Home / Journals / CMC / Vol.66, No.2, 2021
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Understanding the Language of ISIS: An Empirical Approach to Detect Radical Content on Twitter Using Machine Learning

    Zia Ul Rehman1,2, Sagheer Abbas1, Muhammad Adnan Khan3,*, Ghulam Mustafa2, Hira Fayyaz4, Muhammad Hanif1,2, Muhammad Anwar Saeed5
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1075-1090, 2021, DOI:10.32604/cmc.2020.012770
    Abstract The internet, particularly online social networking platforms have revolutionized the way extremist groups are influencing and radicalizing individuals. Recent research reveals that the process initiates by exposing vast audiences to extremist content and then migrating potential victims to confined platforms for intensive radicalization. Consequently, social networks have evolved as a persuasive tool for extremism aiding as recruitment platform and psychological warfare. Thus, recognizing potential radical text or material is vital to restrict the circulation of the extremist chronicle. The aim of this research work is to identify radical text in social media. Our contributions are as follows: (i) A new… More >

  • Open AccessOpen Access

    ARTICLE

    A Self-Learning Data-Driven Development of Failure Criteria of Unknown Anisotropic Ductile Materials with Deep Learning Neural Network

    Kyungsuk Jang1, Gun Jin Yun2,*
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1091-1120, 2021, DOI:10.32604/cmc.2020.012911
    Abstract This paper first proposes a new self-learning data-driven methodology that can develop the failure criteria of unknown anisotropic ductile materials from the minimal number of experimental tests. Establishing failure criteria of anisotropic ductile materials requires time-consuming tests and manual data evaluation. The proposed method can overcome such practical challenges. The methodology is formalized by combining four ideas: 1) The deep learning neural network (DLNN)-based material constitutive model, 2) Self-learning inverse finite element (SELIFE) simulation, 3) Algorithmic identification of failure points from the self-learned stress-strain curves and 4) Derivation of the failure criteria through symbolic regression of the genetic programming. Stress… More >

  • Open AccessOpen Access

    ARTICLE

    An Effective Numerical Method for the Solution of a Stochastic Coronavirus (2019-nCovid) Pandemic Model

    Wasfi Shatanawi1,2,3, Ali Raza4,5,*, Muhammad Shoaib Arif4, Kamaledin Abodayeh1, Muhammad Rafiq6, Mairaj Bibi7
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1121-1137, 2021, DOI:10.32604/cmc.2020.012070
    (This article belongs to this Special Issue: Mathematical aspects of the Coronavirus Disease 2019 (COVID-19): Analysis and Control)
    Abstract Nonlinear stochastic modeling plays a significant role in disciplines such as psychology, finance, physical sciences, engineering, econometrics, and biological sciences. Dynamical consistency, positivity, and boundedness are fundamental properties of stochastic modeling. A stochastic coronavirus model is studied with techniques of transition probabilities and parametric perturbation. Well-known explicit methods such as Euler Maruyama, stochastic Euler, and stochastic Runge–Kutta are investigated for the stochastic model. Regrettably, the above essential properties are not restored by existing methods. Hence, there is a need to construct essential properties preserving the computational method. The non-standard approach of finite difference is examined to maintain the above basic… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Approach to Data Encryption Based on Matrix Computations

    Rosilah Hassan1, Selver Pepic2, Muzafer Saracevic3, Khaleel Ahmad4,*, Milan Tasic5
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1139-1153, 2021, DOI:10.32604/cmc.2020.013104
    (This article belongs to this Special Issue: Deep Learning Trends in Intelligent Systems)
    Abstract In this paper, we provide a new approach to data encryption using generalized inverses. Encryption is based on the implementation of weighted Moore–Penrose inverse AMN(nxm) over the nx8 constant matrix. The square Hermitian positive definite matrix N8x8 p is the key. The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge. We have provided NIST (National Institute of Standards and Technology) quality assurance tests for a random generated Hermitian matrix (a total of 10 different tests and additional analysis with approximate entropy and random digression). In the… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Based Decision Making Approach for Evaluating the Severity of COVID-19 Pandemic in Cities of Kingdom of Saudi Arabia

    Abdullah Baz1,*, Hosam Alhakami2
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1155-1174, 2021, DOI:10.32604/cmc.2020.013215
    Abstract The World Health Organization declared COVID-19 a pandemic on March 11, 2020 stating that it is a worldwide danger and requires imminent preventive strategies to minimise the loss of lives. COVID-19 has now affected millions across 211 countries in the world and the numbers continue to rise. The information discharged by the WHO till June 15, 2020 reports 8,063,990 cases of COVID-19. As the world thinks about the lethal malady for which there is yet no immunization or a predefined course of drug, the nations are relentlessly working at the most ideal preventive systems to contain the infection. The Kingdom… More >

