Home / Journals / CMC / Vol.75, No.2, 2023
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing

    Jihyeon Yu1, Juhwan Kim1, Youngwoo Lee1, Fayozbek Rustamov2, Joobeom Yun1,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3291-3315, 2023, DOI:10.32604/cmc.2023.035835
    Abstract Internet of things (IoT) devices are being increasingly used in numerous areas. However, the low priority on security and various IoT types have made these devices vulnerable to attacks. To prevent this, recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments. However, these studies focused only on major firmware architectures and rarely considered exotic firmware. In addition, because of the diversity of firmware, the emulation success rate is not high in terms of large-scale analyses. In this study, we propose the adaptive emulation framework for multi-architecture (AEMA). In… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Management of Energy Storage Systems for Peak Shaving in a Smart Grid

    Firas M. Makahleh1, Ayman Amer2, Ahmad A. Manasrah1, Hani Attar2, Ahmed A. A. Solyman3, Mehrdad Ahmadi Kamarposhti4,*, Phatiphat Thounthong5
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3317-3337, 2023, DOI:10.32604/cmc.2023.035690
    Abstract In this paper, the installation of energy storage systems (EES) and their role in grid peak load shaving in two echelons, their distribution and generation are investigated. First, the optimal placement and capacity of the energy storage is taken into consideration, then, the charge-discharge strategy for this equipment is determined. Here, Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) are used to calculate the minimum and maximum load in the network with the presence of energy storage systems. The energy storage systems were utilized in a distribution system with the aid of a peak load shaving approach. Ultimately, the battery… More >

  • Open AccessOpen Access

    ARTICLE

    Scalable Blockchain Technology for Tracking the Provenance of the Agri-Food

    B. Subashini*, D. Hemavathi
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3339-3358, 2023, DOI:10.32604/cmc.2023.035074
    Abstract Due to an increase in agricultural mislabeling and carelesshandling of non-perishable foods in recent years, consumers have been calling for the food sector to be more transparent. Due to information dispersion between divisions and the propensity to record inaccurate data, current traceability solutions typically fail to provide reliable farm-to-fork histories ofproducts. The three most enticing characteristics of blockchain technology areopenness, integrity, and traceability, which make it a potentially crucial tool for guaranteeing the integrity and correctness of data. In this paper, we suggest a permissioned blockchain system run by organizations, such as regulatory bodies, to promote the origin-tracking of shelf-stable… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems

    Firas Abedi1, Hayder M. A. Ghanimi2, Mohammed A. M. Sadeeq3, Ahmed Alkhayyat4,*, Zahraa H. Kareem5, Sarmad Nozad Mahmood6, Ali Hashim Abbas7, Ali S. Abosinnee8, Waleed Khaild Al-Azzawi9, Mustafa Musa Jaber10,11, Mohammed Dauwed12
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3359-3374, 2023, DOI:10.32604/cmc.2023.034221
    Abstract Recent economic growth and development have considerably raised energy consumption over the globe. Electric load prediction approaches become essential for effective planning, decision-making, and contract evaluation of the power systems. In order to achieve effective forecasting outcomes with minimum computation time, this study develops an improved whale optimization with deep learning enabled load prediction (IWO-DLELP) scheme for energy storage systems (ESS) in smart grid platform. The major intention of the IWO-DLELP technique is to effectually forecast the electric load in SG environment for designing proficient ESS. The proposed IWO-DLELP model initially undergoes pre-processing in two stages namely min-max normalization and… More >

  • Open AccessOpen Access

    ARTICLE

    Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

    Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Alwan Ahmed Abdulrahman Alwan, Shankar Karuppayah*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3375-3398, 2023, DOI:10.32604/cmc.2023.036587
    Abstract The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet). The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer (P2P) networks. The P2P botnets leverage the privileges of the decentralized nature of P2P networks. Consequently, the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures. Some P2P botnets are smarter to be stealthy in their Command-and-Control mechanisms (C2) and elude the standard discovery mechanisms. Therefore, the other side of this cyberwar is the monitor. The P2P botnet monitoring is an exacting mission… More >

  • Open AccessOpen Access

    ARTICLE

    Bayesian Deep Learning Enabled Sentiment Analysis on Web Intelligence Applications

    Abeer D. Algarni*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3399-3412, 2023, DOI:10.32604/cmc.2023.026687
    Abstract In recent times, web intelligence (WI) has become a hot research topic, which utilizes Artificial Intelligence (AI) and advanced information technologies on the Web and Internet. The users post reviews on social media and are employed for sentiment analysis (SA), which acts as feedback to business people and government. Proper SA on the reviews helps to enhance the quality of the services and products, however, web intelligence techniques are needed to raise the company profit and user fulfillment. With this motivation, this article introduces a new modified pigeon inspired optimization based feature selection (MPIO-FS) with Bayesian deep learning (BDL), named… More >

  • Open AccessOpen Access

    ARTICLE

    Arabic Sign Language Gesture Classification Using Deer Hunting Optimization with Machine Learning Model

