Home / Journals / CMC / Vol.79, No.2, 2024
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Research on Performance Optimization of Spark Distributed Computing Platform

    Qinlu He1,*, Fan Zhang1, Genqing Bian1, Weiqi Zhang1, Zhen Li2
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2833-2850, 2024, DOI:10.32604/cmc.2024.046807 - 15 May 2024
    Abstract Spark, a distributed computing platform, has rapidly developed in the field of big data. Its in-memory computing feature reduces disk read overhead and shortens data processing time, making it have broad application prospects in large-scale computing applications such as machine learning and image processing. However, the performance of the Spark platform still needs to be improved. When a large number of tasks are processed simultaneously, Spark’s cache replacement mechanism cannot identify high-value data partitions, resulting in memory resources not being fully utilized and affecting the performance of the Spark platform. To address the problem that… More >

  • Open AccessOpen Access

    ARTICLE

    DNBP-CCA: A Novel Approach to Enhancing Heterogeneous Data Traffic and Reliable Data Transmission for Body Area Network

    Abdulwadood Alawadhi1,*, Mohd. Hasbullah Omar1, Abdullah Almogahed2, Noradila Nordin3, Salman A. Alqahtani4, Atif M. Alamri5
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2851-2878, 2024, DOI:10.32604/cmc.2024.050154 - 15 May 2024
    Abstract The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use of Body Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-based BANs is impacted by challenges related to heterogeneous data traffic requirements among nodes, including contention during finite backoff periods, association delays, and traffic channel access through clear channel assessment (CCA) algorithms. These challenges lead to increased packet collisions, queuing delays, retransmissions, and the neglect of critical traffic, thereby hindering performance indicators such as throughput, packet delivery ratio, packet drop rate, and packet delay.… More >

  • Open AccessOpen Access

    ARTICLE

    RepBoTNet-CESA: An Alzheimer’s Disease Computer Aided Diagnosis Method Using Structural Reparameterization BoTNet and Cubic Embedding Self Attention

    Xiabin Zhang1,2, Zhongyi Hu1,2,*, Lei Xiao1,2, Hui Huang1,2
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2879-2905, 2024, DOI:10.32604/cmc.2024.048725 - 15 May 2024
    (This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
    Abstract Various deep learning models have been proposed for the accurate assisted diagnosis of early-stage Alzheimer’s disease (AD). Most studies predominantly employ Convolutional Neural Networks (CNNs), which focus solely on local features, thus encountering difficulties in handling global features. In contrast to natural images, Structural Magnetic Resonance Imaging (sMRI) images exhibit a higher number of channel dimensions. However, during the Position Embedding stage of Multi Head Self Attention (MHSA), the coded information related to the channel dimension is disregarded. To tackle these issues, we propose the RepBoTNet-CESA network, an advanced AD-aided diagnostic model that is capable… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction of the Pore-Pressure Built-Up and Temperature of Fire-Loaded Concrete with Pix2Pix

    Xueya Wang1, Yiming Zhang2,3,*, Qi Liu4, Huanran Wang1
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2907-2922, 2024, DOI:10.32604/cmc.2024.050736 - 15 May 2024
    Abstract Concrete subjected to fire loads is susceptible to explosive spalling, which can lead to the exposure of reinforcing steel bars to the fire, substantially jeopardizing the structural safety and stability. The spalling of fire-loaded concrete is closely related to the evolution of pore pressure and temperature. Conventional analytical methods involve the resolution of complex, strongly coupled multifield equations, necessitating significant computational efforts. To rapidly and accurately obtain the distributions of pore-pressure and temperature, the Pix2Pix model is adopted in this work, which is celebrated for its capabilities in image generation. The open-source dataset used herein… More >

  • Open AccessOpen Access

    ARTICLE

    Elevating Image Steganography: A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities

    Muhammad Zaman Ali1, Omer Riaz1, Hafiz Muhammad Hasnain2, Waqas Sharif2, Tenvir Ali2, Gyu Sang Choi3,*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2923-2943, 2024, DOI:10.32604/cmc.2024.049139 - 15 May 2024
    (This article belongs to the Special Issue: Multimedia Encryption and Information Security)
    Abstract In today’s rapidly evolving landscape of communication technologies, ensuring the secure delivery of sensitive data has become an essential priority. To overcome these difficulties, different steganography and data encryption methods have been proposed by researchers to secure communications. Most of the proposed steganography techniques achieve higher embedding capacities without compromising visual imperceptibility using LSB substitution. In this work, we have an approach that utilizes a combination of Most Significant Bit (MSB) matching and Least Significant Bit (LSB) substitution. The proposed algorithm divides confidential messages into pairs of bits and connects them with the MSBs of… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Approach to Energy Optimization: Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN

