Home / Journals / CMC / Vol.69, No.1, 2021
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Implications COVID-19 on Performance and Energy Management in the Production Electricity

    Noor Shakir Mahmood1, Ahmed Ali Ajmi1, Shamsul Sarip2,*, Khairur Rijal Jamaludin2, Hazilah Mad Kaidi2, Hayati Abdul Talib2
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 895-911, 2021, DOI:10.32604/cmc.2021.018012 - 04 June 2021
    (This article belongs to the Special Issue: Application of Artificial Intelligence, Internet of Things, and Learning Approach for Learning Process in COVID-19/Industrial Revolution 4.0)
    Abstract The COVID-19 pandemic has directly impacted the electric power industry; the energy sector has experienced huge losses in electricity production. These losses have also affected the reliability of communication and employees’ performance, hence destabilizing the electric power system. This article aims at achieving two objectives. First, analyzing the impact of the COVID-19 pandemic on the communication of performance (human error and human factors) and energy management in electricity production. Second, to develop a conceptual framework model to alleviate effects of the pandemic on the power sector and then improve energy management and human performance. This… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Class Sentiment Analysis of Social Media Data with Machine Learning Algorithms

    Galimkair Mutanov, Vladislav Karyukin*, Zhanl Mamykova
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 913-930, 2021, DOI:10.32604/cmc.2021.017827 - 04 June 2021
    Abstract The volume of social media data on the Internet is constantly growing. This has created a substantial research field for data analysts. The diversity of articles, posts, and comments on news websites and social networks astonishes imagination. Nevertheless, most researchers focus on posts on Twitter that have a specific format and length restriction. The majority of them are written in the English language. As relatively few works have paid attention to sentiment analysis in the Russian and Kazakh languages, this article thoroughly analyzes news posts in the Kazakhstan media space. The amassed datasets include texts… More >

  • Open AccessOpen Access

    ARTICLE

    A New BEM Modeling Algorithm for Size-Dependent Thermopiezoelectric Problems in Smart Nanostructures

    Mohamed Abdelsabour Fahmy1,2,*
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 931-944, 2021, DOI:10.32604/cmc.2021.018191 - 04 June 2021
    Abstract The main objective of this paper is to introduce a new theory called size-dependent thermopiezoelectricity for smart nanostructures. The proposed theory includes the combination of thermoelastic and piezoelectric influences which enable us to describe the deformation and mechanical behaviors of smart nanostructures subjected to thermal, and piezoelectric loadings. Because of difficulty of experimental research problems associated with the proposed theory. Therefore, we propose a new boundary element method (BEM) formulation and algorithm for the solution of such problems, which involve temperatures, normal heat fluxes, displacements, couple-tractions, rotations, force-tractions, electric displacement, and normal electric displacement as… More >

  • Open AccessOpen Access

    ARTICLE

    Enabling Reachability Across Multiple Domains Without Controller Synchronization in SDN

    Nauman Khan1,2, Rosli Bin Salleh1,*, Ihsan Ali1, Zahid Khan3, Noman Mazhar1, Roobaea Alroobaea4, Fahad Almansour5, Usman Ali1
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 945-965, 2021, DOI:10.32604/cmc.2021.017394 - 04 June 2021
    Abstract Software-defined networking (SDN) makes network agile and flexible due to its programmable approach. An extensive network has multiple domains in SDN for the scalability and performance of the network. However, the inter-domain link is also crucial for the stability of the entire network on the data plane layer. More than one inter-domain connection enhances the scalability of the data plane layer. However, it faces a reachability problem with the principal root, which causes forwarding loops and packet drops in the network, thereby degrading network performance. The proposed solution is a multiple controller architecture; however, this More >

  • Open AccessOpen Access

    ARTICLE

    Stress Distribution in Composites with Co-Phase Periodically Curved Two Neighboring Hollow Fibers

