Home / Journals / CMC / Vol.74, No.2, 2023
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

    Muhammad Nadeem1, Ali Arshad2,*, Saman Riaz2, Syeda Wajiha Zahra1, Ashit Kumar Dutta3, Moteeb Al Moteri4, Sultan Almotairi5
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4059-4079, 2023, DOI:10.32604/cmc.2023.032882
    Abstract Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse. If this algorithm is applied to the cloud network, the attacker will not be able to access the data. To encrypt the data, the values of the bytes have been obtained by converting the plain text to ASCII. A key has been… More >

  • Open AccessOpen Access

    ARTICLE

    Numerical Comparison of Shapeless Radial Basis Function Networks in Pattern Recognition

    Sunisa Tavaen, Sayan Kaennakham*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4081-4098, 2023, DOI:10.32604/cmc.2023.032329
    Abstract This work focuses on radial basis functions containing no parameters with the main objective being to comparatively explore more of their effectiveness. For this, a total of sixteen forms of shapeless radial basis functions are gathered and investigated under the context of the pattern recognition problem through the structure of radial basis function neural networks, with the use of the Representational Capability (RC) algorithm. Different sizes of datasets are disturbed with noise before being imported into the algorithm as ‘training/testing’ datasets. Each shapeless radial basis function is monitored carefully with effectiveness criteria including accuracy, condition number (of the interpolation matrix),… More >

  • Open AccessOpen Access

    ARTICLE

    Log Anomaly Detection Based on Hierarchical Graph Neural Network and Label Contrastive Coding

    Yong Fang, Zhiying Zhao, Yijia Xu*, Zhonglin Liu
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4099-4118, 2023, DOI:10.32604/cmc.2023.033124
    Abstract System logs are essential for detecting anomalies, querying faults, and tracing attacks. Because of the time-consuming and labor-intensive nature of manual system troubleshooting and anomaly detection, it cannot meet the actual needs. The implementation of automated log anomaly detection is a topic that demands urgent research. However, the prior work on processing log data is mainly one-dimensional and cannot profoundly learn the complex associations in log data. Meanwhile, there is a lack of attention to the utilization of log labels and usually relies on a large number of labels for detection. This paper proposes a novel and practical detection model… More >

  • Open AccessOpen Access

    ARTICLE

    An Adaptive Privacy Preserving Framework for Distributed Association Rule Mining in Healthcare Databases

    Hasanien K. Kuba1, Mustafa A. Azzawi2, Saad M. Darwish3,*, Oday A. Hassen4, Ansam A. Abdulhussein5
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4119-4133, 2023, DOI:10.32604/cmc.2023.033182
    Abstract It is crucial, while using healthcare data, to assess the advantages of data privacy against the possible drawbacks. Data from several sources must be combined for use in many data mining applications. The medical practitioner may use the results of association rule mining performed on this aggregated data to better personalize patient care and implement preventive measures. Historically, numerous heuristics (e.g., greedy search) and metaheuristics-based techniques (e.g., evolutionary algorithm) have been created for the positive association rule in privacy preserving data mining (PPDM). When it comes to connecting seemingly unrelated diseases and drugs, negative association rules may be more informative… More >

  • Open AccessOpen Access

    ARTICLE

    Detection of Copy-Move Forgery in Digital Images Using Singular Value Decomposition

    Zaid Nidhal Khudhair1,4, Farhan Mohamed2, Amjad Rehman3,*, Tanzila Saba3, Saeed Ali bahaj3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4135-4147, 2023, DOI:10.32604/cmc.2023.032315
    Abstract This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition (SVD). It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size. At each step, the SVD is determined. First, the diagonal matrix’s maximum value (norm) is selected (representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating the matrix or scaled). Then, the similar norms are grouped, and each leading group is separated into many subgroups (elements of each subgroup… More >

