Open Access
ARTICLE
Sooeun Song1, Minsu Choi1, Yunyeong Goh1, Jusik Yun1, Wonsuk Yoo1, Wonsik Yang1, Jaewook Jung1, Jong-Moon Chung1, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 473-494, 2020, DOI:10.32604/cmc.2020.09052
Abstract As next generation communication technologies emerge, new high data rate
applications and high-definition large-screen video streaming have become very popular.
As a result, network traffic has been increasing so much that existing backhaul networks
soon will not be able to support all traffic demands. To support these needs in future 6G
mobile systems, the establishment of an additional backhaul wireless network is
considered essential. As one of the solutions, a wireless backhaul network based on an
aerial platform has been proposed. In order to explore the potential of aerial platforms as
wireless backhaul networks, in this paper, the categories for… More >
Open Access
REVIEW
Junyan Ni1, Xincun Zhuang2, 3, Magd Abdel Wahab4, 5, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 495-523, 2020, DOI:10.32604/cmc.2020.08448
Abstract Residual stress after welding has negative effects on the service life of welded
steel components or structures. This work reviews three most commonly used methods
for predicting residual stress, namely, empirical, semi-empirical and process simulation
methods. Basic principles adopted by these methods are introduced. The features and
limitations of each method are discussed as well. The empirical method is the most
practical but its accuracy relies heavily on experiments. Mechanical theories are
employed in the semi-empirical method, while other aspects, such as temperature
variation and phase transformation, are simply ignored. The process simulation method
has been widely used due to… More >
Open Access
ARTICLE
Mohamed Abd El-Aziz1, 2, A. M. Aly1, 3, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 525-549, 2020, DOI:10.32604/cmc.2020.08576
Abstract This study focusses on the numerical investigations of boundary layer flow for
magnetohydrodynamic (MHD) and a power-law nanofluid containing gyrotactic
microorganisms on an exponentially stretching surface with zero nanoparticle mass flux
and convective heating. The nonlinear system of the governing equations is transformed
and solved by Runge-Kutta-Fehlberg method. The impacts of the transverse magnetic
field, bioconvection parameters, Lewis number, nanofluid parameters, Prandtl number
and power-law index on the velocity, temperature, nanoparticle volume fraction, density
of motile microorganism profiles is explored. In addition, the impacts of these parameters
on local skin-friction coefficient, local Nusselt, local Sherwood numbers and local
density number… More >
Open Access
ARTICLE
Fatima Bayones1, Abdelmooty Abd-Alla2, *, Raghad Alfatta3, Hoda Al-Nefaie3
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 551-567, 2020, DOI:10.32604/cmc.2020.08420
Abstract The propagation of thermoelastic waves in a homogeneous, isotropic elastic
semi-infinite space is subjected to rotation and initial stress, which is at temperature T0 -
initially, and whose boundary surface is subjected to heat source and load moving with
finite velocity. Temperature and stress distribution occurring due to heating or cooling and
have been determined using certain boundary conditions. Numerical results have been
given and illustrated graphically in each case considered. Comparison is made with the
results predicted by the theory of thermoelasticity in the absence of rotation and initial
stress. The results indicate that the effect of the rotation… More >
Open Access
ARTICLE
Sang-Min Park1, Young-Gab Kim2, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 569-590, 2020, DOI:10.32604/cmc.2020.08666
Abstract Emotions of users do not converge in a single application but are scattered across
diverse applications. Mobile devices are the closest media for handling user data and these
devices have the advantage of integrating private user information and emotions spread
over different applications. In this paper, we first analyze user profile on a mobile device by
describing the problem of the user sentiment profile system in terms of data granularity,
media diversity, and server-side solution. Fine-grained data requires additional data and
structural analysis in mobile devices. Media diversity requires standard parameters to
integrate user data from various applications. A server-side… More >
Open Access
ARTICLE
Noor Mualla1, Essam H Houssein2, *, M. R. Hassan1
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 591-605, 2020, DOI:10.32604/cmc.2020.08580
Abstract Chronological age estimation using panoramic dental X-ray images is an