    Badriyya B. Al-onazi1, Mohamed K. Nour2, Hussain Alshahran3, Mohamed Ahmed Elfaki3, Mrim M. Alnfiai4, Radwa Marzouk5, Mahmoud Othman6, Mahir M. Sharif7, Abdelwahed Motwakel8,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3413-3429, 2023, DOI:10.32604/cmc.2023.035303
    Abstract Sign language includes the motion of the arms and hands to communicate with people with hearing disabilities. Several models have been available in the literature for sign language detection and classification for enhanced outcomes. But the latest advancements in computer vision enable us to perform signs/gesture recognition using deep neural networks. This paper introduces an Arabic Sign Language Gesture Classification using Deer Hunting Optimization with Machine Learning (ASLGC-DHOML) model. The presented ASLGC-DHOML technique mainly concentrates on recognising and classifying sign language gestures. The presented ASLGC-DHOML model primarily pre-processes the input gesture images and generates feature vectors using the densely connected… More >

  • Open AccessOpen Access

    ARTICLE

    Identification of a Printed Anti-Counterfeiting Code Based on Feature Guidance Double Pool Attention Networks

    Changhui You1,2, Hong Zheng1,2,*, Zhongyuan Guo2, Tianyu Wang2, Jianping Ju3, Xi Li3
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3431-3452, 2023, DOI:10.32604/cmc.2023.035897
    Abstract The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment, photographing habits, camera resolution and other factors, resulting in poor collection quality of anti-counterfeiting codes and weak differentiation of anti-counterfeiting codes for high-quality counterfeits. Developing an anti-counterfeiting code authentication algorithm based on mobile phones is of great commercial value. Although the existing algorithms developed based on special equipment can effectively identify forged anti-counterfeiting codes, the anti-counterfeiting code identification scheme based on mobile phones is still in its infancy. To address the small differences in texture features, low response speed and excessively large deep learning… More >

  • Open AccessOpen Access

    ARTICLE

    2D MXene Ti3C2Tx Enhanced Plasmonic Absorption in Metasurface for Terahertz Shielding

    Zaka Ullah1,*, Muath Al Hasan11, Ismail Ben Mabrouk2, Muhammad Junaid3, Fawad Sheikh4
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3453-3464, 2023, DOI:10.32604/cmc.2023.034704
    Abstract With the advancement of technology, shielding for terahertz (THz) electronic and communication equipment is increasingly important. The metamaterial absorption technique is mostly used to shield electromagnetic interference (EMI) in THz sensing technologies. The most widely used THz metamaterial absorbers suffer from their narrowband properties and the involvement of complex fabrication techniques. Materials with multifunctional properties, such as adjustable conductivity, broad bandwidth, high flexibility, and robustness, are driving future development to meet THz shielding applications. In this article, a theoretical simulation approach based on finite difference time domain (FDTD) is utilized to study the absorption and shielding characteristics of a two-dimensional… More >

  • Open AccessOpen Access

    ARTICLE

    Image Splicing Detection Using Generalized Whittaker Function Descriptor

    Dumitru Baleanu1,2,3, Ahmad Sami Al-Shamayleh4, Rabha W. Ibrahim5,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3465-3477, 2023, DOI:10.32604/cmc.2023.037162
    Abstract Image forgery is a crucial part of the transmission of misinformation, which may be illegal in some jurisdictions. The powerful image editing software has made it nearly impossible to detect altered images with the naked eye. Images must be protected against attempts to manipulate them. Image authentication methods have gained popularity because of their use in multimedia and multimedia networking applications. Attempts were made to address the consequences of image forgeries by creating algorithms for identifying altered images. Because image tampering detection targets processing techniques such as object removal or addition, identifying altered images remains a major challenge in research.… More >

  • Open AccessOpen Access

    ARTICLE

    Text Simplification Using Transformer and BERT

    Sarah Alissa1,*, Mike Wald2
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3479-3495, 2023, DOI:10.32604/cmc.2023.033647
    Abstract Reading and writing are the main interaction methods with web content. Text simplification tools are helpful for people with cognitive impairments, new language learners, and children as they might find difficulties in understanding the complex web content. Text simplification is the process of changing complex text into more readable and understandable text. The recent approaches to text simplification adopted the machine translation concept to learn simplification rules from a parallel corpus of complex and simple sentences. In this paper, we propose two models based on the transformer which is an encoder-decoder structure that achieves state-of-the-art (SOTA) results in machine translation.… More >

  • Open AccessOpen Access

    ARTICLE

    Whale Optimization Algorithm-Based Deep Learning Model for Driver Identification in Intelligent Transport Systems

    Yuzhou Li*, Chuanxia Sun, Yinglei Hu
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3497-3515, 2023, DOI:10.32604/cmc.2023.035878
    Abstract Driver identification in intelligent transport systems has immense demand, considering the safety and convenience of traveling in a vehicle. The rapid growth of driver assistance systems (DAS) and driver identification system propels the need for understanding the root causes of automobile accidents. Also, in the case of insurance, it is necessary to track the number of drivers who commonly drive a car in terms of insurance pricing. It is observed that drivers with frequent records of paying “fines” are compelled to pay higher insurance payments than drivers without any penalty records. Thus driver identification act as an important information source… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’ Response Against COVID Variants

