Home / Journals / CMC / Vol.76, No.3, 2023
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Multi-Agent Deep Reinforcement Learning for Efficient Computation Offloading in Mobile Edge Computing

    Tianzhe Jiao, Xiaoyue Feng, Chaopeng Guo, Dongqi Wang, Jie Song*
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3585-3603, 2023, DOI:10.32604/cmc.2023.040068
    Abstract Mobile-edge computing (MEC) is a promising technology for the fifth-generation (5G) and sixth-generation (6G) architectures, which provides resourceful computing capabilities for Internet of Things (IoT) devices, such as virtual reality, mobile devices, and smart cities. In general, these IoT applications always bring higher energy consumption than traditional applications, which are usually energy-constrained. To provide persistent energy, many references have studied the offloading problem to save energy consumption. However, the dynamic environment dramatically increases the optimization difficulty of the offloading decision. In this paper, we aim to minimize the energy consumption of the entire MEC system under the latency constraint by… More >

  • Open AccessOpen Access

    ARTICLE

    Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model

    Abdulgbar A. R. Farea1, Gehad Abdullah Amran2,*, Ebraheem Farea3, Amerah Alabrah4,*, Ahmed A. Abdulraheem5, Muhammad Mursil6, Mohammed A. A. Al-qaness7
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3605-3622, 2023, DOI:10.32604/cmc.2023.040121
    (This article belongs to the Special Issue: AI-driven Cybersecurity in Cyber Physical Systems enabled Healthcare, Current Challenges, Requirements and Future research Foresights)
    Abstract E-commerce, online ticketing, online banking, and other web-based applications that handle sensitive data, such as passwords, payment information, and financial information, are widely used. Various web developers may have varying levels of understanding when it comes to securing an online application. Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the Open Web Application Security Project (OWASP) for its 2017 Top Ten List Cross Site Scripting (XSS). An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws. Many published articles focused on these attacks’ binary classification. This… More >

  • Open AccessOpen Access

    ARTICLE

    Two-Stage Edge-Side Fault Diagnosis Method Based on Double Knowledge Distillation

    Yang Yang1, Yuhan Long1, Yijing Lin2, Zhipeng Gao1, Lanlan Rui1, Peng Yu1,3,*
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3623-3651, 2023, DOI:10.32604/cmc.2023.040250
    Abstract With the rapid development of the Internet of Things (IoT), the automation of edge-side equipment has emerged as a significant trend. The existing fault diagnosis methods have the characteristics of heavy computing and storage load, and most of them have computational redundancy, which is not suitable for deployment on edge devices with limited resources and capabilities. This paper proposes a novel two-stage edge-side fault diagnosis method based on double knowledge distillation. First, we offer a clustering-based self-knowledge distillation approach (Cluster KD), which takes the mean value of the sample diagnosis results, clusters them, and takes the clustering results as the… More >

  • Open AccessOpen Access

    ARTICLE

    Binary Oriented Feature Selection for Valid Product Derivation in Software Product Line

    Muhammad Fezan Afzal1, Imran Khan1, Javed Rashid1,2,3, Mubbashar Saddique4,*, Heba G. Mohamed5
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3653-3670, 2023, DOI:10.32604/cmc.2023.041627
    (This article belongs to the Special Issue: The Next Generation of Artificial Intelligence and the Intelligent Internet of Things)
    Abstract Software Product Line (SPL) is a group of software-intensive systems that share common and variable resources for developing a particular system. The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints (CTC). CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things (IoT) devices because different Internet devices and protocols are communicated. Therefore, managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex, time-consuming, and hard. However, the CTC… More >

  • Open AccessOpen Access

    ARTICLE

    PAN-DeSpeck: A Lightweight Pyramid and Attention-Based Network for SAR Image Despeckling

    Saima Yasmeen1, Muhammad Usman Yaseen1,*, Syed Sohaib Ali2, Moustafa M. Nasralla3, Sohaib Bin Altaf Khattak3
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3671-3689, 2023, DOI:10.32604/cmc.2023.041195
    Abstract SAR images commonly suffer from speckle noise, posing a significant challenge in their analysis and interpretation. Existing convolutional neural network (CNN) based despeckling methods have shown great performance in removing speckle noise. However, these CNN-based methods have a few limitations. They do not decouple complex background information in a multi-resolution manner. Moreover, they have deep network structures that may result in many parameters, limiting their applicability to mobile devices. Furthermore, extracting key speckle information in the presence of complex background is also a major problem with SAR. The proposed study addresses these limitations by introducing a lightweight pyramid and attention-based… More >