  • Open AccessOpen Access

    ARTICLE

    Control of Distributed Generation Using Non-Sinusoidal Pulse Width Modulation

    Mehrdad Ahmadi Kamarposhti1,*, Phatiphat Thounthong2, Ilhami Colak3, Kei Eguchi4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4149-4164, 2023, DOI:10.32604/cmc.2023.033405
    Abstract The islanded mode is one of the connection modes of the grid distributed generation resources. In this study, a distributed generation resource is connected to linear and nonlinear loads via a three-phase inverter where a control method needing no current sensors or compensator elements is applied to the distribute generation system in the islanded mode. This control method has two main loops in each phase. The first loop controls the voltage control loops that adjust the three-phase point of common coupling, the amplitude of the non-sinusoidal reference waveform and the near-state pulse width modulation (NSPWM) method. The next loop compensatesthe… More >

  • Open AccessOpen Access

    ARTICLE

    Identification and Visualization of Spatial and Temporal Trends in Textile Industry

    Umair Yousaf1, Muhammad Asif1, Shahbaz Ahmed1, Noman Tahir1, Azeem Irshad2, Akber Abid Gardezi3, Muhammad Shafiq4,*, Jin-Ghoo Choi4, Habib Hamam5,6,7,8
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4165-4181, 2023, DOI:10.32604/cmc.2023.026607
    Abstract The research volume increases at the study rate, causing massive text corpora. Due to these enormous text corpora, we are drowning in data and starving for information. Therefore, recent research employed different text mining approaches to extract information from this text corpus. These proposed approaches extract meaningful and precise phrases that effectively describe the text's information. These extracted phrases are commonly termed keyphrases. Further, these key phrases are employed to determine the different fields of study trends. Moreover, these key phrases can also be used to determine the spatiotemporal trends in the various research fields. In this research, the progress… More >

  • Open AccessOpen Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430
    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature selection and Bengio Nesterov Momentum-based… More >

  • Open AccessOpen Access

    ARTICLE

    A Multi-Level Circulant Cross-Modal Transformer for Multimodal Speech Emotion Recognition

    Peizhu Gong1, Jin Liu1, Zhongdai Wu2, Bing Han2, Y. Ken Wang3, Huihua He4,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4203-4220, 2023, DOI:10.32604/cmc.2023.028291
    Abstract Speech emotion recognition, as an important component of human-computer interaction technology, has received increasing attention. Recent studies have treated emotion recognition of speech signals as a multimodal task, due to its inclusion of the semantic features of two different modalities, i.e., audio and text. However, existing methods often fail in effectively represent features and capture correlations. This paper presents a multi-level circulant cross-modal Transformer (MLCCT) for multimodal speech emotion recognition. The proposed model can be divided into three steps, feature extraction, interaction and fusion. Self-supervised embedding models are introduced for feature extraction, which give a more powerful representation of the… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Systems and Photovoltaic Cells Empowered Topologically by Sudoku Networks

    Khalid Hamid1, Muhammad Waseem Iqbal2, M. Usman Ashraf3, Akber Abid Gardezi4, Shafiq Ahmad5, Mejdal Alqahtani5, Muhammad Shafiq6,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4221-4238, 2023, DOI:10.32604/cmc.2023.034320
    Abstract A graph invariant is a number that can be easily and uniquely calculated through a graph. Recently, part of mathematical graph invariants has been portrayed and utilized for relationship examination. Nevertheless, no reliable appraisal has been embraced to pick, how much these invariants are associated with a network graph in interconnection networks of various fields of computer science, physics, and chemistry. In this paper, the study talks about sudoku networks will be networks of fractal nature having some applications in computer science like sudoku puzzle game, intelligent systems, Local area network (LAN) development and parallel processors interconnections, music composition creation,… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Deep Fused Learning Approach to Segregate Infectious Diseases

    Jawad Rasheed1,*, Shtwai Alsubai2
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4239-4259, 2023, DOI:10.32604/cmc.2023.031969
    Abstract Humankind is facing another deadliest pandemic of all times in history, caused by COVID-19. Apart from this challenging pandemic, World Health Organization (WHO) considers tuberculosis (TB) as a preeminent infectious disease due to its high infection rate. Generally, both TB and COVID-19 severely affect the lungs, thus hardening the job of medical practitioners who can often misidentify these diseases in the current situation. Therefore, the time of need calls for an immediate and meticulous automatic diagnostic tool that can accurately discriminate both diseases. As one of the preliminary smart health systems that examine three clinical states (COVID-19, TB, and normal… More >

