Home / Journals / CMC / Vol.71, No.2, 2022
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    The Mathematical Model for Streptococcus suis Infection in Pig-Human Population with Humidity Effect

    Inthira Chaiya1, Kamonchat Trachoo1, Kamsing Nonlaopon2, Din Prathumwan2,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2981-2998, 2022, DOI:10.32604/cmc.2022.021856
    (This article belongs to this Special Issue: Role of Computer in Modelling & Solving Real-World Problems)
    Abstract In this paper, we developed a mathematical model for Streptococcus suis, which is an epidemic by considering the moisture that affects the infection. The disease is caused by Streptococcus suis infection found in pigs which can be transmitted to humans. The patients of Streptococcus suis were generally found in adults males and the elderly who contacted pigs or who ate uncooked pork. In human cases, the infection can cause a severe illness and death. This disease has an impact to the financial losses in the swine industry. In the development of models for this disease, we have divided the population… More >

  • Open AccessOpen Access

    ARTICLE

    SSA-HIAST: A Novel Framework for Code Clone Detection

    Neha Saini*, Sukhdip Singh
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2999-3017, 2022, DOI:10.32604/cmc.2022.022659
    Abstract In the recent era of software development, reusing software is one of the major activities that is widely used to save time. To reuse software, the copy and paste method is used and this whole process is known as code cloning. This activity leads to problems like difficulty in debugging, increase in time to debug and manage software code. In the literature, various algorithms have been developed to find out the clones but it takes too much time as well as more space to figure out the clones. Unfortunately, most of them are not scalable. This problem has been targeted… More >

  • Open AccessOpen Access

    ARTICLE

    Live Migration of Virtual Machines Using a Mamdani Fuzzy Inference System

    Tahir Alyas1, Iqra Javed1, Abdallah Namoun2, Ali Tufail2, Sami Alshmrany2, Nadia Tabassum3,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3019-3033, 2022, DOI:10.32604/cmc.2022.019836
    Abstract Efforts were exerted to enhance the live virtual machines (VMs) migration, including performance improvements of the live migration of services to the cloud. The VMs empower the cloud users to store relevant data and resources. However, the utilization of servers has increased significantly because of the virtualization of computer systems, leading to a rise in power consumption and storage requirements by data centers, and thereby the running costs. Data center migration technologies are used to reduce risk, minimize downtime, and streamline and accelerate the data center move process. Indeed, several parameters, such as non-network overheads and downtime adjustment, may impact… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection

    Xiaorui Zhang1,2,*, Xun Sun1, Xingming Sun1, Wei Sun3, Sunil Kumar Jha4
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3035-3050, 2022, DOI:10.32604/cmc.2022.022304
    Abstract The leakage of medical audio data in telemedicine seriously violates the privacy of patients. In order to avoid the leakage of patient information in telemedicine, a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data. The scheme decomposes the medical audio into two independent embedding domains, embeds the robust watermark and the reversible watermark into the two domains respectively. In order to ensure the audio quality, the Hurst exponent is used to find a suitable position for watermark embedding. Due to the independence of the two embedding domains, the embedding of the second-stage reversible watermark will… More >

  • Open AccessOpen Access

    ARTICLE

    A Deep Two-State Gated Recurrent Unit for Particulate Matter (PM2.5) Concentration Forecasting

    Muhammad Zulqarnain1, Rozaida Ghazali1,*, Habib Shah2, Lokman Hakim Ismail1, Abdullah Alsheddy3, Maqsood Mahmud4
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3051-3068, 2022, DOI:10.32604/cmc.2022.021629
    (This article belongs to this Special Issue: Artificial Intelligence and Machine Learning Algorithms in Real-World Applications and Theories)
    Abstract Air pollution is a significant problem in modern societies since it has a serious impact on human health and the environment. Particulate Matter (PM2.5) is a type of air pollution that contains of interrupted elements with a diameter less than or equal to 2.5 m. For risk assessment and epidemiological investigations, a better knowledge of the spatiotemporal variation of PM2.5 concentration in a constant space-time area is essential. Conventional spatiotemporal interpolation approaches commonly relying on robust presumption by limiting interpolation algorithms to those with explicit and basic mathematical expression, ignoring a plethora of hidden but crucial manipulating aspects. Many advanced… More >

  • Open AccessOpen Access

    ARTICLE

    A Robust Video Watermarking Scheme with Squirrel Search Algorithm

    Aman Bhaskar1, Chirag Sharma1, Khalid Mohiuddin2, Aman Singh1,*, Osman A. Nasr2, Mamdooh Alwetaishi3
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3069-3089, 2022, DOI:10.32604/cmc.2022.019866
    Abstract Advancement in multimedia technology has resulted in protection against distortion, modification, and piracy. For implementing such protection, we have an existing technique called watermarking but obtaining desired distortion level with sufficient robustness is a challenging task for watermarking in multimedia applications. In the paper, we proposed a smart technique for video watermarking associating meta-heuristic algorithms along with an embedding method to gain an optimized efficiency. The main aim of the optimization algorithm is to obtain solutions with maximum robustness, and which should not exceed the set threshold of quality. To represent the accuracy of the proposed scheme, we employ a… More >