  • Open AccessOpen Access

    ARTICLE

    Topic-Aware Abstractive Summarization Based on Heterogeneous Graph Attention Networks for Chinese Complaint Reports

    Yan Li1, Xiaoguang Zhang1,*, Tianyu Gong1, Qi Dong1, Hailong Zhu1, Tianqiang Zhang1, Yanji Jiang2,3
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3691-3705, 2023, DOI:10.32604/cmc.2023.040492
    Abstract Automatic text summarization (ATS) plays a significant role in Natural Language Processing (NLP). Abstractive summarization produces summaries by identifying and compressing the most important information in a document. However, there are only relatively several comprehensively evaluated abstractive summarization models that work well for specific types of reports due to their unstructured and oral language text characteristics. In particular, Chinese complaint reports, generated by urban complainers and collected by government employees, describe existing resident problems in daily life. Meanwhile, the reflected problems are required to respond speedily. Therefore, automatic summarization tasks for these reports have been developed. However, similar to traditional… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Traffic Surveillance through Multi-Label Semantic Segmentation and Filter-Based Tracking

    Asifa Mehmood Qureshi1, Nouf Abdullah Almujally2, Saud S. Alotaibi3, Mohammed Hamad Alatiyyah4, Jeongmin Park5,*
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3707-3725, 2023, DOI:10.32604/cmc.2023.040738
    Abstract Road congestion, air pollution, and accident rates have all increased as a result of rising traffic density and worldwide population growth. Over the past ten years, the total number of automobiles has increased significantly over the world. In this paper, a novel method for intelligent traffic surveillance is presented. The proposed model is based on multilabel semantic segmentation using a random forest classifier which classifies the images into five classes. To improve the results, mean-shift clustering was applied to the segmented images. Afterward, the pixels given the label for the vehicle were extracted and blob detection was applied to mark… More >

  • Open AccessOpen Access

    ARTICLE

    A Double-Branch Xception Architecture for Acute Hemorrhage Detection and Subtype Classification

    Muhammad Naeem Akram1, Muhammad Usman Yaseen1, Muhammad Waqar1, Muhammad Imran1,*, Aftab Hussain2
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3727-3744, 2023, DOI:10.32604/cmc.2023.041855
    Abstract This study presents a deep learning model for efficient intracranial hemorrhage (ICH) detection and subtype classification on non-contrast head computed tomography (CT) images. ICH refers to bleeding in the skull, leading to the most critical life-threatening health condition requiring rapid and accurate diagnosis. It is classified as intra-axial hemorrhage (intraventricular, intraparenchymal) and extra-axial hemorrhage (subdural, epidural, subarachnoid) based on the bleeding location inside the skull. Many computer-aided diagnoses (CAD)-based schemes have been proposed for ICH detection and classification at both slice and scan levels. However, these approaches perform only binary classification and suffer from a large number of parameters, which… More >

  • Open AccessOpen Access

    ARTICLE

    Convolutional LSTM Network for Heart Disease Diagnosis on Electrocardiograms

    Batyrkhan Omarov1,*, Meirzhan Baikuvekov1, Zeinel Momynkulov2, Aray Kassenkhan3, Saltanat Nuralykyzy3, Mereilim Iglikova3
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3745-3761, 2023, DOI:10.32604/cmc.2023.042627
    Abstract Heart disease is a leading cause of mortality worldwide. Electrocardiograms (ECG) play a crucial role in diagnosing heart disease. However, interpreting ECG signals necessitates specialized knowledge and training. The development of automated methods for ECG analysis has the potential to enhance the accuracy and efficiency of heart disease diagnosis. This research paper proposes a 3D Convolutional Long Short-Term Memory (Conv-LSTM) model for detecting heart disease using ECG signals. The proposed model combines the advantages of both convolutional neural networks (CNN) and long short-term memory (LSTM) networks. By considering both the spatial and temporal dependencies of ECG, the 3D Conv-LSTM model… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning with a Novel Concoction Loss Function for Identification of Ophthalmic Disease

    Sayyid Kamran Hussain1, Ali Haider Khan2,*, Malek Alrashidi3, Sajid Iqbal4, Qazi Mudassar Ilyas4, Kamran Shah5
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3763-3781, 2023, DOI:10.32604/cmc.2023.041722
    (This article belongs to the Special Issue: Recent Advances in Ophthalmic Diseases Diagnosis using AI)
    Abstract As ocular computer-aided diagnostic (CAD) tools become more widely accessible, many researchers are developing deep learning (DL) methods to aid in ocular disease (OHD) diagnosis. Common eye diseases like cataracts (CATR), glaucoma (GLU), and age-related macular degeneration (AMD) are the focus of this study, which uses DL to examine their identification. Data imbalance and outliers are widespread in fundus images, which can make it difficult to apply many DL algorithms to accomplish this analytical assignment. The creation of effcient and reliable DL algorithms is seen to be the key to further enhancing detection performance. Using the analysis of images of… More >