essential task in forensic sciences. Various statistical approaches have proposed by
considering the teeth and mandible. However, building automated dental age estimation
based on machine learning techniques needs more research efforts. In this paper, an
automated dental age estimation is proposed using transfer learning. In the proposed
approach, features are extracted using two deep neural networks namely, AlexNet and
ResNet. Several classifiers are proposed to perform the classification task including
decision tree, k-nearest neighbor, linear discriminant, and support vector machine. The
proposed approach is evaluated using a number of suitable… More >
Open Access
ARTICLE
Behrouz Karami1, Maziar Janghorban1, Timon Rabczuk2, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 607-629, 2020, DOI:10.32604/cmc.2020.08032
Abstract This study investigates the forced vibration of functionally graded hexagonal
nano-size plates for the first time. A quasi-three-dimensional (3D) plate theory including
stretching effect is used to model the anisotropic plate as a continuum one where smallscale effects are considered based on nonlocal strain gradient theory. Also, the plate is
assumed on a Pasternak foundation in which normal and transverse shear loads are taken
into account. The governing equations of motion are obtained via the Hamiltonian
principles which are solved using analytical based methods by means of Navier’s
approximation. The influences of the exponential factor, nonlocal parameter, strain gradient
parameter,… More >
Open Access
ARTICLE
Yun Wang1, Fazli Subhan2, Shahaboddin Shamshirband3, 4, *, Muhammad Zubair Asghar5, Ikram Ullah5, Ammara Habib5
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 631-655, 2020, DOI:10.32604/cmc.2020.07920
Abstract The feedback collection and analysis has remained an important subject matter
for long. The traditional techniques for student feedback analysis are based on
questionnaire-based data collection and analysis. However, the student expresses their
feedback opinions on online social media sites, which need to be analyzed. This study
aims at the development of fuzzy-based sentiment analysis system for analyzing student
feedback and satisfaction by assigning proper sentiment score to opinion words and
polarity shifters present in the input reviews. Our technique computes the sentiment score
of student feedback reviews and then applies a fuzzy-logic module to analyze and
quantify student’s satisfaction… More >
Open Access
ARTICLE
Yasir Nawaz1, Muhammad Shoaib Arif 1, Mairaj Bibi2, *, Javeria Nawaz Abbasi2, Umer Javed3, Amna Nazeer2
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 657-677, 2020, DOI:10.32604/cmc.2020.08584
Abstract Present contribution is concerned with the construction and application of a
numerical method for the fluid flow problem over a linearly stretching surface with the
modification of standard Gradient descent Algorithm to solve the resulted difference
equation. The flow problem is constructed using continuity, and Navier Stoke equations
and these PDEs are further converted into boundary value problem by applying suitable
similarity transformations. A central finite difference method is proposed that gives
third-order accuracy using three grid points. The stability conditions of the present
proposed method using a Gauss-Seidel iterative procedure is found using VonNeumann stability criteria and order of… More >
Open Access
ARTICLE
N. Shobha Rani1, *, M. Chandrajith2, B. R. Pushpa1, B. J. Bipin Nair1
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 679-694, 2020, DOI:10.32604/cmc.2020.08552
Abstract Assessing the age of an individual via bones serves as a fool proof method in
true determination of individual skills. Several attempts are reported in the past for
assessment of chronological age of an individual based on variety of discriminative
features found in wrist radiograph images. The permutation and combination of these
features realized satisfactory accuracies for a set of limited groups. In this paper,
assessment of gender for individuals of chronological age between 1-17 years is
performed using left hand wrist radiograph images. A fully automated approach is
proposed for removal of noise persisted due to non-uniform illumination during… More >
Open Access
ARTICLE
Jin Wang1, 2, 3, Yu Gao2, Chang Zhou2, R. Simon Sherratt4, Lei Wang5, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 695-711, 2020, DOI:10.32604/cmc.2020.08674
Abstract Wireless Sensor Networks (WSNs) are usually formed with many tiny sensors
which are randomly deployed within sensing field for target monitoring. These sensors
can transmit their monitored data to the sink in a multi-hop communication manner.
