Home / Journals / CMC / Vol.74, No.2, 2023
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

    Doaa Sami Khafaga1, Faten Khalid Karim1,*, Abdelaziz A. Abdelhamid2,3, El-Sayed M. El-kenawy4, Hend K. Alkahtani1, Nima Khodadadi5, Mohammed Hadwan6, Abdelhameed Ibrahim7
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3183-3198, 2023, DOI:10.32604/cmc.2023.033513
    Abstract Managing physical objects in the network’s periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems’ effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper throated optimizer (DTO) to improve… More >

  • Open AccessOpen Access

    ARTICLE

    Time Series Forecasting Fusion Network Model Based on Prophet and Improved LSTM

    Weifeng Liu1,2, Xin Yu1,*, Qinyang Zhao3, Guang Cheng2, Xiaobing Hou1, Shengqi He4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3199-3219, 2023, DOI:10.32604/cmc.2023.032595
    Abstract Time series forecasting and analysis are widely used in many fields and application scenarios. Time series historical data reflects the change pattern and trend, which can serve the application and decision in each application scenario to a certain extent. In this paper, we select the time series prediction problem in the atmospheric environment scenario to start the application research. In terms of data support, we obtain the data of nearly 3500 vehicles in some cities in China from Runwoda Research Institute, focusing on the major pollutant emission data of non-road mobile machinery and high emission vehicles in Beijing and Bozhou,… More >

  • Open AccessOpen Access

    ARTICLE

    (α, γ)-Anti-Multi-Fuzzy Subgroups and Some of Its Properties

    Memet Şahin1, Vakkas Uluçay2, S. A. Edalatpanah3,*, Fayza Abdel Aziz Elsebaee4, Hamiden Abd El-Wahed Khalifa5
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3221-3229, 2023, DOI:10.32604/cmc.2023.033006
    Abstract Recently, fuzzy multi-sets have come to the forefront of scientists’ interest and have been used in algebraic structures such as multi-groups, multi-rings, anti-fuzzy multigroup and (α, γ)-anti-fuzzy subgroups. In this paper, we first summarize the knowledge about the algebraic structure of fuzzy multi-sets such as (α, γ)-anti-multi-fuzzy subgroups. In a way, the notion of anti-fuzzy multigroup is an application of anti-fuzzy multi sets to the theory of group. The concept of anti-fuzzy multigroup is a complement of an algebraic structure of a fuzzy multi set that generalizes both the theories of classical group and fuzzy group. The aim of this… More >

  • Open AccessOpen Access

    ARTICLE

    A Grey Simulation-Based Fuzzy Hierarchical Approach for Diagnosing Healthcare Service Quality

    Phi-Hung Nguyen*, Hong-Anh Pham
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3231-3248, 2023, DOI:10.32604/cmc.2023.031428
    Abstract This study aims to assess and rank the service quality of the healthcare system utilizing a Fuzzy Analytical Hierarchical Process (Fuzzy AHP) and Grey Relational Analysis (Fuzzy GRA) technique. In this study, the six primary characteristics of healthcare service quality, comprising Tangibles (A), Healthcare Staff (B), Responsiveness (C), Relationships (D), Support Service (E), and Accessibility (F), are examined through a case study of 20 private and public hospitals in Hanoi, Vietnam. The weighting results of Fuzzy AHP technique indicated that Responsiveness (C) has the highest ranking, followed by Relationships (D) and Healthcare Staff (B). Meanwhile, Tangibility has finally comprised the… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Resource Allocation for NOMA Wireless Networks

    Fahad R. Albogamy1, M. A. Aiyashi2, Fazirul Hisyam Hashim3, Imran Khan4, Bong Jun Choi5,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3249-3261, 2023, DOI:10.32604/cmc.2023.031673
    Abstract The non-orthogonal multiple access (NOMA) method is a novel multiple access technique that aims to increase spectral efficiency (SE) and accommodate enormous user accesses. Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information, and multi-user detection algorithms, such as successive interference cancellation (SIC), are performed at the receiving end to demodulate the necessary user signals. Although its basic signal waveform, like LTE baseline, could be based on orthogonal frequency division multiple access (OFDMA) or discrete Fourier transform (DFT)-spread OFDM, NOMA superimposes numerous users in the power domain. In contrast… More >

  • Open AccessOpen Access

    ARTICLE

    Automated File Labeling for Heterogeneous Files Organization Using Machine Learning

    Sagheer Abbas1, Syed Ali Raza1,2, M. A. Khan3, Muhammad Adnan Khan4,*, Atta-ur-Rahman5, Kiran Sultan6, Amir Mosavi7,8,9
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3263-3278, 2023, DOI:10.32604/cmc.2023.032864
    Abstract File labeling techniques have a long history in analyzing the anthological trends in computational linguistics. The situation becomes worse in the case of files downloaded into systems from the Internet. Currently, most users either have to change file names manually or leave a meaningless name of the files, which increases the time to search required files and results in redundancy and duplications of user files. Currently, no significant work is done on automated file labeling during the organization of heterogeneous user files. A few attempts have been made in topic modeling. However, one major drawback of current topic modeling approaches… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Deep Transfer Learning Based Colorectal Cancer Detection and Classification Model

