Home / Journals / CMC / Vol.72, No.2, 2022
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Optimized Generative Adversarial Networks for Adversarial Sample Generation

    Daniyal M. Alghazzawi1, Syed Hamid Hasan1,*, Surbhi Bhatia2
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3877-3897, 2022, DOI:10.32604/cmc.2022.024613
    Abstract Detecting the anomalous entity in real-time network traffic is a popular area of research in recent times. Very few researches have focused on creating malware that fools the intrusion detection system and this paper focuses on this topic. We are using Deep Convolutional Generative Adversarial Networks (DCGAN) to trick the malware classifier to believe it is a normal entity. In this work, a new dataset is created to fool the Artificial Intelligence (AI) based malware detectors, and it consists of different types of attacks such as Denial of Service (DoS), scan 11, scan 44, botnet, spam, User Datagram Portal (UDP)… More >

  • Open AccessOpen Access

    ARTICLE

    Early Rehabilitation After Craniosynostosis Surgery

    Dan Wang1, Lanzheng Bian2, Xiaoyan Hao3, Yiming Liu1,*, Jinyue Xia4, Jing Hu5
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3899-3912, 2022, DOI:10.32604/cmc.2022.026660
    Abstract Craniosynostosis is a common congenital craniofacial deformity caused by premature ossification and closure of one or more cranial sutures. Craniosynostosis will not only affect the normal development of the skull, but also may cause a variety of complications, damage the nervous system, and cause long-term effects on the development of physical and mental health. Therefore, it is particularly important to provide new ideas for clinical treatment by studying the rehabilitation methods of craniosynostosis, and to improve the cure rate. To this end, this paper studies the early rehabilitation methods after craniosynostosis surgery and designs a comprehensive early rehabilitation process and… More >

  • Open AccessOpen Access

    ARTICLE

    Automated Handwriting Recognition and Speech Synthesizer for Indigenous Language Processing

    Bassam A. Y. Alqaralleh1,*, Fahad Aldhaban1, Feras Mohammed A-Matarneh2, Esam A. AlQaralleh3
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3913-3927, 2022, DOI:10.32604/cmc.2022.026531
    Abstract In recent years, researchers in handwriting recognition analysis relating to indigenous languages have gained significant internet among research communities. The recent developments of artificial intelligence (AI), natural language processing (NLP), and computational linguistics (CL) find useful in the analysis of regional low resource languages. Automatic lexical task participation might be elaborated to various applications in the NLP. It is apparent from the availability of effective machine recognition models and open access handwritten databases. Arabic language is a commonly spoken Semitic language, and it is written with the cursive Arabic alphabet from right to left. Arabic handwritten Character Recognition (HCR) is… More >

  • Open AccessOpen Access

    ARTICLE

    Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

    Akram A. Almohammedi1,2,*, Vladimir Shepelev1, Sam Darshi3, Mohammed Balfaqih4, Fayad Ghawbar5
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3929-3943, 2022, DOI:10.32604/cmc.2022.026307
    Abstract The widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely transfer it through wireless networks.… More >

  • Open AccessOpen Access

    ARTICLE

    Cognitive Computing-Based Mammographic Image Classification on an Internet of Medical

    Romany F. Mansour1,*, Maha M. Althobaiti2
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3945-3959, 2022, DOI:10.32604/cmc.2022.026515
    Abstract Recently, the Internet of Medical Things (IoMT) has become a research hotspot due to its various applicability in medical field. However, the data analysis and management in IoMT remain challenging owing to the existence of a massive number of devices linked to the server environment, generating a massive quantity of healthcare data. In such cases, cognitive computing can be employed that uses many intelligent technologies–machine learning (ML), deep learning (DL), artificial intelligence (AI), natural language processing (NLP) and others–to comprehend data expansively. Furthermore, breast cancer (BC) has been found to be a major cause of mortality among ladies globally. Earlier… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Security Solution for Industrial Internet of Things Applications