    Resat Kosker1,*, Ismail Gulten2
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 967-983, 2021, DOI:10.32604/cmc.2021.017857 - 04 June 2021
    Abstract In this paper, stress distribution is examined in the case where infinite length co-phase periodically curved two neighboring hollow fibers are contained by an infinite elastic body. The midline of the fibers is assumed to be in the same plane. Using the three-dimensional geometric linear exact equations of the elasticity theory, research is carried out by use of the piecewise homogeneous body model. Moreover, the body is assumed to be loaded at infinity by uniformly distributed normal forces along the hollow fibers. On the inter-medium between the hollow fibers and matrix surfaces, complete cohesion conditions More >

  • Open AccessOpen Access

    ARTICLE

    Ecological Security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model

    Xiaozhou Li1,2, Zhenggang Xu1, Yuanyuan Fu3, Qi Jin1, Yunlin Zhao1,*, Neal N. Xiong4
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 985-1001, 2021, DOI:10.32604/cmc.2021.017357 - 04 June 2021
    Abstract Today, resource depletion threatens a number of resource-based cities in China. The ecological security problem caused by the long-term exploitation of natural resources is a key issue to be solved in the development of resource-exhausted cities. Using 23 indicators, this study evaluated the ecological security status and development trends of 21 resource-exhausted cities in China from 2011 to 2017. The results showed that from 2011 to 2015, the overall ecological security of this type of city was low, with over 60% of the cities at an unsafe level. However, ecological security improved rapidly after 2016, More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Connectivity Restoration Technique (ECRT) for Wireless Sensor Network

    Mahmood ul Hassan1,*, Shahzad Ali2, Khalid Mahmood3, Muhammad Kashif Saeed4, Amin Al-Awady1, Kamran Javed5, Ansar Munir Shah6
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1003-1019, 2021, DOI:10.32604/cmc.2021.018264 - 04 June 2021
    Abstract Node failure in Wireless Sensor Networks (WSNs) is a fundamental problem because WSNs operate in hostile environments. The failure of nodes leads to network partitioning that may compromise the basic operation of the sensor network. To deal with such situations, a rapid recovery mechanism is required for restoring inter-node connectivity. Due to the immense importance and need for a recovery mechanism, several different approaches are proposed in the literature. However, the proposed approaches have shortcomings because they do not focus on energy-efficient operation and coverage-aware mechanisms while performing connectivity restoration. Moreover, most of these approaches… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis and Characterization of Normally-Off Gallium Nitride High Electron Mobility Transistors

    Shahzaib Anwar1, Sardar Muhammad Gulfam1,*, Bilal Muhammad2, Syed Junaid Nawaz1, Khursheed Aurangzeb3, Mohammad Kaleem1
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1021-1037, 2021, DOI:10.32604/cmc.2021.018248 - 04 June 2021
    Abstract High electron mobility transistor (HEMT) based on gallium nitride (GaN) is one of the most promising candidates for the future generation of high frequencies and high-power electronic applications. This research work aims at designing and characterization of enhancement-mode or normally-off GaN HEMT. The impact of variations in gate length, mole concentration, barrier variations and other important design parameters on the performance of normally-off GaN HEMT is thoroughly investigated. An increase in the gate length causes a decrease in the drain current and transconductance, while an increase in drain current and transconductance can be achieved by… More >

  • Open AccessOpen Access

    ARTICLE

    AntiFlamPred: An Anti-Inflammatory Peptide Predictor for Drug Selection Strategies

    Fahad Alotaibi1, Muhammad Attique2,3, Yaser Daanial Khan2,*
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1039-1055, 2021, DOI:10.32604/cmc.2021.017297 - 04 June 2021
    (This article belongs to the Special Issue: Digital Technology and Artificial Intelligence in Medicine and Dentistry)
    Abstract Several autoimmune ailments and inflammation-related diseases emphasize the need for peptide-based therapeutics for their treatment and established substantial consideration. Though, the wet-lab experiments for the investigation of anti-inflammatory proteins/peptides (“AIP”) are usually very costly and remain time-consuming. Therefore, before wet-lab investigations, it is essential to develop in-silico identification models to classify prospective anti-inflammatory candidates for the facilitation of the drug development process. Several anti-inflammatory prediction tools have been proposed in the recent past, yet, there is a space to induce enhancement in prediction performance in terms of precision and efficiency. An exceedingly accurate anti-inflammatory prediction… More >