    Mahmoud Ragab1,2,3,*, Maged Mostafa Mahmoud4,5,6, Amer H. Asseri2,7, Hani Choudhry2,7, Haitham A. Yacoub8
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3279-3295, 2023, DOI:10.32604/cmc.2023.031037
    Abstract Colorectal carcinoma (CRC) is one such dispersed cancer globally and also prominent one in causing cancer-based death. Conventionally, pathologists execute CRC diagnosis through visible scrutinizing under the microscope the resected tissue samples, stained and fixed through Haematoxylin and Eosin (H&E). The advancement of graphical processing systems has resulted in high potentiality for deep learning (DL) techniques in interpretating visual anatomy from high resolution medical images. This study develops a slime mould algorithm with deep transfer learning enabled colorectal cancer detection and classification (SMADTL-CCDC) algorithm. The presented SMADTL-CCDC technique intends to appropriately recognize the occurrence of colorectal cancer. To accomplish this,… More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment

    Pooja Dhiman1, Santosh Kumar Henge1, Sartaj Singh1, Avinash Kaur2, Parminder Singh2,3, Mustapha Hadabou3,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3297-3313, 2023, DOI:10.32604/cmc.2023.030558
    Abstract This research paper puts emphasis on using cloud computing with Blockchain (BC) to improve the security and privacy in a cloud. The security of data is not guaranteed as there is always a risk of leakage of users’ data. Blockchain can be used in a multi-tenant cloud environment (MTCE) to improve the security of data, as it is a decentralized approach. Data is saved in unaltered form. Also, Blockchain is not owned by a single organization. The encryption process can be done using a Homomorphic encryption (HE) algorithm along with hashing technique, hereby allowing computations on encrypted data without the… More >

  • Open AccessOpen Access

    ARTICLE

    An Intelligent Hazardous Waste Detection and Classification Model Using Ensemble Learning Techniques

    Mesfer Al Duhayyim1,*, Saud S. Alotaibi2, Shaha Al-Otaibi3, Fahd N. Al-Wesabi4, Mahmoud Othman5, Ishfaq Yaseen6, Mohammed Rizwanullah6, Abdelwahed Motwakel6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3315-3332, 2023, DOI:10.32604/cmc.2023.033250
    Abstract Proper waste management models using recent technologies like computer vision, machine learning (ML), and deep learning (DL) are needed to effectively handle the massive quantity of increasing waste. Therefore, waste classification becomes a crucial topic which helps to categorize waste into hazardous or non-hazardous ones and thereby assist in the decision making of the waste management process. This study concentrates on the design of hazardous waste detection and classification using ensemble learning (HWDC-EL) technique to reduce toxicity and improve human health. The goal of the HWDC-EL technique is to detect the multiple classes of wastes, particularly hazardous and non-hazardous wastes.… More >

  • Open AccessOpen Access

    ARTICLE

    Residual Attention Deep SVDD for COVID-19 Diagnosis Using CT Scans

    Akram Ali Alhadad1,2,*, Omar Tarawneh3, Reham R. Mostafa1, Hazem M. El-Bakry1
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3333-3350, 2023, DOI:10.32604/cmc.2023.033413
    Abstract COVID-19 is the common name of the disease caused by the novel coronavirus (2019-nCoV) that appeared in Wuhan, China in 2019. Discovering the infected people is the most important factor in the fight against the disease. The gold-standard test to diagnose COVID-19 is polymerase chain reaction (PCR), but it takes 5–6 h and, in the early stages of infection, may produce false-negative results. Examining Computed Tomography (CT) images to diagnose patients infected with COVID-19 has become an urgent necessity. In this study, we propose a residual attention deep support vector data description SVDD (RADSVDD) approach to diagnose COVID-19. It is… More >

  • Open AccessOpen Access

    ARTICLE

    FPGA Implementation of Extended Kalman Filter for Parameters Estimation of Railway Wheelset

    Khakoo Mal1,2,*, Tayab Din Memon1,3, Imtiaz Hussain Kalwar4, Bhawani Shankar Chowdhry5
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3351-3370, 2023, DOI:10.32604/cmc.2023.032940
    Abstract It is necessary to know the status of adhesion conditions between wheel and rail for efficient accelerating and decelerating of railroad vehicle. The proper estimation of adhesion conditions and their real-time implementation is considered a challenge for scholars. In this paper, the development of simulation model of extended Kalman filter (EKF) in MATLAB/Simulink is presented to estimate various railway wheelset parameters in different contact conditions of track. Due to concurrent in nature, the Xilinx® System-on-Chip Zynq Field Programmable Gate Array (FPGA) device is chosen to check the onboard estimation of wheel-rail interaction parameters by using the National Instruments (NI) myRIO®More >

  • Open AccessOpen Access

    ARTICLE

    Pixel-Level Feature Extraction Model for Breast Cancer Detection

    Nishant Behar*, Manish Shrivastava
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3371-3389, 2023, DOI:10.32604/cmc.2023.031949
    Abstract Breast cancer is the most prevalent cancer among women, and diagnosing it early is vital for successful treatment. The examination of images captured during biopsies plays an important role in determining whether a patient has cancer or not. However, the stochastic patterns, varying intensities of colors, and the large sizes of these images make it challenging to identify and mark malignant regions in them. Against this backdrop, this study proposes an approach to the pixel categorization based on the genetic algorithm (GA) and principal component analysis (PCA). The spatial features of the images were extracted using various filters, and the… More >

  • Open AccessOpen Access

    ARTICLE

    Double Update Intelligent Strategy for Permanent Magnet Synchronous Motor Parameter Identification

