Home / Journals / CMC / Vol.77, No.1, 2023
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Adaptive Momentum-Backpropagation Algorithm for Flood Prediction and Management in the Internet of Things

    Jayaraj Thankappan1, Delphin Raj Kesari Mary2, Dong Jin Yoon3, Soo-Hyun Park4,*
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1053-1079, 2023, DOI:10.32604/cmc.2023.038437
    (This article belongs to the Special Issue: Innovations in Pervasive Computing and Communication Technologies)
    Abstract Flooding is a hazardous natural calamity that causes significant damage to lives and infrastructure in the real world. Therefore, timely and accurate decision-making is essential for mitigating flood-related damages. The traditional flood prediction techniques often encounter challenges in accuracy, timeliness, complexity in handling dynamic flood patterns and leading to substandard flood management strategies. To address these challenges, there is a need for advanced machine learning models that can effectively analyze Internet of Things (IoT)-generated flood data and provide timely and accurate flood predictions. This paper proposes a novel approach-the Adaptive Momentum and Backpropagation (AM-BP) algorithm-for flood prediction and management in… More >

  • Open AccessOpen Access

    ARTICLE

    Recognizing Breast Cancer Using Edge-Weighted Texture Features of Histopathology Images

    Arslan Akram1,2, Javed Rashid2,3,4, Fahima Hajjej5, Sobia Yaqoob1,6, Muhammad Hamid7, Asma Irshad8, Nadeem Sarwar9,*
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1081-1101, 2023, DOI:10.32604/cmc.2023.041558
    (This article belongs to the Special Issue: Big Data Analysis for Healthcare Applications)
    Abstract Around one in eight women will be diagnosed with breast cancer at some time. Improved patient outcomes necessitate both early detection and an accurate diagnosis. Histological images are routinely utilized in the process of diagnosing breast cancer. Methods proposed in recent research only focus on classifying breast cancer on specific magnification levels. No study has focused on using a combined dataset with multiple magnification levels to classify breast cancer. A strategy for detecting breast cancer is provided in the context of this investigation. Histopathology image texture data is used with the wavelet transform in this technique. The proposed method comprises… More >

  • Open AccessOpen Access

    ARTICLE

    RF-Net: Unsupervised Low-Light Image Enhancement Based on Retinex and Exposure Fusion

    Tian Ma, Chenhui Fu*, Jiayi Yang, Jiehui Zhang, Chuyang Shang
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1103-1122, 2023, DOI:10.32604/cmc.2023.042416
    (This article belongs to the Special Issue: Advances and Applications in Signal, Image and Video Processing)
    Abstract Low-light image enhancement methods have limitations in addressing issues such as color distortion, lack of vibrancy, and uneven light distribution and often require paired training data. To address these issues, we propose a two-stage unsupervised low-light image enhancement algorithm called Retinex and Exposure Fusion Network (RF-Net), which can overcome the problems of over-enhancement of the high dynamic range and under-enhancement of the low dynamic range in existing enhancement algorithms. This algorithm can better manage the challenges brought about by complex environments in real-world scenarios by training with unpaired low-light images and regular-light images. In the first stage, we design a… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning-Based Robust Morphed Face Authentication Framework for Online Systems

    Harsh Mankodiya1, Priyal Palkhiwala1, Rajesh Gupta1,*, Nilesh Kumar Jadav1, Sudeep Tanwar1, Osama Alfarraj2, Amr Tolba2, Maria Simona Raboaca3,4,*, Verdes Marina5
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1123-1142, 2023, DOI:10.32604/cmc.2023.038556
    Abstract The amalgamation of artificial intelligence (AI) with various areas has been in the picture for the past few years. AI has enhanced the functioning of several services, such as accomplishing better budgets, automating multiple tasks, and data-driven decision-making. Conducting hassle-free polling has been one of them. However, at the onset of the coronavirus in 2020, almost all worldly affairs occurred online, and many sectors switched to digital mode. This allows attackers to find security loopholes in digital systems and exploit them for their lucrative business. This paper proposes a three-layered deep learning (DL)-based authentication framework to develop a secure online… More >

  • Open AccessOpen Access

    ARTICLE

    A Wrapping Encryption Based on Double Randomness Mechanism

    Yi-Li Huang1, Fang-Yie Leu1,2,*, Ruey-Kai Sheu1, Jung-Chun Liu1, Chi-Jan Huang2,3
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1143-1164, 2023, DOI:10.32604/cmc.2023.037161
    Abstract Currently, data security mainly relies on password (PW) or system channel key (SKCH) to encrypt data before they are sent, no matter whether in broadband networks, the 5th generation (5G) mobile communications, satellite communications, and so on. In these environments, a fixed password or channel key (e.g., PW/SKCH) is often adopted to encrypt different data, resulting in security risks since this PW/SKCH may be solved after hackers collect a huge amount of encrypted data. Actually, the most popularly used security mechanism Advanced Encryption Standard (AES) has its own problems, e.g., several rounds have been solved. On the other hand, if… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Service Search Model Using Emerging Technologies

