Home / Journals / CMC / Vol.72, No.1, 2022
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Fault Pattern Diagnosis and Classification in Sensor Nodes Using Fall Curve

    Mudita Uppal1, Deepali Gupta1, Divya Anand2, Fahd S. Alharithi3, Jasem Almotiri3, Arturo Mansilla4,5, Dinesh Singh6, Nitin Goyal1,*
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1799-1814, 2022, DOI:10.32604/cmc.2022.025330
    Abstract The rapid expansion of Internet of Things (IoT) devices deploys various sensors in different applications like homes, cities and offices. IoT applications depend upon the accuracy of sensor data. So, it is necessary to predict faults in the sensor and isolate their cause. A novel primitive technique named fall curve is presented in this paper which characterizes sensor faults. This technique identifies the faulty sensor and determines the correct working of the sensor. Different sources of sensor faults are explained in detail whereas various faults that occurred in sensor nodes available in IoT devices are also presented in tabular form.… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy System Design Using Current Amplifier for 20 nm CMOS Technology

    Shruti Jain1, Cherry Bhargava2, Vijayakumar Varadarajan3, Ketan Kotecha4,*
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1815-1829, 2022, DOI:10.32604/cmc.2022.024004
    (This article belongs to this Special Issue: Bio-Inspired Computational Intelligence and Optimization Techniques for Real-World Engineering Applications)
    Abstract In the recent decade, different researchers have performed hardware implementation for different applications covering various areas of experts. In this research paper, a novel analog design and implementation of different steps of fuzzy systems with current differencing buffered amplifier (CDBA) are proposed with a compact structure that can be used in many signal processing applications. The proposed circuits are capable of wide input current range, simple structure, and are highly linear. Different electrical parameters were compared for the proposed fuzzy system when using different membership functions. The novelty of this paper lies in the electronic implementation of different steps for… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Load Balancing with MANET Propagation of Least Common Multiple Routing and Fuzzy Logic

    V. Gayatri*, M. Senthil Kumaran
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1831-1845, 2022, DOI:10.32604/cmc.2022.021857
    Abstract Mobile Ad Hoc Network (MANET) is a group of node that would interrelate among each other through one multi-hop wireless link, wherein the nodes were able to move in response to sudden modifications. The objective of MANET routing protocol is to quantify the route and compute the best path, but there exists a major decrease in energy efficiency, difficulty in hop selection, cost estimation, and efficient load-balancing. In this paper, a novel least common multipath-based routing has been proposed. Multipath routing is used to find a multipath route from source and destination. Load balancing is of primary importance in the… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling Reliability Engineering Data Using Scale-Invariant Quasi-Inverse Lindley Model

    Mohamed Kayid*, Tareq Alsayed
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1847-1860, 2022, DOI:10.32604/cmc.2022.025401
    Abstract An important property that any lifetime model should satisfy is scale invariance. In this paper, a new scale-invariant quasi-inverse Lindley (QIL) model is presented and studied. Its basic properties, including moments, quantiles, skewness, kurtosis, and Lorenz curve, have been investigated. In addition, the well-known dynamic reliability measures, such as failure rate (FR), reversed failure rate (RFR), mean residual life (MRL), mean inactivity time (MIT), quantile residual life (QRL), and quantile inactivity time (QIT) are discussed. The FR function considers the decreasing or upside-down bathtub-shaped, and the MRL and median residual lifetime may have a bathtub-shaped form. The parameters of the… More >

  • Open AccessOpen Access

    ARTICLE

    Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks

    Nadia Mustaqim Ansari1,*, Rashid Hussain2, Sheeraz Arif3, Syed Sajjad Hussain4
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1861-1875, 2022, DOI:10.32604/cmc.2022.023516
    (This article belongs to this Special Issue: Computational Models for Pro-Smart Environments in Data Science Assisted IoT Systems)
    Abstract The security of Internet of Things (IoT) is a challenging task for researchers due to plethora of IoT networks. Side Channel Attacks (SCA) are one of the major concerns. The prime objective of SCA is to acquire the information by observing the power consumption, electromagnetic (EM) field, timing analysis, and acoustics of the device. Later, the attackers perform statistical functions to recover the key. Advanced Encryption Standard (AES) algorithm has proved to be a good security solution for constrained IoT devices. This paper implements a simulation model which is used to modify the AES algorithm using logical masking properties. This… More >