    Shuai Zhou1, Dazhi Wang1,*, Mingtian Du2, Ye Li1, Shuo Cao3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3391-3404, 2023, DOI:10.32604/cmc.2023.033397
    Abstract The parameters of permanent magnet synchronous motor (PMSM) affect the performance of vector control servo system. Because of the complexity of nonlinear model of PMSM, it is very difficult to identify the parameters of PMSM. Aiming at the problems of large amount of data calculation, low identification accuracy and poor robustness in the process of multi parameter identification of permanent magnet synchronous motor, this paper proposes a weighted differential evolutionary particle swarm optimization algorithm based on double update strategy. By introducing adaptive judgment factor to control the proportion of weighted difference evolution (WDE) algorithm and particle swarm optimization (PSO) algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    DSAFF-Net: A Backbone Network Based on Mask R-CNN for Small Object Detection

    Jian Peng1,2, Yifang Zhao1,2, Dengyong Zhang1,2,*, Feng Li1,2, Arun Kumar Sangaiah3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3405-3419, 2023, DOI:10.32604/cmc.2023.027627
    Abstract Recently, object detection based on convolutional neural networks (CNNs) has developed rapidly. The backbone networks for basic feature extraction are an important component of the whole detection task. Therefore, we present a new feature extraction strategy in this paper, which name is DSAFF-Net. In this strategy, we design: 1) a sandwich attention feature fusion module (SAFF module). Its purpose is to enhance the semantic information of shallow features and resolution of deep features, which is beneficial to small object detection after feature fusion. 2) to add a new stage called D-block to alleviate the disadvantages of decreasing spatial resolution when… More >

  • Open AccessOpen Access

    ARTICLE

    An Artificial Approach for the Fractional Order Rape and Its Control Model

    Wajaree Weera1, Zulqurnain Sabir2, Muhammad Asif Zahoor Raja3, Salem Ben Said4, Maria Emilia Camargo5, Chantapish Zamart1, Thongchai Botmart1,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3421-3438, 2023, DOI:10.32604/cmc.2023.030996
    Abstract The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its control model using the strength of artificial neural networks (ANNs) along with the Levenberg-Marquardt backpropagation approach (LMBA), i.e., artificial neural networks-Levenberg-Marquardt backpropagation approach (ANNs-LMBA). The fractional order investigations have been presented to find more realistic results of the mathematical form of the rape and its control model. The differential mathematical form of the nonlinear fractional order mathematical rape and its control model has six classes: susceptible native girls, infected immature girls, susceptible knowledgeable girls, infected knowledgeable girls, susceptible rapist population and infective rapist population. The… More >

  • Open AccessOpen Access

    ARTICLE

    Few-Shot Object Detection Based on the Transformer and High-Resolution Network

    Dengyong Zhang1,2, Huaijian Pu1,2, Feng Li1,2,*, Xiangling Ding3, Victor S. Sheng4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3439-3454, 2023, DOI:10.32604/cmc.2023.027267
    Abstract Now object detection based on deep learning tries different strategies. It uses fewer data training networks to achieve the effect of large dataset training. However, the existing methods usually do not achieve the balance between network parameters and training data. It makes the information provided by a small amount of picture data insufficient to optimize model parameters, resulting in unsatisfactory detection results. To improve the accuracy of few shot object detection, this paper proposes a network based on the transformer and high-resolution feature extraction (THR). High-resolution feature extraction maintains the resolution representation of the image. Channels and spatial attention are… More >

  • Open AccessOpen Access

    ARTICLE

    Stochastic Computational Heuristic for the Fractional Biological Model Based on Leptospirosis

    Zulqurnain Sabir1, Sánchez-Chero Manuel2, Muhammad Asif Zahoor Raja3, Gilder-Cieza–Altamirano4, María-Verónica Seminario-Morales2, Fernández Vásquez José Arquímedes5, Purihuamán Leonardo Celso Nazario6, Thongchai Botmart7,*, Wajaree Weera7
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3455-3470, 2023, DOI:10.32604/cmc.2023.033352
    Abstract The purpose of these investigations is to find the numerical outcomes of the fractional kind of biological system based on Leptospirosis by exploiting the strength of artificial neural networks aided by scale conjugate gradient, called ANNs-SCG. The fractional derivatives have been applied to get more reliable performances of the system. The mathematical form of the biological Leptospirosis system is divided into five categories, and the numerical performances of each model class will be provided by using the ANNs-SCG. The exactness of the ANNs-SCG is performed using the comparison of the reference and obtained results. The reference solutions have been obtained… More >

  • Open AccessOpen Access

    ARTICLE

    An End-to-End Transformer-Based Automatic Speech Recognition for Qur’an Reciters

    Mohammed Hadwan1,2,*, Hamzah A. Alsayadi3,4, Salah AL-Hagree5
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3471-3487, 2023, DOI:10.32604/cmc.2023.033457
    Abstract The attention-based encoder-decoder technique, known as the trans-former, is used to enhance the performance of end-to-end automatic speech recognition (ASR). This research focuses on applying ASR end-to-end transformer-based models for the Arabic language, as the researchers’ community pays little attention to it. The Muslims Holy Qur’an book is written using Arabic diacritized text. In this paper, an end-to-end transformer model to building a robust Qur’an vs. recognition is proposed. The acoustic model was built using the transformer-based model as deep learning by the PyTorch framework. A multi-head attention mechanism is utilized to represent the encoder and decoder in the acoustic… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Framework of Segmentation 3D MRI of Brain Tumors

