion and summarize some link scheduling algorithms proposed in recent years. Then we propose the link scheduling algorithm SWRR based on WRR (Weighted Round Robin). In this process, we… More >
Open Access
ARTICLE
Yuhang Wang1, Yanbin Sun1,*, Shen Su1, Zhihong Tian1, Mohan Li1, Jing Qiu1, Xianzhi Wang2
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 983-993, 2019, DOI:10.32604/cmc.2019.05547
Abstract With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the… More >
Open Access
ARTICLE
Zhiyi Han1, Yugai Huang2,3, Xiaoqiang Xie1, Ying Mei1, Bin Gu1,*
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 995-1003, 2019, DOI:10.32604/cmc.2019.02181
Abstract In ab initio molecular dynamics (AIMD) simulations of chemical reactions, it is important but difficult to identify the chemical species in the trajectory automatically and quickly. In this paper, based on the chemical graph theory, an algorithm for molecular species identification, according to the molecular coordinates and empirical bond length database, is presented. As an example, the chemical species in condensed glycine at room temperature are investigated with our algorithm in detail. The chemical species, including canonical and zwitterionic glycine, their protonated and de-protonated states, and the free protons, are all identified, counted and recorded correctly. Potential applications and further… More >
Open Access
ARTICLE
Yan Chang1,*, Shibin Zhang1, Lili Yan1, Guihua Han1, Haiquan Song1, Yan Zhang1, Xueyang Li1, Qirun Wang2
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1005-1014, 2019, DOI:10.32604/cmc.2019.06297
Abstract Quantum authorization management (QAM) is the quantum scheme for privilege management infrastructure (PMI) problem. Privilege management (authorization management) includes authentication and authorization. Authentication is to verify a user’s identity. Authorization is the process of verifying that a authenticated user has the authority to perform a operation, which is more fine-grained. In most classical schemes, the authority management center (AMC) manages the resources permissions for all network nodes within the jurisdiction. However, the existence of AMC may be the weakest link of the whole scheme. In this paper, a protocol for QAM without AMC is proposed based on entanglement swapping. In… More >
Open Access
ARTICLE
Lihua Zhu1, Yu Wang1, Lei Wang2, Zhiqiang Wu1,*
CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1015-1026, 2019, DOI:10.32604/cmc.2019.05656
Abstract The performance of the transfer alignment has great impact on inertial navigation systems. As the transfer alignment is generally implemented using a filter to compensate the errors, its accuracy, rapidity and anti-disturbance capability are key properties to evaluate the filtering process. In terms of the superiority in dealing with the noise, H∞ filtering has been used to improve the anti-disturbance capability of the transfer alignment. However, there is still a need to incorporate system uncertainty due to various dynamic conditions. Based on the structural value theory, a robustness stability analysis method has been proposed for the transfer alignment to evaluate… More >