  • Open AccessOpen Access

    ARTICLE

    Attention-Based Bi-LSTM Model for Arabic Depression Classification

    Abdulqader M. Almars*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3091-3106, 2022, DOI:10.32604/cmc.2022.022609
    Abstract Depression is a common mental health issue that affects a large percentage of people all around the world. Usually, people who suffer from this mood disorder have issues such as low concentration, dementia, mood swings, and even suicide. A social media platform like Twitter allows people to communicate as well as share photos and videos that reflect their moods. Therefore, the analysis of social media content provides insight into individual moods, including depression. Several studies have been conducted on depression detection in English and less in Arabic. The detection of depression from Arabic social media lags behind due the complexity… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Watermarking Scheme for NIfTI Medical Images

    Abhishek Kumar1,5, Kamred Udham Singh2, Visvam Devadoss Ambeth Kumar3, Tapan Kant4, Abdul Khader Jilani Saudagar5,*, Abdullah Al Tameem5, Mohammed Al Khathami5, Muhammad Badruddin Khan5, Mozaherul Hoque Abul Hasanat5, Khalid Mahmood Malik6
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3107-3125, 2022, DOI:10.32604/cmc.2022.022817
    (This article belongs to this Special Issue: Edge Computing and Machine Learning for Improving Healthcare Services)
    Abstract Computed Tomography (CT) scan and Magnetic Resonance Imaging (MRI) technologies are widely used in medical field. Within the last few months, due to the increased use of CT scans, millions of patients have had their CT scans done. So, as a result, images showing the Corona Virus for diagnostic purposes were digitally transmitted over the internet. The major problem for the world health care system is a multitude of attacks that affect copyright protection and other ethical issues as images are transmitted over the internet. As a result, it is important to apply a robust and secure watermarking technique to… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis and Modeling of Propagation in Tunnel at 3.7 and 28 GHz

    Md Abdus Samad1,2, Dong-You Choi1,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3127-3143, 2022, DOI:10.32604/cmc.2022.023086
    Abstract In present-day society, train tunnels are extensively used as a means of transportation. Therefore, to ensure safety, streamlined train operations, and uninterrupted internet access inside train tunnels, reliable wave propagation modeling is required. We have experimented and measured wave propagation models in a 1674 m long straight train tunnel in South Korea. The measured path loss and the received signal strength were modeled with the Close-In (CI), Floating intercept (FI), CI model with a frequency-weighted path loss exponent (CIF), and alpha-beta-gamma (ABG) models, where the model parameters were determined using minimum mean square error (MMSE) methods. The measured and the… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Based Automated Diagnosis of Skin Diseases Using Dermoscopy

    Vatsala Anand1, Sheifali Gupta1, Deepika Koundal2,*, Shubham Mahajan3, Amit Kant Pandit3, Atef Zaguia4
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3145-3160, 2022, DOI:10.32604/cmc.2022.022788
    (This article belongs to this Special Issue: Applications of Intelligent Systems in Computer Vision)
    Abstract Biomedical image analysis has been exploited considerably by recent technology involvements, carrying about a pattern shift towards ‘automation’ and ‘error free diagnosis’ classification methods with markedly improved accurate diagnosis productivity and cost effectiveness. This paper proposes an automated deep learning model to diagnose skin disease at an early stage by using Dermoscopy images. The proposed model has four convolutional layers, two maxpool layers, one fully connected layer and three dense layers. All the convolutional layers are using the kernel size of 3 * 3 whereas the maxpool layer is using the kernel size of 2 * 2. The dermoscopy images… More >

  • Open AccessOpen Access

    ARTICLE

    Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN

    Md. Selim Al Mamun1,2, Fatema Akhter1,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3161-3178, 2022, DOI:10.32604/cmc.2022.022214
    (This article belongs to this Special Issue: Pervasive Computing and Communication: Challenges, Technologies & Opportunities)
    Abstract Nowadays, wireless local area network (WLAN) has become prevalent Internet access due to its low-cost gadgets, flexible coverage and hassle-free simple wireless installation. WLAN facilitates wireless Internet services to users with mobile devices like smart phones, tablets, and laptops through deployment of multiple access points (APs) in a network field. Every AP operates on a frequency band called channel. Popular wireless standard such as IEEE 802.11n has a limited number of channels where frequency spectrum of adjacent channels overlaps partially with each other. In a crowded environment, users may experience poor Internet services due to channel collision i.e., interference from… More >

  • Open AccessOpen Access

    ARTICLE

    Correlation Analysis of Energy Consumption of Agricultural Rotorcraft

    Lihua Zhu1,*, Zhijian Xu1, Yu Wang1, Cheire Cheng2
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3179-3192, 2022, DOI:10.32604/cmc.2022.023293
    Abstract With the rapid development of unmanned aerial vehicle technology, unmanned aerial vehicles (UAVs) have been widely used in the field of agricultural plant protection. Compared with fuel-driven UAVs, electrically driven rotorcrafts have many advantages such as lower cost, simpler operation, good maneuverability and cleaner power, which them popular in the plant protection. However, electrical rotorcrafts still face battery problems in actual operation, which limits its working time and application. Aiming at this issue, this paper studied the influence of rotorcraft flight parameters on energy consumption through series of carefully designed flight experiments. First of all, the linear motion experiments have… More >

  • Open AccessOpen Access

    ARTICLE

    A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications

    Wael Said1, Elsayed Mostafa1,*, M. M. Hassan1, Ayman Mohamed Mostafa2
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3193-3209, 2022, DOI:10.32604/cmc.2022.023554
    (This article belongs to this Special Issue: Security and Privacy issues for various Emerging Technologies and Future Trends)
    Abstract User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment. The data stored on the public cloud will be vulnerable to outside and inside attacks. This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud. Different access control policies are applied for verifying users on the cloud. A security mechanism is… More >