    Alaa Omran Almagrabi*
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3961-3983, 2022, DOI:10.32604/cmc.2022.026513
    Abstract The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications. Due to continual needs for new functionality, such as foresight, the number of linked devices in the industrial environment increases. Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments. Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints. A resolver supports the… More >

  • Open AccessOpen Access

    ARTICLE

    Grasshopper KUWAHARA and Gradient Boosting Tree for Optimal Features Classifications

    Rabab Hamed M. Aly1,*, Aziza I. Hussein2, Kamel H. Rahouma3
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3985-3997, 2022, DOI:10.32604/cmc.2022.025862
    Abstract This paper aims to design an optimizer followed by a Kawahara filter for optimal classification and prediction of employees’ performance. The algorithm starts by processing data by a modified K-means technique as a hierarchical clustering method to quickly obtain the best features of employees to reach their best performance. The work of this paper consists of two parts. The first part is based on collecting data of employees to calculate and illustrate the performance of each employee. The second part is based on the classification and prediction techniques of the employee performance. This model is designed to help companies in… More >

  • Open AccessOpen Access

    ARTICLE

    Condition Monitoring and Maintenance Management with Grid-Connected Renewable Energy Systems

    Md. Mottahir Alam1,*, Ahteshamul Haque2, Mohammed Ali Khan3, Nebras M. Sobahi1, Ibrahim Mustafa Mehedi1,4, Asif Irshad Khan5
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3999-4017, 2022, DOI:10.32604/cmc.2022.026353
    Abstract The shift towards the renewable energy market for carbon-neutral power generation has encouraged different governments to come up with a plan of action. But with the endorsement of renewable energy for harsh environmental conditions like sand dust and snow, monitoring and maintenance are a few of the prime concerns. These problems were addressed widely in the literature, but most of the research has drawbacks due to long detection time, and high misclassification error. Hence to overcome these drawbacks, and to develop an accurate monitoring approach, this paper is motivated toward the understanding of primary failure concerning a grid-connected photovoltaic (PV)… More >

  • Open AccessOpen Access

    ARTICLE

    LAME: Layout-Aware Metadata Extraction Approach for Research Articles

    Jongyun Choi1, Hyesoo Kong2, Hwamook Yoon2, Heungseon Oh3, Yuchul Jung1,*
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4019-4037, 2022, DOI:10.32604/cmc.2022.025711
    Abstract The volume of academic literature, such as academic conference papers and journals, has increased rapidly worldwide, and research on metadata extraction is ongoing. However, high-performing metadata extraction is still challenging due to diverse layout formats according to journal publishers. To accommodate the diversity of the layouts of academic journals, we propose a novel LAyout-aware Metadata Extraction (LAME) framework equipped with the three characteristics (e.g., design of automatic layout analysis, construction of a large meta-data training set, and implementation of metadata extractor). In the framework, we designed an automatic layout analysis using PDFMiner. Based on the layout analysis, a large volume… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Aggregator Based Energy Aware RPL Routing for IoT Enabled Forest Environment

    S. Srividhya1, Suresh Sankaranarayanan2,*, Sergei A. Kozlov3, Joel J. P. C. Rodrigues3,4,5
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4039-4055, 2022, DOI:10.32604/cmc.2022.026306
    Abstract Forested areas are extremely vulnerable to disasters leading to environmental destruction. Forest Fire is one among them which requires immediate attention. There are lot of works done by authors where Wireless Sensors and IoT have been used for forest fire monitoring. So, towards monitoring the forest fire and managing the energy efficiently in IoT, Energy Efficient Routing Protocol for Low power lossy networks (E-RPL) was developed. There were challenges about the scalability of the network resulting in a large end-to-end delay and less packet delivery which led to the development of Aggregator-based Energy Efficient RPL with Data Compression (CAA-ERPL). Though… More >

  • Open AccessOpen Access

    ARTICLE

    Optimization Agricultural Supply Chain: A Case Study of Fertilizer Supplier Selection

