Home / Journals / CMC / Vol.68, No.3, 2021
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Real-Time Dense Reconstruction of Indoor Scene

    Jinxing Niu1,*, Qingsheng Hu1, Yi Niu1, Tao Zhang1, Sunil Kumar Jha2
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3713-3724, 2021, DOI:10.32604/cmc.2021.017418
    Abstract Real-time dense reconstruction of indoor scenes is of great research value for the application and development of service robots, augmented reality, cultural relics conservation and other fields. ORB-SLAM2 method is one of the excellent open source algorithms in visual SLAM system, which is often used in indoor scene reconstruction. However, it is time-consuming and can only build sparse scene map by using ORB features to solve camera pose. In view of the shortcomings of ORB-SLAM2 method, this article proposes an improved ORB-SLAM2 solution, which uses a direct method based on light intensity to solve the camera pose. It can greatly… More >

  • Open AccessOpen Access

    ARTICLE

    Outlier Behavior Detection for Indoor Environment Based on t-SNE Clustering

    Shinjin Kang1, Soo Kyun Kim2,*
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3725-3736, 2021, DOI:10.32604/cmc.2021.016828
    Abstract In this study, we propose a low-cost system that can detect the space outlier utilization of residents in an indoor environment. We focus on the users’ app usage to analyze unusual behavior, especially in indoor spaces. This is reflected in the behavioral analysis in that the frequency of using smartphones in personal spaces has recently increased. Our system facilitates autonomous data collection from mobile app logs and Google app servers and generates a high-dimensional dataset that can detect outlier behaviors. The density-based spatial clustering of applications with noise (DBSCAN) algorithm was applied for effective singular movement analysis. To analyze high-level… More >

  • Open AccessOpen Access

    ARTICLE

    Assessing the Performance of Some Ranked Set Sampling Designs Using HybridApproach

    Mohamed. A. H. Sabry1,*, Ehab M. Almetwally2, Hisham M. Almongy3, Gamal M. Ibrahim4
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3737-3753, 2021, DOI:10.32604/cmc.2021.017510
    Abstract In this paper, a joint analysis consisting of goodness-of-fit tests and Markov chain Monte Carlo simulations are used to assess the performance of some ranked set sampling designs. The Markov chain Monte Carlo simulations are conducted when Bayesian methods with Jeffery’s priors of the unknown parameters of Weibull distribution are used, while the goodness of fit analysis is conducted when the likelihood estimators are used and the corresponding empirical distributions are obtained. The ranked set sampling designs considered in this research are the usual ranked set sampling, extreme ranked set sampling, median ranked set sampling, and neoteric ranked set sampling… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction Flashover Voltage on Polluted Porcelain Insulator Using ANN

    Ali Salem1, Rahisham Abd-Rahman1, Waheed Ghanem2,*, Samir Al-Gailani3,4, Salem Al-Ameri1
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3755-3771, 2021, DOI:10.32604/cmc.2021.016988
    Abstract

    This paper aims to assess the effect of dry band location of contaminated porcelain insulators under various flashover voltages due to humidity. Four locations of dry bands are proposed to be tested under different severity of contamination artificially produce using salt deposit density (SDD) sprayed on an insulator. Laboratory tests of polluted insulators under proposed scenarios have been conducted. The flashover voltage of clean insulators has been identified as a reference value to analyze the effect of contamination distribution and its severity. The dry band dimension has been taken into consideration in experimental tests. The flashover voltage has been predicted… More >

  • Open AccessOpen Access

    ARTICLE

    Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network

    Sajid Habib Gill1, Noor Ahmed Sheikh1, Samina Rajpar1, Zain ul Abidin2, N. Z. Jhanjhi3,*, Muneer Ahmad4, Mirza Abdur Razzaq1, Sultan S. Alshamrani5, Yasir Malik6, Fehmi Jaafar7
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3773-3787, 2021, DOI:10.32604/cmc.2021.016001
    Abstract Medical data tampering has become one of the main challenges in the field of secure-aware medical data processing. Forgery of normal patients’ medical data to present them as COVID-19 patients is an illegitimate action that has been carried out in different ways recently. Therefore, the integrity of these data can be questionable. Forgery detection is a method of detecting an anomaly in manipulated forged data. An appropriate number of features are needed to identify an anomaly as either forged or non-forged data in order to find distortion or tampering in the original data. Convolutional neural networks (CNNs) have contributed a… More >

