Computers, Materials & Continua is a peer-reviewed Open Access journal that publishes all types of academic papers in the areas of computer networks, artificial intelligence, big data, software engineering, multimedia, cyber security, internet of things, materials genome, integrated materials science, and data analysis, modeling, designing and manufacturing of modern functional and multifunctional materials. This journal is published monthly by Tech Science Press.
SCI: 2022 Impact Factor 3.1; Scopus CiteScore (Impact per Publication 2022): 5.0; SNIP (Source Normalized Impact per Paper 2022): 1.080; Ei Compendex; Cambridge Scientific Abstracts; INSPEC Databases; Science Navigator; EBSCOhost; ProQuest Central; Zentralblatt für Mathematik; Portico, etc.
Open Access
EDITORIAL
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1321-1324, 2023, DOI:10.32604/cmc.2023.041419
Abstract This article has no abstract. More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1325-1341, 2023, DOI:10.32604/cmc.2023.040858
Abstract Due to the inherent insecure nature of the Internet, it is crucial to ensure the secure transmission of image data over this network. Additionally, given the limitations of computers, it becomes even more important to employ efficient and fast image encryption techniques. While 1D chaotic maps offer a practical approach to real-time image encryption, their limited flexibility and increased vulnerability restrict their practical application. In this research, we have utilized a 3D Hindmarsh-Rose model to construct a secure cryptosystem. The randomness of the chaotic map is assessed through standard analysis. The proposed system enhances security by incorporating an increased number… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1343-1359, 2023, DOI:10.32604/cmc.2023.039263
Abstract Deep learning-based action classification technology has been applied to various fields, such as social safety, medical services, and sports. Analyzing an action on a practical level requires tracking multiple human bodies in an image in real-time and simultaneously classifying their actions. There are various related studies on the real-time classification of actions in an image. However, existing deep learning-based action classification models have prolonged response speeds, so there is a limit to real-time analysis. In addition, it has low accuracy of action of each object if multiple objects appear in the image. Also, it needs to be improved since it… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1361-1384, 2023, DOI:10.32604/cmc.2023.038045
Abstract A common difficulty in building prediction models with realworld environmental datasets is the skewed distribution of classes. There
are significantly more samples for day-to-day classes, while rare events such
as polluted classes are uncommon. Consequently, the limited availability of
minority outcomes lowers the classifier’s overall reliability. This study assesses
the capability of machine learning (ML) algorithms in tackling imbalanced
water quality data based on the metrics of precision, recall, and F1 score. It
intends to balance the misled accuracy towards the majority of data. Hence, 10
ML algorithms of its performance are compared. The classifiers included are
AdaBoost, Support Vector… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1385-1408, 2023, DOI:10.32604/cmc.2023.040246
(This article belongs to this Special Issue: AI Powered Human-centric Computing with Cloud and Edge)
Abstract Intelligent Space (IS) is widely regarded as a promising paradigm for improving quality of life through using service task processing. As the field matures, various state-of-the-art IS architectures have been proposed. Most of the IS architectures designed for service robots face the problems of fixed-function modules and low scalability when performing service tasks. To this end, we propose a hybrid cloud service robot architecture based on a Service-Oriented Architecture (SOA). Specifically, we first use the distributed deployment of functional modules to solve the problem of high computing resource occupancy. Then, the Socket communication interface layer is designed to improve the… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1409-1422, 2023, DOI:10.32604/cmc.2023.034157
(This article belongs to this Special Issue: Emerging Techniques on Citation Analysis in Scholarly Articles)
Abstract The Internet revolution has resulted in abundant data from various
sources, including social media, traditional media, etcetera. Although the
availability of data is no longer an issue, data labelling for exploiting it in
supervised machine learning is still an expensive process and involves tedious
human efforts. The overall purpose of this study is to propose a strategy
to automatically label the unlabeled textual data with the support of active
learning in combination with deep learning. More specifically, this study
assesses the performance of different active learning strategies in automatic
labelling of the textual dataset at sentence and document levels. To… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1423-1438, 2023, DOI:10.32604/cmc.2023.035741
(This article belongs to this Special Issue: Recent Advances in Internet of Things and Emerging Technologies)
Abstract Social media forums have emerged as the most popular form of communication in the modern technology era, allowing people to discuss and express their opinions. This increases the amount of material being shared on social media sites. There is a wealth of information about the threat that may be found in such open data sources. The security of already-deployed software and systems relies heavily on the timely detection of newly-emerging threats to their safety that can be gleaned from such information. Despite the fact that several models for detecting cybersecurity events have been presented, it remains challenging to extract security… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1439-1462, 2023, DOI:10.32604/cmc.2023.038878
