Home / Journals / CMC / Vol.67, No.3, 2021
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    CNN Ensemble Approach to Detect COVID-19 from Computed Tomography Chest Images

    Haikel Alhichri*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3581-3599, 2021, DOI:10.32604/cmc.2021.015399
    (This article belongs to this Special Issue: Artificial Intelligence and Healthcare Analytics for COVID-19)
    Abstract In January 2020, the World Health Organization declared a global health emergency concerning the spread of a new coronavirus disease, which was later named COVID-19. Early and fast diagnosis and isolation of COVID-19 patients have proven to be instrumental in limiting the spread of the disease. Computed tomography (CT) is a promising imaging method for fast diagnosis of COVID-19. In this study, we develop a unique preprocessing step to resize CT chest images to a fixed size (256 × 256 pixels) that preserves the aspect ratio and reduces image loss. Then, we present a deep learning (DL) method to classify… More >

  • Open AccessOpen Access

    ARTICLE

    The Hyperbolic Two Temperature Semiconducting Thermoelastic Waves by Laser Pulses

    Ismail M. Taye1, Kh. Lotfy2,4,*, A. A. El-Bary3,5, Jawdat Alebraheem1, Sadia Asad1
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3601-3618, 2021, DOI:10.32604/cmc.2021.015223
    Abstract A novel model of a hyperbolic two-temperature theory is investigated to study the propagation the thermoelastic waves on semiconductor materials. The governing equations are studied during the photo-excitation processes in the context of the photothermal theory. The outer surface of o semiconductor medium is illuminated by a laser pulse. The generalized photo-thermoelasticity theory in two dimensions (2D) deformation is used in many models (Lord–Shulman (LS), Green–Lindsay (GL) and the classical dynamical coupled theory (CD)). The combinations processes between the hyperbolic two-temperature theory and photo-thermoelasticity theory under the effect of laser pulses are obtained analytically. The harmonic wave technique is used… More >

  • Open AccessOpen Access

    ARTICLE

    Integrity Assessment of Medical Devices for Improving Hospital Services

    Fahad A. Alzahrani1, Masood Ahmad2, Mohd Nadeem2, Rajeev Kumar2,3,*, Raees Ahmad Khan2
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3619-3633, 2021, DOI:10.32604/cmc.2021.014869
    Abstract The present study examines the various techniques being used to maintain the integrity of the medical devices, and develops a quantitative framework to list these in the sequence of priority. To achieve the intended objective, the study employs the combined procedure of Fuzzy Analytic Network Process (ANP) and Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS). We selected fuzzy based decision making techniques for assessing the integrity of medical devices. The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices. Different techniques or the procedures of integrity assessment… More >

  • Open AccessOpen Access

    ARTICLE

    Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text

    Fahd N. Al-Wesabi1,2,*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3635-3648, 2021, DOI:10.32604/cmc.2021.015865
    Abstract The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks. Therefore, improving the security and authenticity of the text when it is transferred via the internet has become one of the most difficult challenges that researchers face today. Arabic text is more sensitive than other languages due to Harakat’s existence in Arabic diacritics such as Kasra, and Damma in which making basic changes such as modifying diacritic arrangements can lead to change the text meaning. In… More >

  • Open AccessOpen Access

    ARTICLE

    Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications

    Alaa Omran Almagrabi1,*, A. K. Bashir2
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3649-3667, 2021, DOI:10.32604/cmc.2021.015056
    (This article belongs to this Special Issue: Security Issues in Industrial Internet of Things)
    Abstract The design of distributed ledger, Asymmetric Key Algorithm (AKA) blockchain systems, is prominent in administering security and access control in various real-time services and applications. The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services. However, the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness. It results in degrading security through unattended access control for limited-service users. In this article, a service-aware access control procedure (SACP) is introduced to address the afore-mentioned issue. The proposed SACP defines attended access control for all the service session by identifying… More >

  • Open AccessOpen Access

    ARTICLE

    Implementation of a Subjective Visual Vertical and Horizontal Testing System Using Virtual Reality