    Nguyen Van Thanh1, Nguyen Thi Kim Lan2,*, Syed Tam Husain1, Nguyen Hoang Hai1, Nguyen Viet Tinh1
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4057-4068, 2022, DOI:10.32604/cmc.2022.026587
    Abstract The 21st century is associated with the Industrial Revolution 4.0 and the organic agriculture trend, making the utilization of high-quality fertilizers, abundant nutritional content, economical, and no affect to environment pollution. According to the new concept, clean agricultural production and organic agricultural products are not allowed to excessively use synthetic chemicals such as chemical fertilizers, and plant protection drugs, but priority is to use manure, organic fertilizers, and natural mineral fertilizers. Fertilizer must meet the balanced nutritional requirements of crops, maintain, and improve the fertility of the ground, protect the surrounding ecosystem, and leave harmful effects in agricultural products, products… More >

  • Open AccessOpen Access

    ARTICLE

    Policy-Based Group Signature Scheme from Lattice

    Yongli Tang1, Yuanhong Li1, Qing Ye1,*, Ying Li1, Xiaojun Wang2
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4069-4085, 2022, DOI:10.32604/cmc.2022.026820
    Abstract Although the existing group signature schemes from lattice have been optimized for efficiency, the signing abilities of each member in the group are relatively single. It may not be suitable for complex applications. Inspired by the pioneering work of Bellare and Fuchsbauer, we present a primitive called policy-based group signature. In policy-based group signatures, group members can on behalf of the group to sign documents that meet their own policies, and the generated signatures will not leak the identity and policies of the signer. Moreover, the group administrator is allowed to reveal the identity of signer when a controversy occurs.… More >

  • Open AccessOpen Access

    ARTICLE

    Resistance to Malicious Packet Droppers Through Enhanced AODV in a MANET

    Shirina Samreen*
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4087-4106, 2022, DOI:10.32604/cmc.2022.026141
    Abstract Packet dropping in a mobile ad hoc network can manifest itself as the data plane attacks as well as control plane attacks. The former deal with malicious nodes performing packet drop on the data packets following the route formation and the latter deal with those malicious nodes which either drop or manipulate the control packets to degrade the network performance. The idea of the proposed approach is that during the route establishment, each of the on-path nodes is provided with pre-computed hash values which have to be used to provide a unique acknowledgement value to the upstream neighbor which acts… More >

  • Open AccessOpen Access

    ARTICLE

    Two-Stage PLS-SEM and Fuzzy AHP Approach to Investigate Vietnamese SMEs’ Export Competitiveness

    Phi-Hung Nguyen1,2,*
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4107-4123, 2022, DOI:10.32604/cmc.2022.026286
    Abstract Vietnam is paying great to the seafood exporting sector, offering various significant production advantages, concluding that it is critical to understand the competitiveness of the target market and implement effective strategies. However, due to COVID 19, the value of Vietnamese pangasius exports resulted in low and unpredictable profits for pangasius farmers. It is obvious to recognize competitiveness as Multi-Criteria Decision Making (MCDM) problem in the uncertain business environment. Therefore, this study is the first to propose a two-staged Partial Least Squares-Structural Equation Modeling (PLS-SEM) and Fuzzy Analytic Hierarchy Process (FAHP) analysis to identify potential criteria and comprehensively investigate the competitiveness… More >

  • Open AccessOpen Access

    ARTICLE

    An Integrated Framework for Cloud Service Selection Based on BOM and TOPSIS

    Ahmed M. Mostafa*
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4125-4142, 2022, DOI:10.32604/cmc.2022.024676
    Abstract Many businesses have experienced difficulties in selecting a cloud service provider (CSP) due to the rapid advancement of cloud computing services and the proliferation of CSPs. Many independent criteria should be considered when evaluating the services provided by different CSPs. It is a case of multi-criteria decision-making (MCDM). This paper presents an integrated MCDM cloud service selection framework for determining the most appropriate service provider based on the best only method (BOM) and technique for order of preference by similarity to ideal solution (TOPSIS). To obtain the weights of criteria and the relative importance of CSPs based on each criterion,… More >

  • Open AccessOpen Access

    ARTICLE

    Spider Monkey Optimization with Statistical Analysis for Robust Rainfall Prediction