  • Open AccessOpen Access

    ARTICLE

    QoS in FANET Business and Swarm Data

    Jesús Hamilton Ortiz1, Carlos Andrés Tavera Romero2,*, Bazil Taha Ahmed3, Osamah Ibrahim Khalaf4
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1877-1899, 2022, DOI:10.32604/cmc.2022.023796
    (This article belongs to this Special Issue: Application of Big Data Analytics in the Management of Business)
    Abstract This article shows the quality of services in a wireless swarm of drones that form an ad hoc network between them Fly Ad Hoc Networks (FANET). Each drone has the ability to send and receive information (like a router); and can behave as a hierarchical node whit the intregration of three protocols: Multiprotocol Label Switch (MPLS), Fast Hierarchical AD Hoc Mobile (FHAM) and Internet Protocol version 6 (IPv6), in conclusion MPLS + FHAM + IPv6. The metrics analyzed in the FANET are: delay, jitter, throughput, lost and sent packets/received. Testing process was carried out with swarms composed of 10, 20,… More >

  • Open AccessOpen Access

    ARTICLE

    Comparative Study of Machine Learning Modeling for Unsteady Aerodynamics

    Mohammad Alkhedher*
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1901-1920, 2022, DOI:10.32604/cmc.2022.025334
    Abstract Modern fighters are designed to fly at high angle of attacks reaching 90 deg as part of their routine maneuvers. These maneuvers generate complex nonlinear and unsteady aerodynamic loading. In this study, different aerodynamic prediction tools are investigated to achieve a model which is highly accurate, less computational, and provides a stable prediction of associated unsteady aerodynamics that results from high angle of attack maneuvers. These prediction tools include Artificial Neural Networks (ANN) model, Adaptive Neuro Fuzzy Logic Inference System (ANFIS), Fourier model, and Polynomial Classifier Networks (PCN). The main aim of the prediction model is to estimate the pitch… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Deep Data Analytics Based Remote Sensing Scene Classification Model

    Ahmed Althobaiti1, Abdullah Alhumaidi Alotaibi2, Sayed Abdel-Khalek3, Suliman A. Alsuhibany4, Romany F. Mansour5,*
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1921-1938, 2022, DOI:10.32604/cmc.2022.025550
    Abstract Latest advancements in the integration of camera sensors paves a way for new Unmanned Aerial Vehicles (UAVs) applications such as analyzing geographical (spatial) variations of earth science in mitigating harmful environmental impacts and climate change. UAVs have achieved significant attention as a remote sensing environment, which captures high-resolution images from different scenes such as land, forest fire, flooding threats, road collision, landslides, and so on to enhance data analysis and decision making. Dynamic scene classification has attracted much attention in the examination of earth data captured by UAVs. This paper proposes a new multi-modal fusion based earth data classification (MMF-EDC)… More >

  • Open AccessOpen Access

    ARTICLE

    Modelling the ZR Relationship of Precipitation Nowcasting Based on Deep Learning

    Jianbing Ma1,*, Xianghao Cui1, Nan Jiang2
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1939-1949, 2022, DOI:10.32604/cmc.2022.025206
    Abstract Sudden precipitations may bring troubles or even huge harm to people's daily lives. Hence a timely and accurate precipitation nowcasting is expected to be an indispensable part of our modern life. Traditionally, the rainfall intensity estimation from weather radar is based on the relationship between radar reflectivity factor (Z) and rainfall rate (R), which is typically estimated by location-dependent experiential formula and arguably uncertain. Therefore, in this paper, we propose a deep learning-based method to model the ZR relation. To evaluate, we conducted our experiment with the Shenzhen precipitation dataset. We proposed a combined method of deep learning and the… More >

  • Open AccessOpen Access

    ARTICLE

    Modified Harris Hawks Optimization Based Test Case Prioritization for Software Testing

    Manar Ahmed Hamza1,*, Abdelzahir Abdelmaboud2, Souad Larabi-Marie-Sainte3, Haya Mesfer Alshahrani4, Mesfer Al Duhayyim5, Hamza Awad Ibrahim6, Mohammed Rizwanullah1, Ishfaq Yaseen1
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1951-1965, 2022, DOI:10.32604/cmc.2022.024692
    Abstract Generally, software testing is considered as a proficient technique to achieve improvement in quality and reliability of the software. But, the quality of test cases has a considerable influence on fault revealing capability of software testing activity. Test Case Prioritization (TCP) remains a challenging issue since prioritizing test cases is unsatisfactory in terms of Average Percentage of Faults Detected (APFD) and time spent upon execution results. TCP is mainly intended to design a collection of test cases that can accomplish early optimization using preferred characteristics. The studies conducted earlier focused on prioritizing the available test cases in accelerating fault detection… More >