    Sungjin Lee1, Min Hong2, Hongly Va1, Ji-Yun Park3,*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3669-3679, 2021, DOI:10.32604/cmc.2021.015706
    Abstract Subjective visual vertical (SVV) and subjective visual horizontal (SVH) tests can be used to evaluate the perception of verticality and horizontality, respectively, and can aid the diagnosis of otolith dysfunction in clinical practice. In this study, SVV and SVH screen version tests are implemented using virtual reality (VR) equipment; the proposed test method promotes a more immersive feeling for the subject while using a simple equipment configuration and possessing excellent mobility. To verify the performance of the proposed VR-based SVV and SVH tests, a reliable comparison was made between the traditional screen-based SVV and SVH tests and the proposed method,… More >

  • Open AccessOpen Access

    ARTICLE

    Reconstructing the Time-Dependent Thermal Coefficient in 2D Free Boundary Problems

    M. J. Huntul*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3681-3699, 2021, DOI:10.32604/cmc.2021.016036
    Abstract The inverse problem of reconstructing the time-dependent thermal conductivity and free boundary coefficients along with the temperature in a two-dimensional parabolic equation with initial and boundary conditions and additional measurements is, for the first time, numerically investigated. This inverse problem appears extensively in the modelling of various phenomena in engineering and physics. For instance, steel annealing, vacuum-arc welding, fusion welding, continuous casting, metallurgy, aircraft, oil and gas production during drilling and operation of wells. From literature we already know that this inverse problem has a unique solution. However, the problem is still ill-posed by being unstable to noise in the… More >

  • Open AccessOpen Access

    ARTICLE

    Text Analysis-Based Watermarking Approach for Tampering Detection of English Text

    Fahd N. Al-Wesabi1,2,*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3701-3719, 2021, DOI:10.32604/cmc.2021.015785
    Abstract Due to the rapid increase in the exchange of text information via internet networks, the security and the reliability of digital content have become a major research issue. The main challenges faced by researchers are authentication, integrity verification, and tampering detection of the digital contents. In this paper, text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents. The proposed approach embeds and detects the watermark logically without altering the original English text document. Based on hidden Markov model (HMM), the fourth level order of the word mechanism is used to analyze… More >

  • Open AccessOpen Access

    ARTICLE

    State-Based Offloading Model for Improving Response Rate of IoT Services

    K. Sakthidasan1, Bhekisipho Twala2, S. Yuvaraj3, K. Vijayan3,*, S. Praveenkumar3, Prashant Mani4, C. Bharatiraja3
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3721-3735, 2021, DOI:10.32604/cmc.2021.014321
    Abstract The Internet of Things (IoT) is a heterogeneous information sharing and access platform that provides services in a pervasive manner. Task and computation offloading in the IoT helps to improve the response rate and the availability of resources. Task offloading in a service-centric IoT environment mitigates the complexity in response delivery and request processing. In this paper, the state-based task offloading method (STOM) is introduced with a view to maximize the service response rate and reduce the response time of the varying request densities. The proposed method is designed using the Markov decision-making model to improve the rate of requests… More >

  • Open AccessOpen Access

    ARTICLE

    Analyzing COVID-2019 Impact on Mental Health Through Social Media Forum

    Huma1, Muhammad Khalid Sohail2, Nadeem Akhtar3, Dost Muhammad3, Humaira Afzal4, Muhammad Rafiq Mufti5, Shahid Hussain6,*, Mansoor Ahmed1
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3737-3748, 2021, DOI:10.32604/cmc.2021.014398
    (This article belongs to this Special Issue: COVID-19 impacts on Software Engineering industry and research community)
    Abstract This study aims to identify the potential association of mental health and social media forum during the outbreak of COVID-19 pandemic. COVID-19 brings a lot of challenges to government globally. Among the different strategies the most extensively adopted ones were lockdown, social distancing, and isolation among others. Most people with no mental illness history have been found with high risk of distress and psychological discomfort due to anxiety of being infected with the virus. Panic among people due to COVID-19 spread faster than the disease itself. The misinformation and excessive usage of social media in this pandemic era have adversely… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Approach for Traffic Orchestration in SDVN Based on CMPR