    Muhammad Salman Qamar1,*, Ihsan ul Haq1, Amil Daraz2, Atif M. Alamri3, Salman A. AlQahtani4, Muhammad Fahad Munir1
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2945-2970, 2024, DOI:10.32604/cmc.2024.050168 - 15 May 2024
    (This article belongs to the Special Issue: Advanced Artificial Intelligence and Machine Learning Frameworks for Signal and Image Processing Applications)
    Abstract In pursuit of enhancing the Wireless Sensor Networks (WSNs) energy efficiency and operational lifespan, this paper delves into the domain of energy-efficient routing protocols. In WSNs, the limited energy resources of Sensor Nodes (SNs) are a big challenge for ensuring their efficient and reliable operation. WSN data gathering involves the utilization of a mobile sink (MS) to mitigate the energy consumption problem through periodic network traversal. The mobile sink (MS) strategy minimizes energy consumption and latency by visiting the fewest nodes or pre-determined locations called rendezvous points (RPs) instead of all cluster heads (CHs). CHs… More >

  • Open AccessOpen Access

    REVIEW

    A Review of NILM Applications with Machine Learning Approaches

    Maheesha Dhashantha Silva*, Qi Liu
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2971-2989, 2024, DOI:10.32604/cmc.2024.051289 - 15 May 2024
    Abstract In recent years, Non-Intrusive Load Monitoring (NILM) has become an emerging approach that provides affordable energy management solutions using aggregated load obtained from a single smart meter in the power grid. Furthermore, by integrating Machine Learning (ML), NILM can efficiently use electrical energy and offer less of a burden for the energy monitoring process. However, conducted research works have limitations for real-time implementation due to the practical issues. This paper aims to identify the contribution of ML approaches to developing a reliable Energy Management (EM) solution with NILM. Firstly, phases of the NILM are discussed,… More >

  • Open AccessOpen Access

    ARTICLE

    FusionNN: A Semantic Feature Fusion Model Based on Multimodal for Web Anomaly Detection

    Li Wang1,2,3,*, Mingshan Xia1,2,*, Hao Hu1, Jianfang Li1,2, Fengyao Hou1,2, Gang Chen1,2,3
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2991-3006, 2024, DOI:10.32604/cmc.2024.048637 - 15 May 2024
    Abstract With the rapid development of the mobile communication and the Internet, the previous web anomaly detection and identification models were built relying on security experts’ empirical knowledge and attack features. Although this approach can achieve higher detection performance, it requires huge human labor and resources to maintain the feature library. In contrast, semantic feature engineering can dynamically discover new semantic features and optimize feature selection by automatically analyzing the semantic information contained in the data itself, thus reducing dependence on prior knowledge. However, current semantic features still have the problem of semantic expression singularity, as… More >

  • Open AccessOpen Access

    ARTICLE

    QoS Routing Optimization Based on Deep Reinforcement Learning in SDN

    Yu Song1, Xusheng Qian2, Nan Zhang3, Wei Wang2, Ao Xiong1,*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3007-3021, 2024, DOI:10.32604/cmc.2024.051217 - 15 May 2024
    Abstract To enhance the efficiency and expediency of issuing e-licenses within the power sector, we must confront the challenge of managing the surging demand for data traffic. Within this realm, the network imposes stringent Quality of Service (QoS) requirements, revealing the inadequacies of traditional routing allocation mechanisms in accommodating such extensive data flows. In response to the imperative of handling a substantial influx of data requests promptly and alleviating the constraints of existing technologies and network congestion, we present an architecture for QoS routing optimization with in Software Defined Network (SDN), leveraging deep reinforcement learning. This… More >

  • Open AccessOpen Access

    ARTICLE

    Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms

    Zhenxiang He*, Zhenyu Zhao, Ke Chen, Yanlin Liu
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3023-3045, 2024, DOI:10.32604/cmc.2024.050281 - 15 May 2024
    Abstract The fast-paced development of blockchain technology is evident. Yet, the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem. Conventional smart contract vulnerability detection primarily relies on static analysis tools, which are less efficient and accurate. Although deep learning methods have improved detection efficiency, they are unable to fully utilize the static relationships within contracts. Therefore, we have adopted the advantages of the above two methods, combining feature extraction mode of tools with deep learning techniques. Firstly, we have constructed corresponding feature extraction mode for… More >