    Hassam Tahir1, Muhammad Shahbaz Khan1, Fawad Ahmed2, Abdullah M. Albarrak3, Sultan Noman Qasem3, Jawad Ahmad4,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3517-3535, 2023, DOI:10.32604/cmc.2023.035410
    Abstract The COVID-19 outbreak began in December 2019 and was declared a global health emergency by the World Health Organization. The four most dominating variants are Beta, Gamma, Delta, and Omicron. After the administration of vaccine doses, an eminent decline in new cases has been observed. The COVID-19 vaccine induces neutralizing antibodies and T-cells in our bodies. However, strong variants like Delta and Omicron tend to escape these neutralizing antibodies elicited by COVID-19 vaccination. Therefore, it is indispensable to study, analyze and most importantly, predict the response of SARS-CoV-2-derived t-cell epitopes against Covid variants in vaccinated and unvaccinated persons. In this… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Generator Discriminator Network Using Texture-Edge Information

    Kyeongseok Jang1, Seongsoo Cho2, Kwang Chul Son3,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3537-3551, 2023, DOI:10.32604/cmc.2023.030557
    Abstract In the proposed paper, a parallel structure type Generative Adversarial Network (GAN) using edge and texture information is proposed. In the existing GAN-based model, many learning iterations had to be given to obtaining an output that was somewhat close to the original data, and noise and distortion occurred in the output image even when learning was performed. To solve this problem, the proposed model consists of two generators and three discriminators to propose a network in the form of a parallel structure. In the network, each edge information and texture information were received as inputs, learning was performed, and each… More >

  • Open AccessOpen Access

    ARTICLE

    A Universal Activation Function for Deep Learning

    Seung-Yeon Hwang1, Jeong-Joon Kim2,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3553-3569, 2023, DOI:10.32604/cmc.2023.037028
    Abstract Recently, deep learning has achieved remarkable results in fields that require human cognitive ability, learning ability, and reasoning ability. Activation functions are very important because they provide the ability of artificial neural networks to learn complex patterns through nonlinearity. Various activation functions are being studied to solve problems such as vanishing gradients and dying nodes that may occur in the deep learning process. However, it takes a lot of time and effort for researchers to use the existing activation function in their research. Therefore, in this paper, we propose a universal activation function (UA) so that researchers can easily create… More >

  • Open AccessOpen Access

    ARTICLE

    DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning

    Yousef Sanjalawe1,2,*, Turke Althobaiti3,4
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3571-3588, 2023, DOI:10.32604/cmc.2023.037386
    Abstract Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received paramount interest over the last few years. Among the latest approaches, Deep Learning (DL)-based IDS methods allow the discovery of attacks with the highest performance. In the CC environment, Distributed Denial of Service (DDoS) attacks are widespread. The cloud services will be rendered unavailable to legitimate end-users as a consequence of the overwhelming network traffic, resulting in financial losses. Although various researchers have proposed many detection techniques, there are possible obstacles in terms of detection performance due to the use of insignificant traffic features. Therefore, in this paper,… More >

  • Open AccessOpen Access

    ARTICLE

    Secure and Efficient Data Transmission Scheme Based on Physical Mechanism

    Ping Zhang1, Haoran Zhu1, Wenjun Li2, Osama Alfarraj3, Amr Tolba3, Gwang-jun Kim4,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3589-3605, 2023, DOI:10.32604/cmc.2023.032097
    Abstract Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply, which are not suitable for traditional security technology. The security technology based on the physical mechanism has attracted extensive attention. How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism. In this paper, superlattice technology is introduced to the security field of Internet of things, and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed. In order to ensure the… More >

  • Open AccessOpen Access

    ARTICLE

    Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing

    Xinyi Qing1,3, Baopeng Ye2, Yuanquan Shi1,3, Tao Li4,*, Yuling Chen4, Lei Liu1
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3607-3624, 2023, DOI:10.32604/cmc.2023.037532
    Abstract Due to its decentralized, tamper-proof, and trust-free characteristics, blockchain is used in the Internet of Things (IoT) to guarantee the reliability of data. However, some technical flaws in blockchain itself prevent the development of these applications, such as the issue with linearly growing storage capacity of blockchain systems. On the other hand, there is a lack of storage resources for sensor devices in IoT, and numerous sensor devices will generate massive data at ultra-high speed, which makes the storage problem of the IoT enabled by blockchain more prominent. There are various solutions to reduce the storage burden by modifying the… More >

  • Open AccessOpen Access

    ARTICLE

    A COVID-19 Detection Model Based on Convolutional Neural Network and Residual Learning

    Bo Wang1,*, Yongxin Zhang1, Shihui Ji2, Binbin Zhang1, Xiangyu Wang1, Jiyong Zhang1
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3625-3642, 2023, DOI:10.32604/cmc.2023.036754
    Abstract A model that can obtain rapid and accurate detection of coronavirus disease 2019 (COVID-19) plays a significant role in treating and preventing the spread of disease transmission. However, designing such a model that can balance the detection accuracy and weight parameters of memory well to deploy a mobile device is challenging. Taking this point into account, this paper fuses the convolutional neural network and residual learning operations to build a multi-class classification model, which improves COVID-19 pneumonia detection performance and keeps a trade-off between the weight parameters and accuracy. The convolutional neural network can extract the COVID-19 feature information by… More >