  • Open AccessOpen Access

    ARTICLE

    A Data Consistency Insurance Method for Smart Contract

    Jing Deng1, Xiaofei Xing1, Guoqiang Deng2,*, Ning Hu3, Shen Su3, Le Wang3, Md Zakirul Alam Bhuiyan4
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3783-3795, 2023, DOI:10.32604/cmc.2023.034116
    Abstract As one of the major threats to the current DeFi (Decentralized Finance) ecosystem, reentrant attack induces data inconsistency of the victim smart contract, enabling attackers to steal on-chain assets from DeFi projects, which could terribly do harm to the confidence of the blockchain investors. However, protecting DeFi projects from the reentrant attack is very difficult, since generating a call loop within the highly automatic DeFi ecosystem could be very practicable. Existing researchers mainly focus on the detection of the reentrant vulnerabilities in the code testing, and no method could promise the non-existent of reentrant vulnerabilities. In this paper, we introduce… More >

  • Open AccessOpen Access

    ARTICLE

    Clinical Knowledge-Based Hybrid Swin Transformer for Brain Tumor Segmentation

    Xiaoliang Lei1, Xiaosheng Yu2,*, Hao Wu3, Chengdong Wu2,*, Jingsi Zhang2
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3797-3811, 2023, DOI:10.32604/cmc.2023.042069
    Abstract Accurate tumor segmentation from brain tissues in Magnetic Resonance Imaging (MRI) imaging is crucial in the pre-surgical planning of brain tumor malignancy. MRI images’ heterogeneous intensity and fuzzy boundaries make brain tumor segmentation challenging. Furthermore, recent studies have yet to fully employ MRI sequences’ considerable and supplementary information, which offers critical a priori knowledge. This paper proposes a clinical knowledge-based hybrid Swin Transformer multimodal brain tumor segmentation algorithm based on how experts identify malignancies from MRI images. During the encoder phase, a dual backbone network with a Swin Transformer backbone to capture long dependencies from 3D MR images and a… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Layer Deep Sparse Representation for Biological Slice Image Inpainting

    Haitao Hu1, Hongmei Ma2, Shuli Mei1,*
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3813-3832, 2023, DOI:10.32604/cmc.2023.041416
    Abstract Biological slices are an effective tool for studying the physiological structure and evolution mechanism of biological systems. However, due to the complexity of preparation technology and the presence of many uncontrollable factors during the preparation processing, leads to problems such as difficulty in preparing slice images and breakage of slice images. Therefore, we proposed a biological slice image small-scale corruption inpainting algorithm with interpretability based on multi-layer deep sparse representation, achieving the high-fidelity reconstruction of slice images. We further discussed the relationship between deep convolutional neural networks and sparse representation, ensuring the high-fidelity characteristic of the algorithm first. A novel… More >

  • Open AccessOpen Access

    ARTICLE

    Speech Recognition via CTC-CNN Model

    Wen-Tsai Sung1, Hao-Wei Kang1, Sung-Jung Hsiao2,*
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3833-3858, 2023, DOI:10.32604/cmc.2023.040024
    Abstract In the speech recognition system, the acoustic model is an important underlying model, and its accuracy directly affects the performance of the entire system. This paper introduces the construction and training process of the acoustic model in detail and studies the Connectionist temporal classification (CTC) algorithm, which plays an important role in the end-to-end framework, established a convolutional neural network (CNN) combined with an acoustic model of Connectionist temporal classification to improve the accuracy of speech recognition. This study uses a sound sensor, ReSpeaker Mic Array v2.0.1, to convert the collected speech signals into text or corresponding speech signals to… More >

  • Open AccessOpen Access

    ARTICLE

    An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments

    Weizheng Wang1,3, Xiangqi Wang2,*, Xianmin Pan1, Xingxing Gong3, Jian Liang3, Pradip Kumar Sharma4, Osama Alfarraj5, Wael Said6
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3859-3876, 2023, DOI:10.32604/cmc.2023.041346
    Abstract Image-denoising techniques are widely used to defend against Adversarial Examples (AEs). However, denoising alone cannot completely eliminate adversarial perturbations. The remaining perturbations tend to amplify as they propagate through deeper layers of the network, leading to misclassifications. Moreover, image denoising compromises the classification accuracy of original examples. To address these challenges in AE defense through image denoising, this paper proposes a novel AE detection technique. The proposed technique combines multiple traditional image-denoising algorithms and Convolutional Neural Network (CNN) network structures. The used detector model integrates the classification results of different models as the input to the detector and calculates the… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure and Efficient Information Authentication Scheme for E-Healthcare System