  • Open AccessOpen Access

    ARTICLE

    Reducing Dataset Specificity for Deepfakes Using Ensemble Learning

    Qaiser Abbas1, Turki Alghamdi1, Yazed Alsaawy1, Tahir Alyas2,*, Ali Alzahrani1, Khawar Iqbal Malik3, Saira Bibi4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4261-4276, 2023, DOI:10.32604/cmc.2023.034482
    Abstract The emergence of deep fake videos in recent years has made image falsification a real danger. A person’s face and emotions are deep-faked in a video or speech and are substituted with a different face or voice employing deep learning to analyze speech or emotional content. Because of how clever these videos are frequently, Manipulation is challenging to spot. Social media are the most frequent and dangerous targets since they are weak outlets that are open to extortion or slander a human. In earlier times, it was not so easy to alter the videos, which required expertise in the domain… More >

  • Open AccessOpen Access

    ARTICLE

    Partially Deep-Learning Encryption Technique

    Hamdy M. Mousa*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4277-4291, 2023, DOI:10.32604/cmc.2023.034593
    Abstract The biggest problem facing the world is information security in the digital era. Information protection and integrity are hot topics at all times, so many techniques have been introduced to transmit and store data securely. The increase in computing power is increasing the number of security breaches and attacks at a higher rate than before on average. Thus, a number of existing security systems are at risk of hacking. This paper proposes an encryption technique called Partial Deep-Learning Encryption Technique (PD-LET) to achieve data security. PD-LET includes several stages for encoding and decoding digital data. Data preprocessing, convolution layer of… More >

  • Open AccessOpen Access

    ARTICLE

    Light-Weighted Decision Support Framework for Selecting Cloud Service Providers

    Abdulmajeed Aljuhani1,*, Abdulaziz Alhubaishy2, Mohammad Khalid Imam Rahmani2, Ahmad A. Alzahrani3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4293-4317, 2023, DOI:10.32604/cmc.2023.033893
    Abstract Multi-criteria decision making (MCDM) is a technique used to achieve better outcomes for some complex business-related problems, whereby the selection of the best alternative can be made in as many cases as possible. This paper proposes a model, the multi-criteria decision support method, that allows both service providers and consumers to maximize their profits while preserving the best matching process for resource allocation and task scheduling. The increasing number of service providers with different service provision capabilities creates an issue for consumers seeking to select the best service provider. Each consumer seeks a service provider based on various preferences, such… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Coyote Optimization with Deep Learning Based Cloud-Intrusion Detection System

    Abdullah M. Basahel1, Mohammad Yamin1, Sulafah M. Basahel2, E. Laxmi Lydia3,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4319-4336, 2023, DOI:10.32604/cmc.2023.033497
    Abstract Cloud Computing (CC) is the preference of all information technology (IT) organizations as it offers pay-per-use based and flexible services to its users. But the privacy and security become the main hindrances in its achievement due to distributed and open architecture that is prone to intruders. Intrusion Detection System (IDS) refers to one of the commonly utilized system for detecting attacks on cloud. IDS proves to be an effective and promising technique, that identifies malicious activities and known threats by observing traffic data in computers, and warnings are given when such threats were identified. The current mainstream IDS are assisted… More >

  • Open AccessOpen Access

    ARTICLE

    Vibration of a Two-Layer “Metal+PZT” Plate Contacting with Viscous Fluid

    Zeynep Ekicioglu Kuzeci1,*, Surkay D. Akbarov2,3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4337-4362, 2023, DOI:10.32604/cmc.2023.033446
    Abstract The present work investigates the mechanically forced vibration of the hydro-elasto-piezoelectric system consisting of a two-layer plate “elastic+PZT”, a compressible viscous fluid, and a rigid wall. It is assumed that the PZT (piezoelectric) layer of the plate is in contact with the fluid and time-harmonic linear forces act on the free surface of the elastic-metallic layer. This study is valuable because it considers for the first time the mechanical vibration of the metal+piezoelectric bilayer plate in contact with a fluid. It is also the first time that the influence of the volumetric concentration of the constituents on the vibration of… More >