  • Open AccessOpen Access

    ARTICLE

    A Computer Vision-Based System for Metal Sheet Pick Counting

    Jirasak Ji, Warut Pannakkong*, Jirachai Buddhakulsomsiri
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3643-3656, 2023, DOI:10.32604/cmc.2023.037507
    Abstract Inventory counting is crucial to manufacturing industries in terms of inventory management, production, and procurement planning. Many companies currently require workers to manually count and track the status of materials, which are repetitive and non-value-added activities but incur significant costs to the companies as well as mental fatigue to the employees. This research aims to develop a computer vision system that can automate the material counting activity without applying any marker on the material. The type of material of interest is metal sheet, whose shape is simple, a large rectangular shape, yet difficult to detect. The use of computer vision… More >

  • Open AccessOpen Access

    ARTICLE

    MLD-MPC Approach for Three-Tank Hybrid Benchmark Problem

    Hanen Yaakoubi1, Hegazy Rezk2, Mujahed Al-Dhaifallah3,4,*, Joseph Haggège1
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3657-3675, 2023, DOI:10.32604/cmc.2023.034929
    Abstract The present paper aims at validating a Model Predictive Control (MPC), based on the Mixed Logical Dynamical (MLD) model, for Hybrid Dynamic Systems (HDSs) that explicitly involve continuous dynamics and discrete events. The proposed benchmark system is a three-tank process, which is a typical case study of HDSs. The MLD-MPC controller is applied to the level control of the considered tank system. The study is initially focused on the MLD approach that allows consideration of the interacting continuous dynamics with discrete events and includes the operating constraints. This feature of MLD modeling is very advantageous when an MPC controller synthesis… More >

  • Open AccessOpen Access

    ARTICLE

    Automated Colonic Polyp Detection and Classification Enabled Northern Goshawk Optimization with Deep Learning

    Mohammed Jasim Mohammed Jasim1, Bzar Khidir Hussan2, Subhi R. M. Zeebaree3,*, Zainab Salih Ageed4
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3677-3693, 2023, DOI:10.32604/cmc.2023.037363
    Abstract The major mortality factor relevant to the intestinal tract is the growth of tumorous cells (polyps) in various parts. More specifically, colonic polyps have a high rate and are recognized as a precursor of colon cancer growth. Endoscopy is the conventional technique for detecting colon polyps, and considerable research has proved that automated diagnosis of image regions that might have polyps within the colon might be used to help experts for decreasing the polyp miss rate. The automated diagnosis of polyps in a computer-aided diagnosis (CAD) method is implemented using statistical analysis. Nowadays, Deep Learning, particularly through Convolution Neural networks… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Density-Based Spatial Clustering of Applications with Noise (ADBSCAN) for Clusters of Different Densities

    Ahmed Fahim1,2,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3695-3712, 2023, DOI:10.32604/cmc.2023.036820
    Abstract Finding clusters based on density represents a significant class of clustering algorithms. These methods can discover clusters of various shapes and sizes. The most studied algorithm in this class is the Density-Based Spatial Clustering of Applications with Noise (DBSCAN). It identifies clusters by grouping the densely connected objects into one group and discarding the noise objects. It requires two input parameters: epsilon (fixed neighborhood radius) and MinPts (the lowest number of objects in epsilon). However, it can’t handle clusters of various densities since it uses a global value for epsilon. This article proposes an adaptation of the DBSCAN method so… More >

  • Open AccessOpen Access

    ARTICLE

    TECMH: Transformer-Based Cross-Modal Hashing For Fine-Grained Image-Text Retrieval

    Qiqi Li1, Longfei Ma1, Zheng Jiang1, Mingyong Li1,*, Bo Jin2
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3713-3728, 2023, DOI:10.32604/cmc.2023.037463
    Abstract In recent years, cross-modal hash retrieval has become a popular research field because of its advantages of high efficiency and low storage. Cross-modal retrieval technology can be applied to search engines, cross-modal medical processing, etc. The existing main method is to use a multi-label matching paradigm to finish the retrieval tasks. However, such methods do not use fine-grained information in the multi-modal data, which may lead to sub-optimal results. To avoid cross-modal matching turning into label matching, this paper proposes an end-to-end fine-grained cross-modal hash retrieval method, which can focus more on the fine-grained semantic information of multi-modal data. First,… More >

  • Open AccessOpen Access

    ARTICLE

    Grey Wolf-Based Method for an Implicit Authentication of Smartphone Users

    Abdulwahab Ali Almazroi, Mohamed Meselhy Eltoukhy*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3729-3741, 2023, DOI:10.32604/cmc.2023.036020
    Abstract Smartphones have now become an integral part of our everyday lives. User authentication on smartphones is often accomplished by mechanisms (like face unlock, pattern, or pin password) that authenticate the user’s identity. These technologies are simple, inexpensive, and fast for repeated logins. However, these technologies are still subject to assaults like smudge assaults and shoulder surfing. Users’ touch behavior while using their cell phones might be used to authenticate them, which would solve the problem. The performance of the authentication process may be influenced by the attributes chosen (from these behaviors). The purpose of this study is to present an… More >