However, the ‘hot spots’ problem will be caused since nodes near sink will consume
more energy during forwarding. Recently, mobile sink based technology provides an
alternative solution for the long-distance communication and sensor nodes only need to
use single hop communication to the mobile sink during data transmission. Even though
it is difficult to consider many network metrics such as sensor position, residual energy… More >
Open Access
ARTICLE
Yinghang Jiang1, Qi Liu2,3,*, Williams Dannah1, Dandan Jin2, Xiaodong Liu3, Mingxu Sun4,*
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 713-729, 2020, DOI:10.32604/cmc.2020.04604
Abstract Hadoop is a well-known parallel computing system for distributed computing
and large-scale data processes. “Straggling” tasks, however, have a serious impact on task
allocation and scheduling in a Hadoop system. Speculative Execution (SE) is an efficient
method of processing “Straggling” Tasks by monitoring real-time running status of tasks
and then selectively backing up “Stragglers” in another node to increase the chance to
complete the entire mission early. Present speculative execution strategies meet challenges
on misjudgement of “Straggling” tasks and improper selection of backup nodes, which
leads to inefficient implementation of speculative executive processes. This paper has
proposed an Optimized Resource… More >
Open Access
ARTICLE
Lili Pan1, Cong Li1, *, Samira Pouyanfar2, Rongyu Chen1, Yan Zhou1
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 731-746, 2020, DOI:10.32604/cmc.2020.06508
Abstract With the development of deep learning and Convolutional Neural Networks
(CNNs), the accuracy of automatic food recognition based on visual data have
significantly improved. Some research studies have shown that the deeper the model is,
the higher the accuracy is. However, very deep neural networks would be affected by the
overfitting problem and also consume huge computing resources. In this paper, a new
classification scheme is proposed for automatic food-ingredient recognition based on
deep learning. We construct an up-to-date combinational convolutional neural network
(CBNet) with a subnet merging technique. Firstly, two different neural networks are
utilized for learning interested features.… More >
Open Access
ARTICLE
Haoxiang Sun1, *, Changxing Chen1, Yunfei Ling1, Mu Yang1
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 747-761, 2020, DOI:10.32604/cmc.2020.05625
Abstract In the process of spectrum perception, in order to realize accurate perception of
the channel state, the method of multi-node cooperative perception can usually be used.
However, the first problem to be considered is how to complete information fusion and
obtain more accurate and reliable judgment results based on multi-node perception results.
The ideas put forward in this paper are as follows: firstly, the perceived results of each node
are obtained on the premise of limiting detection probability and false alarm probability.
Then, on the one hand, the weighted fusion criterion of decision-making weight optimization
of each node is realized… More >
Open Access
ARTICLE
Huan Zhang1, Kangfeng Zheng1, *, Xiujuan Wang2, Shoushan Luo1, Bin Wu1
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 763-786, 2020, DOI:10.32604/cmc.2020.06553
Abstract As a core component of the network, web applications have become one of the
preferred targets for attackers because the static configuration of web applications
simplifies the exploitation of vulnerabilities by attackers. Although the moving target
defense (MTD) has been proposed to increase the attack difficulty for the attackers, there
is no solo approach can cope with different attacks; in addition, it is impossible to
implement all these approaches simultaneously due to the resource limitation. Thus, the
selection of an optimal defense strategy based on MTD has become the focus of research.
In general, the confrontation of two players in… More >
Open Access
ARTICLE
Wujie Hu1, Gonglin Yuan1, *, Hongtruong Pham2
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 787-800, 2020, DOI:10.32604/cmc.2020.02993
Abstract It is well known that Newton and quasi-Newton algorithms are effective to small
and medium scale smooth problems because they take full use of corresponding gradient
function’s information but fail to solve nonsmooth problems. The perfect algorithm stems
from concept of ‘bundle’ successfully addresses both smooth and nonsmooth complex
problems, but it is regrettable that it is merely effective to small and medium optimization
models since it needs to store and update relevant information of parameter’s bundle. The
conjugate gradient algorithm is effective both large-scale smooth and nonsmooth
optimization model since its simplicity that utilizes objective function’s information and the… More >
Open Access
ARTICLE
Fan Liu1, Jianwei Yan2, Wantao Wang2, Jian Liu2, *, Junying Li3, Alan Yang4
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 801-816, 2020, DOI:10.32604/cmc.2020.07039
Abstract Skin lesion recognition is an important challenge in the medical field. In this