  • Open AccessOpen Access

    ARTICLE

    Interpretable and Adaptable Early Warning Learning Analytics Model

    Shaleeza Sohail1, Atif Alvi2,*, Aasia Khanum3
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3211-3225, 2022, DOI:10.32604/cmc.2022.023560
    (This article belongs to this Special Issue: Machine Learning Empowered Secure Computing for Intelligent Systems)
    Abstract Major issues currently restricting the use of learning analytics are the lack of interpretability and adaptability of the machine learning models used in this domain. Interpretability makes it easy for the stakeholders to understand the working of these models and adaptability makes it easy to use the same model for multiple cohorts and courses in educational institutions. Recently, some models in learning analytics are constructed with the consideration of interpretability but their interpretability is not quantified. However, adaptability is not specifically considered in this domain. This paper presents a new framework based on hybrid statistical fuzzy theory to overcome these… More >

  • Open AccessOpen Access

    ARTICLE

    AMC Integrated Multilayer Wearable Antenna for Multiband WBAN Applications

    Iqra Aitbar1, Nosherwan Shoaib1,*, Akram Alomainy2, Abdul Quddious3, Symeon Nikolaou4, Muhammad Ali Imran5, Qammer H. Abbasi5
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3227-3241, 2022, DOI:10.32604/cmc.2022.023008
    (This article belongs to this Special Issue: Advances in 5G Antenna Designs and Systems)
    Abstract In this paper, a compact, efficient and easy to fabricate wearable antenna integrated with Artificial Magnetic Conductor (AMC) is presented. Addition of slots and bevels/cuts in the rectangular monopole patch antenna yield a wide bandwidth along with band notches. The proposed antenna is backed with an AMC metasurface that changes the bidirectional radiation pattern to a unidirectional, thus, considerably reducing the Specific Absorption Ratio (SAR). The demonstrated antenna has a good coverage radiating away from the body and presents reduced radiation towards the body with a front-to-back ratio of 13 dB and maximum gain of 3.54 dB. The proposed design… More >

  • Open AccessOpen Access

    ARTICLE

    Optimization Analysis of Sustainable Solar Power System for Mobile Communication Systems

    Mohammed H. Alsharif1, Raju Kannadasan2, Amir Y. Hassan3, Wael Z. Tawfik4, Mun-Kyeom Kim5,*, Muhammad Asghar Khan6, Ahmad A. A. Solyman7
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3243-3255, 2022, DOI:10.32604/cmc.2022.022348
    Abstract Cellular mobile technology has witnessed tremendous growth in recent times. One of the challenges facing the operators to extend the coverage of the networks to meet the rising demand for cellular mobile services is the power sources used to supply cellular towers with energy, especially in remote. Thus, switch from the conventional sources of energy to a greener and sustainable power model became a target of the academic and industrial sectors in many fields; one of these important fields is the telecommunication sector. Accordingly, this study aims to find the optimum sizing and techno-economic investigation of a solar photovoltaic scheme… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Forgery Detection Approaches for Digital Color Images

    Amira Baumy1, Abeer D. Algarni2,*, Mahmoud Abdalla3, Walid El-Shafai4,5, Fathi E. Abd El-Samie3,4, Naglaa F. Soliman2,3
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3257-3276, 2022, DOI:10.32604/cmc.2022.021047
    Abstract This paper is concerned with a vital topic in image processing: color image forgery detection. The development of computing capabilities has led to a breakthrough in hacking and forgery attacks on signal, image, and data communicated over networks. Hence, there is an urgent need for developing efficient image forgery detection algorithms. Two main types of forgery are considered in this paper: splicing and copy-move. Splicing is performed by inserting a part of an image into another image. On the other hand, copy-move forgery is performed by copying a part of the image into another position in the same image. The… More >

  • Open AccessOpen Access

    ARTICLE

    A DQN-Based Cache Strategy for Mobile Edge Networks

    Siyuan Sun1,*, Junhua Zhou2, Jiuxing Wen3, Yifei Wei1, Xiaojun Wang4
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3277-3291, 2022, DOI:10.32604/cmc.2022.020471
    Abstract The emerging mobile edge networks with content caching capability allows end users to receive information from adjacent edge servers directly instead of a centralized data warehouse, thus the network transmission delay and system throughput can be improved significantly. Since the duplicate content transmissions between edge network and remote cloud can be reduced, the appropriate caching strategy can also improve the system energy efficiency of mobile edge networks to a great extent. This paper focuses on how to improve the network energy efficiency and proposes an intelligent caching strategy according to the cached content distribution model for mobile edge networks based… More >

  • Open AccessOpen Access

    ARTICLE

    Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications

    Hend Ibrahim1, Abeer D. Algarni2,*, Mahmoud Abdalla1, Walid El-Shafai3,4, Fathi E. Abd El-Samie2,3, Naglaa F. Soliman1,2
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3293-3318, 2022, DOI:10.32604/cmc.2022.022436
    Abstract Optical Wireless Communication (OWC) is a new trend in communication systems to achieve large bandwidth, high bit rate, high security, fast deployment, and low cost. The basic idea of the OWC is to transmit data on unguided media with light. This system requires multi-carrier modulation such as Orthogonal Frequency Division Multiplexing (OFDM). This paper studies optical OFDM performance based on Intensity Modulation with Direct Detection (IM/DD) system. This system requires a non-negativity constraint. The paper presents a framework for wireless optical OFDM system that comprises (IM/DD) with different forms, Direct Current biased Optical OFDM (DCO-OFDM), Asymmetrically Clipped Optical OFDM (ACO-OFDM),… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Agent Deep Q-Networks for Efficient Edge Federated Learning Communications in Software-Defined IoT