  • Open AccessOpen Access

    ARTICLE

    Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing

    Emad Alsuwat1,*, Suhare Solaiman1, Hatim Alsuwat2
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3743-3759, 2023, DOI:10.32604/cmc.2023.035126
    Abstract Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning (ML) models. Due to attackers’ (and/or benign equivalents’) dynamic behavior changes, testing data distribution frequently diverges from original training data over time, resulting in substantial model failures. Due to their dispersed and dynamic nature, distributed denial-of-service attacks pose a danger to cybersecurity, resulting in attacks with serious consequences for users and businesses. This paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service (DDOS) in the network.… More >

  • Open AccessOpen Access

    ARTICLE

    A New Prediction System Based on Self-Growth Belief Rule Base with Interpretability Constraints

    Yingmei Li, Peng Han, Wei He*, Guangling Zhang, Hongwei Wei, Boying Zhao
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3761-3780, 2023, DOI:10.32604/cmc.2023.037686
    Abstract Prediction systems are an important aspect of intelligent decisions. In engineering practice, the complex system structure and the external environment cause many uncertain factors in the model, which influence the modeling accuracy of the model. The belief rule base (BRB) can implement nonlinear modeling and express a variety of uncertain information, including fuzziness, ignorance, randomness, etc. However, the BRB system also has two main problems: Firstly, modeling methods based on expert knowledge make it difficult to guarantee the model’s accuracy. Secondly, interpretability is not considered in the optimization process of current research, resulting in the destruction of the interpretability of… More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain-Enabled Secure and Privacy-Preserving Data Aggregation for Fog-Based ITS

    Siguang Chen1,2,*, Li Yang1,2, Yanhang Shi1,2, Qian Wang1
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3781-3796, 2023, DOI:10.32604/cmc.2023.036437
    Abstract As an essential component of intelligent transportation systems (ITS), electric vehicles (EVs) can store massive amounts of electric power in their batteries and send power back to a charging station (CS) at peak hours to balance the power supply and generate profits. However, when the system collects the corresponding power data, several severe security and privacy issues are encountered. The identity and private injection data may be maliciously intercepted by network attackers and be tampered with to damage the services of ITS and smart grids. Existing approaches requiring high computational overhead render them unsuitable for the resource-constrained Internet of Things… More >

  • Open AccessOpen Access

    ARTICLE

    Ether-IoT: A Realtime Lightweight and Scalable Blockchain-Enabled Cache Algorithm for IoT Access Control

    Hafiz Adnan Hussain*, Zulkefli Mansor, Zarina Shukur, Uzma Jafar
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3797-3815, 2023, DOI:10.32604/cmc.2023.034671
    Abstract Several unique characteristics of Internet of Things (IoT) devices, such as distributed deployment and limited storage, make it challenging for standard centralized access control systems to enable access control in today’s large-scale IoT ecosystem. To solve these challenges, this study presents an IoT access control system called Ether-IoT based on the Ethereum Blockchain (BC) infrastructure with Attribute-Based Access Control (ABAC). Access Contract (AC), Cache Contract (CC), Device Contract (DC), and Policy Contract (PC) are the four central smart contracts (SCs) that are included in the proposed system. CC offers a way to save user characteristics in a local cache system… More >

  • Open AccessOpen Access

    ARTICLE

    Improving Speech Enhancement Framework via Deep Learning

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3817-3832, 2023, DOI:10.32604/cmc.2023.037380
    Abstract Speech plays an extremely important role in social activities. Many individuals suffer from a “speech barrier,” which limits their communication with others. In this study, an improved speech recognition method is proposed that addresses the needs of speech-impaired and deaf individuals. A basic improved connectionist temporal classification convolutional neural network (CTC-CNN) architecture acoustic model was constructed by combining a speech database with a deep neural network. Acoustic sensors were used to convert the collected voice signals into text or corresponding voice signals to improve communication. The method can be extended to modern artificial intelligence techniques, with multiple applications such as… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Intelligence and Internet of Things Enabled Intelligent Framework for Active and Healthy Living

    Saeed Ali Alsareii1, Mohsin Raza2, Abdulrahman Manaa Alamri1, Mansour Yousef AlAsmari1, Muhammad Irfan3, Hasan Raza4, Muhammad Awais2,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3833-3848, 2023, DOI:10.32604/cmc.2023.035686
    Abstract Obesity poses several challenges to healthcare and the well-being of individuals. It can be linked to several life-threatening diseases. Surgery is a viable option in some instances to reduce obesity-related risks and enable weight loss. State-of-the-art technologies have the potential for long-term benefits in post-surgery living. In this work, an Internet of Things (IoT) framework is proposed to effectively communicate the daily living data and exercise routine of surgery patients and patients with excessive weight. The proposed IoT framework aims to enable seamless communications from wearable sensors and body networks to the cloud to create an accurate profile of the… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Security by Using GIFT and ECC Encryption Method in Multi-Tenant Datacenters

    Jin Wang1, Ying Liu1, Shuying Rao1, R. Simon Sherratt2, Jinbin Hu1,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3849-3865, 2023, DOI:10.32604/cmc.2023.037150
    Abstract Data security and user privacy have become crucial elements in multi-tenant data centers. Various traffic types in the multi-tenant data center in the cloud environment have their characteristics and requirements. In the data center network (DCN), short and long flows are sensitive to low latency and high throughput, respectively. The traditional security processing approaches, however, neglect these characteristics and requirements. This paper proposes a fine-grained security enhancement mechanism (SEM) to solve the problem of heterogeneous traffic and reduce the traffic completion time (FCT) of short flows while ensuring the security of multi-tenant traffic transmission. Specifically, for short flows in DCN,… More >