  • Open AccessOpen Access

    ARTICLE

    Embedding Extraction for Arabic Text Using the AraBERT Model

    Amira Hamed Abo-Elghit1,*, Taher Hamza1, Aya Al-Zoghby2
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1967-1994, 2022, DOI:10.32604/cmc.2022.025353
    Abstract Nowadays, we can use the multi-task learning approach to train a machine-learning algorithm to learn multiple related tasks instead of training it to solve a single task. In this work, we propose an algorithm for estimating textual similarity scores and then use these scores in multiple tasks such as text ranking, essay grading, and question answering systems. We used several vectorization schemes to represent the Arabic texts in the SemEval2017-task3-subtask-D dataset. The used schemes include lexical-based similarity features, frequency-based features, and pre-trained model-based features. Also, we used contextual-based embedding models such as Arabic Bidirectional Encoder Representations from Transformers (AraBERT). We… More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced Particle Swarm Optimization for ITC2021 Sports Timetabling

    Mutasem K. Alsmadi1,*, Ghaith M. Jaradat2, Malek Alzaqebah3, Ibrahim ALmarashdeh1, Fahad A. Alghamdi1, Rami Mustafa A. Mohammad4, Nahier Aldhafferi4, Abdullah Alqahtani4
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1995-2014, 2022, DOI:10.32604/cmc.2022.025077
    (This article belongs to this Special Issue: Machine Learning Empowered Secure Computing for Intelligent Systems)
    Abstract Timetabling problem is among the most difficult operational tasks and is an important step in raising industrial productivity, capability, and capacity. Such tasks are usually tackled using metaheuristics techniques that provide an intelligent way of suggesting solutions or decision-making. Swarm intelligence techniques including Particle Swarm Optimization (PSO) have proved to be effective examples. Different recent experiments showed that the PSO algorithm is reliable for timetabling in many applications such as educational and personnel timetabling, machine scheduling, etc. However, having an optimal solution is extremely challenging but having a sub-optimal solution using heuristics or metaheuristics is guaranteed. This research paper seeks… More >

  • Open AccessOpen Access

    ARTICLE

    Detection of Behavioral Patterns Employing a Hybrid Approach of Computational Techniques

    Rohit Raja1, Chetan Swarup2, Abhishek Kumar3,*, Kamred Udham Singh4, Teekam Singh5, Dinesh Gupta6, Neeraj Varshney7, Swati Jain8
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2015-2031, 2022, DOI:10.32604/cmc.2022.022904
    (This article belongs to this Special Issue: Edge Computing and Machine Learning for Improving Healthcare Services)
    Abstract As far as the present state is concerned in detecting the behavioral pattern of humans (subject) using morphological image processing, a considerable portion of the study has been conducted utilizing frontal vision data of human faces. The present research work had used a side vision of human-face data to develop a theoretical framework via a hybrid analytical model approach. In this example, hybridization includes an artificial neural network (ANN) with a genetic algorithm (GA). We researched the geometrical properties extracted from side-vision human-face data. An additional study was conducted to determine the ideal number of geometrical characteristics to pick while… More >

  • Open AccessOpen Access

    ARTICLE

    IoT and Blockchain-Based Mask Surveillance System for COVID-19 Prevention Using Deep Learning

    Wahidur Rahman1, Naif Al Mudawi2,*, Abdulwahab Alazeb2, Muhammad Minoar Hossain1, Saima Siddique Tashfia1, Md. Tarequl Islam1, Shisir Mia1, Mohammad Motiur Rahman1
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2033-2053, 2022, DOI:10.32604/cmc.2022.025025
    (This article belongs to this Special Issue: Soft Computing and Machine Learning for Predictive Data Analytics)
    Abstract On the edge of the worldwide public health crisis, the COVID-19 disease has become a serious headache for its destructive nature on humanity worldwide. Wearing a facial mask can be an effective possible solution to mitigate the spreading of the virus and reduce the death rate. Thus, wearing a face mask in public places such as shopping malls, hotels, restaurants, homes, and offices needs to be enforced. This research work comes up with a solution of mask surveillance system utilizing the mechanism of modern computations like Deep Learning (DL), Internet of things (IoT), and Blockchain. The absence or displacement of… More >

  • Open AccessOpen Access

    ARTICLE

    Spherical Fuzzy WASPAS-based Entropy Objective Weighting for International Payment Method Selection

    Phi-Hung Nguyen1,2,*, Thanh-Tuan Dang3, Kim-Anh Nguyen1, Hong-Anh Pham1
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2055-2075, 2022, DOI:10.32604/cmc.2022.025532
    Abstract In international trade, exporters prefer to receive payments as quickly as possible, and importers want to make payments as late as possible. In this respect, the payment field, an essential condition for trade transactions, also represents the positions of exporters and importers conflict. In addition, there are many cases in which various variables must be considered rather than only one specific variable representatively affecting payment, particularly in the case of import-export Small and Medium-Sized Enterprises (SMEs) from emerging countries. A selection of proper payment methods can be categorized as a Multi-Criteria Decision-Making (MCDM) issue. Therefore, this study aims to propose… More >