    Ibrahim Mahmoud El-Henawy1, Mostafa Elbaz2, Zainab H. Ali3,*, Noha Sakr4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3489-3502, 2023, DOI:10.32604/cmc.2023.033356
    Abstract Medical image segmentation is a crucial process for computer-aided diagnosis and surgery. Medical image segmentation refers to portioning the images into small, disjointed parts for simplifying the processes of analysis and examination. Rician and speckle noise are different types of noise in magnetic resonance imaging (MRI) that affect the accuracy of the segmentation process negatively. Therefore, image enhancement has a significant role in MRI segmentation. This paper proposes a novel framework that uses 3D MRI images from Kaggle and applies different diverse models to remove Rician and speckle noise using the best possible noise-free image. The proposed techniques consider the… More >

  • Open AccessOpen Access

    ARTICLE

    A Big Data Based Dynamic Weight Approach for RFM Segmentation

    Lin Lang1, Shuang Zhou1, Minjuan Zhong1,*, Guang Sun1, Bin Pan1, Peng Guo1,2
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3503-3513, 2023, DOI:10.32604/cmc.2023.023596
    Abstract Using the RFM (Recency, Frequency, Monetary value) model can provide valuable insights about customer clusters which is the core of customer relationship management. Due to accurate customer segment coming from dynamic weighted applications, in-depth targeted marketing may also use type of dynamic weight of R, F and M as factors. In this paper, we present our dynamic weighted RFM approach which is intended to improve the performance of customer segmentation by using the factors and variations to attain dynamic weights. Our dynamic weight approach is a kind of Custom method in essential which roots in the understanding of the data… More >

  • Open AccessOpen Access

    ARTICLE

    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

    Iman Almomani1,2, Walid El-Shafai1,3,*, Aala AlKhayer1, Albandari Alsumayt4, Sumayh S. Aljameel5, Khalid Alissa6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3515-3537, 2023, DOI:10.32604/cmc.2023.033765
    Abstract Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users’ biometrics is still a hot research area to be investigated. This work presents a powerful biometric security system (BSS) to protect different biometric modalities such as faces, iris, and fingerprints. The proposed BSS model is based on hybridizing auto-encoder (AE) network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy. The employed… More >

  • Open AccessOpen Access

    ARTICLE

    Vehicle Plate Number Localization Using Memetic Algorithms and Convolutional Neural Networks

    Gibrael Abosamra*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3539-3560, 2023, DOI:10.32604/cmc.2023.032976
    Abstract This paper introduces the third enhanced version of a genetic algorithm-based technique to allow fast and accurate detection of vehicle plate numbers (VPLN) in challenging image datasets. Since binarization of the input image is the most important and difficult step in the detection of VPLN, a hybrid technique is introduced that fuses the outputs of three fast techniques into a pool of connected components objects (CCO) and hence enriches the solution space with more solution candidates. Due to the combination of the outputs of the three binarization techniques, many CCOs are produced into the output pool from which one or… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Vehicle Detection Based on Improved You Look Only Once

    Sunil Kumar1, Manisha Jailia1, Sudeep Varshney2, Nitish Pathak3, Shabana Urooj4,*, Nouf Abd Elmunim4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3561-3577, 2023, DOI:10.32604/cmc.2023.029999
    Abstract Vehicle detection is still challenging for intelligent transportation systems (ITS) to achieve satisfactory performance. The existing methods based on one stage and two-stage have intrinsic weakness in obtaining high vehicle detection performance. Due to advancements in detection technology, deep learning-based methods for vehicle detection have become more popular because of their higher detection accuracy and speed than the existing algorithms. This paper presents a robust vehicle detection technique based on Improved You Look Only Once (RVD-YOLOv5) to enhance vehicle detection accuracy. The proposed method works in three phases; in the first phase, the K-means algorithm performs data clustering on datasets… More >

  • Open AccessOpen Access

    ARTICLE

    Data De-identification Framework

    Junhyoung Oh1, Kyungho Lee2,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3579-3606, 2023, DOI:10.32604/cmc.2023.031491
    Abstract As technology develops, the amount of information being used has increased a lot. Every company learns big data to provide customized services with its customers. Accordingly, collecting and analyzing data of the data subject has become one of the core competencies of the companies. However, when collecting and using it, the authority of the data subject may be violated. The data often identifies its subject by itself, and even if it is not a personal information that infringes on an individual’s authority, the moment it is connected, it becomes important and sensitive personal information that we have never thought of.… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Optical Attocells Positioning of Indoor Visible Light Communication System

    Mohammed S. M. Gismalla1,2,3, Asrul I. Azmi1,2, Mohd R. Salim1,2, Farabi Iqbal1,2, Mohammad F. L. Abdullah4, Mosab Hamdan5,6, Muzaffar Hamzah5,*, Abu Sahmah M. Supa’at1,2
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3607-3625, 2023, DOI:10.32604/cmc.2023.031192
    Abstract Visible light communication (VLC), which is a prominent emerging solution that complements the radio frequency (RF) technology, exhibits the potential to meet the demands of fifth-generation (5G) and beyond technologies. The random movement of mobile terminals in the indoor environment is a challenge in the VLC system. The model of optical attocells has a critical role in the uniform distribution and the quality of communication links in terms of received power and signal-to-noise ratio (SNR). As such, the optical attocells positions were optimized in this study with a developed try and error (TE) algorithm. The optimized optical attocells were examined… More >