Abstract Smart contracts have led to more efficient development in finance and healthcare, but vulnerabilities in contracts pose high risks to their future applications. The current vulnerability detection methods for contracts are either based on fixed expert rules, which are inefficient, or rely on simplistic deep learning techniques that do not fully leverage contract semantic information. Therefore, there is ample room for improvement in terms of detection precision. To solve these problems, this paper proposes a vulnerability detector based on deep learning techniques, graph representation, and Transformer, called GRATDet. The method first performs swapping, insertion, and symbolization operations for contract functions,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1463-1477, 2023, DOI:10.32604/cmc.2023.038417
Abstract Recently, computation offloading has become an effective method for overcoming the constraint of a mobile device (MD) using computation-intensive mobile and offloading delay-sensitive application tasks to the remote cloud-based data center. Smart city benefitted from offloading to edge point. Consider a mobile edge computing (MEC) network in multiple regions. They comprise N MDs and many access points, in which every MD has M independent real-time tasks. This study designs a new Task Offloading and Resource Allocation in IoT-based MEC using Deep Learning with Seagull Optimization (TORA-DLSGO) algorithm. The proposed TORA-DLSGO technique addresses the resource management issue in the MEC server,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1479-1495, 2023, DOI:10.32604/cmc.2023.038787
(This article belongs to this Special Issue: Optimization Algorithm in Real-World Applications)
Abstract The Honey Badger Algorithm (HBA) is a novel meta-heuristic algorithm proposed recently inspired by the foraging behavior of honey badgers. The dynamic search behavior of honey badgers with sniffing and wandering is divided into exploration and exploitation in HBA, which has been applied in photovoltaic systems and optimization problems effectively. However, HBA tends to suffer from the local optimum and low convergence. To alleviate these challenges, an improved HBA (IHBA) through fusing multi-strategies is presented in the paper. It introduces Tent chaotic mapping and composite mutation factors to HBA, meanwhile, the random control parameter is improved, moreover, a diversified updating… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1497-1514, 2023, DOI:10.32604/cmc.2023.034914
Abstract Recently, to build a smart factory, research has been conducted to perform fault diagnosis and defect detection based on vibration and noise signals generated when a mechanical system is driven using deep-learning technology, a field of artificial intelligence. Most of the related studies apply various audio-feature extraction techniques to one-dimensional raw data to extract sound-specific features and then classify the sound by using the derived spectral image as a training dataset. However, compared to numerical raw data, learning based on image data has the disadvantage that creating a training dataset is very time-consuming. Therefore, we devised a two-step data preprocessing… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1515-1535, 2023, DOI:10.32604/cmc.2023.040274
Abstract Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve. Because finding the trade-off between data privacy and data utility is an NP-hard problem and also a current research area. When existing approaches are investigated, one of the most significant difficulties discovered is the presence of outlier data in the datasets. Outlier data has a negative impact on data utility. Furthermore, k-anonymity algorithms, which are commonly used in the literature, do not provide adequate protection against outlier data. In this study, a new data anonymization algorithm… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1537-1554, 2023, DOI:10.32604/cmc.2023.034196
Abstract Text classification or categorization is the procedure of automatically tagging a textual document with most related labels or classes. When the number of labels is limited to one, the task becomes single-label text categorization. The Arabic texts include unstructured information also like English texts, and that is understandable for machine learning (ML) techniques, the text is changed and demonstrated by numerical value. In recent times, the dominant method for natural language processing (NLP) tasks is recurrent neural network (RNN), in general, long short term memory (LSTM) and convolutional neural network (CNN). Deep learning (DL) models are currently presented for deriving… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1555-1568, 2023, DOI:10.32604/cmc.2023.039334
Abstract The use of machine learning to predict student employability is
important in order to analyse a student’s capability to get a job. Based on
the results of this type of analysis, university managers can improve the
employability of their students, which can help in attracting students in
the future. In addition, learners can focus on the essential skills identified
through this analysis during their studies, to increase their employability. An
effective method called OPT-BAG (OPTimisation of BAGging classifiers) was
therefore developed to model the problem of predicting the employability of
students. This model can help predict the employability of students… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1569-1584, 2023, DOI:10.32604/cmc.2023.039859