  • Open AccessOpen Access

    ARTICLE

    Investigation of Inside-Out Tracking Methods for Six Degrees of Freedom Pose Estimation of a Smartphone in Augmented Reality

    Chanho Park1, Takefumi Ogawa2,*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3047-3065, 2024, DOI:10.32604/cmc.2024.048901 - 15 May 2024
    (This article belongs to the Special Issue: Advances and Applications in Signal, Image and Video Processing)
    Abstract Six degrees of freedom (6DoF) input interfaces are essential for manipulating virtual objects through translation or rotation in three-dimensional (3D) space. A traditional outside-in tracking controller requires the installation of expensive hardware in advance. While inside-out tracking controllers have been proposed, they often suffer from limitations such as interaction limited to the tracking range of the sensor (e.g., a sensor on the head-mounted display (HMD)) or the need for pose value modification to function as an input interface (e.g., a sensor on the controller). This study investigates 6DoF pose estimation methods without restricting the tracking… More >

  • Open AccessOpen Access

    ARTICLE

    Workout Action Recognition in Video Streams Using an Attention Driven Residual DC-GRU Network

    Arnab Dey1,*, Samit Biswas1, Dac-Nhuong Le2
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3067-3087, 2024, DOI:10.32604/cmc.2024.049512 - 15 May 2024
    (This article belongs to the Special Issue: Advances and Applications in Signal, Image and Video Processing)
    Abstract Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers the likelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions in video streams holds significant importance in computer vision research, as it aims to enhance exercise adherence, enable instant recognition, advance fitness tracking technologies, and optimize fitness routines. However, existing action datasets often lack diversity and specificity for workout actions, hindering the development of accurate recognition models. To address this gap, the Workout Action Video dataset (WAVd) has been introduced as a significant… More >

  • Open AccessOpen Access

    ARTICLE

    Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs

    Nagaraju Pacharla, K. Srinivasa Reddy*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3089-3110, 2024, DOI:10.32604/cmc.2024.048133 - 15 May 2024
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing… More >

  • Open AccessOpen Access

    ARTICLE

    A Study on the Explainability of Thyroid Cancer Prediction: SHAP Values and Association-Rule Based Feature Integration Framework

    Sujithra Sankar1,*, S. Sathyalakshmi2
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3111-3138, 2024, DOI:10.32604/cmc.2024.048408 - 15 May 2024
    Abstract In the era of advanced machine learning techniques, the development of accurate predictive models for complex medical conditions, such as thyroid cancer, has shown remarkable progress. Accurate predictive models for thyroid cancer enhance early detection, improve resource allocation, and reduce overtreatment. However, the widespread adoption of these models in clinical practice demands predictive performance along with interpretability and transparency. This paper proposes a novel association-rule based feature-integrated machine learning model which shows better classification and prediction accuracy than present state-of-the-art models. Our study also focuses on the application of SHapley Additive exPlanations (SHAP) values as… More >

  • Open AccessOpen Access

    ARTICLE

    Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs

    Norah Abdullah Al-Johany1,*, Sanaa Abdullah Sharaf1,2, Fathy Elbouraey Eassa1,2, Reem Abdulaziz Alnanih1,2,*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3139-3173, 2024, DOI:10.32604/cmc.2024.047392 - 15 May 2024
    Abstract The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memory systems. However, MPI implementations can contain defects that impact the reliability and performance of parallel applications. Detecting and correcting these defects is crucial, yet there is a lack of published models specifically designed for correcting MPI defects. To address this, we propose a model for detecting and correcting MPI defects (DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blocking point-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defects addressed by… More >

  • Open AccessOpen Access

    ARTICLE

    RoGRUT: A Hybrid Deep Learning Model for Detecting Power Trapping in Smart Grids

    Farah Mohammad1,*, Saad Al-Ahmadi2, Jalal Al-Muhtadi1,2
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3175-3192, 2024, DOI:10.32604/cmc.2023.042873 - 15 May 2024
    Abstract Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users. It hinders the economic growth of utility companies, poses electrical risks, and impacts the high energy costs borne by consumers. The development of smart grids is crucial for the identification of power theft since these systems create enormous amounts of data, including information on client consumption, which may be used to identify electricity theft using machine learning and deep learning techniques. Moreover, there also exist different solutions such as hardware-based solutions to detect electricity theft that… More >