  • Open AccessOpen Access

    ARTICLE

    Fusion Strategy for Improving Medical Image Segmentation

    Fahad Alraddady1, E. A. Zanaty2, Aida H. Abu bakr3, Walaa M. Abd-Elhafiez4,5,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3627-3646, 2023, DOI:10.32604/cmc.2023.027606
    Abstract In this paper, we combine decision fusion methods with four meta-heuristic algorithms (Particle Swarm Optimization (PSO) algorithm, Cuckoo search algorithm, modification of Cuckoo Search (CS McCulloch) algorithm and Genetic algorithm) in order to improve the image segmentation. The proposed technique based on fusing the data from Particle Swarm Optimization (PSO), Cuckoo search, modification of Cuckoo Search (CS McCulloch) and Genetic algorithms are obtained for improving magnetic resonance images (MRIs) segmentation. Four algorithms are used to compute the accuracy of each method while the outputs are passed to fusion methods. In order to obtain parts of the points that determine similar… More >

  • Open AccessOpen Access

    ARTICLE

    Vehicle Detection in Challenging Scenes Using CenterNet Based Approach

    Ayesha1, Muhammad Javed Iqbal1, Iftikhar Ahmad2,*, Madini O. Alassafi2, Ahmed S. Alfakeeh2, Ahmed Alhomoud3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3647-3661, 2023, DOI:10.32604/cmc.2023.020916
    Abstract Contemporarily numerous analysts labored in the field of Vehicle detection which improves Intelligent Transport System (ITS) and reduces road accidents. The major obstacles in automatic detection of tiny vehicles are due to occlusion, environmental conditions, illumination, view angles and variation in size of objects. This research centers on tiny and partially occluded vehicle detection and identification in challenging scene specifically in crowed area. In this paper we present comprehensive methodology of tiny vehicle detection using Deep Neural Networks (DNN) namely CenterNet. Substantially DNN disregards objects that are small in size 5 pixels and more false positives likely to happen in… More >

  • Open AccessOpen Access

    ARTICLE

    Regulatory Genes Through Robust-SNR for Binary Classification Within Functional Genomics Experiments

    Muhammad Hamraz1, Dost Muhammad Khan1, Naz Gul1, Amjad Ali1, Zardad Khan1, Shafiq Ahmad2, Mejdal Alqahtani2, Akber Abid Gardezi3, Muhammad Shafiq4,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3663-3677, 2023, DOI:10.32604/cmc.2023.030064
    Abstract The current study proposes a novel technique for feature selection by inculcating robustness in the conventional Signal to noise Ratio (SNR). The proposed method utilizes the robust measures of location i.e., the “Median” as well as the measures of variation i.e., “Median absolute deviation (MAD) and Interquartile range (IQR)” in the SNR. By this way, two independent robust signal-to-noise ratios have been proposed. The proposed method selects the most informative genes/features by combining the minimum subset of genes or features obtained via the greedy search approach with top-ranked genes selected through the robust signal-to-noise ratio (RSNR). The results obtained via… More >

  • Open AccessOpen Access

    ARTICLE

    Ontological Model for Cohesive Smart Health Services Management

    Muhammad Raza Naqvi1, Muhammad Waseem Iqbal2,*, Syed Khuram Shahzad3, M. Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3679-3695, 2023, DOI:10.32604/cmc.2023.030340
    Abstract Health care has become an essential social-economic concern for all stakeholders (e.g., patients, doctors, hospitals etc.), health needs, private care and the elderly class of society. The massive increase in the usage of health care Internet of things (IoT) applications has great technological evolvement in human life. There are various smart health care services like remote patient monitoring, diagnostic, disease-specific remote treatments and telemedicine. These applications are available in a split fashion and provide solutions for variant diseases, medical resources and remote service management. The main objective of this research is to provide a management platform where all these services… More >

  • Open AccessOpen Access

    ARTICLE

    A Dual Attention Encoder-Decoder Text Summarization Model

    Nada Ali Hakami1, Hanan Ahmed Hosni Mahmoud2,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3697-3710, 2023, DOI:10.32604/cmc.2023.031525
    Abstract A worthy text summarization should represent the fundamental content of the document. Recent studies on computerized text summarization tried to present solutions to this challenging problem. Attention models are employed extensively in text summarization process. Classical attention techniques are utilized to acquire the context data in the decoding phase. Nevertheless, without real and efficient feature extraction, the produced summary may diverge from the core topic. In this article, we present an encoder-decoder attention system employing dual attention mechanism. In the dual attention mechanism, the attention algorithm gathers main data from the encoder side. In the dual attention model, the system… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN

    Sugandhi Midha1, Sahil Verma1,*, Kavita1, Mohit Mittal2, Nz Jhanjhi3,4, Mehedi Masud5, Mohammed A. AlZain6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3711-3726, 2023, DOI:10.32604/cmc.2023.027992
    Abstract Cloud-based SDN (Software Defined Network) integration offers new kinds of agility, flexibility, automation, and speed in the network. Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement. The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services. It has improved the real-time monitoring of patients by medical practitioners. Patients’ data get stored at the central server on the cloud from where it is available to medical practitioners in no time. The centralisation of data on the server makes it more vulnerable… More >

