Home / Journals / CMC / Vol.78, No.1, 2024
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations

    Fang Xu1,2,3, Songhao Jiang1,2, Yi Ma1,2,3,*, Manzoor Ahmed1,3,*, Zenggang Xiong1,2,3, Yuanlin Lyu1,2
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1095-1113, 2024, DOI:10.32604/cmc.2023.046577
    (This article belongs to the Special Issue: Advance Machine Learning for Sentiment Analysis over Various Domains and Applications)
    Abstract Effective data communication is a crucial aspect of the Social Internet of Things (SIoT) and continues to be a significant research focus. This paper proposes a data forwarding algorithm based on Multidimensional Social Relations (MSRR) in SIoT to solve this problem. The proposed algorithm separates message forwarding into intra- and cross-community forwarding by analyzing interest traits and social connections among nodes. Three new metrics are defined: the intensity of node social relationships, node activity, and community connectivity. Within the community, messages are sent by determining which node is most similar to the sender by weighing the strength of social connections… More >

  • Open AccessOpen Access

    ARTICLE

    A Weighted Multi-Layer Analytics Based Model for Emoji Recommendation

    Amira M. Idrees1,*, Abdul Lateef Marzouq Al-Solami2
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1115-1133, 2024, DOI:10.32604/cmc.2023.046457
    Abstract The developed system for eye and face detection using Convolutional Neural Networks (CNN) models, followed by eye classification and voice-based assistance, has shown promising potential in enhancing accessibility for individuals with visual impairments. The modular approach implemented in this research allows for a seamless flow of information and assistance between the different components of the system. This research significantly contributes to the field of accessibility technology by integrating computer vision, natural language processing, and voice technologies. By leveraging these advancements, the developed system offers a practical and efficient solution for assisting blind individuals. The modular design ensures flexibility, scalability, and… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Hierarchical Particle Swarm Optimization with Evolutionary Artificial Bee Colony Algorithm for Task Scheduling in Cloud Computing

    Shasha Zhao1,2,3,*, Huanwen Yan1,2, Qifeng Lin1,2, Xiangnan Feng1,2, He Chen1,2, Dengyin Zhang1,2
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1135-1156, 2024, DOI:10.32604/cmc.2024.045660
    Abstract Task scheduling plays a key role in effectively managing and allocating computing resources to meet various computing tasks in a cloud computing environment. Short execution time and low load imbalance may be the challenges for some algorithms in resource scheduling scenarios. In this work, the Hierarchical Particle Swarm Optimization-Evolutionary Artificial Bee Colony Algorithm (HPSO-EABC) has been proposed, which hybrids our presented Evolutionary Artificial Bee Colony (EABC), and Hierarchical Particle Swarm Optimization (HPSO) algorithm. The HPSO-EABC algorithm incorporates both the advantages of the HPSO and the EABC algorithm. Comprehensive testing including evaluations of algorithm convergence speed, resource execution time, load balancing,… More >

  • Open AccessOpen Access

    ARTICLE

    Multimodal Sentiment Analysis Based on a Cross-Modal Multihead Attention Mechanism

    Lujuan Deng, Boyi Liu*, Zuhe Li
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1157-1170, 2024, DOI:10.32604/cmc.2023.042150
    Abstract Multimodal sentiment analysis aims to understand people’s emotions and opinions from diverse data. Concatenating or multiplying various modalities is a traditional multi-modal sentiment analysis fusion method. This fusion method does not utilize the correlation information between modalities. To solve this problem, this paper proposes a model based on a multi-head attention mechanism. First, after preprocessing the original data. Then, the feature representation is converted into a sequence of word vectors and positional encoding is introduced to better understand the semantic and sequential information in the input sequence. Next, the input coding sequence is fed into the transformer model for further… More >

  • Open AccessOpen Access

    ARTICLE

    Explainable Conformer Network for Detection of COVID-19 Pneumonia from Chest CT Scan: From Concepts toward Clinical Explainability