  • Open AccessOpen Access

    ARTICLE

    A Convolutional Neural Network Model for Wheat Crop Disease Prediction

    Mahmood Ashraf1,*, Mohammad Abrar2, Nauman Qadeer3, Abdulrahman A. Alshdadi4, Thabit Sabbah5, Muhammad Attique Khan6
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3867-3882, 2023, DOI:10.32604/cmc.2023.035498
    Abstract Wheat is the most important cereal crop, and its low production incurs import pressure on the economy. It fulfills a significant portion of the daily energy requirements of the human body. The wheat disease is one of the major factors that result in low production and negatively affects the national economy. Thus, timely detection of wheat diseases is necessary for improving production. The CNN-based architectures showed tremendous achievement in the image-based classification and prediction of crop diseases. However, these models are computationally expensive and need a large amount of training data. In this research, a light weighted modified CNN architecture… More >

  • Open AccessOpen Access

    ARTICLE

    COVID-19 Classification from X-Ray Images: An Approach to Implement Federated Learning on Decentralized Dataset

    Ali Akbar Siddique1, S. M. Umar Talha1, M. Aamir1, Abeer D. Algarni2, Naglaa F. Soliman2,*, Walid El-Shafai3,4
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3883-3901, 2023, DOI:10.32604/cmc.2023.037413
    Abstract The COVID-19 pandemic has devastated our daily lives, leaving horrific repercussions in its aftermath. Due to its rapid spread, it was quite difficult for medical personnel to diagnose it in such a big quantity. Patients who test positive for Covid-19 are diagnosed via a nasal PCR test. In comparison, polymerase chain reaction (PCR) findings take a few hours to a few days. The PCR test is expensive, although the government may bear expenses in certain places. Furthermore, subsets of the population resist invasive testing like swabs. Therefore, chest X-rays or Computerized Vomography (CT) scans are preferred in most cases, and… More >

  • Open AccessOpen Access

    ARTICLE

    Cooperative Caching Strategy Based on Two-Layer Caching Model for Remote Sensing Satellite Networks

    Rui Xu1,2,3, Xiaoqiang Di1,3,4,*, Hao Luo1, Hui Qi1,3, Xiongwen He5, Wenping Lei6
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3903-3922, 2023, DOI:10.32604/cmc.2023.037054
    Abstract In Information Centric Networking (ICN) where content is the object of exchange, in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite networks. Setting up cache space at any node enables users to access data nearby, thus relieving the processing pressure on the servers. However, the existing caching strategies still suffer from the lack of global planning of cache contents and low utilization of cache resources due to the lack of fine-grained division of cache contents. To address the issues mentioned, a cooperative caching strategy (CSTL) for remote sensing satellite… More >

  • Open AccessOpen Access

    ARTICLE

    Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems

    T. Haritha, A. Anitha*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3923-3939, 2023, DOI:10.32604/cmc.2023.036278
    Abstract In crowded cities, searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’ time, increases air pollution, and traffic congestion. Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement. But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number, personal identity, and desired destination. This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’ security breaches, single points of failure,… More >

  • Open AccessOpen Access

    ARTICLE

    Quantum Secure Undeniable Signature for Blockchain-Enabled Cold-Chain Logistics System

    Chaoyang Li, Hongxue Shen, Xiayang Shi, Hui Liang*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3941-3956, 2023, DOI:10.32604/cmc.2023.037796
    Abstract Data security and user privacy are two main security concerns in the cold-chain logistics system (CCLS). Many security issues exist in traditional CCLS, destroying data security and user privacy. The digital signature can provide data verification and identity authentication based on the mathematical difficulty problem for logistics data sharing in CCLS. This paper first established a blockchain-enabled cold-chain logistics system (BCCLS) based on union blockchain technology, which can provide secure data sharing among different logistics nodes and guarantee logistics data security with the untampered blockchain ledger. Meanwhile, a lattice-based undeniable signature scheme is designed to strengthen the security of logistics… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Calibration Method of Grating Projection Measurement System

    Qiucheng Sun*, Weiyu Dai, Mingyu Sun, Zeming Ren, Mingze Wang
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3957-3970, 2023, DOI:10.32604/cmc.2023.037254
    Abstract In the traditional fringe projection profilometry system, the projector and the camera light center are both spatially virtual points. The spatial position relationships specified in the model are not easy to obtain, leading to inaccurate system parameters and affecting measurement accuracy. This paper proposes a method for solving the system parameters of the fringe projection profilometry system, and the spatial position of the camera and projector can be adjusted in accordance with the obtained calibration parameters. The steps are as follows: First, in accordance with the conversion relationship of the coordinate system in the calibration process, the calculation formula of… More >