  • Open AccessOpen Access

    ARTICLE

    Early-Stage Cervical Cancerous Cell Detection from Cervix Images Using YOLOv5

    Md Zahid Hasan Ontor1, Md Mamun Ali1, Kawsar Ahmed2,3,*, Francis M. Bui3, Fahad Ahmed Al-Zahrani4, S. M. Hasan Mahmud5, Sami Azam6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3727-3741, 2023, DOI:10.32604/cmc.2023.032794
    Abstract Cervical Cancer (CC) is a rapidly growing disease among women throughout the world, especially in developed and developing countries. For this many women have died. Fortunately, it is curable if it can be diagnosed and detected at an early stage and taken proper treatment. But the high cost, awareness, highly equipped diagnosis environment, and availability of screening tests is a major barrier to participating in screening or clinical test diagnoses to detect CC at an early stage. To solve this issue, the study focuses on building a deep learning-based automated system to diagnose CC in the early stage using cervix… More >

  • Open AccessOpen Access

    ARTICLE

    Detection of Omicron Caused Pneumonia from Radiology Images Using Convolution Neural Network (CNN)

    Arfat Ahmad Khan1, Malik Muhammad Ali Shahid2, Rab Nawaz Bashir2, Salman Iqbal2, Arshad Shehzad Ahmad Shahid3, Javeria Maqbool4, Chitapong Wechtaisong5,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3743-3761, 2023, DOI:10.32604/cmc.2023.033924
    Abstract COVID-19 disease caused by the SARS-CoV-2 virus has created social and economic disruption across the world. The ability of the COVID-19 virus to quickly mutate and transfer has created serious concerns across the world. It is essential to detect COVID-19 infection caused by different variants to take preventive measures accordingly. The existing method of detection of infections caused by COVID-19 and its variants is costly and time-consuming. The impacts of the COVID-19 pandemic in developing countries are very drastic due to the unavailability of medical facilities and infrastructure to handle the pandemic. Pneumonia is the major symptom of COVID-19 infection.… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Symbiotic Organism Search with Deep Learning for Industrial Fault Diagnosis

    Mrim M. Alnfiai*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3763-3780, 2023, DOI:10.32604/cmc.2023.033448
    Abstract Developments in data storage and sensor technologies have allowed the cumulation of a large volume of data from industrial systems. Both structural and non-structural data of industrial systems are collected, which covers data formats of time-series, text, images, sound, etc. Several researchers discussed above were mostly qualitative, and ceratin techniques need expert guidance to conclude on the condition of gearboxes. But, in this study, an improved symbiotic organism search with deep learning enabled fault diagnosis (ISOSDL-FD) model for gearbox fault detection in industrial systems. The proposed ISOSDL-FD technique majorly concentrates on the identification and classification of faults in the gearbox… More >

  • Open AccessOpen Access

    ARTICLE

    Adapted Speed System in a Road Bend Situation in VANET Environment

    Said Benkirane1, Azidine Guezzaz1, Mourade Azrour1, Akber Abid Gardezi2, Shafiq Ahmad3, Abdelaty Edrees Sayed3, Salman Naseer4, Muhammad Shafiq5,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3781-3794, 2023, DOI:10.32604/cmc.2023.033119
    Abstract Today, road safety remains a serious concern for governments around the world. In fact, approximately 1.35 million people die and 2–50 million are injured on public roads worldwide each year. Straight bends in road traffic are the main cause of many road accidents, and excessive and inappropriate speed in this very critical area can cause drivers to lose their vehicle stability. For these reasons, new solutions must be considered to stop this disaster and save lives. Therefore, it is necessary to study this topic very carefully and use new technologies such as Vehicle Ad Hoc Networks (VANET), Internet of Things… More >

  • Open AccessOpen Access

    ARTICLE

    Topological Evaluation of Certain Computer Networks by Contraharmonic-Quadratic Indices

    Ahmed M. Alghamdi1,*, Khalid Hamid2, Muhammad Waseem Iqbal3, M. Usman Ashraf4, Abdullah Alshahrani5, Adel Alshamrani6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3795-3810, 2023, DOI:10.32604/cmc.2023.033976
    Abstract In various fields, different networks are used, most of the time not of a single kind; but rather a mix of at least two networks. These kinds of networks are called bridge networks which are utilized in interconnection networks of PC, portable networks, spine of internet, networks engaged with advanced mechanics, power generation interconnection, bio-informatics and substance intensify structures. Any number that can be entirely calculated by a graph is called graph invariants. Countless mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty years. Nevertheless, no trustworthy evaluation has been embraced to pick, how… More >

  • Open AccessOpen Access

    ARTICLE

    Forecasting Future Trajectories with an Improved Transformer Network

    Wei Wu1, Weigong Zhang1,*, Dong Wang1, Lydia Zhu2, Xiang Song3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3811-3828, 2023, DOI:10.32604/cmc.2023.029787
    Abstract An increase in car ownership brings convenience to people’s life. However, it also leads to frequent traffic accidents. Precisely forecasting surrounding agents’ future trajectories could effectively decrease vehicle-vehicle and vehicle-pedestrian collisions. Long-short-term memory (LSTM) network is often used for vehicle trajectory prediction, but it has some shortages such as gradient explosion and low efficiency. A trajectory prediction method based on an improved Transformer network is proposed to forecast agents’ future trajectories in a complex traffic environment. It realizes the transformation from sequential step processing of LSTM to parallel processing of Transformer based on attention mechanism. To perform trajectory prediction more… More >