  • Open AccessOpen Access

    ARTICLE

    Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack

    Fahd N. Al-Wesabi1,2,*, Huda G. Iskandar2,3, Saleh Alzahrani4, Abdelzahir Abdelmaboud4, Mohammed Abdul4, Nadhem Nemri4, Mohammad Medani4, Mohammed Y. Alghamdi5
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3789-3806, 2021, DOI:10.32604/cmc.2021.017674
    Abstract In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing. The HFDATAI solution technically integrates and senses the watermark without modifying the original text. The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated, null-watermarking approach to enhance the proposed approach’s efficiency, accuracy, and intensity. The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of… More >

  • Open AccessOpen Access

    ARTICLE

    Reinforcement Learning-Based Optimization for Drone Mobility in 5G and Beyond Ultra-Dense Networks

    Jawad Tanveer1, Amir Haider2, Rashid Ali2, Ajung Kim1,*
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3807-3823, 2021, DOI:10.32604/cmc.2021.016087
    Abstract Drone applications in 5th generation (5G) networks mainly focus on services and use cases such as providing connectivity during crowded events, human-instigated disasters, unmanned aerial vehicle traffic management, internet of things in the sky, and situation awareness. 4G and 5G cellular networks face various challenges to ensure dynamic control and safe mobility of the drone when it is tasked with delivering these services. The drone can fly in three-dimensional space. The drone connectivity can suffer from increased handover cost due to several reasons, including variations in the received signal strength indicator, co-channel interference offered to the drone by neighboring cells,… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Accuracy for Motor Imagery Detection Using Deep Learning for BCI

    Ayesha Sarwar1, Kashif Javed1, Muhammad Jawad Khan1, Saddaf Rubab1, Oh-Young Song2,*, Usman Tariq3
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3825-3840, 2021, DOI:10.32604/cmc.2021.016893
    (This article belongs to the Special Issue: Artificial Intelligence and IoT based intelligent systems using high performance computing for Medical applications.)
    Abstract Brain-Computer Interface (BCI) is a system that provides a link between the brain of humans and the hardware directly. The recorded brain data is converted directly to the machine that can be used to control external devices. There are four major components of the BCI system: acquiring signals, preprocessing of acquired signals, features extraction, and classification. In traditional machine learning algorithms, the accuracy is insignificant and not up to the mark for the classification of multi-class motor imagery data. The major reason for this is, features are selected manually, and we are not able to get those features that give… More >

  • Open AccessOpen Access

    ARTICLE

    Video Analytics Framework for Human Action Recognition

    Muhammad Attique Khan1, Majed Alhaisoni2, Ammar Armghan3, Fayadh Alenezi3, Usman Tariq4, Yunyoung Nam5,*, Tallha Akram6
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3841-3859, 2021, DOI:10.32604/cmc.2021.016864
    (This article belongs to the Special Issue: Recent Advances in Deep Learning, Information Fusion, and Features Selection for Video Surveillance Application)
    Abstract Human action recognition (HAR) is an essential but challenging task for observing human movements. This problem encompasses the observations of variations in human movement and activity identification by machine learning algorithms. This article addresses the challenges in activity recognition by implementing and experimenting an intelligent segmentation, features reduction and selection framework. A novel approach has been introduced for the fusion of segmented frames and multi-level features of interests are extracted. An entropy-skewness based features reduction technique has been implemented and the reduced features are converted into a codebook by serial based fusion. A custom made genetic algorithm is implemented on… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Face Anti-Spoofing Algorithm Based on Image Fusion

    Pingping Yu1, Jiayu Wang1, Ning Cao2,*, Heiner Dintera3
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3861-3876, 2021, DOI:10.32604/cmc.2021.017527
    Abstract Along with the rapid development of biometric authentication technology, face recognition has been commercially used in many industries in recent years. However, it cannot be ignored that face recognition-based authentication techniques can be easily spoofed using various types of attacks such photographs, videos or forged 3D masks. In order to solve this problem, this work proposed a face anti-fraud algorithm based on the fusion of thermal infrared images and visible light images. The normal temperature distribution of the human face is stable and characteristic, and the important physiological information of the human body can be observed by the infrared thermal… More >