(This article belongs to this Special Issue: IoMT and Smart Healthcare)
Abstract The Internet of Medical Things (IoMT) is mainly concerned with the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically, whereas machine learning approaches enable these smart systems to make informed decisions. Generally, broadcasting is used for the transmission of frames, whereas congestion, energy efficiency, and excessive load are among the common issues associated with existing approaches. In this paper, a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames, especially with the minimum possible communication overheads in the IoMT network. For this purpose, the proposed scheme utilises a well-known… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1585-1597, 2023, DOI:10.32604/cmc.2023.035415
Abstract Image Super-Resolution (SR) research has achieved great success with powerful neural networks. The deeper networks with more parameters improve the restoration quality but add the computation complexity, which means more inference time would be cost, hindering image SR from practical usage. Noting the spatial distribution of the objects or things in images, a two-stage local objects SR system is proposed, which consists of two modules, the object detection module and the SR module. Firstly, You Only Look Once (YOLO), which is efficient in generic object detection tasks, is selected to detect the input images for obtaining objects of interest, then… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1599-1619, 2023, DOI:10.32604/cmc.2023.039912
Abstract To reduce the comprehensive costs of the construction and operation of microgrids and to minimize the power fluctuations caused by randomness and intermittency in distributed generation, a double-layer optimizing configuration method of hybrid energy storage microgrid based on improved grey wolf optimization (IGWO) is proposed. Firstly, building a microgrid system containing a wind-solar power station and electric-hydrogen coupling hybrid energy storage system. Secondly, the minimum comprehensive cost of the construction and operation of the microgrid is taken as the outer objective function, and the minimum peak-to-valley of the microgrid’s daily output is taken as the inner objective function. By iterating… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1621-1641, 2023, DOI:10.32604/cmc.2023.040095
(This article belongs to this Special Issue: Optimization for Artificial Intelligence Application)
Abstract Predicting the popularity of online news is essential for news providers and recommendation systems. Time series, content and meta-feature are important features in news popularity prediction. However, there is a lack of exploration of how to integrate them effectively into a deep learning model and how effective and valuable they are to the model’s performance. This work proposes a novel deep learning model named Multiple Features Dynamic Fusion (MFDF) for news popularity prediction. For modeling time series, long short-term memory networks and attention-based convolution neural networks are used to capture long-term trends and short-term fluctuations of online news popularity. The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1643-1663, 2023, DOI:10.32604/cmc.2023.038578
(This article belongs to this Special Issue: Intelligent Computational Models based on Machine Learning and Deep Learning for Diagnosis System)
Abstract Breast cancer resistance protein (BCRP) is an important resistance protein that significantly impacts anticancer drug discovery, treatment, and rehabilitation. Early identification of BCRP substrates is quite a challenging task. This study aims to predict early substrate structure, which can help to optimize anticancer drug development and clinical diagnosis. For this study, a novel intelligent approach-based methodology is developed by modifying the ResNet101 model using transfer learning (TL) for automatic deep feature (DF) extraction followed by classification with linear discriminant analysis algorithm (TLRNDF-LDA). This study utilized structural fingerprints, which are exploited by DF contrary to conventional molecular descriptors. The proposed in… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1665-1687, 2023, DOI:10.32604/cmc.2023.038760
Abstract This paper presents the architecture of a Convolution Neural Network (CNN) accelerator based on a new processing element (PE) array called a diagonal cyclic array (DCA). As demonstrated, it can significantly reduce the burden of repeated memory accesses for feature data and weight parameters of the CNN models, which maximizes the data reuse rate and improve the computation speed. Furthermore, an integrated computation architecture has been implemented for the activation function, max-pooling, and activation function after convolution calculation, reducing the hardware resource. To evaluate the effectiveness of the proposed architecture, a CNN accelerator has been implemented for You Only Look… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1689-1700, 2023, DOI:10.32604/cmc.2023.039084
(This article belongs to this Special Issue: Intelligent Computational Models based on Machine Learning and Deep Learning for Diagnosis System)
Abstract Falling is among the most harmful events older adults may encounter. With the continuous growth of the aging population in many societies, developing effective fall detection mechanisms empowered by machine learning technologies and easily integrable with existing healthcare systems becomes essential. This paper presents a new healthcare Internet of Health Things (IoHT) architecture built around an ensemble machine learning-based fall detection system (FDS) for older people. Compared to deep neural networks, the ensemble multi-stage random forest model allows the extraction of an optimal subset of fall detection features with minimal hyperparameters. The number of cascaded random forest stages is automatically… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1701-1719, 2023, DOI:10.32604/cmc.2023.040235