  • Open AccessOpen Access

    ARTICLE

    Shear Let Transform Residual Learning Approach for Single-Image Super-Resolution

    Israa Ismail1,*, Ghada Eltaweel1, Mohamed Meselhy Eltoukhy1,2
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3193-3209, 2024, DOI:10.32604/cmc.2023.043873 - 15 May 2024
    Abstract Super-resolution techniques are employed to enhance image resolution by reconstructing high-resolution images from one or more low-resolution inputs. Super-resolution is of paramount importance in the context of remote sensing, satellite, aerial, security and surveillance imaging. Super-resolution remote sensing imagery is essential for surveillance and security purposes, enabling authorities to monitor remote or sensitive areas with greater clarity. This study introduces a single-image super-resolution approach for remote sensing images, utilizing deep shearlet residual learning in the shearlet transform domain, and incorporating the Enhanced Deep Super-Resolution network (EDSR). Unlike conventional approaches that estimate residuals between high and… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach

    Wajdi Alhakami*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3211-3237, 2024, DOI:10.32604/cmc.2023.043935 - 15 May 2024
    Abstract The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatory mechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes… More >

  • Open AccessOpen Access

    ARTICLE

    Density Clustering Algorithm Based on KD-Tree and Voting Rules

    Hui Du, Zhiyuan Hu*, Depeng Lu, Jingrui Liu
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3239-3259, 2024, DOI:10.32604/cmc.2024.046314 - 15 May 2024
    Abstract Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets with uneven density. Additionally, they incur substantial computational costs when applied to high-dimensional data due to calculating similarity matrices. To alleviate these issues, we employ the KD-Tree to partition the dataset and compute the K-nearest neighbors (KNN) density for each point, thereby avoiding the computation of similarity matrices. Moreover, we apply the rules of voting elections, treating each data point as a voter and casting a vote for the point with the highest density among its KNN. By utilizing the vote counts More >

  • Open AccessOpen Access

    REVIEW

    Survey of Indoor Localization Based on Deep Learning

    Khaldon Azzam Kordi1, Mardeni Roslee1,*, Mohamad Yusoff Alias1, Abdulraqeb Alhammadi2, Athar Waseem3, Anwar Faizd Osman4
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3261-3298, 2024, DOI:10.32604/cmc.2024.044890 - 15 May 2024
    Abstract This study comprehensively examines the current state of deep learning (DL) usage in indoor positioning. It emphasizes the significance and efficiency of convolutional neural networks (CNNs) and recurrent neural networks (RNNs). Unlike prior studies focused on single sensor modalities like Wi-Fi or Bluetooth, this research explores the integration of multiple sensor modalities (e.g., Wi-Fi, Bluetooth, Ultra-Wideband, ZigBee) to expand indoor localization methods, particularly in obstructed environments. It addresses the challenge of precise object localization, introducing a novel hybrid DL approach using received signal information (RSI), Received Signal Strength (RSS), and Channel State Information (CSI) data… More >

  • Open AccessOpen Access

    ARTICLE

    Graph Convolutional Networks Embedding Textual Structure Information for Relation Extraction

    Chuyuan Wei*, Jinzhe Li, Zhiyuan Wang, Shanshan Wan, Maozu Guo
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3299-3314, 2024, DOI:10.32604/cmc.2024.047811 - 15 May 2024
    Abstract Deep neural network-based relational extraction research has made significant progress in recent years, and it provides data support for many natural language processing downstream tasks such as building knowledge graph, sentiment analysis and question-answering systems. However, previous studies ignored much unused structural information in sentences that could enhance the performance of the relation extraction task. Moreover, most existing dependency-based models utilize self-attention to distinguish the importance of context, which hardly deals with multiple-structure information. To efficiently leverage multiple structure information, this paper proposes a dynamic structure attention mechanism model based on textual structure information, which deeply… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Object Detection and Classification via Multi-Method Fusion

    Muhammad Waqas Ahmed1, Nouf Abdullah Almujally2, Abdulwahab Alazeb3, Asaad Algarni4, Jeongmin Park5,*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3315-3331, 2024, DOI:10.32604/cmc.2024.046501 - 15 May 2024
    (This article belongs to the Special Issue: Machine Vision Detection and Intelligent Recognition)
    Abstract Advances in machine vision systems have revolutionized applications such as autonomous driving, robotic navigation, and augmented reality. Despite substantial progress, challenges persist, including dynamic backgrounds, occlusion, and limited labeled data. To address these challenges, we introduce a comprehensive methodology to enhance image classification and object detection accuracy. The proposed approach involves the integration of multiple methods in a complementary way. The process commences with the application of Gaussian filters to mitigate the impact of noise interference. These images are then processed for segmentation using Fuzzy C-Means segmentation in parallel with saliency mapping techniques to find… More >