    Thamer Alhussain1, Ahmad Ali AlZubi2,*, Abdulaziz Alarifi2
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3749-3763, 2021, DOI:10.32604/cmc.2021.015858
    Abstract The vehicle ad hoc network that has emerged in recent years was originally a branch of the mobile ad hoc network. With the drafting and gradual establishment of standards such as IEEE802.11p and IEEE1609, the vehicle ad hoc network has gradually become independent of the mobile ad hoc network. The Internet of Vehicles (Vehicular Ad Hoc Network, VANET) is a vehicle-mounted network that comprises vehicles and roadside basic units. This multi-hop hybrid wireless network is based on a vehicle-mounted self-organizing network. As compared to other wireless networks, such as mobile ad hoc networks, wireless sensor networks, wireless mesh networks, etc.,… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Span and Multiple Relevant Time Series Prediction Based on Neighborhood Rough Set

    Xiaoli Li1, Shuailing Zhou1, Zixu An2,*, Zhenlong Du1
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3765-3780, 2021, DOI:10.32604/cmc.2021.012422
    Abstract Rough set theory has been widely researched for time series prediction problems such as rainfall runoff. Accurate forecasting of rainfall runoff is a long standing but still mostly significant problem for water resource planning and management, reservoir and river regulation. Most research is focused on constructing the better model for improving prediction accuracy. In this paper, a rainfall runoff forecast model based on the variable-precision fuzzy neighborhood rough set (VPFNRS) is constructed to predict Watershed runoff value. Fuzzy neighborhood rough set define the fuzzy decision of a sample by using the concept of fuzzy neighborhood. The fuzzy neighborhood rough set… More >

  • Open AccessOpen Access

    ARTICLE

    Time Series Facebook Prophet Model and Python for COVID-19 Outbreak Prediction

    Mashael Khayyat1,*, Kaouther Laabidi2, Nada Almalki1, Maysoon Al-zahrani1
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3781-3793, 2021, DOI:10.32604/cmc.2021.014918
    (This article belongs to this Special Issue: COVID-19 impacts on Software Engineering industry and research community)
    Abstract COVID-19 comes from a large family of viruses identified in 1965; to date, seven groups have been recorded which have been found to affect humans. In the healthcare industry, there is much evidence that Al or machine learning algorithms can provide effective models that solve problems in order to predict confirmed cases, recovered cases, and deaths. Many researchers and scientists in the field of machine learning are also involved in solving this dilemma, seeking to understand the patterns and characteristics of virus attacks, so scientists may make the right decisions and take specific actions. Furthermore, many models have been considered… More >

  • Open AccessOpen Access

    ARTICLE

    An Intelligent Cluster Optimization Algorithm for Smart Body Area Networks

    Adil Mushtaq1, Muhammad Nadeem Majeed1, Farhan Aadil2, Muhammad Fahad Khan2, Sangsoon Lim3,*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3795-3814, 2021, DOI:10.32604/cmc.2021.015369
    (This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
    Abstract Body Area Networks (BODYNETs) or Wireless Body Area Networks (WBAN), being an important type of ad-hoc network, plays a vital role in multimedia, safety, and traffic management applications. In BODYNETs, rapid topology changes occur due to high node mobility, which affects the scalability of the network. Node clustering is one mechanism among many others, which is used to overcome this issue in BODYNETs. There are many clustering algorithms used in this domain to overcome this issue. However, these algorithms generate a large number of Cluster Heads (CHs), which results in scarce resource utilization and degraded performance. In this research, an… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Adaptive Binarization Method for Degraded Document Images

    Siti Norul Huda Sheikh Abdullah1, Saad M. Ismail1,2, Mohammad Kamrul Hasan1,*, Palaiahnakote Shivakumara3
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3815-3832, 2021, DOI:10.32604/cmc.2021.014610
    Abstract Achieving a good recognition rate for degraded document images is difficult as degraded document images suffer from low contrast, bleed-through, and nonuniform illumination effects. Unlike the existing baseline thresholding techniques that use fixed thresholds and windows, the proposed method introduces a concept for obtaining dynamic windows according to the image content to achieve better binarization. To enhance a low-contrast image, we proposed a new mean histogram stretching method for suppressing noisy pixels in the background and, simultaneously, increasing pixel contrast at edges or near edges, which results in an enhanced image. For the enhanced image, we propose a new method… More >