Abstract Cybersecurity increasingly relies on machine learning (ML) models to respond to and detect attacks. However, the rapidly changing data environment makes model life-cycle management after deployment essential. Real-time detection of drift signals from various threats is fundamental for effectively managing deployed models. However, detecting drift in unsupervised environments can be challenging. This study introduces a novel approach leveraging Shapley additive explanations (SHAP), a widely recognized explainability technique in ML, to address drift detection in unsupervised settings. The proposed method incorporates a range of plots and statistical techniques to enhance drift detection reliability and introduces a drift suspicion metric that considers… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1721-1744, 2023, DOI:10.32604/cmc.2023.040567
Abstract Expanding internet-connected services has increased cyberattacks, many of which have grave and disastrous repercussions. An Intrusion Detection System (IDS) plays an essential role in network security since it helps to protect the network from vulnerabilities and attacks. Although extensive research was reported in IDS, detecting novel intrusions with optimal features and reducing false alarm rates are still challenging. Therefore, we developed a novel fusion-based feature importance method to reduce the high dimensional feature space, which helps to identify attacks accurately with less false alarm rate. Initially, to improve training data quality, various preprocessing techniques are utilized. The Adaptive Synthetic oversampling… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1745-1761, 2023, DOI:10.32604/cmc.2023.040710
(This article belongs to this Special Issue: Recent Advances in Ophthalmic Diseases Diagnosis using AI)
Abstract In the field of medical images, pixel-level labels are time-consuming and expensive to acquire, while image-level labels are relatively easier to obtain. Therefore, it makes sense to learn more information (knowledge) from a small number of hard-to-get pixel-level annotated images to apply to different tasks to maximize their usefulness and save time and training costs. In this paper, using Pixel-Level Labeled Images for Multi-Task Learning (PLDMLT), we focus on grading the severity of fundus images for Diabetic Retinopathy (DR). This is because, for the segmentation task, there is a finely labeled mask, while the severity grading task is without classification… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1763-1780, 2023, DOI:10.32604/cmc.2023.039413
Abstract The subcellular localization of human proteins is vital for understanding the structure of human cells. Proteins play a significant role within human cells, as many different groups of proteins are located in a specific location to perform a particular function. Understanding these functions will help in discovering many diseases and developing their treatments. The importance of imaging analysis techniques, specifically in proteomics research, is becoming more prevalent. Despite recent advances in deep learning techniques for analyzing microscopy images, classification models have faced critical challenges in achieving high performance. Most protein subcellular images have a significant class imbalance. We use oversampling… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1781-1796, 2023, DOI:10.32604/cmc.2023.037293
Abstract At present, the interpretation of regional economic development (RED) has changed from a simple evaluation of economic growth to a focus on economic growth and the optimization of economic structure, the improvement of economic relations, and the change of institutional innovation. This article uses the RED trend as the research object and constructs the RED index to conduct the theoretical analysis. Then this paper uses the attention mechanism based on digital twins and the time series network model to verify the actual data. Finally, the regional economy is predicted according to the theoretical model. The specific research work mainly includes… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381
Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone data. The suggested platform stores… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1817-1832, 2023, DOI:10.32604/cmc.2023.039460
(This article belongs to this Special Issue: Advances in Information Security Application)
Abstract Emotion recognition based on facial expressions is one of the most critical elements of human-machine interfaces. Most conventional methods for emotion recognition using facial expressions use the entire facial image to extract features and then recognize specific emotions through a pre-trained model. In contrast, this paper proposes a novel feature vector extraction method using the Euclidean distance between the landmarks changing their positions according to facial expressions, especially around the eyes, eyebrows, nose, and mouth. Then, we apply a new classifier using an ensemble network to increase emotion recognition accuracy. The emotion recognition performance was compared with the conventional algorithms… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1833-1851, 2023, DOI:10.32604/cmc.2023.039923