    Prohim Tam1, Sa Math1, Ahyoung Lee2, Seokhoon Kim1,3,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3319-3335, 2022, DOI:10.32604/cmc.2022.023215
    Abstract Federated learning (FL) activates distributed on-device computation techniques to model a better algorithm performance with the interaction of local model updates and global model distributions in aggregation averaging processes. However, in large-scale heterogeneous Internet of Things (IoT) cellular networks, massive multi-dimensional model update iterations and resource-constrained computation are challenging aspects to be tackled significantly. This paper introduces the system model of converging software-defined networking (SDN) and network functions virtualization (NFV) to enable device/resource abstractions and provide NFV-enabled edge FL (eFL) aggregation servers for advancing automation and controllability. Multi-agent deep Q-networks (MADQNs) target to enforce a self-learning softwarization, optimize resource allocation… More >

  • Open AccessOpen Access

    ARTICLE

    Automated Identification Algorithm Using CNN for Computer Vision in Smart Refrigerators

    Pulkit Jain1, Paras Chawla1, Mehedi Masud2,*, Shubham Mahajan3, Amit Kant Pandit3
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3337-3353, 2022, DOI:10.32604/cmc.2022.023053
    (This article belongs to this Special Issue: Applications of Intelligent Systems in Computer Vision)
    Abstract Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications. In particular the need for automating the process of real-time food item identification, there is a huge surge of research so as to make smarter refrigerators. According to a survey by the Food and Agriculture Organization of the United Nations (FAO), it has been found that 1.3 billion tons of food is wasted by consumers around the world due to either food spoilage or expiry and a large amount of food is wasted from homes and restaurants itself. Smart refrigerators have been very successful in… More >

  • Open AccessOpen Access

    ARTICLE

    Modelling and Verification of Context-Aware Intelligent Assistive Formalism

    Shahid Yousaf1,*, Hafiz Mahfooz Ul Haque2, Abbas Khalid1, Muhammad Adnan Hashmi3, Eraj Khan1
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3355-3373, 2022, DOI:10.32604/cmc.2022.023019
    Abstract Recent years have witnessed the expeditious evolution of intelligent smart devices and autonomous software technologies with the expanded domains of computing from workplaces to smart computing in everyday routine life activities. This trend has been rapidly advancing towards the new generation of systems where smart devices play vital roles in acting intelligently on behalf of the users. Context-awareness has emerged from the pervasive computing paradigm. Context-aware systems have the ability to acquire contextual information from the surrounding environment autonomously, perform reasoning on it, and then adapt their behaviors accordingly. With the proliferation of context-aware systems and smart sensors, real-time monitoring… More >

  • Open AccessOpen Access

    ARTICLE

    Two-Tier Clustering with Routing Protocol for IoT Assisted WSN

    A. Arokiaraj Jovith1, Mahantesh Mathapati2, M. Sundarrajan3, N. Gnanasankaran4, Seifedine Kadry5, Maytham N. Meqdad6, Shabnam Mohamed Aslam7,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3375-3392, 2022, DOI:10.32604/cmc.2022.022668
    Abstract In recent times, Internet of Things (IoT) has become a hot research topic and it aims at interlinking several sensor-enabled devices mainly for data gathering and tracking applications. Wireless Sensor Network (WSN) is an important component in IoT paradigm since its inception and has become the most preferred platform to deploy several smart city application areas like home automation, smart buildings, intelligent transportation, disaster management, and other such IoT-based applications. Clustering methods are widely-employed energy efficient techniques with a primary purpose i.e., to balance the energy among sensor nodes. Clustering and routing processes are considered as Non-Polynomial (NP) hard problems… More >

  • Open AccessOpen Access

    ARTICLE

    Webpage Matching Based on Visual Similarity

    Mengmeng Ge1, Xiangzhan Yu1,*, Lin Ye1,2, Jiantao Shi1
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3393-3405, 2022, DOI:10.32604/cmc.2022.017220
    Abstract With the rapid development of the Internet, the types of webpages are more abundant than in previous decades. However, it becomes severe that people are facing more and more significant network security risks and enormous losses caused by phishing webpages, which imitate the interface of real webpages and deceive the victims. To better identify and distinguish phishing webpages, a visual feature extraction method and a visual similarity algorithm are proposed. First, the visual feature extraction method improves the Vision-based Page Segmentation (VIPS) algorithm to extract the visual block and calculate its signature by perceptual hash technology. Second, the visual similarity… More >

  • Open AccessOpen Access

    ARTICLE

    Automated Grading of Breast Cancer Histopathology Images Using Multilayered Autoencoder

    Shakra Mehak1, M. Usman Ashraf2, Rabia Zafar3, Ahmed M. Alghamdi4, Ahmed S. Alfakeeh5, Fawaz Alassery6, Habib Hamam7, Muhammad Shafiq8,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3407-3423, 2022, DOI:10.32604/cmc.2022.022705
    Abstract Breast cancer (BC) is the most widely recognized cancer in women worldwide. By 2018, 627,000 women had died of breast cancer (World Health Organization Report 2018). To diagnose BC, the evaluation of tumours is achieved by analysis of histological specimens. At present, the Nottingham Bloom Richardson framework is the least expensive approach used to grade BC aggressiveness. Pathologists contemplate three elements, 1. mitotic count, 2. gland formation, and 3. nuclear atypia, which is a laborious process that witness's variations in expert's opinions. Recently, some algorithms have been proposed for the detection of mitotic cells, but nuclear atypia in breast cancer… More >