    Mohamed Abdel-Basset1, Hossam Hawash1, Mohamed Abouhawwash2,3,*, S. S. Askar4, Alshaimaa A. Tantawy1
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1171-1187, 2024, DOI:10.32604/cmc.2023.044425
    Abstract The early implementation of treatment therapies necessitates the swift and precise identification of COVID-19 pneumonia by the analysis of chest CT scans. This study aims to investigate the indispensable need for precise and interpretable diagnostic tools for improving clinical decision-making for COVID-19 diagnosis. This paper proposes a novel deep learning approach, called Conformer Network, for explainable discrimination of viral pneumonia depending on the lung Region of Infections (ROI) within a single modality radiographic CT scan. Firstly, an efficient U-shaped transformer network is integrated for lung image segmentation. Then, a robust transfer learning technique is introduced to design a robust feature… More >

  • Open AccessOpen Access

    ARTICLE

    Smart Healthcare Activity Recognition Using Statistical Regression and Intelligent Learning

    K. Akilandeswari1, Nithya Rekha Sivakumar2,*, Hend Khalid Alkahtani3, Shakila Basheer3, Sara Abdelwahab Ghorashi2
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1189-1205, 2024, DOI:10.32604/cmc.2023.034815
    Abstract In this present time, Human Activity Recognition (HAR) has been of considerable aid in the case of health monitoring and recovery. The exploitation of machine learning with an intelligent agent in the area of health informatics gathered using HAR augments the decision-making quality and significance. Although many research works conducted on Smart Healthcare Monitoring, there remain a certain number of pitfalls such as time, overhead, and falsification involved during analysis. Therefore, this paper proposes a Statistical Partial Regression and Support Vector Intelligent Agent Learning (SPR-SVIAL) for Smart Healthcare Monitoring. At first, the Statistical Partial Regression Feature Extraction model is used… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Convolutional Neural Networks for Accurate Classification of Gastrointestinal Tract Syndromes

    Zahid Farooq Khan1, Muhammad Ramzan1,*, Mudassar Raza1, Muhammad Attique Khan2,3, Khalid Iqbal4, Taerang Kim5, Jae-Hyuk Cha5
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1207-1225, 2024, DOI:10.32604/cmc.2023.045491
    (This article belongs to the Special Issue: Deep Learning in Medical Imaging-Disease Segmentation and Classification)
    Abstract Accurate detection and classification of artifacts within the gastrointestinal (GI) tract frames remain a significant challenge in medical image processing. Medical science combined with artificial intelligence is advancing to automate the diagnosis and treatment of numerous diseases. Key to this is the development of robust algorithms for image classification and detection, crucial in designing sophisticated systems for diagnosis and treatment. This study makes a small contribution to endoscopic image classification. The proposed approach involves multiple operations, including extracting deep features from endoscopy images using pre-trained neural networks such as Darknet-53 and Xception. Additionally, feature optimization utilizes the binary dragonfly algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Perspective Data Fusion Framework Based on Hierarchical BERT: Provide Visual Predictions of Business Processes

    Yongwang Yuan1, Xiangwei Liu2,3,*, Ke Lu1,3
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1227-1252, 2024, DOI:10.32604/cmc.2023.046937
    Abstract Predictive Business Process Monitoring (PBPM) is a significant research area in Business Process Management (BPM) aimed at accurately forecasting future behavioral events. At present, deep learning methods are widely cited in PBPM research, but no method has been effective in fusing data information into the control flow for multi-perspective process prediction. Therefore, this paper proposes a process prediction method based on the hierarchical BERT and multi-perspective data fusion. Firstly, the first layer BERT network learns the correlations between different category attribute data. Then, the attribute data is integrated into a weighted event-level feature vector and input into the second layer… More >

  • Open AccessOpen Access

    ARTICLE

    Design of a Lightweight Compressed Video Stream-Based Patient Activity Monitoring System