  • Open AccessOpen Access

    ARTICLE

    Hydrodynamics and Sensitivity Analysis of a Williamson Fluid in Porous-Walled Wavy Channel

    A. Shahzad1, W. A. Khan2,*, R. Gul1, B. Dayyan1, M. Zubair1
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3877-3893, 2021, DOI:10.32604/cmc.2021.012524
    Abstract In this work, a steady, incompressible Williamson fluid model is investigated in a porous wavy channel. This situation arises in the reabsorption of useful substances from the glomerular filtrate in the kidney. After 80% reabsorption, urine is left, which behaves like a thinning fluid. The laws of conservation of mass and momentum are used to model the physical problem. The analytical solution of the problem in terms of stream function is obtained by a regular perturbation expansion method. The asymptotic integration method for small wave amplitudes and the RK-Fehlberg method for pressure distribution has been used inside the channel. It… More >

  • Open AccessOpen Access

    ARTICLE

    Data-Fusion for Epidemiological Analysis of Covid-19 Variants in UAE

    Anoud Bani-Hani1,*, Anaïs Lavorel2, Newel Bessadet3
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3895-3913, 2021, DOI:10.32604/cmc.2021.015355
    (This article belongs to the Special Issue: AI, IoT, Blockchain Assisted Intelligent Solutions to Medical and Healthcare Systems)
    Abstract Since December 2019, a new pandemic has appeared causing a considerable negative global impact. The SARS-CoV-2 first emerged from China and transformed to a global pandemic within a short time. The virus was further observed to be spreading rapidly and mutating at a fast pace, with over 5,775 distinct variations of the virus observed globally (at the time of submitting this paper). Extensive research has been ongoing worldwide in order to get a better understanding of its behaviour, influence and more importantly, ways for reducing its impact. Data analytics has been playing a pivotal role in this research to obtain… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Intrusion Detection System in Cyberphysical Systems Using a Parameter-Tuned Deep-Stacked Autoencoder

    Nojood O. Aljehane*
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3915-3929, 2021, DOI:10.32604/cmc.2021.017905
    (This article belongs to the Special Issue: Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks)
    Abstract Cyber physical systems (CPSs) are a networked system of cyber (computation, communication) and physical (sensors, actuators) elements that interact in a feedback loop with the assistance of human interference. Generally, CPSs authorize critical infrastructures and are considered to be important in the daily lives of humans because they form the basis of future smart devices. Increased utilization of CPSs, however, poses many threats, which may be of major significance for users. Such security issues in CPSs represent a global issue; therefore, developing a robust, secure, and effective CPS is currently a hot research topic. To resolve this issue, an intrusion… More >

  • Open AccessOpen Access

    ARTICLE

    BitmapAligner: Bit-Parallelism String Matching with MapReduce and Hadoop

    Mary Aksa1, Junaid Rashid2,*, Muhammad Wasif Nisar1, Toqeer Mahmood3, Hyuk-Yoon Kwon4, Amir Hussain5
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3931-3946, 2021, DOI:10.32604/cmc.2021.016081
    Abstract Advancements in next-generation sequencer (NGS) platforms have improved NGS sequence data production and reduced the cost involved, which has resulted in the production of a large amount of genome data. The downstream analysis of multiple associated sequences has become a bottleneck for the growing genomic data due to storage and space utilization issues in the domain of bioinformatics. The traditional string-matching algorithms are efficient for small sized data sequences and cannot process large amounts of data for downstream analysis. This study proposes a novel bit-parallelism algorithm called BitmapAligner to overcome the issues faced due to a large number of sequences… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles

    Mohana Priya Pitchai1, Manikandan Ramachandran1,*, Fadi Al-Turjman2, Leonardo Mostarda3
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3947-3966, 2021, DOI:10.32604/cmc.2021.015568
    (This article belongs to the Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract The Internet of Things plays a predominant role in automating all real-time applications. One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules. As vehicles are connected to the internet through wireless communication technologies, the Internet of Vehicles network infrastructure is susceptible to flooding attacks. Reconfiguring the network infrastructure is difficult as network customization is not possible. As Software Defined Network provide a flexible programming environment for network customization, detecting flooding attacks on the Internet of Vehicles is integrated on top of it. The basic methodology used is crypto-fuzzy rules, in which cryptographic… More >