  • Open AccessOpen Access

    ARTICLE

    A User-friendly Model for Ransomware Analysis Using Sandboxing

    Akhtar Kamal1, Morched Derbali2, Sadeeq Jan1,*, Javed Iqbal Bangash3, Fazal Qudus Khan2, Houssem Jerbi4, Rabeh Abbassi4, Gulzar Ahmad5
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3833-3846, 2021, DOI:10.32604/cmc.2021.015941
    Abstract Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the attacker. There have been several reported high-profile ransomware attacks including WannaCry, Petya, and Bad Rabbit resulting in losses of over a billion dollars to various individuals and businesses in the world. The analysis of ransomware is often carried out via sandbox environments; however, the initial setup and configuration of such environments is a challenging task. Also, it is difficult for an ordinary computer user to correctly interpret the complex results presented in the reports generated by… More >

  • Open AccessOpen Access

    ARTICLE

    A Deep Learning-Based Recognition Approach for the Conversion of Multilingual Braille Images

    Abdulmalik AlSalman1, Abdu Gumaei1,*, Amani AlSalman2, Suheer Al-Hadhrami1
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3847-3864, 2021, DOI:10.32604/cmc.2021.015614
    Abstract Braille-assistive technologies have helped blind people to write, read, learn, and communicate with sighted individuals for many years. These technologies enable blind people to engage with society and help break down communication barriers in their lives. The Optical Braille Recognition (OBR) system is one example of these technologies. It plays an important role in facilitating communication between sighted and blind people and assists sighted individuals in the reading and understanding of the documents of Braille cells. However, a clear gap exists in current OBR systems regarding asymmetric multilingual conversion of Braille documents. Few systems allow sighted people to read and… More >

  • Open AccessOpen Access

    ARTICLE

    Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida

    Ali A.R. Alkhafaji1,*, Nilam Nur Amir Sjarif1, M.A Shahidan1, Nurulhuda Firdaus Mohd Azmi1, Haslina Md Sarkan1, Suriayati Chuprat1, Osamah Ibrahim Khalaf2, Ehab Nabiel Al-Khanak3
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3865-3885, 2021, DOI:10.32604/cmc.2021.015803
    (This article belongs to this Special Issue: Application of Big Data Analytics in the Management of Business)
    Abstract The most sensitive Arabic text available online is the digital Holy Quran. This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs. Thus, it should be protected from any kind of tampering to keep its invaluable meaning intact. Different characteristics of Arabic letters like the vowels (), Kashida (extended letters), and other symbols in the Holy Quran must be secured from alterations. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR) and Embedding Ratio (ER).… More >

  • Open AccessOpen Access

    ARTICLE

    A Reliable and Scalable Internet of Military Things Architecture

    Omar Said1,3, Amr Tolba2,3,*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3887-3906, 2021, DOI:10.32604/cmc.2021.016076
    Abstract Recently, Internet of Things (IoT) technology has provided logistics services to many disciplines such as agriculture, industry, and medicine. Thus, it has become one of the most important scientific research fields. Applying IoT to military domain has many challenges such as fault tolerance and QoS. In this paper, IoT technology is applied on the military field to create an Internet of Military Things (IoMT) system. Here, the architecture of the aforementioned IoMT system is proposed. This architecture consists of four main layers: Communication, information, application, and decision support. These layers provided a fault tolerant coverage communication system for IoMT things.… More >

  • Open AccessOpen Access

    ARTICLE

    Joint Frequency and DOA Estimation with Automatic Pairing Using the Rayleigh–Ritz Theorem

    Haiming Du1,*, Han Gao1, Wenjing Jia2
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3907-3919, 2021, DOI:10.32604/cmc.2021.015969
    Abstract This paper presents a novel scheme for joint frequency and direction of arrival (DOA) estimation, that pairs frequencies and DOAs automatically without additional computations. First, when the property of the Kronecker product is used in the received array signal of the multiple-delay output model, the frequency-angle steering vector can be reconstructed as the product of the frequency steering vector and the angle steering vector. The frequency of the incoming signal is then obtained by searching for the minimal eigenvalue among the smallest eigenvalues that depend on the frequency parameters but are irrelevant to the DOAs. Subsequently, the DOA related to… More >