    Sangeeta Yadav1, Preeti Gulia1,*, Nasib Singh Gill1,*, Piyush Kumar Shukla2, Arfat Ahmad Khan3, Sultan Alharby4, Ahmed Alhussen4, Mohd Anul Haq5
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1253-1274, 2024, DOI:10.32604/cmc.2023.042869
    (This article belongs to the Special Issue: Deep Learning based Object Detection and Tracking in Videos)
    Abstract Inpatient falls from beds in hospitals are a common problem. Such falls may result in severe injuries. This problem can be addressed by continuous monitoring of patients using cameras. Recent advancements in deep learning-based video analytics have made this task of fall detection more effective and efficient. Along with fall detection, monitoring of different activities of the patients is also of significant concern to assess the improvement in their health. High computation-intensive models are required to monitor every action of the patient precisely. This requirement limits the applicability of such networks. Hence, to keep the model lightweight, the already designed… More >

  • Open AccessOpen Access

    ARTICLE

    Cybernet Model: A New Deep Learning Model for Cyber DDoS Attacks Detection and Recognition

    Azar Abid Salih1,*, Maiwan Bahjat Abdulrazaq2
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1275-1295, 2024, DOI:10.32604/cmc.2023.046101
    Abstract Cyberspace is extremely dynamic, with new attacks arising daily. Protecting cybersecurity controls is vital for network security. Deep Learning (DL) models find widespread use across various fields, with cybersecurity being one of the most crucial due to their rapid cyberattack detection capabilities on networks and hosts. The capabilities of DL in feature learning and analyzing extensive data volumes lead to the recognition of network traffic patterns. This study presents novel lightweight DL models, known as Cybernet models, for the detection and recognition of various cyber Distributed Denial of Service (DDoS) attacks. These models were constructed to have a reasonable number… More >

  • Open AccessOpen Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian*
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system throughput; Finally, map resource access… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine

    Arslan Akram1,2, Imran Khan1, Javed Rashid2,3, Mubbashar Saddique4,*, Muhammad Idrees4, Yazeed Yasin Ghadi5, Abdulmohsen Algarni6
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1311-1328, 2024, DOI:10.32604/cmc.2023.040512
    (This article belongs to the Special Issue: The Next Generation of Artificial Intelligence and the Intelligent Internet of Things)
    Abstract Algorithms for steganography are methods of hiding data transfers in media files. Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information, and these methods have made it feasible to handle a wide range of problems associated with image analysis. Images with little information or low payload are used by information embedding methods, but the goal of all contemporary research is to employ high-payload images for classification. To address the need for both low- and high-payload images, this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to… More >

  • Open AccessOpen Access

    ARTICLE

    Method for Detecting Industrial Defects in Intelligent Manufacturing Using Deep Learning

    Bowen Yu, Chunli Xie*
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1329-1343, 2024, DOI:10.32604/cmc.2023.046248
    Abstract With the advent of Industry 4.0, marked by a surge in intelligent manufacturing, advanced sensors embedded in smart factories now enable extensive data collection on equipment operation. The analysis of such data is pivotal for ensuring production safety, a critical factor in monitoring the health status of manufacturing apparatus. Conventional defect detection techniques, typically limited to specific scenarios, often require manual feature extraction, leading to inefficiencies and limited versatility in the overall process. Our research presents an intelligent defect detection methodology that leverages deep learning techniques to automate feature extraction and defect localization processes. Our proposed approach encompasses a suite… More >