    Mahmoud Ragab1,2,3,*
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4143-4155, 2022, DOI:10.32604/cmc.2022.027075
    Abstract Rainfall prediction becomes popular in real time environment due to the developments of recent technologies. Accurate and fast rainfall predictive models can be designed by the use of machine learning (ML), statistical models, etc. Besides, feature selection approaches can be derived for eliminating the curse of dimensionality problems. In this aspect, this paper presents a novel chaotic spider money optimization with optimal kernel ridge regression (CSMO-OKRR) model for accurate rainfall prediction. The goal of the CSMO-OKRR technique is to properly predict the rainfall using the weather data. The proposed CSMO-OKRR technique encompasses three major processes namely feature selection, prediction, and… More >

  • Open AccessOpen Access

    ARTICLE

    Underwater Terrain Image Stitching Based on Spatial Gradient Feature Block

    Zhenzhou Wang1, Jiashuo Li1, Xiang Wang1,*, Xuanhao Niu2
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4157-4171, 2022, DOI:10.32604/cmc.2022.027017
    Abstract At present, underwater terrain images are all strip-shaped small fragment images preprocessed by the side-scan sonar imaging system. However, the processed underwater terrain images have inconspicuous and few feature points. In order to better realize the stitching of underwater terrain images and solve the problems of slow traditional image stitching speed, we proposed an improved algorithm for underwater terrain image stitching based on spatial gradient feature block. First, the spatial gradient fuzzy C-Means algorithm is used to divide the underwater terrain image into feature blocks with the fusion of spatial gradient information. The accelerated-KAZE (A-KAZE) algorithm is used to combine… More >

  • Open AccessOpen Access

    ARTICLE

    Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security

    Ala’ A. Eshmawi1, Suliman A. Alsuhibany2, Sayed Abdel-Khalek3, Romany F. Mansour4,*
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4173-4184, 2022, DOI:10.32604/cmc.2022.028008
    Abstract Digital image security is a fundamental and tedious process on shared communication channels. Several methods have been employed for accomplishing security on digital image transmission, such as encryption, steganography, and watermarking. Image stenography and encryption are commonly used models to achieve improved security. Besides, optimal pixel selection process (OPSP) acts as a vital role in the encryption process. With this motivation, this study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security, named CSOES-DIS technique. The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process. In addition, the CSOES-DIS… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Logic with Archimedes Optimization Based Biomedical Data Classification Model

    Mahmoud Ragab1,2,3,*, Diaa Hamed4,5
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4185-4200, 2022, DOI:10.32604/cmc.2022.027074
    Abstract Medical data classification becomes a hot research topic in the healthcare sector to aid physicians in the healthcare sector for decision making. Besides, the advances of machine learning (ML) techniques assist to perform the effective classification task. With this motivation, this paper presents a Fuzzy Clustering Approach Based on Breadth-first Search Algorithm (FCA-BFS) with optimal support vector machine (OSVM) model, named FCABFS-OSVM for medical data classification. The proposed FCABFS-OSVM technique intends to classify the healthcare data by the use of clustering and classification models. Besides, the proposed FCABFS-OSVM technique involves the design of FCABFS technique to cluster the medical data… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Framework for Precipitation Prediction Using Cloud Images

    Mirza Adnan Baig*, Ghulam Ali Mallah, Noor Ahmed Shaikh
    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4201-4213, 2022, DOI:10.32604/cmc.2022.026225
    Abstract Precipitation prediction (PP) have become one of the significant research areas of deep learning (DL) and machine vision (MV) techniques are frequently used to predict the weather variables (WV). Since the climate change has left significant impact upon weather variables (WV) and continuously changes are observed in temperature, humidity, cloud patterns and other factors. Although cloud images contain sufficient information to predict the precipitation pattern but due to changes in climate, the complex cloud patterns and rapid shape changing behavior of clouds are difficult to consider for rainfall prediction. Prediction of rainfall would provide more meticulous assistance to the farmers… More >

Per Page:

Share Link