  • Open AccessOpen Access

    ARTICLE

    Improving Language Translation Using the Hidden Markov Model

    Yunpeng Chang1, Xiaoliang Wang1,*, Meihua Xue1, Yuzhen Liu1, Frank Jiang2
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3921-3931, 2021, DOI:10.32604/cmc.2021.012304
    Abstract Translation software has become an important tool for communication between different languages. People’s requirements for translation are higher and higher, mainly reflected in people’s desire for barrier free cultural exchange. With a large corpus, the performance of statistical machine translation based on words and phrases is limited due to the small size of modeling units. Previous statistical methods rely primarily on the size of corpus and number of its statistical results to avoid ambiguity in translation, ignoring context. To support the ongoing improvement of translation methods built upon deep learning, we propose a translation algorithm based on the Hidden Markov… More >

  • Open AccessOpen Access

    ARTICLE

    Vehicle Re-Identification Model Based on Optimized DenseNet121 with Joint Loss

    Xiaorui Zhang1,2,*, Xuan Chen1, Wei Sun2, Xiaozheng He3
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3933-3948, 2021, DOI:10.32604/cmc.2021.016560
    Abstract With the increasing application of surveillance cameras, vehicle re-identification (Re-ID) has attracted more attention in the field of public security. Vehicle Re-ID meets challenge attributable to the large intra-class differences caused by different views of vehicles in the traveling process and obvious inter-class similarities caused by similar appearances. Plentiful existing methods focus on local attributes by marking local locations. However, these methods require additional annotations, resulting in complex algorithms and insufferable computation time. To cope with these challenges, this paper proposes a vehicle Re-ID model based on optimized DenseNet121 with joint loss. This model applies the SE block to automatically… More >

  • Open AccessOpen Access

    ARTICLE

    Quality of Service Aware Cluster Routing in Vehicular Ad Hoc Networks

    Ishtiaq Wahid1, Fasee Ullah2,*, Masood Ahmad1, Atif Khan3, M. Irfan Uddin4, Abdullah Alharbi5, Wael Alosaimi5
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3949-3965, 2021, DOI:10.32604/cmc.2021.014190
    (This article belongs to this Special Issue: Deep Learning and Parallel Computing for Intelligent and Efficient IoT)
    Abstract In vehicular ad hoc networks (VANETs), the topology information (TI) is updated frequently due to vehicle mobility. These frequent changes in topology increase the topology maintenance overhead. To reduce the control message overhead, cluster-based routing schemes are proposed. In cluster-based routing schemes, the nodes are divided into different virtual groups, and each group (logical node) is considered a cluster. The topology changes are accommodated within each cluster, and broadcasting TI to the whole VANET is not required. The cluster head (CH) is responsible for managing the communication of a node with other nodes outside the cluster. However, transmitting real-time data… More >

  • Open AccessOpen Access

    ARTICLE

    Brain Tumor Classification Based on Fine-Tuned Models and the Ensemble Method

    Neelum Noreen1,*, Sellapan Palaniappan1, Abdul Qayyum2, Iftikhar Ahmad3, Madini O. Alassafi3
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3967-3982, 2021, DOI:10.32604/cmc.2021.014158
    Abstract Brain tumors are life-threatening for adults and children. However, accurate and timely detection can save lives. This study focuses on three different types of brain tumors: Glioma, meningioma, and pituitary tumors. Many studies describe the analysis and classification of brain tumors, but few have looked at the problem of feature engineering. Methods are needed to overcome the drawbacks of manual diagnosis and conventional feature-engineering techniques. An automatic diagnostic system is thus necessary to extract features and classify brain tumors accurately. While progress continues to be made, the automatic diagnoses of brain tumors still face challenges of low accuracy and high… More >

  • Open AccessOpen Access

    ARTICLE

    Windowing Techniques, the Welch Method for Improvement of Power Spectrum Estimation