  • Open AccessOpen Access

    ARTICLE

    Lightweight Intrusion Detection Using Reservoir Computing

    Jiarui Deng1,2, Wuqiang Shen1,3, Yihua Feng4, Guosheng Lu5, Guiquan Shen1,3, Lei Cui1,3, Shanxiang Lyu1,2,*
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1345-1361, 2024, DOI:10.32604/cmc.2023.047079
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The blockchain-empowered Internet of Vehicles (IoV) enables various services and achieves data security and privacy, significantly advancing modern vehicle systems. However, the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks. As a result, an efficient intrusion detection system (IDS) becomes crucial for securing the IoV environment. Existing IDSs based on convolutional neural networks (CNN) often suffer from high training time and storage requirements. In this paper, we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats. Our approach achieves superior performance, as demonstrated by… More >

  • Open AccessOpen Access

    ARTICLE

    Selective and Adaptive Incremental Transfer Learning with Multiple Datasets for Machine Fault Diagnosis

    Kwok Tai Chui1,*, Brij B. Gupta2,3,4,5,6,*, Varsha Arya7,8,9, Miguel Torres-Ruiz10
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1363-1379, 2024, DOI:10.32604/cmc.2023.046762
    (This article belongs to the Special Issue: Development and Industrial Application of AI Technologies)
    Abstract The visions of Industry 4.0 and 5.0 have reinforced the industrial environment. They have also made artificial intelligence incorporated as a major facilitator. Diagnosing machine faults has become a solid foundation for automatically recognizing machine failure, and thus timely maintenance can ensure safe operations. Transfer learning is a promising solution that can enhance the machine fault diagnosis model by borrowing pre-trained knowledge from the source model and applying it to the target model, which typically involves two datasets. In response to the availability of multiple datasets, this paper proposes using selective and adaptive incremental transfer learning (SA-ITL), which fuses three… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Object Segmentation and Recognition Using Multi-Layer Perceptron Networks

    Aysha Naseer1, Nouf Abdullah Almujally2, Saud S. Alotaibi3, Abdulwahab Alazeb4, Jeongmin Park5,*
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1381-1398, 2024, DOI:10.32604/cmc.2023.042963
    Abstract Object segmentation and recognition is an imperative area of computer vision and machine learning that identifies and separates individual objects within an image or video and determines classes or categories based on their features. The proposed system presents a distinctive approach to object segmentation and recognition using Artificial Neural Networks (ANNs). The system takes RGB images as input and uses a k-means clustering-based segmentation technique to fragment the intended parts of the images into different regions and label them based on their characteristics. Then, two distinct kinds of features are obtained from the segmented images to help identify the objects… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Model for Improving Software Cost Estimation in Global Software Development

    Mehmood Ahmed1,3,*, Noraini B. Ibrahim1, Wasif Nisar2, Adeel Ahmed3, Muhammad Junaid3,*, Emmanuel Soriano Flores4, Divya Anand4
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1399-1422, 2024, DOI:10.32604/cmc.2023.046648
    Abstract Accurate software cost estimation in Global Software Development (GSD) remains challenging due to reliance on historical data and expert judgments. Traditional models, such as the Constructive Cost Model (COCOMO II), rely heavily on historical and accurate data. In addition, expert judgment is required to set many input parameters, which can introduce subjectivity and variability in the estimation process. Consequently, there is a need to improve the current GSD models to mitigate reliance on historical data, subjectivity in expert judgment, inadequate consideration of GSD-based cost drivers and limited integration of modern technologies with cost overruns. This study introduces a novel hybrid… More >

  • Open AccessOpen Access

    ARTICLE

    Improving Video Watermarking through Galois Field GF(24) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques

    Yasmin Alaa Hassan1,*, Abdul Monem S. Rahma2
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1423-1442, 2024, DOI:10.32604/cmc.2023.046149
    Abstract Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity. This study delves into the integration of Galois Field (GF) multiplication tables, especially GF(24), and their interaction with distinct irreducible polynomials. The primary aim is to enhance watermarking techniques for achieving imperceptibility, robustness, and efficient execution time. The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process. Scene selection is used strategically to embed watermarks in the most vital frames of the video, while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria, maintaining the video’s visual quality.… More >