  • Open AccessOpen Access

    ARTICLE

    Image Dehazing Based on Pixel Guided CNN with PAM via Graph Cut

    Fayadh Alenezi*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3425-3443, 2022, DOI:10.32604/cmc.2022.023339
    (This article belongs to this Special Issue: Analysis, Processing, and Applications of Fuzzy System and Deep Learning)
    Abstract Image dehazing is still an open research topic that has been undergoing a lot of development, especially with the renewed interest in machine learning-based methods. A major challenge of the existing dehazing methods is the estimation of transmittance, which is the key element of haze-affected imaging models. Conventional methods are based on a set of assumptions that reduce the solution search space. However, the multiplication of these assumptions tends to restrict the solutions to particular cases that cannot account for the reality of the observed image. In this paper we reduce the number of simplified hypotheses in order to attain… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Hybrid Tunicate Swarm Naked Mole-Rat Algorithm for Image Segmentation and Numerical Optimization

    Supreet Singh1,2, Nitin Mittal1, Urvinder Singh2, Rohit Salgotra2, Atef Zaguia3, Dilbag Singh4,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3445-3462, 2022, DOI:10.32604/cmc.2022.023004
    (This article belongs to this Special Issue: Applications of Intelligent Systems in Computer Vision)
    Abstract This paper provides a new optimization algorithm named as tunicate swarm naked mole-rat algorithm (TSNMRA) which uses hybridization concept of tunicate swarm algorithm (TSA) and naked mole-rat algorithm (NMRA). This newly developed algorithm uses the characteristics of both algorithms (TSA and NMRA) and enhance the exploration abilities of NMRA. Apart from the hybridization concept, important parameter of NMRA such as mating factor is made to be self-adaptive with the help of simulated annealing mutation operator and there is no need to define its value manually. For evaluating the working capabilities of proposed TSNMRA, it is tested for 100-digit challenge (CEC… More >

  • Open AccessOpen Access

    ARTICLE

    Twitter Arabic Sentiment Analysis to Detect Depression Using Machine Learning

    Dhiaa A. Musleh, Taef A. Alkhales, Reem A. Almakki*, Shahad E. Alnajim, Shaden K. Almarshad, Rana S. Alhasaniah, Sumayh S. Aljameel, Abdullah A. Almuqhim
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3463-3477, 2022, DOI:10.32604/cmc.2022.022508
    (This article belongs to this Special Issue: Machine Learning Empowered Secure Computing for Intelligent Systems)
    Abstract Depression has been a major global concern for a long time, with the disease affecting aspects of many people's daily lives, such as their moods, eating habits, and social interactions. In Arabic culture, there is a lack of awareness regarding the importance of facing and curing mental health diseases. However, people all over the world, including Arab citizens, tend to express their feelings openly on social media, especially Twitter, as it is a platform designed to enable the expression of emotions through short texts, pictures, or videos. Users are inclined to treat their Twitter accounts as diaries because the platform… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Energy Conservation in V2X Communications for 5G Networks

    Arif Husen1,2, Abid Soahil1,*, Mohammad Hijji2, Muhammad Hasanain Chaudary1, Farooq Ahmed1
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3479-3495, 2022, DOI:10.32604/cmc.2022.023840
    Abstract The smart vehicles are one of critical enablers for automated services in smart cities to provide intelligent transportation means without human intervention. In order to fulfil requirements, Vehicle-to-Anything(V2X) communications aims to manage massive connectivity and high traffic load on base stations and extend the range over multiple hops in 5G networks. However, V2X networking faces several challenges from dynamic topology caused by high velocity of nodes and routing overhead that degrades the network performance and increases energy consumption. The existing routing scheme for V2X networking lacks energy efficiency and scalability for high velocity nodes with dense distribution. In order to… More >

  • Open AccessOpen Access

    ARTICLE

    Algorithm Development of Cloud Removal from Solar Images Based on Pix2Pix Network

    Xian Wu1, Wei Song1,2,3,*, Xukun Zhang1, Ganghua Lin2,4, Haimin Wang5,6,7, Yuanyong Deng2,4
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3497-3512, 2022, DOI:10.32604/cmc.2022.022325
    Abstract Sky clouds affect solar observations significantly. Their shadows obscure the details of solar features in observed images. Cloud-covered solar images are difficult to be used for further research without pre-processing. In this paper, the solar image cloud removing problem is converted to an image-to-image translation problem, with a used algorithm of the Pixel to Pixel Network (Pix2Pix), which generates a cloudless solar image without relying on the physical scattering model. Pix2Pix is consists of a generator and a discriminator. The generator is a well-designed U-Net. The discriminator uses PatchGAN structure to improve the details of the generated solar image, which… More >

  • Open AccessOpen Access

    ARTICLE

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm

    Saima Hassan1, Mojtaba Ahmadieh Khanesar2, Nazar Kalaf Hussein3, Samir Brahim Belhaouari4,*, Usman Amjad5, Wali Khan Mashwani6
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3513-3531, 2022, DOI:10.32604/cmc.2022.022018
    (This article belongs to this Special Issue: Recent Advances in Metaheuristic Techniques and Their Real-World Applications)
    Abstract The estimation of the fuzzy membership function parameters for interval type 2 fuzzy logic system (IT2-FLS) is a challenging task in the presence of uncertainty and imprecision. Grasshopper optimization algorithm (GOA) is a fresh population based meta-heuristic algorithm that mimics the swarming behavior of grasshoppers in nature, which has good convergence ability towards optima. The main objective of this paper is to apply GOA to estimate the optimal parameters of the Gaussian membership function in an IT2-FLS. The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm.… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Modified Sine Cosine Algorithm Using Inverse Filtering and Clipping Methods for Low Autocorrelation Binary Sequences