    Dah-Jing Jwo1,*, Wei-Yeh Chang1, I-Hua Wu2
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3983-4003, 2021, DOI:10.32604/cmc.2021.014752
    Abstract This paper revisits the characteristics of windowing techniques with various window functions involved, and successively investigates spectral leakage mitigation utilizing the Welch method. The discrete Fourier transform (DFT) is ubiquitous in digital signal processing (DSP) for the spectrum analysis and can be efficiently realized by the fast Fourier transform (FFT). The sampling signal will result in distortion and thus may cause unpredictable spectral leakage in discrete spectrum when the DFT is employed. Windowing is implemented by multiplying the input signal with a window function and windowing amplitude modulates the input signal so that the spectral leakage is evened out. Therefore,… More >

  • Open AccessOpen Access

    ARTICLE

    Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

    V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4005-4018, 2021, DOI:10.32604/cmc.2021.014643
    Abstract Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need of reliability and authentication. By… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced KOCED Routing Protocol with K-means Algorithm

    SeaYoung Park1, Jong-Yong Lee2, Daesung Lee3,*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4019-4037, 2021, DOI:10.32604/cmc.2021.014353
    (This article belongs to this Special Issue: Intelligent techniques for energy efficient service management in Edge computing)
    Abstract Replacing or recharging batteries in the sensor nodes of a wireless sensor network (WSN) is a significant challenge. Therefore, efficient power utilization by sensors is a critical requirement, and it is closely related to the life span of the network. Once a sensor node consumes all its energy, it will no longer function properly. Therefore, various protocols have been proposed to minimize the energy consumption of sensors and thus prolong the network operation. Recently, clustering algorithms combined with artificial intelligence have been proposed for this purpose. In particular, various protocols employ the K-means clustering algorithm, which is a machine learning… More >

  • Open AccessOpen Access

    ARTICLE

    1D-CNN: Speech Emotion Recognition System Using a Stacked Network with Dilated CNN Features

    Mustaqeem, Soonil Kwon*
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4039-4059, 2021, DOI:10.32604/cmc.2021.015070
    (This article belongs to this Special Issue: Deep Learning Trends in Intelligent Systems)
    Abstract Emotion recognition from speech data is an active and emerging area of research that plays an important role in numerous applications, such as robotics, virtual reality, behavior assessments, and emergency call centers. Recently, researchers have developed many techniques in this field in order to ensure an improvement in the accuracy by utilizing several deep learning approaches, but the recognition rate is still not convincing. Our main aim is to develop a new technique that increases the recognition rate with reasonable cost computations. In this paper, we suggested a new technique, which is a one-dimensional dilated convolutional neural network (1D-DCNN) for… More >

  • Open AccessOpen Access

    ARTICLE

    Mechanical Properties of a Wood Flour-PET Composite Through Computational Homogenisation

    P. Pesante1, K. Saavedra2,*, G. Pincheira2
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4061-4079, 2021, DOI:10.32604/cmc.2021.015268
    Abstract This work proposes to study the effective elastic properties (EEP) of a wood-plastic composite (WPC) made from polyethylene terephthalate (PET) and Chilean Radiate pine’s wood flour, using finite element simulations of a representative volume element (RVE) with periodic boundary conditions. Simulations are validated through a static 3-point bending test, with specimens obtained by extruding and injection. The effect of different weight fractions, space orientations and sizes of particles are here examined. Numerical predictions are empirically confirmed in the sense that composites with more wood flour content and bigger size, have higher elastic modulus. However, these results are very sensitive to… More >

  • Open AccessOpen Access

    ARTICLE

    Control Strategy for a Quadrotor Based on a Memetic Shuffled Frog Leaping Algorithm

    Nour Ben Ammar1, Hegazy Rezk2,3,*, Soufiene Bouallègue1,4
    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4081-4100, 2021, DOI:10.32604/cmc.2021.015681
    Abstract This work presents a memetic Shuffled Frog Leaping Algorithm (SFLA) based tuning approach of an Integral Sliding Mode Controller (ISMC) for a quadrotor type of Unmanned Aerial Vehicles (UAV). Based on the Newton–Euler formalism, a nonlinear dynamic model of the studied quadrotor is firstly established for control design purposes. Since the main parameters of the ISMC design are the gains of the sliding surfaces and signum functions of the switching control law, which are usually selected by repetitive and time-consuming trials-errors based procedures, a constrained optimization problem is formulated for the systematically tuning of these unknown variables. Under time-domain operating… More >

Per Page:

Share Link