  • Open AccessOpen Access

    ARTICLE

    An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment

    K. Raju*, M. Chinnadurai
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1057-1072, 2021, DOI:10.32604/cmc.2021.016068 - 04 June 2021
    Abstract Security is a critical issue in cloud computing (CC) because attackers can fabricate data by creating, copying, or deleting data with no user authorization. Most of the existing techniques make use of password-based authentication for encrypting data. Password-based schemes suffer from several issues and can be easily compromised. This paper presents a new concept of hybrid metaheuristic optimization as an identity-based secure and optimal authentication (HMO-ISOA) scheme for CC environments. The HMO-ISOA technique makes use of iris and fingerprint biometrics. Initially, the HMO-ISOA technique involves a directional local ternary quantized extrema pattern–based feature extraction process… More >

  • Open AccessOpen Access

    ARTICLE

    Noise Reduction in Industry Based on Virtual Instrumentation

    Radek Martinek1, Rene Jaros1, Jan Baros1, Lukas Danys1, Aleksandra Kawala-Sterniuk2, Jan Nedoma3,*, Zdenek Machacek1, Jiri Koziorek1
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1073-1096, 2021, DOI:10.32604/cmc.2021.017568 - 04 June 2021
    Abstract This paper discusses the reduction of background noise in an industrial environment to extend human-machine-interaction. In the Industry 4.0 era, the mass development of voice control (speech recognition) in various industrial applications is possible, especially as related to augmented reality (such as hands-free control via voice commands). As Industry 4.0 relies heavily on radiofrequency technologies, some brief insight into this problem is provided, including the Internet of things (IoT) and 5G deployment. This study was carried out in cooperation with the industrial partner Brose CZ spol. s.r.o., where sound recordings were made to produce a dataset.… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Data Fusion Paradigm for WSN Based on Neural Networks

    Moath Alsafasfeh1,*, Zaid A. Arida2, Omar A. Saraereh3, Qais Alsafasfeh4, Salem Alemaishat5
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1097-1108, 2021, DOI:10.32604/cmc.2021.018187 - 04 June 2021
    Abstract Wireless sensor networks (WSNs) have gotten a lot of attention as useful tools for gathering data. The energy problem has been a fundamental constraint and challenge faced by many WSN applications due to the size and cost constraints of the sensor nodes. This paper proposed a data fusion model based on the back propagation neural network (BPNN) model to address the problem of a large number of invalid or redundant data. Using three layered-based BPNNs and a TEEN threshold, the proposed model describes the cluster structure and filters out unnecessary details. During the information transmission More >

  • Open AccessOpen Access

    ARTICLE

    Locating Famous Tea’s Picking Point Based on Shi-Tomasi Algorithm

    Lei Zhang1,2, Lang Zou1,2, Chuanyu Wu1,2,*, Jianneng Chen1,2, Heping Chen3
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1109-1122, 2021, DOI:10.32604/cmc.2021.016495 - 04 June 2021
    Abstract To address the difficulty of locating the picking point of a tea sprout during the intelligent automatic picking of famous tea, this study proposes a method to obtain information on the picking point on the basis of the Shi-Tomasi algorithm. This method can rapidly identify a tea sprout’s picking point and obtain its coordinates. Images of tea sprouts in a tea garden were collected, and the G-B component of tea sprouts was segmented using the Otsu algorithm. The region of interest was set with the lowest point of its contour as the center. The characteristics of… More >

  • Open AccessOpen Access

    ARTICLE

    Resource Assessment of Wind Energy Potential of Mokha in Yemen with Weibull Speed