Abstract Cluster analysis is a crucial technique in unsupervised machine learning, pattern recognition, and data analysis. However, current clustering algorithms suffer from the need for manual determination of parameter values, low accuracy, and inconsistent performance concerning data size and structure. To address these challenges, a novel clustering algorithm called the fully automated density-based clustering method (FADBC) is proposed. The FADBC method consists of two stages: parameter selection and cluster extraction. In the first stage, a proposed method extracts optimal parameters for the dataset, including the epsilon size and a minimum number of points thresholds. These parameters are then used in a… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1853-1870, 2023, DOI:10.32604/cmc.2023.038589
Abstract Emerging telemedicine trends, such as the Internet of Medical Things (IoMT), facilitate regular and efficient interactions between medical devices and computing devices. The importance of IoMT comes from the need to continuously monitor patients’ health conditions in real-time during normal daily activities, which is realized with the help of various wearable devices and sensors. One major health problem is workplace stress, which can lead to cardiovascular disease or psychiatric disorders. Therefore, real-time monitoring of employees’ stress in the workplace is essential. Stress levels and the source of stress could be detected early in the fog layer so that the negative… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1871-1890, 2023, DOI:10.32604/cmc.2023.039462
(This article belongs to this Special Issue: Advances in Information Security Application)
Abstract These days, data is regarded as a valuable asset in the era of the data economy, which demands a trading platform for buying and selling data. However, online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other. Therefore, in this paper, a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption. The proposed system enables bilateral authorization, where data trading between a seller and a buyer is accomplished only if their policies, required by each other, are… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1891-1909, 2023, DOI:10.32604/cmc.2023.039464
(This article belongs to this Special Issue: Advances in Information Security Application)
Abstract The rapid growth of modern vehicles with advanced technologies requires strong security to ensure customer safety. One key system that needs protection is the passive key entry system (PKES). To prevent attacks aimed at defeating the PKES, we propose a novel radio frequency (RF) fingerprinting method. Our method extracts the cepstral coefficient feature as a fingerprint of a radio frequency signal. This feature is then analyzed using a convolutional neural network (CNN) for device identification. In evaluation, we conducted experiments to determine the effectiveness of different cepstral coefficient features and the convolutional neural network-based model. Our experimental results revealed that… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1911-1927, 2023, DOI:10.32604/cmc.2023.041187
Abstract S-boxes can be the core component of block ciphers, and how to efficiently generate S-boxes with strong cryptographic properties appears to be an important task in the design of block ciphers. In this work, an optimized model based on the generative adversarial network (GAN) is proposed to generate 8-bit S-boxes. The central idea of this optimized model is to use loss function constraints for GAN. More specially, the Advanced Encryption Standard (AES) S-box is used to construct the sample dataset via the affine equivalence property. Then, three models are respectively built and cross-trained to generate 8-bit S-boxes based on three… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1929-1946, 2023, DOI:10.32604/cmc.2023.039170
Abstract Attribute-based encryption (ABE) is a technique used to encrypt data, it has the flexibility of access control, high security, and resistance to collusion attacks, and especially it is used in cloud security protection. However, a large number of bilinear mappings are used in ABE, and the calculation of bilinear pairing is time-consuming. So there is the problem of low efficiency. On the other hand, the decryption key is not uniquely associated with personal identification information, if the decryption key is maliciously sold, ABE is unable to achieve accountability for the user. In practical applications, shared message requires hierarchical sharing in… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1947-1976, 2023, DOI:10.32604/cmc.2023.039340
Abstract Authorship verification is a crucial task in digital forensic investigations, where it is often necessary to determine whether a specific individual wrote a particular piece of text. Convolutional Neural Networks (CNNs) have shown promise in solving this problem, but their performance highly depends on the choice of hyperparameters. In this paper, we explore the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification. We conduct experiments using a Hyper Tuned CNN model with three popular optimization algorithms: Adaptive Moment Estimation (ADAM), Stochastic Gradient Descent (SGD), and Root Mean Squared Propagation (RMSPROP). The model is trained and… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1977-1994, 2023, DOI:10.32604/cmc.2023.040998
Abstract The influence maximization (IM) problem aims to find a set of seed nodes that maximizes the spread of their influence in a social network. The positive influence maximization (PIM) problem is an extension of the IM problem, which consider the polar relation of nodes in signed social networks so that the positive influence of seeds can be the most widely spread. To solve the PIM problem, this paper proposes the polar and decay related independent cascade (IC-PD) model to simulate the influence propagation of nodes and the decay of information during the influence propagation in signed social networks. To overcome… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1995-2013, 2023, DOI:10.32604/cmc.2023.039644
