Home / Journals / CMC / Vol.75, No.1, 2023
Table of Content
  • Open AccessOpen Access

    ARTICLE

    LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment

    Xiaorui Zhang1,2,3,*, Rui Jiang1, Wei Sun3,4, Aiguo Song5, Xindong Wei6, Ruohan Meng7
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1-17, 2023, DOI:10.32604/cmc.2023.034748
    Abstract Robust watermarking requires finding invariant features under multiple attacks to ensure correct extraction. Deep learning has extremely powerful in extracting features, and watermarking algorithms based on deep learning have attracted widespread attention. Most existing methods use small kernel convolution to extract image features and embed the watermarking. However, the effective perception fields for small kernel convolution are extremely confined, so the pixels that each watermarking can affect are restricted, thus limiting the performance of the watermarking. To address these problems, we propose a watermarking network based on large kernel convolution and adaptive weight assignment for loss functions. It uses large-kernel… More >

  • Open AccessOpen Access

    ARTICLE

    Firefly-CDDL: A Firefly-Based Algorithm for Cyberbullying Detection Based on Deep Learning

    Monirah Al-Ajlan*, Mourad Ykhlef
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 19-34, 2023, DOI:10.32604/cmc.2023.033753
    Abstract There are several ethical issues that have arisen in recent years due to the ubiquity of the Internet and the popularity of social media and community platforms. Among them is cyberbullying, which is defined as any violent intentional action that is repeatedly conducted by individuals or groups using online channels against victims who are not able to react effectively. An alarmingly high percentage of people, especially teenagers, have reported being cyberbullied in recent years. A variety of approaches have been developed to detect cyberbullying, but they require time-consuming feature extraction and selection processes. Moreover, no approach to date has examined… More >

  • Open AccessOpen Access

    ARTICLE

    Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment

    Naveed Khan1, Zhang Jianbiao1, Intikhab Ullah2, Muhammad Salman Pathan3, Huhnkuk Lim4,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 35-49, 2023, DOI:10.32604/cmc.2023.036189
    Abstract Public cloud computing provides a variety of services to consumers via high-speed internet. The consumer can access these services anytime and anywhere on a balanced service cost. Many traditional authentication protocols are proposed to secure public cloud computing. However, the rapid development of high-speed internet and organizations’ race to develop quantum computers is a nightmare for existing authentication schemes. These traditional authentication protocols are based on factorization or discrete logarithm problems. As a result, traditional authentication protocols are vulnerable in the quantum computing era. Therefore, in this article, we have proposed an authentication protocol based on the lattice technique for… More >

  • Open AccessOpen Access

    ARTICLE

    Relational Logging Design Pattern

    Savas Takan1,*, Gokmen Katipoglu2
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 51-65, 2023, DOI:10.32604/cmc.2023.035282
    Abstract Observability and traceability of developed software are crucial to its success in software engineering. Observability is the ability to comprehend a system’s internal state from the outside. Monitoring is used to determine what causes system problems and why. Logs are among the most critical technology to guarantee observability and traceability. Logs are frequently used to investigate software events. In current log technologies, software events are processed independently of each other. Consequently, current logging technologies do not reveal relationships. However, system events do not occur independently of one another. With this perspective, our research has produced a new log design pattern… More >

  • Open AccessOpen Access

    ARTICLE

    Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key

    Wangke Yu, Shuhua Wang*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 67-80, 2023, DOI:10.32604/cmc.2023.035337
    Abstract Wireless network is the basis of the Internet of things and the intelligent vehicle Internet. Due to the complexity of the Internet of things and intelligent vehicle Internet environment, the nodes of the Internet of things and the intelligent vehicle Internet are more vulnerable to malicious destruction and attacks. Most of the proposed authentication and key agreement protocols for wireless networks are based on traditional cryptosystems such as large integer decomposition and elliptic curves. With the rapid development of quantum computing, these authentication protocols based on traditional cryptography will be more and more threatened, so it is necessary to design… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Machine Learning Driven Sentiment Analysis on COVID-19 Twitter Data