  • Open AccessOpen Access

    ARTICLE

    An Innovative Bispectral Deep Learning Method for Protein Family Classification

    Isam Abu-Qasmieh, Amjed Al Fahoum*, Hiam Alquran, Ala’a Zyout
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3971-3991, 2023, DOI:10.32604/cmc.2023.037431
    Abstract Proteins are essential for many biological functions. For example, folding amino acid chains reveals their functionalities by maintaining tissue structure, physiology, and homeostasis. Note that quantifiable protein characteristics are vital for improving therapies and precision medicine. The automatic inference of a protein’s properties from its amino acid sequence is called “basic structure”. Nevertheless, it remains a critical unsolved challenge in bioinformatics, although with recent technological advances and the investigation of protein sequence data. Inferring protein function from amino acid sequences is crucial in biology. This study considers using raw sequencing to explain biological facts using a large corpus of protein… More >

  • Open AccessOpen Access

    ARTICLE

    Parameter Tuned Deep Learning Based Traffic Critical Prediction Model on Remote Sensing Imaging

    Sarkar Hasan Ahmed1, Adel Al-Zebari2, Rizgar R. Zebari3, Subhi R. M. Zeebaree4,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3993-4008, 2023, DOI:10.32604/cmc.2023.037464
    Abstract Remote sensing (RS) presents laser scanning measurements, aerial photos, and high-resolution satellite images, which are utilized for extracting a range of traffic-related and road-related features. RS has a weakness, such as traffic fluctuations on small time scales that could distort the accuracy of predicted road and traffic features. This article introduces an Optimal Deep Learning for Traffic Critical Prediction Model on High-Resolution Remote Sensing Images (ODLTCP-HRRSI) to resolve these issues. The presented ODLTCP-HRRSI technique majorly aims to forecast the critical traffic in smart cities. To attain this, the presented ODLTCP-HRRSI model performs two major processes. At the initial stage, the… More >

  • Open AccessOpen Access

    ARTICLE

    Modified Wild Horse Optimization with Deep Learning Enabled Symmetric Human Activity Recognition Model

    Bareen Shamsaldeen Tahir1, Zainab Salih Ageed2, Sheren Sadiq Hasan3, Subhi R. M. Zeebaree4,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4009-4024, 2023, DOI:10.32604/cmc.2023.037433
    Abstract Traditional indoor human activity recognition (HAR) is a time-series data classification problem and needs feature extraction. Presently, considerable attention has been given to the domain of HAR due to the enormous amount of its real-time uses in real-time applications, namely surveillance by authorities, biometric user identification, and health monitoring of older people. The extensive usage of the Internet of Things (IoT) and wearable sensor devices has made the topic of HAR a vital subject in ubiquitous and mobile computing. The more commonly utilized inference and problem-solving technique in the HAR system have recently been deep learning (DL). The study develops… More >

  • Open AccessOpen Access

    ARTICLE

    Mining Fine-Grain Face Forgery Cues with Fusion Modality

    Shufan Peng, Manchun Cai*, Tianliang Lu, Xiaowen Liu
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4025-4045, 2023, DOI:10.32604/cmc.2023.036688
    Abstract Face forgery detection is drawing ever-increasing attention in the academic community owing to security concerns. Despite the considerable progress in existing methods, we note that: Previous works overlooked fine-grain forgery cues with high transferability. Such cues positively impact the model’s accuracy and generalizability. Moreover, single-modality often causes overfitting of the model, and Red-Green-Blue (RGB) modal-only is not conducive to extracting the more detailed forgery traces. We propose a novel framework for fine-grain forgery cues mining with fusion modality to cope with these issues. First, we propose two functional modules to reveal and locate the deeper forged features. Our method locates… More >

  • Open AccessOpen Access

    ARTICLE

    Recommendation Algorithm Integrating CNN and Attention System in Data Extraction

    Yang Li, Fei Yin, Xianghui Hui*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4047-4063, 2023, DOI:10.32604/cmc.2023.036945
    Abstract With the rapid development of the Internet globally since the 21st century, the amount of data information has increased exponentially. Data helps improve people’s livelihood and working conditions, as well as learning efficiency. Therefore, data extraction, analysis, and processing have become a hot issue for people from all walks of life. Traditional recommendation algorithm still has some problems, such as inaccuracy, less diversity, and low performance. To solve these problems and improve the accuracy and variety of the recommendation algorithms, the research combines the convolutional neural networks (CNN) and the attention model to design a recommendation algorithm based on the… More >

  • Open AccessOpen Access

    REVIEW

    Wireless Sensor Security Issues on Data Link Layer: A Survey

    Muhammad Zulkifl Hasan*, Zurina Mohd Hanapi, Muhammad Zunnurain Hussain
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4065-4084, 2023, DOI:10.32604/cmc.2023.036444
    Abstract A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats and assaults. In 2022, the global market for information technology is expected to reach $170.4 billion. However, in contrast, 95% of cyber security threats globally are caused by human action. These networks may be utilized in several control systems, such as home-automation, chemical and physical assault detection, intrusion detection, and… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Text-Independent Speaker Identification Using Feature Fusion and Transformer Model