  • Open AccessOpen Access

    ARTICLE

    Energy-Efficient Deployment of Water Quality Sensor Networks

    Qian Sun1,2, Zhiping Shen1,2, Jinglin Liang1,2, Xiaoyi Wang1,2,*, Jiping Xu1,2, Li Wang1,2, Huiyan Zhang1,2, Jiabin Yu1,2, Ning Cao3, Ruichao Wang4
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3967-3977, 2021, DOI:10.32604/cmc.2021.017252
    Abstract Water quality sensor networks are promising tools for the exploration of oceans. Some key areas need to be monitored effectively. Water quality sensors are deployed randomly or uniformly, however, and understanding how to deploy sensor nodes reasonably and realize effective monitoring of key areas on the basis of monitoring the whole area is an urgent problem to be solved. Additionally, energy is limited in water quality sensor networks. When moving sensor nodes, we should extend the life cycle of the sensor networks as much as possible. In this study, sensor nodes in non-key monitored areas are moved to key areas.… More >

  • Open AccessOpen Access

    ARTICLE

    Digital Forensics for Skulls Classification in Physical Anthropology Collection Management

    Imam Yuadi1,*, Myrtati D. Artaria2, Sakina3, A. Taufiq Asyhari4
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3979-3995, 2021, DOI:10.32604/cmc.2021.015417
    Abstract The size, shape, and physical characteristics of the human skull are distinct when considering individual humans. In physical anthropology, the accurate management of skull collections is crucial for storing and maintaining collections in a cost-effective manner. For example, labeling skulls inaccurately or attaching printed labels to skulls can affect the authenticity of collections. Given the multiple issues associated with the manual identification of skulls, we propose an automatic human skull classification approach that uses a support vector machine and different feature extraction methods such as gray-level co-occurrence matrix features, Gabor features, fractal features, discrete wavelet transforms, and combinations of features.… More >

  • Open AccessOpen Access

    ARTICLE

    A New Hybrid Feature Selection Method Using T-test and Fitness Function

    Husam Ali Abdulmohsin1,*, Hala Bahjat Abdul Wahab2, Abdul Mohssen Jaber Abdul Hossen3
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3997-4016, 2021, DOI:10.32604/cmc.2021.014840
    (This article belongs to the Special Issue: AI, IoT, Blockchain Assisted Intelligent Solutions to Medical and Healthcare Systems)
    Abstract

    Feature selection (FS) (or feature dimensional reduction, or feature optimization) is an essential process in pattern recognition and machine learning because of its enhanced classification speed and accuracy and reduced system complexity. FS reduces the number of features extracted in the feature extraction phase by reducing highly correlated features, retaining features with high information gain, and removing features with no weights in classification. In this work, an FS filter-type statistical method is designed and implemented, utilizing a t-test to decrease the convergence between feature subsets by calculating the quality of performance value (QoPV). The approach utilizes the well-designed fitness function… More >

  • Open AccessOpen Access

    ARTICLE

    Data Matching of Solar Images Super-Resolution Based on Deep Learning

    Liu Xiangchun1, Chen Zhan1, Song Wei1,2,3,*, Li Fenglei1, Yang Yanxing4
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4017-4029, 2021, DOI:10.32604/cmc.2021.017086
    Abstract The images captured by different observation station have different resolutions. The Helioseismic and Magnetic Imager (HMI: a part of the NASA Solar Dynamics Observatory (SDO) has low-precision but wide coverage. And the Goode Solar Telescope (GST, formerly known as the New Solar Telescope) at Big Bear Solar Observatory (BBSO) solar images has high precision but small coverage. The super-resolution can make the captured images become clearer, so it is wildly used in solar image processing. The traditional super-resolution methods, such as interpolation, often use single image’s feature to improve the image’s quality. The methods based on deep learning-based super-resolution image… More >