    Abdulbaset El-Bshah1, Fahd N. Al-Wesabi2,3,*, Ameen M. Al-Kustoban4, Mohammad Alamgeer5, Nadhem Nemri5, Majdy M. Eltahir5, Hany Mahgoub6, Noha Negm7
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1123-1140, 2021, DOI:10.32604/cmc.2021.018427 - 04 June 2021
    Abstract The increasing use of fossil fuels has a significant impact on the environment and ecosystem, which increases the rate of pollution. Given the high potential of renewable energy sources in Yemen and other Arabic countries, and the absence of similar studies in the region. This study aims to examine the potential of wind energy in Mokha region. This was done by analyzing and evaluating wind properties, determining available energy density, calculating wind energy extracted at different altitudes, and then computing the capacity factor for a few wind turbines and determining the best. Weibull speed was… More >

  • Open AccessOpen Access

    ARTICLE

    Competency Driven Resource Evaluation Method for Business Process Intelligence

    Abid Sohail1,*, Dhanapal Durai Dominic2, Mohammad Hijji3, Muhammad Arif Butt4
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1141-1157, 2021, DOI:10.32604/cmc.2021.018023 - 04 June 2021
    (This article belongs to the Special Issue: Computational Models for Pro-Smart Environments in Data Science Assisted IoT Systems)
    Abstract Enterprises are continuously aiming at improving the execution of processes to achieve a competitive edge. One of the established ways of improving process performance is to assign the most appropriate resources to each task of the process. However, evaluations of business process improvement approaches have established that a method that can guide decision-makers to identify the most appropriate resources for a task of process improvement in a structured way, is missing. It is because the relationship between resources and tasks is less understood and advancement in business process intelligence is also ignored. To address this More >

  • Open AccessOpen Access

    ARTICLE

    Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

    Farouq Aliyu1,*, Tarek Sheltami1, Ashraf Mahmoud1, Louai Al-Awami1, Ansar Yasar2
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1159-1181, 2021, DOI:10.32604/cmc.2021.016938 - 04 June 2021
    (This article belongs to the Special Issue: Powering the Future Intelligence - Ambient Social Media Analytics)
    Abstract Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomaly-based Intrusion Detection and Prevention System (IDPS) against Man-in-the-Middle (MITM) attack in the fog layer. The system uses special nodes known as Intrusion Detection… More >

  • Open AccessOpen Access

    ARTICLE

    Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms

    Muhammad Tayyab1,*, Mohsen Marjani1, N. Z. Jhanjhi1, Ibrahim Abaker Targio Hashim2, Abdulwahab Ali Almazroi3, Abdulaleem Ali Almazroi4
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1183-1200, 2021, DOI:10.32604/cmc.2021.017199 - 04 June 2021
    Abstract Deep learning (DL) algorithms have been widely used in various security applications to enhance the performances of decision-based models. Malicious data added by an attacker can cause several security and privacy problems in the operation of DL models. The two most common active attacks are poisoning and evasion attacks, which can cause various problems, including wrong prediction and misclassification of decision-based models. Therefore, to design an efficient DL model, it is crucial to mitigate these attacks. In this regard, this study proposes a secure neural network (NN) model that provides data security during model training… More >

  • Open AccessOpen Access

    ARTICLE

    Resource Allocation and Optimization in Device-to-Device Communication 5G Networks

    Fahad Ahmed Al-Zahrani1, Imran Khan2, Mahdi Zareei3,*, Asim Zeb4, Abdul Waheed5,6
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1201-1214, 2021, DOI:10.32604/cmc.2021.018386 - 04 June 2021
    Abstract The next-generation wireless networks are expected to provide higher capacity, system throughput with improved energy efficiency. One of the key technologies, to meet the demand for high-rate transmission, is device-to-device (D2D) communication which allows users who are close to communicating directly instead of transiting through base stations, and D2D communication users to share the cellular user chain under the control of the cellular network. As a new generation of cellular network technology, D2D communication technology has the advantages of improving spectrum resource utilization and improving system throughput and has become one of the key technologies… More >