  • Open AccessOpen Access

    ARTICLE

    View Types and Visual Communication Cues for Remote Collaboration

    Seungwon Kim1, Weidong Huang2, Chi-Min Oh3, Gun Lee4, Mark Billinghurst4, Sang-Joon Lee5,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4363-4379, 2023, DOI:10.32604/cmc.2023.034209
    Abstract Over the last several years, remote collaboration has been getting more attention in the research community because of the COVID-19 pandemic. In previous studies, researchers have investigated the effect of adding visual communication cues or shared views in collaboration, but there has not been any previous study exploring the influence between them. In this paper, we investigate the influence of view types on the use of visual communication cues. We compared the use of the three visual cues (hand gesture, a pointer with hand gesture, and sketches with hand gesture) across two view types (dependent and independent views), respectively. We… More >

  • Open AccessOpen Access

    ARTICLE

    TRUSED: A Trust-Based Security Evaluation Scheme for A Distributed Control System

    Saqib Ali1,*, Raja Waseem Anwar2
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4381-4398, 2023, DOI:10.32604/cmc.2023.031472
    Abstract Distributed control systems (DCS) have revolutionized the communication process and attracted more interest due to their pervasive computing nature (cyber/physical), their monitoring capabilities and the benefits they offer. However, due to distributed communication, flexible network topologies and lack of central control, the traditional security strategies are inadequate for meeting the unique characteristics of DCS. Moreover, malicious and untrustworthy nodes pose a significant threat during the formation of a DCS network. Trust-based secure systems not only monitor and track the behavior of the nodes but also enhance the security by identifying and isolating the malicious node, which reduces the risk and… More >

  • Open AccessOpen Access

    ARTICLE

    Malware Detection in Android IoT Systems Using Deep Learning

    Muhammad Waqar1, Sabeeh Fareed1, Ajung Kim2,*, Saif Ur Rehman Malik3, Muhammad Imran1, Muhammad Usman Yaseen1
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4399-4415, 2023, DOI:10.32604/cmc.2023.032984
    Abstract The Android Operating System (AOS) has been evolving since its inception and it has become one of the most widely used operating system for the Internet of Things (IoT). Due to the high popularity and reliability of AOS for IoT, it is a target of many cyber-attacks which can cause compromise of privacy, financial loss, data integrity, unauthorized access, denial of services and so on. The Android-based IoT (AIoT) devices are extremely vulnerable to various malwares due to the open nature and high acceptance of Android in the market. Recently, several detection preventive malwares are developed to conceal their malicious… More >

  • Open AccessOpen Access

    ARTICLE

    Type-2 Neutrosophic Set and Their Applications in Medical Databases Deadlock Resolution

    Marwan H. Hassan1, Saad M. Darwish2,*, Saleh M. Elkaffas3
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4417-4434, 2023, DOI:10.32604/cmc.2023.033175
    Abstract Electronic patient data gives many advantages, but also new difficulties. Deadlocks may delay procedures like acquiring patient information. Distributed deadlock resolution solutions introduce uncertainty due to inaccurate transaction properties. Soft computing-based solutions have been developed to solve this challenge. In a single framework, ambiguous, vague, incomplete, and inconsistent transaction attribute information has received minimal attention. The work presented in this paper employed type-2 neutrosophic logic, an extension of type-1 neutrosophic logic, to handle uncertainty in real-time deadlock-resolving systems. The proposed method is structured to reflect multiple types of knowledge and relations among transactions’ features that include validation factor degree, slackness… More >

  • Open AccessOpen Access

    ARTICLE

    Natural Language Processing with Optimal Deep Learning-Enabled Intelligent Image Captioning System