    Arfat Ahmad Khan1, Rashid Jahangir2,*, Roobaea Alroobaea3, Saleh Yahya Alyahyan4, Ahmed H. Almulhi3, Majed Alsafyani3, Chitapong Wechtaisong5
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4085-4100, 2023, DOI:10.32604/cmc.2023.036797
    Abstract Automatic Speaker Identification (ASI) involves the process of distinguishing an audio stream associated with numerous speakers’ utterances. Some common aspects, such as the framework difference, overlapping of different sound events, and the presence of various sound sources during recording, make the ASI task much more complicated and complex. This research proposes a deep learning model to improve the accuracy of the ASI system and reduce the model training time under limited computation resources. In this research, the performance of the transformer model is investigated. Seven audio features, chromagram, Mel-spectrogram, tonnetz, Mel-Frequency Cepstral Coefficients (MFCCs), delta MFCCs, delta-delta MFCCs and spectral… More >

  • Open AccessOpen Access

    ARTICLE

    Feature Selection with Deep Belief Network for Epileptic Seizure Detection on EEG Signals

    Srikanth Cherukuvada, R. Kayalvizhi*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4101-4118, 2023, DOI:10.32604/cmc.2023.036207
    Abstract The term Epilepsy refers to a most commonly occurring brain disorder after a migraine. Early identification of incoming seizures significantly impacts the lives of people with Epilepsy. Automated detection of epileptic seizures (ES) has dramatically improved the life quality of the patients. Recent Electroencephalogram (EEG) related seizure detection mechanisms encountered several difficulties in real-time. The EEGs are the non-stationary signal, and seizure patterns would change with patients and recording sessions. Further, EEG data were disposed to wide noise varieties that adversely moved the recognition accuracy of ESs. Artificial intelligence (AI) methods in the domain of ES analysis use traditional deep… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Resource Allocation Framework for Multi-Cloud Environment

    Tahir Alyas1, Taher M. Ghazal2,3, Badria Sulaiman Alfurhood4, Ghassan F. Issa2, Osama Ali Thawabeh5, Qaiser Abbas6,*
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4119-4136, 2023, DOI:10.32604/cmc.2023.033916
    Abstract Cloud computing makes dynamic resource provisioning more accessible. Monitoring a functioning service is crucial, and changes are made when particular criteria are surpassed. This research explores the decentralized multi-cloud environment for allocating resources and ensuring the Quality of Service (QoS), estimating the required resources, and modifying allotted resources depending on workload and parallelism due to resources. Resource allocation is a complex challenge due to the versatile service providers and resource providers. The engagement of different service and resource providers needs a cooperation strategy for a sustainable quality of service. The objective of a coherent and rational resource allocation is to… More >

  • Open AccessOpen Access

    ARTICLE

    Computational Linguistics with Optimal Deep Belief Network Based Irony Detection in Social Media

    Manar Ahmed Hamza1,*, Hala J. Alshahrani2, Abdulkhaleq Q. A. Hassan3, Abdulbaset Gaddah4, Nasser Allheeib5, Suleiman Ali Alsaif6, Badriyya B. Al-onazi7, Heba Mohsen8
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4137-4154, 2023, DOI:10.32604/cmc.2023.035237
    Abstract Computational linguistics refers to an interdisciplinary field associated with the computational modelling of natural language and studying appropriate computational methods for linguistic questions. The number of social media users has been increasing over the last few years, which have allured researchers’ interest in scrutinizing the new kind of creative language utilized on the Internet to explore communication and human opinions in a better way. Irony and sarcasm detection is a complex task in Natural Language Processing (NLP). Irony detection has inferences in advertising, sentiment analysis (SA), and opinion mining. For the last few years, irony-aware SA has gained significant computational… More >

  • Open AccessOpen Access

    ARTICLE

    Big Data Bot with a Special Reference to Bioinformatics

    Ahmad M. Al-Omari1,*, Shefa M. Tawalbeh1, Yazan H. Akkam2, Mohammad Al-Tawalbeh3, Shima’a Younis1, Abdullah A. Mustafa4, Jonathan Arnold5
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4155-4173, 2023, DOI:10.32604/cmc.2023.036956
    Abstract There are quintillions of data on deoxyribonucleic acid (DNA) and protein in publicly accessible data banks, and that number is expanding at an exponential rate. Many scientific fields, such as bioinformatics and drug discovery, rely on such data; nevertheless, gathering and extracting data from these resources is a tough undertaking. This data should go through several processes, including mining, data processing, analysis, and classification. This study proposes software that extracts data from big data repositories automatically and with the particular ability to repeat data extraction phases as many times as needed without human intervention. This software simulates the extraction of… More >

  • Open AccessOpen Access

    ARTICLE

    Computational Investigation of Hand Foot Mouth Disease Dynamics with Fuzziness

    Dumitru Baleanu1,2,3, Fazal Dayan4, Nauman Ahmed3,5,*, Muhammad Rafiq6,7, Ali Raza3,8, Muhammad Ozair Ahmad5
    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4175-4189, 2023, DOI:10.32604/cmc.2023.034868
    Abstract The first major outbreak of the severely complicated hand, foot and mouth disease (HFMD), primarily caused by enterovirus 71, was reported in Taiwan in 1998. HFMD surveillance is needed to assess the spread of HFMD. The parameters we use in mathematical models are usually classical mathematical parameters, called crisp parameters, which are taken for granted. But any biological or physical phenomenon is best explained by uncertainty. To represent a realistic situation in any mathematical model, fuzzy parameters can be very useful. Many articles have been published on how to control and prevent HFMD from the perspective of public health and… More >

Per Page:

Share Link