  • Open AccessOpen Access

    ARTICLE

    Fault Tolerant Optical Mark Recognition

    Qamar Hafeez1, Waqar Aslam1, M. Ikramullah Lali2, Shafiq Ahmad3, Mejdal Alqahtani3, Muhammad Shafiq4,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3829-3847, 2023, DOI:10.32604/cmc.2023.026422
    Abstract Optical Mark Recognition (OMR) systems have been studied since 1970. It is widely accepted as a data entry technique. OMR technology is used for surveys and multiple-choice questionnaires. Due to its ease of use, OMR technology has grown in popularity over the past two decades and is widely used in universities and colleges to automatically grade and grade student responses to questionnaires. The accuracy of OMR systems is very important due to the environment in which they are used. The OMR algorithm relies on pixel projection or Hough transform to determine the exact answer in the document. These techniques rely… More >

  • Open AccessOpen Access

    ARTICLE

    ETL Maturity Model for Data Warehouse Systems: A CMMI Compliant Framework

    Musawwer Khan1, Islam Ali1, Shahzada Khurram2, Salman Naseer3, Shafiq Ahmad4, Ahmed T. Soliman4, Akber Abid Gardezi5, Muhammad Shafiq6,*, Jin-Ghoo Choi6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3849-3863, 2023, DOI:10.32604/cmc.2023.027387
    Abstract The effectiveness of the Business Intelligence (BI) system mainly depends on the quality of knowledge it produces. The decision-making process is hindered, and the user’s trust is lost, if the knowledge offered is undesired or of poor quality. A Data Warehouse (DW) is a huge collection of data gathered from many sources and an important part of any BI solution to assist management in making better decisions. The Extract, Transform, and Load (ETL) process is the backbone of a DW system, and it is responsible for moving data from source systems into the DW system. The more mature the ETL… More >

  • Open AccessOpen Access

    ARTICLE

    Information-Centric IoT-Based Smart Farming with Dynamic Data Optimization

    Souvik Pal1,2,*, Hannah VijayKumar3, D. Akila4, N. Z. Jhanjhi5,6, Omar A. Darwish7, Fathi Amsaad8
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3865-3880, 2023, DOI:10.32604/cmc.2023.029038
    Abstract Smart farming has become a strategic approach of sustainable agriculture management and monitoring with the infrastructure to exploit modern technologies, including big data, the cloud, and the Internet of Things (IoT). Many researchers try to integrate IoT-based smart farming on cloud platforms effectively. They define various frameworks on smart farming and monitoring system and still lacks to define effective data management schemes. Since IoT-cloud systems involve massive structured and unstructured data, data optimization comes into the picture. Hence, this research designs an Information-Centric IoT-based Smart Farming with Dynamic Data Optimization (ICISF-DDO), which enhances the performance of the smart farming infrastructure… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Video Steganography with Dual Cover Medium, DNA and Complex Frames

    Asma Sajjad1, Humaira Ashraf1, NZ Jhanjhi2,3,*, Mamoona Humayun4, Mehedi Masud5, Mohammed A. AlZain6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3881-3898, 2023, DOI:10.32604/cmc.2023.030197
    Abstract The most valuable resource on the planet is no longer oil, but data. The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value. In order to transmit sensitive information securely, researchers are combining robust cryptography and steganographic approaches. The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid (DNA) for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility. In the previous approach, DNA was used only for frame selection. If this DNA is compromised, then our frames with… More >

  • Open AccessOpen Access

    ARTICLE

    Translation of English Language into Urdu Language Using LSTM Model

    Sajadul Hassan Kumhar1, Syed Immamul Ansarullah2, Akber Abid Gardezi3, Shafiq Ahmad4, Abdelaty Edrees Sayed4, Muhammad Shafiq5,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3899-3912, 2023, DOI:10.32604/cmc.2023.032290
    Abstract English to Urdu machine translation is still in its beginning and lacks simple translation methods to provide motivating and adequate English to Urdu translation. In order to make knowledge available to the masses, there should be mechanisms and tools in place to make things understandable by translating from source language to target language in an automated fashion. Machine translation has achieved this goal with encouraging results. When decoding the source text into the target language, the translator checks all the characteristics of the text. To achieve machine translation, rule-based, computational, hybrid and neural machine translation approaches have been proposed to… More >

  • Open AccessOpen Access

    ARTICLE

    Ontology-Based News Linking for Semantic Temporal Queries

    Muhammad Islam Satti1, Jawad Ahmed2, Hafiz Syed Muhammad Muslim1, Akber Abid Gardezi3, Shafiq Ahmad4, Abdelaty Edrees Sayed4, Salman Naseer5, Muhammad Shafiq6,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3913-3929, 2023, DOI:10.32604/cmc.2023.033001
    Abstract Daily newspapers publish a tremendous amount of information disseminated through the Internet. Freely available and easily accessible large online repositories are not indexed and are in an un-processable format. The major hindrance in developing and evaluating existing/new monolingual text in an image is that it is not linked and indexed. There is no method to reuse the online news images because of the unavailability of standardized benchmark corpora, especially for South Asian languages. The corpus is a vital resource for developing and evaluating text in an image to reuse local news systems in general and specifically for the Urdu language.… More >

  • Open AccessOpen Access

    ARTICLE

    Identity-Based Edge Computing Anonymous Authentication Protocol

    Naixin Kang1, Zhenhu Ning1,*, Shiqiang Zhang1, Sadaqat ur Rehman2, Muhammad Waqas1,3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3931-3943, 2023, DOI:10.32604/cmc.2023.029711
    Abstract With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based… More >