  • Open AccessOpen Access

    ARTICLE

    Evolution-Based Performance Prediction of Star Cricketers

    Haseeb Ahmad1, Shahbaz Ahmad1, Muhammad Asif1, Mobashar Rehman2,*, Abdullah Alharbi3, Zahid Ullah4
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1215-1232, 2021, DOI:10.32604/cmc.2021.016659 - 04 June 2021
    (This article belongs to the Special Issue: AI for Wearable Sensing--Smartphone / Smartwatch User Identification / Authentication)
    Abstract Cricket databases contain rich and useful information to examine and forecasting patterns and trends. This paper predicts Star Cricketers (SCs) from batting and bowling domains by employing supervised machine learning models. With this aim, each player’s performance evolution is retrieved by using effective features that incorporate the standard performance measures of each player and their peers. Prediction is performed by applying Bayesian-rule, function and decision-tree-based models. Experimental evaluations are performed to validate the applicability of the proposed approach. In particular, the impact of the individual features on the prediction of SCs are analyzed. Moreover, the More >

  • Open AccessOpen Access

    ARTICLE

    Parametric Methods for the Regional Assessment of Cardiac Wall Motion Abnormalities: Comparison Study

    Narjes Benameur1,*, Mazin Abed Mohammed2, Ramzi Mahmoudi3,4, Younes Arous5, Begonya Garcia-Zapirain6, Karrar Hameed Abdulkareem7, Mohamed Hedi Bedoui3
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1233-1252, 2021, DOI:10.32604/cmc.2021.016860 - 04 June 2021
    (This article belongs to the Special Issue: Advanced signal acquisition and processing for Internet of Medical Things)
    Abstract Left ventricular (LV) dysfunction is mainly assessed by global contractile indices such as ejection fraction and LV Volumes in cardiac MRI. While these indices give information about the presence or not of LV alteration, they are not able to identify the location and the size of such alteration. The aim of this study is to compare the performance of three parametric imaging techniques used in cardiac MRI for the regional quantification of cardiac dysfunction. The proposed approaches were evaluated on 20 patients with myocardial infarction and 20 subjects with normal function. Three parametric images approaches:… More >

  • Open AccessOpen Access

    ARTICLE

    Classification and Categorization of COVID-19 Outbreak in Pakistan

    Amber Ayoub1, Kainaat Mahboob1, Abdul Rehman Javed2, Muhammad Rizwan1, Thippa Reddy Gadekallu2, Mustufa Haider Abidi3,*, Mohammed Alkahtani4,5
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1253-1269, 2021, DOI:10.32604/cmc.2021.015655 - 04 June 2021
    (This article belongs to the Special Issue: Artificial Intelligence and Healthcare Analytics for COVID-19)
    Abstract Coronavirus is a potentially fatal disease that normally occurs in mammals and birds. Generally, in humans, the virus spreads through aerial droplets of any type of fluid secreted from the body of an infected person. Coronavirus is a family of viruses that is more lethal than other unpremeditated viruses. In December 2019, a new variant, i.e., a novel coronavirus (COVID-19) developed in Wuhan province, China. Since January 23, 2020, the number of infected individuals has increased rapidly, affecting the health and economies of many countries, including Pakistan. The objective of this research is to provide More >

  • Open AccessOpen Access

    ARTICLE

    Complex Problems Solution as a Service Based on Predictive Optimization and Tasks Orchestration in Smart Cities