    Siti Julia Rosli1,2, Hasliza A Rahim1,2,*, Khairul Najmy Abdul Rani1,2, Ruzelita Ngadiran2,3, Wan Azani Mustafa3,4, Muzammil Jusoh1,2, Mohd Najib Mohd Yasin1,2, Thennarasan Sabapathy1,2, Mohamedfareq Abdulmalek5, Wan Suryani Firuz Wan Ariffin2, Ahmed Alkhayyat6
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3533-3556, 2022, DOI:10.32604/cmc.2022.021719
    Abstract The essential purpose of radar is to detect a target of interest and provide information concerning the target's location, motion, size, and other parameters. The knowledge about the pulse trains’ properties shows that a class of signals is mainly well suited to digital processing of increasing practical importance. A low autocorrelation binary sequence (LABS) is a complex combinatorial problem. The main problems of LABS are low Merit Factor (MF) and shorter length sequences. Besides, the maximum possible MF equals 12.3248 as infinity length is unable to be achieved. Therefore, this study implemented two techniques to propose a new metaheuristic algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Neural Network and Pseudo Relevance Feedback Based Query Expansion

    Abhishek Kumar Shukla*, Sujoy Das
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3557-3570, 2022, DOI:10.32604/cmc.2022.022411
    (This article belongs to this Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract The neural network has attracted researchers immensely in the last couple of years due to its wide applications in various areas such as Data mining, Natural language processing, Image processing, and Information retrieval etc. Word embedding has been applied by many researchers for Information retrieval tasks. In this paper word embedding-based skip-gram model has been developed for the query expansion task. Vocabulary terms are obtained from the top “k” initially retrieved documents using the Pseudo relevance feedback model and then they are trained using the skip-gram model to find the expansion terms for the user query. The performance of the… More >

  • Open AccessOpen Access

    ARTICLE

    Path Planning Based on the Improved RRT* Algorithm for the Mining Truck

    Dong Wang1,*, Shutong Zheng1, Yanxi Ren2, Danjie Du3
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3571-3587, 2022, DOI:10.32604/cmc.2022.022183
    Abstract Planning a reasonable driving path for trucks in mining areas is a key point to improve mining efficiency. In this paper, a path planning method based on Rapidly-exploring Random Tree Star (RRT*) is proposed, and several optimizations are carried out in the algorithm. Firstly, the selection process of growth target points is optimized. Secondly, the process of selecting the parent node is optimized and a Dubins curve is used to constraint it. Then, the expansion process from tree node to random point is optimized by the gravitational repulsion field method and dynamic step method. In the obstacle detection process, Dubins… More >

  • Open AccessOpen Access

    ARTICLE

    VANET Jamming and Adversarial Attack Defense for Autonomous Vehicle Safety

    Haeri Kim1, Jong-Moon Chung1,2,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3589-3605, 2022, DOI:10.32604/cmc.2022.023073
    Abstract The development of Vehicular Ad-hoc Network (VANET) technology is helping Intelligent Transportation System (ITS) services to become a reality. Vehicles can use VANETs to communicate safety messages on the road (while driving) and can inform their location and share road condition information in real-time. However, intentional and unintentional (e.g., packet/frame collision) wireless signal jamming can occur, which will degrade the quality of communication over the channel, preventing the reception of safety messages, and thereby posing a safety hazard to the vehicle's passengers. In this paper, VANET jamming detection applying Support Vector Machine (SVM) machine learning technology is used to classify… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Model for Predicting the Quality of Services Violation

    Muhammad Adnan Khan1,2, Asma Kanwal3, Sagheer Abbas3, Faheem Khan4, T. Whangbo4,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3607-3619, 2022, DOI:10.32604/cmc.2022.023480
    Abstract Cloud computing is providing IT services to its customer based on Service level agreements (SLAs). It is important for cloud service providers to provide reliable Quality of service (QoS) and to maintain SLAs accountability. Cloud service providers need to predict possible service violations before the emergence of an issue to perform remedial actions for it. Cloud users’ major concerns; the factors for service reliability are based on response time, accessibility, availability, and speed. In this paper, we, therefore, experiment with the parallel mutant-Particle swarm optimization (PSO) for the detection and predictions of QoS violations in terms of response time, speed,… More >

  • Open AccessOpen Access

    ARTICLE

    Computational Algorithms for the Analysis of Cancer Virotherapy Model

    Ali Raza1,2,*, Dumitru Baleanu3,4, Muhammad Rafiq5, Syed Zaheer Abbas6, Abubakar Siddique6, Umer Javed8, Mehvish Naz7, Arooj Fatima6, Tayyba Munawar6, Hira Batool6, Zaighum Nazir6
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3621-3634, 2022, DOI:10.32604/cmc.2022.023286
    Abstract Cancer is a common term for many diseases that can affect any part of the body. In 2020, ten million people will die due to cancer. A worldwide leading cause of death is cancer by the World Health Organization (WHO) report. Interaction of cancer cells, viral therapy, and immune response are identified in this model. Mathematical and computational modeling is an effective tool to predict the dynamics of cancer virotherapy. The cell population is categorized into three parts like uninfected cells (x), infected cells (y), virus-free cells (v), and immune cells (z). The modeling of cancer-like diseases is based on… More >