  • Open AccessOpen Access

    ARTICLE

    Mobile Memory Management System Based on User’s Application Usage Patterns

    Jaehwan Lee, Sangoh Park*
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4031-4050, 2021, DOI:10.32604/cmc.2021.017872
    Abstract Currently, the number of functions to improve user convenience in smartphone applications is increasing. In addition, more mobile applications are being loaded into mobile operating system memory for faster launches, thus increasing the memory requirements for smartphones. The memory used by applications in mobile operating systems is managed using software; allocated memory is freed up by either considering the usage state of the application or terminating the least recently used (LRU) application. As LRU-based memory management schemes do not consider the application launch frequency in a low memory situation, currently used mobile operating systems can lead to the termination of… More >

  • Open AccessOpen Access

    ARTICLE

    Image-to-Image Style Transfer Based on the Ghost Module

    Yan Jiang1, Xinrui Jia1, Liguo Zhang1,2,*, Ye Yuan1, Lei Chen3, Guisheng Yin1
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4051-4067, 2021, DOI:10.32604/cmc.2021.016481
    Abstract The technology for image-to-image style transfer (a prevalent image processing task) has developed rapidly. The purpose of style transfer is to extract a texture from the source image domain and transfer it to the target image domain using a deep neural network. However, the existing methods typically have a large computational cost. To achieve efficient style transfer, we introduce a novel Ghost module into the GANILLA architecture to produce more feature maps from cheap operations. Then we utilize an attention mechanism to transform images with various styles. We optimize the original generative adversarial network (GAN) by using more efficient calculation… More >

  • Open AccessOpen Access

    ARTICLE

    Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

    Romany F. Mansour1,*, Moheb R. Girgis2
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4069-4085, 2021, DOI:10.32604/cmc.2021.017064
    (This article belongs to the Special Issue: Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks)
    Abstract Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques,… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Modal Data Analysis Based Game Player Experience Modeling Using LSTM-DNN

    Sehar Shahzad Farooq1, Mustansar Fiaz1, Irfan Mehmood2, Ali Kashif Bashir3, Raheel Nawaz4, KyungJoong Kim5, Soon Ki Jung1,*
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4087-4108, 2021, DOI:10.32604/cmc.2021.015612
    (This article belongs to the Special Issue: Machine Learning for Data Analytics)
    Abstract Game player modeling is a paradigm of computational models to exploit players’ behavior and experience using game and player analytics. Player modeling refers to descriptions of players based on frameworks of data derived from the interaction of a player’s behavior within the game as well as the player’s experience with the game. Player behavior focuses on dynamic and static information gathered at the time of gameplay. Player experience concerns the association of the human player during gameplay, which is based on cognitive and affective physiological measurements collected from sensors mounted on the player’s body or in the player’s surroundings. In… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Comparison of Deep CNN Models for Detecting Driver’s Distraction

    Kathiravan Srinivasan1, Lalit Garg2,*, Debajit Datta3, Abdulellah A. Alaboudi4, N. Z. Jhanjhi5, Rishav Agarwal3, Anmol George Thomas1
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4109-4124, 2021, DOI:10.32604/cmc.2021.016736
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract According to various worldwide statistics, most car accidents occur solely due to human error. The person driving a car needs to be alert, especially when travelling through high traffic volumes that permit high-speed transit since a slight distraction can cause a fatal accident. Even though semi-automated checks, such as speed detecting cameras and speed barriers, are deployed, controlling human errors is an arduous task. The key causes of driver’s distraction include drunken driving, conversing with co-passengers, fatigue, and operating gadgets while driving. If these distractions are accurately predicted, the drivers can be alerted through an alarm system. Further, this research… More >

  • Open AccessOpen Access

    ARTICLE

    Context and Machine Learning Based Trust Management Framework for Internet of Vehicles

    Abdul Rehman1,*, Mohd Fadzil Hassan1, Yew Kwang Hooi1, Muhammad Aasim Qureshi2, Tran Duc Chung3, Rehan Akbar4, Sohail Safdar5
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4125-4142, 2021, DOI:10.32604/CMC.2021.017620
    (This article belongs to the Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract Trust is one of the core components of any ad hoc network security system. Trust management (TM) has always been a challenging issue in a vehicular network. One such developing network is the Internet of vehicles (IoV), which is expected to be an essential part of smart cities. IoV originated from the merger of Vehicular ad hoc networks (VANET) and the Internet of things (IoT). Security is one of the main barriers in the on-road IoV implementation. Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements. Trust plays a vital role in ensuring security,… More >