    Bahjat Fakieh1, Abdullah S. AL-Malaise AL-Ghamdi1,2,3, Farrukh Saleem1, Mahmoud Ragab2,4,5,6,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 81-97, 2023, DOI:10.32604/cmc.2023.033406
    Abstract The outbreak of the pandemic, caused by Coronavirus Disease 2019 (COVID-19), has affected the daily activities of people across the globe. During COVID-19 outbreak and the successive lockdowns, Twitter was heavily used and the number of tweets regarding COVID-19 increased tremendously. Several studies used Sentiment Analysis (SA) to analyze the emotions expressed through tweets upon COVID-19. Therefore, in current study, a new Artificial Bee Colony (ABC) with Machine Learning-driven SA (ABCML-SA) model is developed for conducting Sentiment Analysis of COVID-19 Twitter data. The prime focus of the presented ABCML-SA model is to recognize the sentiments expressed in tweets made upon… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Hybrid Deep Learning Enabled Attack Detection and Classification in IoT Environment

    Fahad F. Alruwaili*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 99-115, 2023, DOI:10.32604/cmc.2023.034752
    Abstract The Internet of Things (IoT) paradigm enables end users to access networking services amongst diverse kinds of electronic devices. IoT security mechanism is a technology that concentrates on safeguarding the devices and networks connected in the IoT environment. In recent years, False Data Injection Attacks (FDIAs) have gained considerable interest in the IoT environment. Cybercriminals compromise the devices connected to the network and inject the data. Such attacks on the IoT environment can result in a considerable loss and interrupt normal activities among the IoT network devices. The FDI attacks have been effectively overcome so far by conventional threat detection… More >

  • Open AccessOpen Access

    ARTICLE

    An Elevator Button Recognition Method Combining YOLOv5 and OCR

    Xinliang Tang1, Caixing Wang1, Jingfang Su1,*, Cecilia Taylor2
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 117-131, 2023, DOI:10.32604/cmc.2023.033327
    Abstract Fast recognition of elevator buttons is a key step for service robots to ride elevators automatically. Although there are some studies in this field, none of them can achieve real-time application due to problems such as recognition speed and algorithm complexity. Elevator button recognition is a comprehensive problem. Not only does it need to detect the position of multiple buttons at the same time, but also needs to accurately identify the characters on each button. The latest version 5 of you only look once algorithm (YOLOv5) has the fastest reasoning speed and can be used for detecting multiple objects in… More >

  • Open AccessOpen Access

    ARTICLE

    Symbiotic Organisms Search with Deep Learning Driven Biomedical Osteosarcoma Detection and Classification

    Abdullah M. Basahel1, Mohammad Yamin1, Sulafah M. Basahel2, Mona M. Abusurrah3, K.Vijaya Kumar4, E. Laxmi Lydia5,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 133-148, 2023, DOI:10.32604/cmc.2023.031786
    Abstract Osteosarcoma is one of the rare bone cancers that affect the individuals aged between 10 and 30 and it incurs high death rate. Early diagnosis of osteosarcoma is essential to improve the survivability rate and treatment protocols. Traditional physical examination procedure is not only a time-consuming process, but it also primarily relies upon the expert’s knowledge. In this background, the recently developed Deep Learning (DL) models can be applied to perform decision making. At the same time, hyperparameter optimization of DL models also plays an important role in influencing overall classification performance. The current study introduces a novel Symbiotic Organisms… More >

  • Open AccessOpen Access

    ARTICLE

    Arithmetic Optimization with Ensemble Deep Transfer Learning Based Melanoma Classification

    K. Kalyani1, Sara A Althubiti2, Mohammed Altaf Ahmed3, E. Laxmi Lydia4, Seifedine Kadry5, Neunggyu Han6, Yunyoung Nam6,*
    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 149-164, 2023, DOI:10.32604/cmc.2023.033005
    Abstract Melanoma is a skin disease with high mortality rate while early diagnoses of the disease can increase the survival chances of patients. It is challenging to automatically diagnose melanoma from dermoscopic skin samples. Computer-Aided Diagnostic (CAD) tool saves time and effort in diagnosing melanoma compared to existing medical approaches. In this background, there is a need exists to design an automated classification model for melanoma that can utilize deep and rich feature datasets of an image for disease classification. The current study develops an Intelligent Arithmetic Optimization with Ensemble Deep Transfer Learning Based Melanoma Classification (IAOEDTT-MC) model. The proposed IAOEDTT-MC… More >

Share Link

WeChat scan