Abstract Autism spectrum disorder (ASD) can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics, like changes in behavior, social disabilities, and difficulty communicating with others. Eye tracking (ET) has become a useful method to detect ASD. One vital aspect of moral erudition is the aptitude to have common visual attention. The eye-tracking approach offers valuable data regarding the visual behavior of children for accurate and early detection. Eye-tracking data can offer insightful information about the behavior and thought processes of people with ASD, but it is important to be aware of its limitations… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2015-2031, 2023, DOI:10.32604/cmc.2023.040489
Abstract With the continuous development of the economy and society, plastic pollution in rivers, lakes, oceans, and other bodies of water is increasingly severe, posing a serious challenge to underwater ecosystems. Effective cleaning up of underwater litter by robots relies on accurately identifying and locating the plastic waste. However, it often causes significant challenges such as noise interference, low contrast, and blurred textures in underwater optical images. A weighted fusion-based algorithm for enhancing the quality of underwater images is proposed, which combines weighted logarithmic transformations, adaptive gamma correction, improved multi-scale Retinex (MSR) algorithm, and the contrast limited adaptive histogram equalization (CLAHE)… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2033-2060, 2023, DOI:10.32604/cmc.2023.040629
Abstract Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem. In this paper, we introduce an asymmetric key algorithm for specifically processing images with larger bit values. To overcome the separate flaws of elliptic curve cryptography (ECC) and the Hill cipher (HC), we present an approach to picture encryption by combining these two encryption approaches. In addition, to strengthen our scheme, the group laws are defined over the rational points of a given elliptic curve (EC) over a Galois field (GF). The exclusive-or (XOR) function is used instead of matrix multiplication to encrypt and… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.039446
(This article belongs to this Special Issue: Advances in Information Security Application)
Abstract Intrusion Detection System (IDS) is a network security mechanism that analyses all users’ and applications’ traffic and detects malicious activities in real-time. The existing IDS methods suffer from lower accuracy and lack the required level of security to prevent sophisticated attacks. This problem can result in the system being vulnerable to attacks, which can lead to the loss of sensitive data and potential system failure. Therefore, this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification (LTH-CNN). Here, the Correlation Coefficient based Mayfly Optimization (CC-MA) algorithm is used to extract the input characteristics for the IDS… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2079-2093, 2023, DOI:10.32604/cmc.2023.039683
Abstract A potential concept that could be effective for multiple applications is a “cyber-physical system” (CPS). The Internet of Things (IoT) has evolved as a research area, presenting new challenges in obtaining valuable data through environmental monitoring. The existing work solely focuses on classifying the audio system of CPS without utilizing feature extraction. This study employs a deep learning method, CNN-LSTM, and two-way feature extraction to classify audio systems within CPS. The primary objective of this system, which is built upon a convolutional neural network (CNN) with Long Short Term Memory (LSTM), is to analyze the vocalization patterns of two different… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2095-2119, 2023, DOI:10.32604/cmc.2023.039980
Abstract Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol–Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT and IoT-23 datasets used IoT… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2121-2143, 2023, DOI:10.32604/cmc.2023.040287
Abstract By identifying and responding to any malicious behavior that could endanger the system, the Intrusion Detection System (IDS) is crucial for preserving the security of the Industrial Internet of Things (IIoT) network. The benefit of anomaly-based IDS is that they are able to recognize zero-day attacks due to the fact that they do not rely on a signature database to identify abnormal activity. In order to improve control over datasets and the process, this study proposes using an automated machine learning (AutoML) technique to automate the machine learning processes for IDS. Our ground-breaking architecture, known as AID4I, makes use of… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2145-2177, 2023, DOI:10.32604/cmc.2023.040997
Abstract Multimodal Sentiment Analysis (SA) is gaining popularity due to its broad application potential. The existing studies have focused on the SA of single modalities, such as texts or photos, posing challenges in effectively handling social media data with multiple modalities. Moreover, most multimodal research has concentrated on merely combining the two modalities rather than exploring their complex correlations, leading to unsatisfactory sentiment classification results. Motivated by this, we propose a new visual-textual sentiment classification model named Multi-Model Fusion (MMF), which uses a mixed fusion framework for SA to effectively capture the essential information and the intrinsic relationship between the visual… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2179-2200, 2023, DOI:10.32604/cmc.2023.041022
(This article belongs to this Special Issue: Development and Industrial Application of AI Technologies)