    Shabir Ahmad1, Jehad Ali2, Faisal Jamil3, Taeg Keun Whangbo1, DoHyeun Kim3,*
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1271-1288, 2021, DOI:10.32604/cmc.2021.017773 - 04 June 2021
    (This article belongs to the Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract Smart cities have different contradicting goals having no apparent solution. The selection of the appropriate solution, which is considered the best compromise among the candidates, is known as complex problem-solving. Smart city administrators face different problems of complex nature, such as optimal energy trading in microgrids and optimal comfort index in smart homes, to mention a few. This paper proposes a novel architecture to offer complex problem solutions as a service (CPSaaS) based on predictive model optimization and optimal task orchestration to offer solutions to different problems in a smart city. Predictive model optimization uses More >

  • Open AccessOpen Access

    ARTICLE

    Modeling of Heart Rate Variability Using Time-Frequency Representations

    Ghaylen Laouini1, Ibrahim Mahariq1, Thabet Abdeljawad2,3,4,*, Hasan Aksoy5
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1289-1299, 2021, DOI:10.32604/cmc.2021.018411 - 04 June 2021
    (This article belongs to the Special Issue: Advanced signal acquisition and processing for Internet of Medical Things)
    Abstract The heart rate variability signal is highly correlated with the respiration even at high workload exercise. It is also known that this phenomenon still exists during increasing exercise. In the current study, we managed to model this correlation during increasing exercise using the time varying integral pulse frequency modulation (TVIPFM) model that relates the mechanical modulation (MM) to the respiration and the cardiac rhythm. This modulation of the autonomic nervous system (ANS) is able to simultaneously decrease sympathetic and increase parasympathetic activity. The TVIPFM model takes into consideration the effect of the increasing exercise test,… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Power Control Aware Depth Routing in Underwater Sensor Networks

    Ghufran Ahmed1, Saiful Islam2, Ihsan Ali3, Isra Adil Hayder4, Abdelmuttlib Ibrahim Abdalla Ahmed3, Muhammad Talha5, Sultan S. Alshamrani6, Ag Asri Ag Ibrahim7,*
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1301-1322, 2021, DOI:10.32604/cmc.2021.017062 - 04 June 2021
    (This article belongs to the Special Issue: Deep Learning and Parallel Computing for Intelligent and Efficient IoT)
    Abstract Underwater acoustic sensor network (UASN) refers to a procedure that promotes a broad spectrum of aquatic applications. UASNs can be practically applied in seismic checking, ocean mine identification, resource exploration, pollution checking, and disaster avoidance. UASN confronts many difficulties and issues, such as low bandwidth, node movements, propagation delay, 3D arrangement, energy limitation, and high-cost production and arrangement costs caused by antagonistic underwater situations. Underwater wireless sensor networks (UWSNs) are considered a major issue being encountered in energy management because of the limited battery power of their nodes. Moreover, the harsh underwater environment requires vendors… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient CNN-Based Automated Diagnosis Framework from COVID-19 CT Images

    Walid El-Shafai1, Noha A. El-Hag2, Ghada M. El-Banby3, Ashraf A. M. Khalaf2, Naglaa F. Soliman4,*, Abeer D. Algarni4, Fathi E. Abd El-Samie1,4
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1323-1341, 2021, DOI:10.32604/cmc.2021.017385 - 04 June 2021
    Abstract Corona Virus Disease-2019 (COVID-19) continues to spread rapidly in the world. It has dramatically affected daily lives, public health, and the world economy. This paper presents a segmentation and classification framework of COVID-19 images based on deep learning. Firstly, the classification process is employed to discriminate between COVID-19, non-COVID, and pneumonia by Convolutional Neural Network (CNN). Then, the segmentation process is applied for COVID-19 and pneumonia CT images. Finally, the resulting segmented images are used to identify the infected region, whether COVID-19 or pneumonia. The proposed CNN consists of four Convolutional (Conv) layers, four batch More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning and Entity Embedding-Based Intrusion Detection Model for Wireless Sensor Networks