    Naveed Khan1, Jianbiao Zhang1,*, Ghulam Ali Mallah2, Shehzad Ashraf Chaudhry3
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3877-3896, 2023, DOI:10.32604/cmc.2023.032553
    (This article belongs to the Special Issue: AI-driven Cybersecurity in Cyber Physical Systems enabled Healthcare, Current Challenges, Requirements and Future research Foresights)
    Abstract The mobile cellular network provides internet connectivity for heterogeneous Internet of Things (IoT) devices. The cellular network consists of several towers installed at appropriate locations within a smart city. These cellular towers can be utilized for various tasks, such as e-healthcare systems, smart city surveillance, traffic monitoring, infrastructure surveillance, or sidewalk checking. Security is a primary concern in data broadcasting, particularly authentication, because the strength of a cellular network’s signal is much higher frequency than the associated one, and their frequencies can sometimes be aligned, posing a significant challenge. As a result, that requires attention, and without information authentication, such… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Deep Learning Approach to Classify the Plant Leaf Species

    Javed Rashid1,2, Imran Khan1, Irshad Ahmed Abbasi3, Muhammad Rizwan Saeed4, Mubbashar Saddique5,*, Mohamed Abbas6,7
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3897-3920, 2023, DOI:10.32604/cmc.2023.040356
    (This article belongs to the Special Issue: Recent Advances in Deep Learning and Saliency Methods for Agriculture)
    Abstract Many plant species have a startling degree of morphological similarity, making it difficult to split and categorize them reliably. Unknown plant species can be challenging to classify and segment using deep learning. While using deep learning architectures has helped improve classification accuracy, the resulting models often need to be more flexible and require a large dataset to train. For the sake of taxonomy, this research proposes a hybrid method for categorizing guava, potato, and java plum leaves. Two new approaches are used to form the hybrid model suggested here. The guava, potato, and java plum plant species have been successfully… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Multi-Blockchain Electronic Archives Sharing Model

    Fang Yu1, Wenbin Bi2, Ning Cao3,*, Jun Luo4, Diantang An5, Liqiang Ding4, Russell Higgs6
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3921-3931, 2023, DOI:10.32604/cmc.2023.028330
    Abstract The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption. Aiming at the problem of dynamic permission management in common access control methods, a new access control method based on smart contract under blockchain is proposed, which improves the intelligence level under blockchain technology. Firstly, the Internet attribute access control model based on smart contract is established. For the dynamic access of heterogeneous devices, the management contract, permission judgment contract and access control contract are designed; Secondly,… More >

  • Open AccessOpen Access

    ARTICLE

    Detection of Different Stages of Alzheimer’s Disease Using CNN Classifier

    S M Hasan Mahmud1,2, Md Mamun Ali3, Mohammad Fahim Shahriar1, Fahad Ahmed Al-Zahrani4, Kawsar Ahmed5,6,*, Dip Nandi1, Francis M. Bui5
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3933-3948, 2023, DOI:10.32604/cmc.2023.039020
    (This article belongs to the Special Issue: IoMT and Smart Healthcare)
    Abstract Alzheimer’s disease (AD) is a neurodevelopmental impairment that results in a person’s behavior, thinking, and memory loss. The most common symptoms of AD are losing memory and early aging. In addition to these, there are several serious impacts of AD. However, the impact of AD can be mitigated by early-stage detection though it cannot be cured permanently. Early-stage detection is the most challenging task for controlling and mitigating the impact of AD. The study proposes a predictive model to detect AD in the initial phase based on machine learning and a deep learning approach to address the issue. To build… More >

  • Open AccessOpen Access

    ARTICLE

    A Smart Obfuscation Approach to Protect Software in Cloud

    Lei Yu1, Yucong Duan2,*
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3949-3965, 2023, DOI:10.32604/cmc.2023.038970
    (This article belongs to the Special Issue: AI Powered Human-centric Computing with Cloud and Edge)
    Abstract Cloud computing and edge computing brought more software, which also brought a new danger of malicious software attacks. Data synchronization mechanisms of software can further help reverse data modifications. Based on the mechanisms, attackers can cover themselves behind the network and modify data undetected. Related knowledge of software reverse engineering can be organized as rules to accelerate the attacks, when attackers intrude cloud server to access the source or binary codes. Therefore, we proposed a novel method to resist this kind of reverse engineering by breaking these rules. Our method is based on software obfuscations and encryptions to enhance the… More >

Per Page:

Share Link