  • Open AccessOpen Access

    ARTICLE

    Evolution of Desertification Types on the North Shore of Qinghai Lake

    Wenzheng Yu1, Jintao Cui2, Yang Gao1, Mingxuan Zhu1, Li Shao3, Yanbo Shen4,5,*, Xiaozhao Zhang6, Chen Guo7, Hanxiaoya Zhang8
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3635-3646, 2022, DOI:10.32604/cmc.2022.023195
    Abstract Land desertification is a widely concerned ecological environment problem. Studying the evolution trend of desertification types is of great significance to prevent and control land desertification. In this study, we applied the decision tree classification method, to study the land area and temporal and spatial change law of different types of desertification in the North Bank of Qinghai Lake area from 1987 to 2014, based on the current land use situation and TM remote sensing image data of Haiyan County, Qinghai Province, The results show that the area of mild desertification land and moderate desertification land in the study area… More >

  • Open AccessOpen Access

    ARTICLE

    Arabic Fake News Detection Using Deep Learning

    Khaled M. Fouad1,3, Sahar F. Sabbeh1,2,*, Walaa Medhat1,3
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3647-3665, 2022, DOI:10.32604/cmc.2022.021449
    Abstract Nowadays, an unprecedented number of users interact through social media platforms and generate a massive amount of content due to the explosion of online communication. However, because user-generated content is unregulated, it may contain offensive content such as fake news, insults, and harassment phrases. The identification of fake news and rumors and their dissemination on social media has become a critical requirement. They have adverse effects on users, businesses, enterprises, and even political regimes and governments. State of the art has tackled the English language for news and used feature-based algorithms. This paper proposes a model architecture to detect fake… More >

  • Open AccessOpen Access

    ARTICLE

    Citrus Diseases Recognition Using Deep Improved Genetic Algorithm

    Usra Yasmeen1, Muhammad Attique Khan1, Usman Tariq2, Junaid Ali Khan1, Muhammad Asfand E. Yar3, Ch. Avais Hanif4, Senghour Mey5, Yunyoung Nam6,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3667-3684, 2022, DOI:10.32604/cmc.2022.022264
    (This article belongs to this Special Issue: Recent Advances in Deep Learning and Saliency Methods for Agriculture)
    Abstract Agriculture is the backbone of each country, and almost 50% of the population is directly involved in farming. In Pakistan, several kinds of fruits are produced and exported the other countries. Citrus is an important fruit, and its production in Pakistan is higher than the other fruits. However, the diseases of citrus fruits such as canker, citrus scab, blight, and a few more impact the quality and quantity of this Fruit. The manual diagnosis of these diseases required an expert person who is always a time-consuming and costly procedure. In the agriculture sector, deep learning showing significant success in the… More >

  • Open AccessOpen Access

    ARTICLE

    Radio Optical Network Simulation Tool (RONST)

    Yasmine I. Abdelhak1,2, Fady Kamel3, Moustafa Hafez2, Hussein E. Kotb4,5, Haitham A. Omran5, Tawfik Ismail6,7,*, Hassan Mostafa2,3
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3685-3702, 2022, DOI:10.32604/cmc.2022.022470
    Abstract This paper presents a radio optical network simulation tool (RONST) for modeling optical-wireless systems. For a typical optical and electrical chain environment, performance should be optimized concurrently before system implementation. As a result, simulating such systems turns out to be a multidisciplinary problem. The governing equations are incompatible with co-simulation in the traditional environments of existing software (SW) packages. The ultra-wideband (UWB) technology is an ideal candidate for providing high-speed short-range access for wireless services. The limited wireless reach of this technology is a significant limitation. A feasible solution to the problem of extending UWB signals is to transmit these… More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET

    Safiullah Khan1, Ali Raza2,3, Seong Oun Hwang4,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3703-3719, 2022, DOI:10.32604/cmc.2022.023476
    (This article belongs to this Special Issue: Machine Learning Empowered Secure Computing for Intelligent Systems)
    Abstract Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety and comfort for travelers on roads. However, wireless communications over open-access environments face many security and privacy issues that may affect deployment of large-scale VANETs. Researchers have proposed different protocols to address security and privacy issues in a VANET, and in this study we cryptanalyze some of the privacy preserving protocols to show that all existing protocols are vulnerable to the Sybil attack. The Sybil attack can be used by malicious actors to create fake… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Optimization of Random Forest Algorithm Based on Spark

    Suzhen Wang1, Zhanfeng Zhang1,*, Shanshan Geng1, Chaoyi Pang2
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3721-3731, 2022, DOI:10.32604/cmc.2022.015378
    Abstract As society has developed, increasing amounts of data have been generated by various industries. The random forest algorithm, as a classification algorithm, is widely used because of its superior performance. However, the random forest algorithm uses a simple random sampling feature selection method when generating feature subspaces which cannot distinguish redundant features, thereby affecting its classification accuracy, and resulting in a low data calculation efficiency in the stand-alone mode. In response to the aforementioned problems, related optimization research was conducted with Spark in the present paper. This improved random forest algorithm performs feature extraction according to the calculated feature importance… More >

  • Open AccessOpen Access

    ARTICLE

    Diabetic Retinopathy Detection Using Classical-Quantum Transfer Learning Approach and Probability Model