    Bandar Almaslukh*
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1343-1360, 2021, DOI:10.32604/cmc.2021.017914 - 04 June 2021
    Abstract Wireless sensor networks (WSNs) are considered promising for applications such as military surveillance and healthcare. The security of these networks must be ensured in order to have reliable applications. Securing such networks requires more attention, as they typically implement no dedicated security appliance. In addition, the sensors have limited computing resources and power and storage, which makes WSNs vulnerable to various attacks, especially denial of service (DoS). The main types of DoS attacks against WSNs are blackhole, grayhole, flooding, and scheduling. There are two primary techniques to build an intrusion detection system (IDS): signature-based and… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Relay Selection Scheme for Minimization of the Transmission Time

    Yu-Jin Na1, Ji-Sung Jung1, Young-Hwan You2, Hyoung-Kyu Song1,*
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1361-1373, 2021, DOI:10.32604/cmc.2021.018481 - 04 June 2021
    Abstract As the installation of small cells increases, the use of relay also increases. The relay operates as a base station as well as just an amplifier. As the roles and types of relays become more diverse, appropriate relay selection technology is an effective way to improve communication performance. Many researches for relay selection have been studied to secure the reliability of relay communication. In this paper, the relay selection scheme is proposed for a cooperative system using decode-and-forward (DF) relaying scheme in the mobile communication system. To maintain the transmission rate, the proposed scheme classifies… More >

  • Open AccessOpen Access

    ARTICLE

    GAN-GLS: Generative Lyric Steganography Based on Generative Adversarial Networks

    Cuilin Wang1, Yuling Liu1,*, Yongju Tong1, Jingwen Wang2
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1375-1390, 2021, DOI:10.32604/cmc.2021.017950 - 04 June 2021
    Abstract Steganography based on generative adversarial networks (GANs) has become a hot topic among researchers. Due to GANs being unsuitable for text fields with discrete characteristics, researchers have proposed GAN-based steganography methods that are less dependent on text. In this paper, we propose a new method of generative lyrics steganography based on GANs, called GAN-GLS. The proposed method uses the GAN model and the large-scale lyrics corpus to construct and train a lyrics generator. In this method, the GAN uses a previously generated line of a lyric as the input sentence in order to generate the… More >

  • Open AccessOpen Access

    ARTICLE

    PAPR Reduction in NOMA by Using Hybrid Algorithms

    Mohit Kumar Sharma, Arun Kumar*
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1391-1406, 2021, DOI:10.32604/cmc.2021.017666 - 04 June 2021
    Abstract Non-orthogonal multiple access (NOMA) is gaining considerable attention due to its features, such as low out-of-band radiation, signal detection capability, high spectrum gain, fast data rate, and massive D2D connectivity. It may be considered for 5G networks. However, the high peak-to-average power ratio (PAPR) is viewed as a significant disadvantage of a NOMA waveform, and it weakens the quality of signals and the throughput of the scheme. In this article, we introduce a modified NOMA system by employing a block of wavelet transform, an alternative to FFT (Fast Fourier transform). The modified system combines the More >

  • Open AccessOpen Access

    ARTICLE

    Breast Lesions Detection and Classification via YOLO-Based Fusion Models

    Asma Baccouche1,*, Begonya Garcia-Zapirain2, Cristian Castillo Olea2, Adel S. Elmaghraby1
    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1407-1425, 2021, DOI:10.32604/cmc.2021.018461 - 04 June 2021
    (This article belongs to the Special Issue: Recent Advances in Deep Learning for Medical Image Analysis)
    Abstract With recent breakthroughs in artificial intelligence, the use of deep learning models achieved remarkable advances in computer vision, ecommerce, cybersecurity, and healthcare. Particularly, numerous applications provided efficient solutions to assist radiologists for medical imaging analysis. For instance, automatic lesion detection and classification in mammograms is still considered a crucial task that requires more accurate diagnosis and precise analysis of abnormal lesions. In this paper, we propose an end-to-end system, which is based on You-Only-Look-Once (YOLO) model, to simultaneously localize and classify suspicious breast lesions from entire mammograms. The proposed system first preprocesses the raw images,… More >

Per Page:

Share Link