  • Open AccessOpen Access

    ARTICLE

    Leveraging Augmented Reality, Semantic-Segmentation, and VANETs for Enhanced Driver’s Safety Assistance

    Sitara Afzal1, Imran Ullah Khan1, Irfan Mehmood2, Jong Weon Lee1,*
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1443-1460, 2024, DOI:10.32604/cmc.2023.046707
    (This article belongs to the Special Issue: Deep Learning based Object Detection and Tracking in Videos)
    Abstract Overtaking is a crucial maneuver in road transportation that requires a clear view of the road ahead. However, limited visibility of ahead vehicles can often make it challenging for drivers to assess the safety of overtaking maneuvers, leading to accidents and fatalities. In this paper, we consider atrous convolution, a powerful tool for explicitly adjusting the field-of-view of a filter as well as controlling the resolution of feature responses generated by Deep Convolutional Neural Networks in the context of semantic image segmentation. This article explores the potential of seeing-through vehicles as a solution to enhance overtaking safety. See-through vehicles leverage… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Solution System for Cloud Security Based on Equity Distribution: Model and Algorithms

    Sarah Mustafa Eljack1,*, Mahdi Jemmali2,3,4, Mohsen Denden6,7, Mutasim Al Sadig1, Abdullah M. Algashami1, Sadok Turki5
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1461-1479, 2024, DOI:10.32604/cmc.2023.040919
    (This article belongs to the Special Issue: The Next Generation of Artificial Intelligence and the Intelligent Internet of Things)
    Abstract In the cloud environment, ensuring a high level of data security is in high demand. Data planning storage optimization is part of the whole security process in the cloud environment. It enables data security by avoiding the risk of data loss and data overlapping. The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient. In our work, we propose a data scheduling model for the cloud environment. The model is made up of three parts that together help dispatch user data flow to the appropriate cloud VMs. The first component is the… More >

  • Open AccessOpen Access

    ARTICLE

    Real-Time Detection and Instance Segmentation of Strawberry in Unstructured Environment

    Chengjun Wang1,2, Fan Ding2,*, Yiwen Wang1, Renyuan Wu1, Xingyu Yao2, Chengjie Jiang1, Liuyi Ling1
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1481-1501, 2024, DOI:10.32604/cmc.2023.046876
    (This article belongs to the Special Issue: Machine Vision Detection and Intelligent Recognition)
    Abstract The real-time detection and instance segmentation of strawberries constitute fundamental components in the development of strawberry harvesting robots. Real-time identification of strawberries in an unstructured environment is a challenging task. Current instance segmentation algorithms for strawberries suffer from issues such as poor real-time performance and low accuracy. To this end, the present study proposes an Efficient YOLACT (E-YOLACT) algorithm for strawberry detection and segmentation based on the YOLACT framework. The key enhancements of the E-YOLACT encompass the development of a lightweight attention mechanism, pyramid squeeze shuffle attention (PSSA), for efficient feature extraction. Additionally, an attention-guided context-feature pyramid network (AC-FPN) is… More >

  • Open AccessOpen Access

    ARTICLE

    Structured Multi-Head Attention Stock Index Prediction Method Based Adaptive Public Opinion Sentiment Vector

    Cheng Zhao1, Zhe Peng2, Xuefeng Lan3, Yuefeng Cen4, Zuxin Wang5,*
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1503-1523, 2024, DOI:10.32604/cmc.2024.039232
    Abstract The present study examines the impact of short-term public opinion sentiment on the secondary market, with a focus on the potential for such sentiment to cause dramatic stock price fluctuations and increase investment risk. The quantification of investment sentiment indicators and the persistent analysis of their impact has been a complex and significant area of research. In this paper, a structured multi-head attention stock index prediction method based adaptive public opinion sentiment vector is proposed. The proposed method utilizes an innovative approach to transform numerous investor comments on social platforms over time into public opinion sentiment vectors expressing complex sentiments.… More >

Per Page:

Share Link