  • Open AccessOpen Access

    ARTICLE

    Industry 4.0: Architecture and Equipment Revolution

    Ahmed Bashar Fakhri1, Saleem Latteef Mohammed1, Imran Khan2, Ali Safaa Sadiq3,4, Basem Alkazemi5, Prashant Pillai4, Bong Jun Choi6,*
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1175-1194, 2021, DOI:10.32604/cmc.2020.012587
    Abstract The development of science and technology has led to the era of Industry 4.0. The core concept is the combination of “material and informationization”. In the supply chain and manufacturing process, the “material” of the physical entity world is realized by data, identity, intelligence, and information. Industry 4.0 is a disruptive transformation and upgrade of intelligent industrialization based on the Internet-of-Things and Big Data in traditional industrialization. The goal is “maximizing production efficiency, minimizing production costs, and maximizing the individual needs of human beings for products and services.” Achieving this goal will surely bring about a major leap in the… More >

  • Open AccessOpen Access

    ARTICLE

    Exploiting Structural Similarities to Classify Citations

    Muhammad Saboor Ahmed*, Muhammad Tanvir Afzal
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1195-1214, 2021, DOI:10.32604/cmc.2020.012619
    Abstract Citations play an important role in the scientific community by assisting in measuring multifarious policies like the impact of journals, researchers, institutions, and countries. Authors cite papers for different reasons, such as extending previous work, comparing their study with the state-of-the-art, providing background of the field, etc. In recent years, researchers have tried to conceptualize all citations into two broad categories, important and incidental. Such a categorization is very important to enhance scientific output in multiple ways, for instance, (1) Helping a researcher in identifying meaningful citations from a list of 100 to 1000 citations (2) Enhancing the impact factor… More >

  • Open AccessOpen Access

    ARTICLE

    University Learning and Anti-Plagiarism Back-End Services

    Manjur Kolhar*, Abdalla Alameen
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1215-1226, 2021, DOI:10.32604/cmc.2020.012658
    Abstract Plagiarism refers to the use of other people’s ideas and information without acknowledging the source. In this research, anti-plagiarism software was designed especially for the university and its campuses to identify plagiarized text in students’ written assignments and laboratory reports. The proposed framework collected original documents to identify plagiarized text using natural language processing. Our research proposes a method to detect plagiarism by applying the core concept of text, which is semantic associations of words and their syntactic composition. Information on the browser was obtained through Request application programming interface by name Url.AbsoluteUri, and it is stored in a centralized… More >

  • Open AccessOpen Access

    ARTICLE

    Entanglement and Sudden Death for a Two-Mode Radiation Field Two Atoms

    Eman M. A. Hilal1, E. M. Khalil2,3,*, S. Abdel-Khalek2,4
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1227-1236, 2021, DOI:10.32604/cmc.2020.012659
    Abstract The effect of the field–field interaction on a cavity containing two qubit (TQ) interacting with a two mode of electromagnetic field as parametric amplifier type is investigated. After performing an appropriate transformation, the constants of motion are calculated. Using the Schrödinger differential equation a system of differential equations was obtained, and the general solution was obtained in the case of exact resonance. Some statistical quantities were calculated and discussed in detail to describe the features of this system. The collapses and revivals phenomena have been discussed in details. The Shannon information entropy has been applied for measuring the degree of… More >

  • Open AccessOpen Access

    ARTICLE

    Smart CardioWatch System for Patients with Cardiovascular Diseases Who Live Alone

    Raisa Nazir Ahmed Kazi1,*, Manjur Kolhar2, Faiza Rizwan2
    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1237-1250, 2021, DOI:10.32604/cmc.2020.012707
    Abstract The widespread use of smartwatches has increased their specific and complementary activities in the health sector for patient’s prognosis. In this study, we propose a framework referred to as smart forecasting CardioWatch (SCW) to measure the heart-rate variation (HRV) for patients with myocardial infarction (MI) who live alone or are outside their homes. In this study, HRV is used as a vital alarming sign for patients with MI. The performance of the proposed framework is measured using machine learning and deep learning techniques, namely, support vector machine, logistic regression, and decision-tree classification techniques. The results indicated that the analysis of… More >

Per Page:

Share Link

WeChat scan