paper, we have implemented an intelligent classification system based on convolutional
neural network. First of all, this system can classify whether the input image is a
dermascopic image with an accuracy of 99%. And then diagnose the dermoscopic image
and the non-skin mirror image separately. Due to the limitation of the data, we can only
realize the recognition of vitiligo by non-skin mirror. We propose a vitiligo recognition
based on the probability average of three structurally identical CNN models. The method
is more efficient and robust than… More >
Open Access
ARTICLE
Yanghong Zhang1, Feng Sun2, Liwei Tian1, Jinfeng Li3, Longqing Zhang3, Shengfu Lan3
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 817-831, 2020, DOI:10.32604/cmc.2020.06076
Abstract Image sparse representation is a method of efficient compression and coding of
image signal in the process of digital image processing. Image after sparse representation,
to enhance the transmission efficiency of the image signal. Entropy of Primitive (EoP) is a
statistical representation of the sparse representation of the image, which indicates the
probability of each base element. Based on the EoP, this paper presents an image quality
evaluation method-Difference of Visual Information Metric (DVIM). The principle of this
method is to evaluate the image quality with the difference between the original image and
the distorted image. The comparative experiments between… More >
Open Access
ARTICLE
Bo Gao1, *, Xuan Liu1, Xiaobo Wu1, *, Shudong Li2, *, Zhongzhou Lan1, Hui Lu2, *, Boyan Liu1
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 833-847, 2020, DOI:10.32604/cmc.2020.06702
Abstract The stability of Non-Linear Feedback Shift Registers (NFSRs) plays an
important role in the cryptographic security. Due to the complexity of nonlinear systems
and the lack of efficient algebraic tools, the theorems related to the stability of NFSRs are
still not well-developed. In this paper, we view the NFSR with periodic inputs as a
Boolean control network. Based on the mathematical tool of semi-tensor product (STP),
the Boolean network can be mapped into an algebraic form. Through these basic theories,
we analyze the state space of non-autonomous NFSRs, and discuss the stability of an
NFSR with periodic inputs of limited… More >
Open Access
ARTICLE
Yuan Chen1, Liangtao Duan1, Weize Sun2, *, Jingxin Xu3
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 849-859, 2020, DOI:10.32604/cmc.2020.07115
Abstract In this paper, we address the frequency estimator for 2-dimensional (2-D)
complex sinusoids in the presence of white Gaussian noise. With the use of the sinc
function model of the discrete Fourier transform (DFT) coefficients on the input data, a
fast and accurate frequency estimator is devised, where only the DFT coefficient with the
highest magnitude and its four neighbors are required. Variance analysis is also included
to investigate the accuracy of the proposed algorithm. Simulation results are conducted to
demonstrate the superiority of the developed scheme, in terms of the estimation
performance and computational complexity. More >
Open Access
ARTICLE
Zengshan Tian1, Weiqin Yang1, Yue Jin1, Liangbo Xie1, *, Zhengwen Huang2
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 861-876, 2020, DOI:10.32604/cmc.2020.07297
Abstract With the popularity of indoor wireless network, device-free indoor
localization has attracted more and more attention. Unlike device-based localization
where the target is required to carry an active transmitter, their frequent signal scanning
consumes a large amount of energy, which is inconvenient for devices with limited
energy. In this work, we propose the MFPL, device-free localization (DFL) system
based on WiFi distance measurement. First, we combine multi-subcarrier characteristic
of Channel State Information (CSI) with classical Fresnel reflection model to get the
linear relationship between the change of the length of reflection path and the
subcarrier phase difference. Then we calculate… More >
Open Access
ARTICLE
Yali Wang1, Youqian Feng1, Zhonghai Yin1, Cheng Zhou1, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 877-891, 2020, DOI:10.32604/cmc.2020.06423
Abstract This paper researches some problems in complex formation for multi-agents,
in which two matrices are proposed to record the formation. The pattern matrix is used to
describe the pattern of the formation; meanwhile, the location matrix is used to record the
location of each agent. Thus, all desired positions of each agent will be obtained by
geometrical relationship on the basis of two matrices above. In addition a self-adaptation
flocking algorithm is proposed to control all agents to form a desired formation and avoid
obstacles. The main idea is as follows: agents will form a desired formation through the
method… More >
Open Access
ARTICLE
Tingting Zhang1, 2, 3, *, Yushi Lan2, Minggang Yu1, Changyou Zheng1, Kun Liu1
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 893-904, 2020, DOI:10.32604/cmc.2020.06216
Abstract Web Services Choreography Description Language lacks a formal system to