    Amna Mir1, Umer Yasin1, Salman Naeem Khan1, Atifa Athar3,*, Riffat Jabeen2, Sehrish Aslam1
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3733-3746, 2022, DOI:10.32604/cmc.2022.022524
    (This article belongs to this Special Issue: Advances in Artificial Intelligence and Machine learning in Biomedical and Healthcare Informatics)
    Abstract Diabetic Retinopathy (DR) is a common complication of diabetes mellitus that causes lesions on the retina that affect vision. Late detection of DR can lead to irreversible blindness. The manual diagnosis process of DR retina fundus images by ophthalmologists is time consuming and costly. While, Classical Transfer learning models are extensively used for computer aided detection of DR; however, their maintenance costs limits detection performance rate. Therefore, Quantum Transfer learning is a better option to address this problem in an optimized manner. The significance of Hybrid quantum transfer learning approach includes that it performs heuristically. Thus, our proposed methodology aims… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction of Changed Faces with HSCNN

    Jinho Han*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3747-3759, 2022, DOI:10.32604/cmc.2022.023683
    (This article belongs to this Special Issue: Analysis, Processing, and Applications of Fuzzy System and Deep Learning)
    Abstract Convolutional Neural Networks (CNN) have been successfully employed in the field of image classification. However, CNN trained using images from several years ago may be unable to identify how such images have changed over time. Cross-age face recognition is, therefore, a substantial challenge. Several efforts have been made to resolve facial changes over time utilizing recurrent neural networks (RNN) with CNN. The structure of RNN contains hidden contextual information in a hidden state to transfer a state in the previous step to the next step. This paper proposes a novel model called Hidden State-CNN (HSCNN). This adds to CNN a… More >

  • Open AccessOpen Access

    ARTICLE

    Empathic Responses of Behavioral-Synchronization in Human-Agent Interaction

    Sung Park1,*, Seongeon Park2, Mincheol Whang2
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3761-3784, 2022, DOI:10.32604/cmc.2022.023738
    (This article belongs to this Special Issue: Deep Vision Architectures and Algorithms for Edge AI Computing)
    Abstract Artificial entities, such as virtual agents, have become more pervasive. Their long-term presence among humans requires the virtual agent's ability to express appropriate emotions to elicit the necessary empathy from the users. Affective empathy involves behavioral mimicry, a synchronized co-movement between dyadic pairs. However, the characteristics of such synchrony between humans and virtual agents remain unclear in empathic interactions. Our study evaluates the participant's behavioral synchronization when a virtual agent exhibits an emotional expression congruent with the emotional context through facial expressions, behavioral gestures, and voice. Participants viewed an emotion-eliciting video stimulus (negative or positive) with a virtual agent. The… More >

  • Open AccessOpen Access

    ARTICLE

    Design of QoS Aware Routing Protocol for IoT Assisted Clustered WSN

    Ashit Kumar Dutta1, S. Srinivasan2, Bobbili Prasada Rao3, B. Hemalatha4, Irina V. Pustokhina5, Denis A. Pustokhin6, Gyanendra Prasad Joshi7,*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3785-3801, 2022, DOI:10.32604/cmc.2022.023657
    Abstract In current days, the domain of Internet of Things (IoT) and Wireless Sensor Networks (WSN) are combined for enhancing the sensor related data transmission in the forthcoming networking applications. Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks. In this view, this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing (EMO-QoSCMR) Protocol for IoT assisted WSN. The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy, throughput, delay, and lifetime. The proposed model involves… More >

  • Open AccessOpen Access

    ARTICLE

    Continuous Tracking of GPS Signals with Data Wipe-Off Method

    Dah-Jing Jwo*, Kun-Chan Lee
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3803-3820, 2022, DOI:10.32604/cmc.2022.023442
    Abstract The decentralized pre-filter based vector tracking loop (VTL) configuration with data wipe-off (DWO) method of the Global Positioning System (GPS) receiver is proposed for performance enhancement. It is a challenging task to continuously track the satellites’ signals in weak signal environment for the GPS receiver. VTL is a very attractive technique as it can provide tracking capability in signal-challenged environments. In the VTL, each channel will not form a loop independently. On the contrary, the signals in the channels of VTL are shared with each other; the navigation processor in turn predicts the code phases. Thus, the receiver can successfully… More >

  • Open AccessOpen Access

    ARTICLE

    An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks

    Idrees Sarhan Kocher*
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3821-3838, 2022, DOI:10.32604/cmc.2022.023478
    Abstract Applications of Wireless Sensor devices are widely used by various monitoring sections such as environmental monitoring, industrial sensing, habitat modeling, healthcare and enemy movement detection systems. Researchers were found that 16 bytes packet size (payload) requires Media Access Control (MAC) and globally unique network addresses overheads as more as the payload itself which is not reasonable in most situations. The approach of using a unique address isn't preferable for most Wireless Sensor Networks (WSNs) applications as well. Based on the mentioned drawbacks, the current work aims to fill the existing gap in the field area by providing two strategies. First,… More >

  • Open AccessOpen Access

    ARTICLE

    An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks

    Abdelwahed Berguiga*, Ahlem Harchay
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3839-3851, 2022, DOI:10.32604/cmc.2022.023399
    Abstract The success of Internet of Things (IoT) deployment has emerged important smart applications. These applications are running independently on different platforms, almost everywhere in the world. Internet of Medical Things (IoMT), also referred as the healthcare Internet of Things, is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems. Indeed, with the impact of the COVID-19 pandemic, a large number of interconnected devices designed to create smart networks. These networks monitor patients from remote locations as well as tracking medication orders. However, IoT may be jeopardized by attacks… More >

Per Page:

Share Link