    Radwa Marzouk1, Eatedal Alabdulkreem2, Mohamed K. Nour3, Mesfer Al Duhayyim4,*, Mahmoud Othman5, Abu Sarwar Zamani6, Ishfaq Yaseen6, Abdelwahed Motwakel6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4435-4451, 2023, DOI:10.32604/cmc.2023.033091
    Abstract The recent developments in Multimedia Internet of Things (MIoT) devices, empowered with Natural Language Processing (NLP) model, seem to be a promising future of smart devices. It plays an important role in industrial models such as speech understanding, emotion detection, home automation, and so on. If an image needs to be captioned, then the objects in that image, its actions and connections, and any silent feature that remains under-projected or missing from the images should be identified. The aim of the image captioning process is to generate a caption for image. In next step, the image should be provided with… More >

  • Open AccessOpen Access

    ARTICLE

    A Neural Study of the Fractional Heroin Epidemic Model

    Wajaree Weera1, Thongchai Botmart1,*, Samina Zuhra2, Zulqurnain Sabir3, Muhammad Asif Zahoor Raja4, Salem Ben Said5
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4453-4467, 2023, DOI:10.32604/cmc.2023.033232
    Abstract This works intends to provide numerical solutions based on the nonlinear fractional order derivatives of the classical White and Comiskey model (NFD-WCM). The fractional order derivatives have provided authentic and accurate solutions for the NDF-WCM. The solutions of the fractional NFD-WCM are provided using the stochastic computing supervised algorithm named Levenberg-Marquard Backpropagation (LMB) based on neural networks (NNs). This regression approach combines gradient descent and Gauss-Newton iterative methods, which means finding a solution through the sequences of different calculations. WCM is used to demonstrate the heroin epidemics. Heroin has been on-growth world wide, mainly in Asia, Europe, and the USA.… More >

  • Open AccessOpen Access

    ARTICLE

    Multi Criteria Decision Making for Evaluation and Ranking of Cancer Information

    Shahid Mahmood1,*, Muhammad Amin2, Mubashir Baig Mirza1, Salem Abu-Ghumsan1, Muhammad Akram3, Zahid Mahmood Janjua4, Arslan Shahid5, Usman Shahid6
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4469-4481, 2023, DOI:10.32604/cmc.2023.030728
    Abstract Cancer is a disease that is rapidly expanding in prevalence all over the world. Cancer cells can metastasize, or spread, across the body and impact several different cell types. Additionally, the incidence rates of several subtypes of cancer have been on the rise in India. The countermeasures for the cancer disease can be taken by determining the specific expansion rate of each type. To rank the various forms of cancer’s rate of progression, we used some of the available data. Numerous studies are available in the literature which show the growth rate of cancer by different techniques. The accuracy of… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Enabled Intelligent Healthcare Management System in Smart Cities Environment

    Hanan Abdullah Mengash1, Lubna A. Alharbi2, Saud S. Alotaibi3, Sarab AlMuhaideb4, Nadhem Nemri5, Mrim M. Alnfiai6, Radwa Marzouk1, Ahmed S. Salama7, Mesfer Al Duhayyim8,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4483-4500, 2023, DOI:10.32604/cmc.2023.032588
    Abstract In recent times, cities are getting smart and can be managed effectively through diverse architectures and services. Smart cities have the ability to support smart medical systems that can infiltrate distinct events (i.e., smart hospitals, smart homes, and community health centres) and scenarios (e.g., rehabilitation, abnormal behavior monitoring, clinical decision-making, disease prevention and diagnosis postmarking surveillance and prescription recommendation). The integration of Artificial Intelligence (AI) with recent technologies, for instance medical screening gadgets, are significant enough to deliver maximum performance and improved management services to handle chronic diseases. With latest developments in digital data collection, AI techniques can be employed… More >

  • Open AccessOpen Access

    ARTICLE

    A Parallel Hybrid Testing Technique for Tri-Programming Model-Based Software Systems

    Huda Basloom1,*, Mohamed Dahab1, Abdullah Saad AL-Ghamdi2, Fathy Eassa1, Ahmed Mohammed Alghamdi3, Seif Haridi4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4501-4530, 2023, DOI:10.32604/cmc.2023.033928
    Abstract Recently, researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems (HPCs) to achieve exascale by applying parallelism at multiple levels. Combining different programming paradigms, such as Message Passing Interface (MPI), Open Multiple Processing (OpenMP), and Open Accelerators (OpenACC), can increase computation speed and improve performance. During the integration of multiple models, the probability of runtime errors increases, making their detection difficult, especially in the absence of testing techniques that can detect these errors. Numerous studies have been conducted to identify these errors, but no technique exists for detecting errors… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets

    Doaa Sami Khafaga1, El-Sayed M. El-kenawy2,3, Faten Khalid Karim1,*, Mostafa Abotaleb4, Abdelhameed Ibrahim5, Abdelaziz A. Abdelhamid6,7, D. L. Elsheweikh8
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4531-4545, 2023, DOI:10.32604/cmc.2023.033042
    Abstract Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning. Each feature in a dataset has 2n possible subsets, making it challenging to select the optimum collection of features using typical methods. As a result, a new metaheuristics-based feature selection method based on the dipper-throated and grey-wolf optimization (DTO-GW) algorithms has been developed in this research. Instability can result when the selection of features is subject to metaheuristics, which can lead to a wide range of results. Thus, we adopted hybrid optimization in our method of optimizing, which allowed us… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling and Simulation of DVR and D-STATCOM in Presence of Wind Energy System

    Mehrdad Ahmadi Kamarposhti1,*, Ilhami Colak2, Phatiphat Thounthong3, Kei Eguchi4
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4547-4570, 2023, DOI:10.32604/cmc.2023.034082
    Abstract The present study suggests that series voltage injection is more effective than parallel current injection to improve voltage quality on the load side. The line voltage can be accurately symmetrized at the connection point by creating and controlling a series voltage component in each phase. This is more reliable and effective than parallel current injection. A dynamic voltage restorer (DVR) and a distribution static synchronous compensator (DSTATCOM) were utilized to provide the required power. The DVR is an effective and modern device utilized in parallel within the grid and can protect sensitive loads from voltage problems in the grid by… More >

  • Open AccessOpen Access

    ARTICLE

    Industrial Recycling Process of Batteries for EVs

    Abdallah Abdallah1, Muhamed Dauwed2, Ayman A. Aly3, Bassem F. Felemban3, Imran Khan4, Dag Øivind Madsen5,*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4571-4586, 2023, DOI:10.32604/cmc.2023.032995
    Abstract The growing number of decarbonization standards in the transportation sector has resulted in an increase in demand for electric cars. Renewable energy sources have the ability to bring the fossil fuel age to an end. Electrochemical storage devices, particularly lithium-ion batteries, are critical for this transition’s success. This is owing to a combination of favorable characteristics such as high energy density and minimal self-discharge. Given the environmental degradation caused by hazardous wastes and the scarcity of some resources, recycling used lithium-ion batteries has significant economic and practical importance. Many efforts have been undertaken in recent years to recover cathode materials… More >

  • Open AccessOpen Access

    ARTICLE

    A Hyperparameter Optimization for Galaxy Classification

    Fatih Ahmet Şenel*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4587-4600, 2023, DOI:10.32604/cmc.2023.033155
    Abstract In this study, the morphological galaxy classification process was carried out with a hybrid approach. Since the Galaxy classification process may contain detailed information about the universe’s formation, it remains the current research topic. Researchers divided more than 100 billion galaxies into ten different classes. It is not always possible to understand which class the galaxy types belong. However, Artificial Intelligence (AI) can be used for successful classification. There are studies on the automatic classification of galaxies into a small number of classes. As the number of classes increases, the success of the used methods decreases. Based on the literature,… More >

  • Open AccessOpen Access

    ARTICLE

    Crime Prediction Methods Based on Machine Learning: A Survey

    Junxiang Yin*
    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4601-4629, 2023, DOI:10.32604/cmc.2023.034190
    Abstract The objective of crime prediction, one of the most important technologies in social computing, is to extract useful information from many existing criminal records to predict the next process-related crime. It can aid the police in obtaining criminal information and warn the public to be vigilant in certain areas. With the rapid growth of big data, the Internet of Things, and other technologies, as well as the increasing use of artificial intelligence in forecasting models, crime prediction models based on deep learning techniques are accelerating. Therefore, it is necessary to classify the existing crime prediction algorithms and compare in depth… More >

Per Page:

Share Link