Abstract Indonesia is a producer in the fisheries sector, with production reaching 14.8 million tons in 2022. The production potential of the fisheries sector can be optimally optimized through aquaculture management. One of the most important issues in aquaculture management is how to efficiently control the fish pond water conditions. IoT technology can be applied to support a fish pond aquaculture monitoring system, especially for catfish species (Siluriformes), in real-time and remotely. One of the technologies that can provide this convenience is the IoT. The problem of this study is how to integrate IoT devices with Firebase’s cloud data system to… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2201-2216, 2023, DOI:10.32604/cmc.2023.041191
(This article belongs to this Special Issue: Telehealth Monitoring with Man-Computer Interface for Medical Processing)
Abstract Breast cancer is a major public health concern that affects women worldwide. It is a leading cause of cancer-related deaths among women, and early detection is crucial for successful treatment. Unfortunately, breast cancer can often go undetected until it has reached advanced stages, making it more difficult to treat. Therefore, there is a pressing need for accurate and efficient diagnostic tools to detect breast cancer at an early stage. The proposed approach utilizes SqueezeNet with fire modules and complex bypass to extract informative features from mammography images. The extracted features are then utilized to train a support vector machine (SVM)… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2217-2234, 2023, DOI:10.32604/cmc.2023.038305
Abstract Vehicular Adhoc Networks (VANETs) enable vehicles to act as mobile nodes that can fetch, share, and disseminate information about vehicle safety, emergency events, warning messages, and passenger infotainment. However, the continuous dissemination of information from vehicles and their one-hop neighbor nodes, Road Side Units (RSUs), and VANET infrastructures can lead to performance degradation of VANETs in the existing host-centric IP-based network. Therefore, Information Centric Networks (ICN) are being explored as an alternative architecture for vehicular communication to achieve robust content distribution in highly mobile, dynamic, and error-prone domains. In ICN-based Vehicular-IoT networks, consumer mobility is implicitly supported, but producer mobility… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2235-2259, 2023, DOI:10.32604/cmc.2023.038003
Abstract The Internet service provider (ISP) is the heart of any country’s Internet infrastructure and plays an important role in connecting to the World Wide Web. Internet exchange point (IXP) allows the interconnection of two or more separate network infrastructures. All Internet traffic entering a country should pass through its IXP. Thus, it is an ideal location for performing malicious traffic analysis. Distributed denial of service (DDoS) attacks are becoming a more serious daily threat. Malicious actors in DDoS attacks control numerous infected machines known as botnets. Botnets are used to send numerous fake requests to overwhelm the resources of victims… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2261-2279, 2023, DOI:10.32604/cmc.2023.038534
Abstract In this paper, the application of transportation systems in real-time traffic conditions is evaluated with data handling representations. The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. Compared to the existing approach, the design model in the proposed method is made by dividing the computing areas into several cluster regions, thereby reducing the complex monitoring system where control errors are minimized. Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2281-2300, 2023, DOI:10.32604/cmc.2023.034872
Abstract Path planning is a prevalent process that helps mobile robots find the most efficient pathway from the starting position to the goal position to avoid collisions with obstacles. In this paper, we propose a novel path planning algorithm–Intermediary RRT*-PSO-by utilizing the exploring speed advantages of Rapidly exploring Random Trees and using its solution to feed to a metaheuristic-based optimizer, Particle swarm optimization (PSO), for fine-tuning and enhancement. In Phase 1, the start and goal trees are initialized at the starting and goal positions, respectively, and the intermediary tree is initialized at a random unexplored region of the search space. The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2301-2316, 2023, DOI:10.32604/cmc.2023.037727
Abstract Sleep spindles are an electroencephalogram (EEG) biomarker of non-rapid eye movement (NREM) sleep and have important implications for clinical diagnosis and prognosis. However, it is challenging to accurately detect sleep spindles due to the complexity of the human brain and the uncertainty of neural mechanisms. To improve the reliability and objectivity of sleep spindle detection and to compensate for the limitations of manual annotation, this study proposes a new automatic detection algorithm based on Matching Pursuit (MP) and Least Squares Boosting (LSBoost), where the automatic sleep spindle detection algorithm can help reduce the visual annotation workload of sleep clinicians. Specifically,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2317-2336, 2023, DOI:10.32604/cmc.2023.038026