  • Open AccessOpen Access

    ARTICLE

    Energy-Efficient Static Data Collector-based Scheme in Smart Cities

    Adel D. Rajab*
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2077-2092, 2022, DOI:10.32604/cmc.2022.025736
    Abstract In the Internet of Things (IoT)-based smart city applications, employing the Data Collectors (DC) as the data brokers between the nodes and Base Station (BS) can be a promising solution to enhance the energy efficiency of energy-constrained IoT sensor nodes. There are several schemes that utilize mobile DCs to collect the data packets from sensor nodes. However, moving DCs along the hundreds of thousands of sensors sparsely distributed across a smart city is considered a design challenge in such schemes. Another concern lies in how these mobile DCs are being powered. Therefore, to overcome these limitations, we exploit multiple energy-limited… More >

  • Open AccessOpen Access

    ARTICLE

    Regulation Relatedness Map Creation Method with Latent Semantic Analysis

    Mehmet Murat Huyut1,*, Batuhan Kocaoğlu2, Ünzile Meram3
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2093-2107, 2022, DOI:10.32604/cmc.2022.024190
    (This article belongs to this Special Issue: Application of Big Data Analytics in the Management of Business)
    Abstract Regulatory authorities create a lot of legislation that must be followed. These create complex compliance requirements and time-consuming processes to find regulatory non-compliance. While the regulations establish rules in the relevant areas, recommendations and best practices for compliance are not generally mentioned. Best practices are often used to find a solution to this problem. There are numerous governance, management, and security frameworks in Information Technology (IT) area to guide businesses to run their processes at a much more mature level. Best practice maps can used to map another best practice, and users can adapt themselves by the help of this… More >

  • Open AccessOpen Access

    ARTICLE

    Historical Arabic Images Classification and Retrieval Using Siamese Deep Learning Model

    Manal M. Khayyat1,2, Lamiaa A. Elrefaei2,3, Mashael M. Khayyat4,*
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2109-2125, 2022, DOI:10.32604/cmc.2022.024975
    Abstract Classifying the visual features in images to retrieve a specific image is a significant problem within the computer vision field especially when dealing with historical faded colored images. Thus, there were lots of efforts trying to automate the classification operation and retrieve similar images accurately. To reach this goal, we developed a VGG19 deep convolutional neural network to extract the visual features from the images automatically. Then, the distances among the extracted features vectors are measured and a similarity score is generated using a Siamese deep neural network. The Siamese model built and trained at first from scratch but, it… More >

  • Open AccessOpen Access

    ARTICLE

    An Energy-Efficient 12b 2.56 MS/s SAR ADC Using Successive Scaling of Reference Voltages

    Hojin Kang1, Syed Asmat Ali Shah2, HyungWon Kim1,*
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2127-2139, 2022, DOI:10.32604/cmc.2022.025798
    Abstract This paper presents an energy efficient architecture for successive approximation register (SAR) analog to digital converter (ADC). SAR ADCs with a capacitor array structure have been widely used because of its simple architecture and relatively high speed. However, conventional SAR ADCs consume relatively high energy due to the large number of capacitors used in the capacitor array and their sizes scaled up along with the number of bits. The proposed architecture reduces the energy consumption as well as the capacitor size by employing a new array architecture that scales down the reference voltages instead of scaling up the capacitor sizes.… More >

  • Open AccessOpen Access

    ARTICLE

    Energy Theft Identification Using Adaboost Ensembler in the Smart Grids

    Muhammad Irfan1,*, Nasir Ayub2, Faisal Althobiani3, Zain Ali4, Muhammad Idrees5, Saeed Ullah2, Saifur Rahman1, Abdullah Saeed Alwadie1, Saleh Mohammed Ghonaim3, Hesham Abdushkour3, Fahad Salem Alkahtani1, Samar Alqhtani6, Piotr Gas7
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2141-2158, 2022, DOI:10.32604/cmc.2022.025466
    (This article belongs to this Special Issue: Towards Big Data Analytics: Smart and Intelligent Techniques for Sustainable Smart Grid)
    Abstract One of the major concerns for the utilities in the Smart Grid (SG) is electricity theft. With the implementation of smart meters, the frequency of energy usage and data collection from smart homes has increased, which makes it possible for advanced data analysis that was not previously possible. For this purpose, we have taken historical data of energy thieves and normal users. To avoid imbalance observation, biased estimates, we applied the interpolation method. Furthermore, the data unbalancing issue is resolved in this paper by Nearmiss undersampling technique and makes the data suitable for further processing. By proposing an improved version… More >

Per Page:

Share Link