    Farhan Amin, Gyu Sang Choi*
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1165-1181, 2023, DOI:10.32604/cmc.2023.040693
    (This article belongs to the Special Issue: The Next Generation of Artificial Intelligence and the Intelligent Internet of Things)
    Abstract In recent years, the Internet of Things (IoT) has played a vital role in providing various services to users in a smart city. However, searching for services, objects, data, and frameworks remains a concern. The technological advancements in Cyber-Physical Systems (CPSs) and the Social Internet of Things (SIoT) open a new era of research. Thus, we propose a Cyber-Physical-Social Systems (CPSs) for service search. Herein, service search and object discovery operation carries with the suitable selection of friends in the network. Our proposed model constructs a graph and performs social network analysis (SNA). We suggest degree centrality, clustering, and scale-free… More >

  • Open AccessOpen Access

    ARTICLE

    A Text Image Watermarking Algorithm Based on Image Enhancement

    Baowei Wang1,*, Luyao Shen2, Junhao Zhang2, Zenghui Xu2, Neng Wang2
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1183-1207, 2023, DOI:10.32604/cmc.2023.040307
    Abstract Digital watermarking technology is adequate for copyright protection and content authentication. There needs to be more research on the watermarking algorithm after printing and scanning. Aiming at the problem that existing anti-print scanning text image watermarking algorithms cannot take into account the invisibility and robustness of the watermark, an anti-print scanning watermarking algorithm suitable for text images is proposed. This algorithm first performs a series of image enhancement preprocessing operations on the printed scanned image to eliminate the interference of incorrect bit information on watermark embedding and then uses a combination of Discrete Wavelet Transform (DWT)-Singular Value Decomposition (SVD) to… More >

  • Open AccessOpen Access

    ARTICLE

    Liver Tumor Prediction with Advanced Attention Mechanisms Integrated into a Depth-Based Variant Search Algorithm

    P. Kalaiselvi1,*, S. Anusuya2
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1209-1226, 2023, DOI:10.32604/cmc.2023.040264
    Abstract In recent days, Deep Learning (DL) techniques have become an emerging transformation in the field of machine learning, artificial intelligence, computer vision, and so on. Subsequently, researchers and industries have been highly endorsed in the medical field, predicting and controlling diverse diseases at specific intervals. Liver tumor prediction is a vital chore in analyzing and treating liver diseases. This paper proposes a novel approach for predicting liver tumors using Convolutional Neural Networks (CNN) and a depth-based variant search algorithm with advanced attention mechanisms (CNN-DS-AM). The proposed work aims to improve accuracy and robustness in diagnosing and treating liver diseases. The… More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced Automatic Arabic Essay Scoring System Based on Machine Learning Algorithms

    Nourmeen Lotfy1, Abdulaziz Shehab1,2,*, Mohammed Elhoseny1,3, Ahmed Abu-Elfetouh1
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1227-1249, 2023, DOI:10.32604/cmc.2023.039185
    (This article belongs to the Special Issue: Cognitive Computing and Systems in Education and Research)
    Abstract Despite the extensive effort to improve intelligent educational tools for smart learning environments, automatic Arabic essay scoring remains a big research challenge. The nature of the writing style of the Arabic language makes the problem even more complicated. This study designs, implements, and evaluates an automatic Arabic essay scoring system. The proposed system starts with pre-processing the student answer and model answer dataset using data cleaning and natural language processing tasks. Then, it comprises two main components: the grading engine and the adaptive fusion engine. The grading engine employs string-based and corpus-based similarity algorithms separately. After that, the adaptive fusion… More >

  • Open AccessOpen Access

    ARTICLE

    A Smart Heart Disease Diagnostic System Using Deep Vanilla LSTM

    Maryam Bukhari1, Sadaf Yasmin1, Sheneela Naz2, Mehr Yahya Durrani1, Mubashir Javaid3, Jihoon Moon4, Seungmin Rho5,*
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1251-1279, 2023, DOI:10.32604/cmc.2023.040329
    (This article belongs to the Special Issue: Telehealth Monitoring with Man-Computer Interface for Medical Processing)
    Abstract Effective smart healthcare frameworks contain novel and emerging solutions for remote disease diagnostics, which aid in the prevention of several diseases including heart-related abnormalities. In this context, regular monitoring of cardiac patients through smart healthcare systems based on Electrocardiogram (ECG) signals has the potential to save many lives. In existing studies, several heart disease diagnostic systems are proposed by employing different state-of-the-art methods, however, improving such methods is always an intriguing area of research. Hence, in this research, a smart healthcare system is proposed for the diagnosis of heart disease using ECG signals. The proposed framework extracts both linear and… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning-Based Model for Detection of Brinjal Weed in the Era of Precision Agriculture