  • Open AccessOpen Access

    ARTICLE

    Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration

    Aiman1, Muhammad Arshad1,*, Bilal Khan1, Sadique Ahmad2,*, Muhammad Asim2,3
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3333-3353, 2024, DOI:10.32604/cmc.2024.049254 - 15 May 2024
    Abstract Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personal information, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic, semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, and marketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French, etc. However, the research on Roman Urdu is not up to the mark. Hence, this study focuses on detecting the author’s age and gender based on Roman Urdu text messages.… More >

  • Open AccessOpen Access

    ARTICLE

    Positron Emission Tomography Lung Image Respiratory Motion Correcting with Equivariant Transformer

    Jianfeng He1,2, Haowei Ye1, Jie Ning1, Hui Zhou1,2,*, Bo She3,*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3355-3372, 2024, DOI:10.32604/cmc.2024.048706 - 15 May 2024
    (This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
    Abstract In addressing the challenge of motion artifacts in Positron Emission Tomography (PET) lung scans, our study introduces the Triple Equivariant Motion Transformer (TEMT), an innovative, unsupervised, deep-learning-based framework for efficient respiratory motion correction in PET imaging. Unlike traditional techniques, which segment PET data into bins throughout a respiratory cycle and often face issues such as inefficiency and overemphasis on certain artifacts, TEMT employs Convolutional Neural Networks (CNNs) for effective feature extraction and motion decomposition.TEMT’s unique approach involves transforming motion sequences into Lie group domains to highlight fundamental motion patterns, coupled with employing competitive weighting for More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Hybrid Ensemble Learning Approach for Enhancing Accuracy and Sustainability in Wind Power Forecasting

    Farhan Ullah1, Xuexia Zhang1,*, Mansoor Khan2, Muhammad Abid3,*, Abdullah Mohamed4
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3373-3395, 2024, DOI:10.32604/cmc.2024.048656 - 15 May 2024
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract Accurate wind power forecasting is critical for system integration and stability as renewable energy reliance grows. Traditional approaches frequently struggle with complex data and non-linear connections. This article presents a novel approach for hybrid ensemble learning that is based on rigorous requirements engineering concepts. The approach finds significant parameters influencing forecasting accuracy by evaluating real-time Modern-Era Retrospective Analysis for Research and Applications (MERRA2) data from several European Wind farms using in-depth stakeholder research and requirements elicitation. Ensemble learning is used to develop a robust model, while a temporal convolutional network handles time-series complexities and data… More >

  • Open AccessOpen Access

    ARTICLE

    Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol

    Umi Salma Basha1, Shashi Kant Gupta2, Wedad Alawad3, SeongKi Kim4,*, Salil Bharany5,*
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3397-3416, 2024, DOI:10.32604/cmc.2024.046265 - 15 May 2024
    Abstract A new era of data access and management has begun with the use of cloud computing in the healthcare industry. Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a major concern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentiality and integrity of healthcare data in the cloud. The computational overhead of encryption technologies could lead to delays in data access and processing rates. To address these challenges, we introduced the Enhanced Parallel Multi-Key Encryption Algorithm (EPM-KEA), aiming to bolster… More >

  • Open AccessOpen Access

    ARTICLE

    Monocular Distance Estimated Based on PTZ Camera

    Qirui Zhong1, Xiaogang Cheng2,*, Yuxin Song3, Han Wang2
    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3417-3433, 2024, DOI:10.32604/cmc.2024.049992 - 15 May 2024
    (This article belongs to the Special Issue: Metaheuristics, Soft Computing, and Machine Learning in Image Processing and Computer Vision)
    Abstract This paper introduces an intelligent computational approach for extracting salient objects from images and estimating their distance information with PTZ (Pan-Tilt-Zoom) cameras. PTZ cameras have found wide applications in numerous public places, serving various purposes such as public security management, natural disaster monitoring, and crisis alarms, particularly with the rapid development of Artificial Intelligence and global infrastructural projects. In this paper, we combine Gauss optical principles with the PTZ camera’s capabilities of horizontal and pitch rotation, as well as optical zoom, to estimate the distance of the object. We present a novel monocular object distance… More >

Per Page:

Share Link