  • Open AccessOpen Access

    ARTICLE

    GA-Stacking: A New Stacking-Based Ensemble Learning Method to Forecast the COVID-19 Outbreak

    Walaa N. Ismail1,2,*, Hessah A. Alsalamah3,4, Ebtesam Mohamed2
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3945-3976, 2023, DOI:10.32604/cmc.2023.031194
    Abstract As a result of the increased number of COVID-19 cases, Ensemble Machine Learning (EML) would be an effective tool for combatting this pandemic outbreak. An ensemble of classifiers can improve the performance of single machine learning (ML) classifiers, especially stacking-based ensemble learning. Stacking utilizes heterogeneous-base learners trained in parallel and combines their predictions using a meta-model to determine the final prediction results. However, building an ensemble often causes the model performance to decrease due to the increasing number of learners that are not being properly selected. Therefore, the goal of this paper is to develop and evaluate a generic, data-independent… More >

  • Open AccessOpen Access

    ARTICLE

    Rooted Tree Optimization for Wind Turbine Optimum Control Based on Energy Storage System

    Billel Meghni1, Afaf Benamor2, Oussama Hachana3, Ahmad Taher Azar4,5,*, Amira Boulmaiz6, Salah Saad1, El-Sayed M. El-kenawy7,8, Nashwa Ahmad Kamal9, Suliman Mohamed Fati5, Naglaa K. Bahgaat10
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3977-3996, 2023, DOI:10.32604/cmc.2023.029838
    Abstract The integration of wind turbines (WTs) in variable speed drive systems belongs to the main factors causing low stability in electrical networks. Therefore, in order to avoid this issue, WTs hybridization with a storage system is a mandatory. This paper investigates WT system operating at variable speed. The system contains of a permanent magnet synchronous generator (PMSG) supported by a battery storage system (BSS). To enhance the quality of active and reactive power injected into the network, direct power control (DPC) scheme utilizing space-vector modulation (SVM) technique based on proportional-integral (PI) control is proposed. Meanwhile, to improve the rendition of… More >

  • Open AccessOpen Access

    ARTICLE

    Android Malware Detection Using ResNet-50 Stacking

    Lojain Nahhas1, Marwan Albahar1,*, Abdullah Alammari2, Anca Jurcut3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3997-4014, 2023, DOI:10.32604/cmc.2023.028316
    Abstract There has been an increase in attacks on mobile devices, such as smartphones and tablets, due to their growing popularity. Mobile malware is one of the most dangerous threats, causing both security breaches and financial losses. Mobile malware is likely to continue to evolve and proliferate to carry out a variety of cybercrimes on mobile devices. Mobile malware specifically targets Android operating system as it has grown in popularity. The rapid proliferation of Android malware apps poses a significant security risk to users, making static and manual analysis of malicious files difficult. Therefore, efficient identification and classification of Android malicious… More >

  • Open AccessOpen Access

    ARTICLE

    LoRa Backscatter Network Efficient Data Transmission Using RF Source Range Control

    Dae-Young Kim1, SoYeon Lee2, Seokhoon Kim1,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4015-4025, 2023, DOI:10.32604/cmc.2023.027078
    Abstract Networks based on backscatter communication provide wireless data transmission in the absence of a power source. A backscatter device receives a radio frequency (RF) source and creates a backscattered signal that delivers data; this enables new services in battery-less domains with massive Internet-of-Things (IoT) devices. Connectivity is highly energy-efficient in the context of massive IoT applications. Outdoors, long-range (LoRa) backscattering facilitates large IoT services. A backscatter network guarantees timeslot-and contention-based transmission. Timeslot-based transmission ensures data transmission, but is not scalable to different numbers of transmission devices. If contention-based transmission is used, collisions are unavoidable. To reduce collisions and increase transmission… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Optimized Feature Selection Using Metaheuristics Applied to Physical Benchmark Datasets

    Doaa Sami Khafaga1, El-Sayed M. El-kenawy2, Fadwa Alrowais1,*, Sunil Kumar3, Abdelhameed Ibrahim4, Abdelaziz A. Abdelhamid5,6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4027-4041, 2023, DOI:10.32604/cmc.2023.033039
    Abstract In data mining and machine learning, feature selection is a critical part of the process of selecting the optimal subset of features based on the target data. There are 2n potential feature subsets for every n features in a dataset, making it difficult to pick the best set of features using standard approaches. Consequently, in this research, a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm (ASSOA) has been proposed. When using metaheuristics to pick features, it is common for the selection of features to vary across runs, which can lead to instability. Because of… More >

  • Open AccessOpen Access

    ARTICLE

    Federation Boosting Tree for Originator Rights Protection

    Yinggang Sun1, Hongguo Zhang1, Chao Ma1,*, Hai Huang1, Dongyang Zhan2,3, Jiaxing Qu4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4043-4058, 2023, DOI:10.32604/cmc.2023.031684
    Abstract The problem of data island hinders the application of big data in artificial intelligence model training, so researchers propose a federated learning framework. It enables model training without having to centralize all data in a central storage point. In the current horizontal federated learning scheme, each participant gets the final jointly trained model. No solution is proposed for scenarios where participants only provide training data in exchange for benefits, but do not care about the final jointly trained model. Therefore, this paper proposes a new boosted tree algorithm, called RPBT (the originator Rights Protected federated Boosted Tree algorithm). Compared with… More >

Per Page:

Share Link