    Jigna Patel1, Anand Ruparelia1, Sudeep Tanwar1,*, Fayez Alqahtani2, Amr Tolba3, Ravi Sharma4, Maria Simona Raboaca5,6,*, Bogdan Constantin Neagu7
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1281-1301, 2023, DOI:10.32604/cmc.2023.038796
    Abstract The overgrowth of weeds growing along with the primary crop in the fields reduces crop production. Conventional solutions like hand weeding are labor-intensive, costly, and time-consuming; farmers have used herbicides. The application of herbicide is effective but causes environmental and health concerns. Hence, Precision Agriculture (PA) suggests the variable spraying of herbicides so that herbicide chemicals do not affect the primary plants. Motivated by the gap above, we proposed a Deep Learning (DL) based model for detecting Eggplant (Brinjal) weed in this paper. The key objective of this study is to detect plant and non-plant (weed) parts from crop images.… More >

  • Open AccessOpen Access

    ARTICLE

    NPBMT: A Novel and Proficient Buffer Management Technique for Internet of Vehicle-Based DTNs

    Sikandar Khan1, Khalid Saeed1, Muhammad Faran Majeed2,*, Salman A. AlQahtani3, Khursheed Aurangzeb3, Muhammad Shahid Anwar4,*
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1303-1323, 2023, DOI:10.32604/cmc.2023.039697
    (This article belongs to the Special Issue: Software-defined Internet-of-Vehicles (SD-IoV) leveraging AI, 5G and NFV)
    Abstract Delay Tolerant Networks (DTNs) have the major problem of message delay in the network due to a lack of end-to-end connectivity between the nodes, especially when the nodes are mobile. The nodes in DTNs have limited buffer storage for storing delayed messages. This instantaneous sharing of data creates a low buffer/shortage problem. Consequently, buffer congestion would occur and there would be no more space available in the buffer for the upcoming messages. To address this problem a buffer management policy is proposed named “A Novel and Proficient Buffer Management Technique (NPBMT) for the Internet of Vehicle-Based DTNs”. NPBMT combines appropriate-size… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Technique for Image Cryptography Using Sudoku Keys

    M. A. P. Manimekalai1, M. Karthikeyan1, I. Thusnavis Bella Mary1, K. Martin Sagayam1, Ahmed A Elngar2, Unai Fernandez-Gamiz3, Hatıra Günerhan4,*
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1325-1353, 2023, DOI:10.32604/cmc.2023.035856
    (This article belongs to the Special Issue: Artificial Intelligence-based Smart Sensors for Industrial IoT Applications)
    Abstract This paper proposes a cryptographic technique on images based on the Sudoku solution. Sudoku is a number puzzle, which needs applying defined protocols and filling the empty boxes with numbers. Given a small size of numbers as input, solving the sudoku puzzle yields an expanded big size of numbers, which can be used as a key for the Encryption/Decryption of images. In this way, the given small size of numbers can be stored as the prime key, which means the key is compact. A prime key clue in the sudoku puzzle always leads to only one solution, which means the… More >

  • Open AccessOpen Access

    ARTICLE

    Fusion-Based Deep Learning Model for Automated Forest Fire Detection

    Mesfer Al Duhayyim1, Majdy M. Eltahir2, Ola Abdelgney Omer Ali3, Amani Abdulrahman Albraikan4, Fahd N. Al-Wesabi2, Anwer Mustafa Hilal5,*, Manar Ahmed Hamza5, Mohammed Rizwanullah5
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1355-1371, 2023, DOI:10.32604/cmc.2023.024198
    Abstract Earth resource and environmental monitoring are essential areas that can be used to investigate the environmental conditions and natural resources supporting sustainable policy development, regulatory measures, and their implementation elevating the environment. Large-scale forest fire is considered a major harmful hazard that affects climate change and life over the globe. Therefore, the early identification of forest fires using automated tools is essential to avoid the spread of fire to a large extent. Therefore, this paper focuses on the design of automated forest fire detection using a fusion-based deep learning (AFFD-FDL) model for environmental monitoring. The AFFD-FDL technique involves the design… More >

  • Open AccessOpen Access

    ARTICLE

    Micro-Expression Recognition Based on Spatio-Temporal Feature Extraction of Key Regions

    Wenqiu Zhu1,2, Yongsheng Li1,2, Qiang Liu1,2,*, Zhigao Zeng1,2
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1373-1392, 2023, DOI:10.32604/cmc.2023.037216
    Abstract Aiming at the problems of short duration, low intensity, and difficult detection of micro-expressions (MEs), the global and local features of ME video frames are extracted by combining spatial feature extraction and temporal feature extraction. Based on traditional convolution neural network (CNN) and long short-term memory (LSTM), a recognition method combining global identification attention network (GIA), block identification attention network (BIA) and bi-directional long short-term memory (Bi-LSTM) is proposed. In the BIA, the ME video frame will be cropped, and the training will be carried out by cropping into 24 identification blocks (IBs), 10 IBs and uncropped IBs. To alleviate… More >

Per Page:

Share Link