  • Open AccessOpen Access

    ARTICLE

    Investigating and Modelling of Task Offloading Latency in Edge-Cloud Environment

    Jaber Almutairi1, Mohammad Aldossary2,*,*
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4143-4160, 2021, DOI:10.32604/cmc.2021.018145
    Abstract Recently, the number of Internet of Things (IoT) devices connected to the Internet has increased dramatically as well as the data produced by these devices. This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing. However, different service architecture and offloading strategies have a different impact on the service time performance of IoT applications. Therefore, this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network. Also, it introduces the… More >

  • Open AccessOpen Access

    ARTICLE

    Joint Event Extraction Based on Global Event-Type Guidance and Attention Enhancement

    Daojian Zeng1, Jian Tian2, Ruoyao Peng1, Jianhua Dai1,*, Hui Gao3, Peng Peng4
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4161-4173, 2021, DOI:10.32604/cmc.2021.017028
    Abstract Event extraction is one of the most challenging tasks in information extraction. It is a common phenomenon where multiple events exist in the same sentence. However, extracting multiple events is more difficult than extracting a single event. Existing event extraction methods based on sequence models ignore the interrelated information between events because the sequence is too long. In addition, the current argument extraction relies on the results of syntactic dependency analysis, which is complicated and prone to error transmission. In order to solve the above problems, a joint event extraction method based on global event-type guidance and attention enhancement was… More >

  • Open AccessOpen Access

    ARTICLE

    Surveillance Video Key Frame Extraction Based on Center Offset

    Yunzuo Zhang1,*, Shasha Zhang1, Yi Li1, Jiayu Zhang1, Zhaoquan Cai2, Shui Lam3
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4175-4190, 2021, DOI:10.32604/cmc.2021.017011
    Abstract With the explosive growth of surveillance video data, browsing videos quickly and effectively has become an urgent problem. Video key frame extraction has received widespread attention as an effective solution. However, accurately capturing the local motion state changes of moving objects in the video is still challenging in key frame extraction. The target center offset can reflect the change of its motion state. This observation proposed a novel key frame extraction method based on moving objects center offset in this paper. The proposed method utilizes the center offset to obtain the global and local motion state information of moving objects,… More >

  • Open AccessOpen Access

    ARTICLE

    Segmentation of Brain Tumor Magnetic Resonance Images Using a Teaching-Learning Optimization Algorithm

    J. Jayanthi1,*, M. Kavitha2, T. Jayasankar3, A. Sagai Francis Britto4, N. B. Prakash5, Mohamed Yacin Sikkandar6, C. Bharathiraja7
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4191-4203, 2021, DOI:10.32604/cmc.2021.012252
    Abstract Image recognition is considered to be the pre-eminent paradigm for the automatic detection of tumor diseases in this era. Among various cancers identified so far, glioma, a type of brain tumor, is one of the deadliest cancers, and it remains challenging to the medicinal world. The only consoling factor is that the survival rate of the patient is increased by remarkable percentage with the early diagnosis of the disease. Early diagnosis is attempted to be accomplished with the changes observed in the images of suspected parts of the brain captured in specific interval of time. From the captured image, the… More >

  • Open AccessOpen Access

    ARTICLE

    Virtual Reality-Based Random Dot Kinematogram

    Jun Ma1, Hyo-Jung Kim2, Ji-Soo Kim3,4, Eek-Sung Lee5, Min Hong6,*
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4205-4213, 2021, DOI:10.32604/cmc.2021.018080
    (This article belongs to the Special Issue: Integrity and Multimedia Data Management in Healthcare Applications using IoT)
    Abstract This research implements a random dot kinematogram (RDK) using virtual reality (VR) and analyzes the results based on normal subjects. Visual motion perception is one of visual functions localized to a specific cortical area, the human motion perception area (human analogue for the middle temporal/middle superior temporal area) located in the parieto–occipito–temporal junction of the human brain. The RDK measures visual motion perception capabilities. The stimuli in conventional RDK methods are presented using a monitor screen, so these devices require a spacious dark room for installation and use. Recently, VR technology has been implemented in different medical domains. The test… More >

Per Page:

Share Link