accurately express the semantics of service behaviors and verify the correctness of a
service choreography model. This paper presents a new approach of choreography model
verification based on Description Logic. A meta model of service choreography is built to
provide a conceptual framework to capture the formal syntax and semantics of service
choreography. Based on the framework, a set of rules and constraints are defined in
Description Logic for choreography model verification. To automate model verification,
the UML-based service choreography model will be transformed, by the given algorithms,
into the… More >
Open Access
ARTICLE
Yong Yan1, Yao Dai2, *, Zhiqiang Zhou3, Wei Jiang4, Shaoyong Guo2
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 905-915, 2020, DOI:10.32604/cmc.2020.07425
Abstract Internet of Things (IoT) technology is rapidly evolving, but there is no trusted
platform to protect user privacy, protect information between different IoT domains, and
promote edge processing. Therefore, we integrate the blockchain technology into
constructing trusted IoT platforms. However, the application of blockchain in IoT is
hampered by the challenges posed by heavy computing processes. To solve the problem,
we put forward a blockchain framework based on mobile edge computing, in which the
blockchain mining tasks can be offloaded to nearby nodes or the edge computing service
providers and the encrypted hashes of blocks can be cached in the… More >
Open Access
ARTICLE
Haiwen Chen1, Guang Yu1, Fang Liu2, Zhiping Cai1, *, Anfeng Liu3, Shuhui Chen1, Hongbin Huang1, Chak Fong Cheang4
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 917-927, 2020, DOI:10.32604/cmc.2020.05981
Abstract For many Internet companies, a huge amount of KPIs (e.g., server CPU usage,
network usage, business monitoring data) will be generated every day. How to closely
monitor various KPIs, and then quickly and accurately detect anomalies in such huge data
for troubleshooting and recovering business is a great challenge, especially for unlabeled
data. The generated KPIs can be detected by supervised learning with labeled data, but
the current problem is that most KPIs are unlabeled. That is a time-consuming and
laborious work to label anomaly for company engineers. Build an unsupervised model to
detect unlabeled data is an urgent need… More >
Open Access
ARTICLE
Weihua Fang1, Zhilin An2, Tiantang Yu2, *, Tinh Quoc Bui3, 4, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 929-962, 2020, DOI:10.32604/cmc.2020.05022
Abstract Numerical analysis of unsteady heat transfer problems with complex
geometries by the isogeometric boundary element method (IGABEM) is presented. The
IGABEM possesses many desirable merits and features, for instance, (a) exactly
represented arbitrarily complex geometries, and higher-order continuity due to nonuniform rational B-splines (NURBS) shape functions; (b) using NURBS for both field
approximation and geometric description; (c) directly utilizing geometry data from
computer-aided design (CAD); and (d) only boundary discretization. The formulation of
IGABEM for unsteady heat transfer is derived. The domain discretization in terms of
IGABEM for unsteady heat transfer is required as that in traditional BEM. The internal… More >
Open Access
ARTICLE
Xuyu Xiang1, Jiaohua Qin1, *, Junshan Tan1, Neal N. Xiong1
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 963-976, 2020, DOI:10.32604/cmc.2020.06394
Abstract In this paper, a new adaptive calibration algorithm for image steganalysis is
proposed. Steganography disturbs the dependence between neighboring pixels and
decreases the neighborhood node degree. Firstly, we analyzed the effect of steganography
on the neighborhood node degree of cover images. Then, the calibratable pixels are marked
by the analysis of neighborhood node degree. Finally, the strong correlation calibration
image is constructed by revising the calibratable pixels. Experimental results reveal that
compared with secondary steganography the image calibration method significantly
increased the detection accuracy for LSB matching steganography on low embedding ratio.
The proposed method also has a better performance… More >
Open Access
ARTICLE
Fengrui Liu1, 2, 3, Wanting Yao1, 2, Xinhong Shi4, *, Libin Zhao1, 2, Jianyu Zhang5, *
CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 977-999, 2020, DOI:10.32604/cmc.2020.07184
Abstract To minimize the mass and increase the bearing failure load of composite doublelap bolted joints, a three-step optimization strategy including feasible region reduction,
optimization model decoupling and optimization was presented. In feasible region
reduction, the dimensions of the feasible design region were reduced by selecting dominant
design variables from numerous multilevel parameters by sensitivity analyses, and the
feasible regions of variables were reduced by influence mechanism analyses. In model
decoupling, the optimization model with a large number of variables was divided into
various sub-models with fewer variables by variance analysis. In the third step, the
optimization sub-models were solved one… More >