Abstract The dendritic cell algorithm (DCA) is an excellent prototype for developing Machine Learning inspired by the function of the powerful natural immune system. Too many parameters increase complexity and lead to plenty of criticism in the signal fusion procedure of DCA. The loss function of DCA is ambiguous due to its complexity. To reduce the uncertainty, several researchers simplified the algorithm program; some introduced gradient descent to optimize parameters; some utilized searching methods to find the optimal parameter combination. However, these studies are either time-consuming or need to be revised in the case of non-convex functions. To overcome the problems,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2337-2354, 2023, DOI:10.32604/cmc.2023.038695
Abstract The existing dataset for visual dialog comprises multiple rounds of questions and a diverse range of image contents. However, it faces challenges in overcoming visual semantic limitations, particularly in obtaining sufficient context from visual and textual aspects of images. This paper proposes a new visual dialog dataset called Diverse History-Dialog (DS-Dialog) to address the visual semantic limitations faced by the existing dataset. DS-Dialog groups relevant histories based on their respective Microsoft Common Objects in Context (MSCOCO) image categories and consolidates them for each image. Specifically, each MSCOCO image category consists of top relevant histories extracted based on their semantic relationships… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2355-2384, 2023, DOI:10.32604/cmc.2023.034993
Abstract Crowdsensing, as a data collection method that uses the mobile sensing ability of many users to help the public collect and extract useful information, has received extensive attention in data collection. Since crowdsensing relies on user equipment to consume resources to obtain information, and the quality and distribution of user equipment are uneven, crowdsensing has problems such as low participation enthusiasm of participants and low quality of collected data, which affects the widespread use of crowdsensing. This paper proposes to apply the blockchain to crowdsensing and solve the above challenges by utilizing the characteristics of the blockchain, such as immutability… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2385-2400, 2023, DOI:10.32604/cmc.2023.035904
Abstract In this article, a comprehensive survey of deep learning-based (DL-based) human pose estimation (HPE) that can help researchers in the domain of computer vision is presented. HPE is among the fastest-growing research domains of computer vision and is used in solving several problems for human endeavours. After the detailed introduction, three different human body modes followed by the main stages of HPE and two pipelines of two-dimensional (2D) HPE are presented. The details of the four components of HPE are also presented. The keypoints output format of two popular 2D HPE datasets and the most cited DL-based HPE articles from… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2401-2426, 2023, DOI:10.32604/cmc.2023.037857
Abstract Farming is cultivating the soil, producing crops, and keeping livestock. The agricultural sector plays a crucial role in a country’s economic growth. This research proposes a two-stage machine learning framework for agriculture to improve efficiency and increase crop yield. In the first stage, machine learning algorithms generate data for extensive and far-flung agricultural areas and forecast crops. The recommended crops are based on various factors such as weather conditions, soil analysis, and the amount of fertilizers and pesticides required. In the second stage, a transfer learning-based model for plant seedlings, pests, and plant leaf disease datasets is used to detect… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2427-2441, 2023, DOI:10.32604/cmc.2023.038462
Abstract With the rapid development of technology, processing the explosive growth of meteorological data on traditional standalone computing has become increasingly time-consuming, which cannot meet the demands of scientific research and business. Therefore, this paper proposes the implementation of the parallel Clustering Large Application based upon RANdomized Search (CLARANS) clustering algorithm on the Spark cloud computing platform to cluster China’s climate regions using meteorological data from 1988 to 2018. The aim is to address the challenge of applying clustering algorithms to large datasets. In this paper, the morphological similarity distance is adopted as the similarity measurement standard instead of Euclidean distance,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2443-2460, 2023, DOI:10.32604/cmc.2023.038675
Abstract Role-based network embedding aims to embed role-similar nodes into a similar embedding space, which is widely used in graph mining tasks such as role classification and detection. Roles are sets of nodes in graph networks with similar structural patterns and functions. However, the role-similar nodes may be far away or even disconnected from each other. Meanwhile, the neighborhood node features and noise also affect the result of the role-based network embedding, which are also challenges of current network embedding work. In this paper, we propose a Role-based network Embedding via Quantum walk with weighted Features fusion (REQF), which simultaneously considers… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2461-2482, 2023, DOI:10.32604/cmc.2023.040257
Abstract With the increasing use of deep learning technology, there is a growing concern over creating deep fake images and videos that can potentially be used for fraud. In healthcare, manipulating medical images could lead to misdiagnosis and potentially life-threatening consequences. Therefore, the primary purpose of this study is to explore the use of deep learning algorithms to detect deep fake images by solving the problem of recognizing the handling of samples of cancer and other diseases. Therefore, this research proposes a framework that leverages state-of-the-art deep convolutional neural networks (CNN) and a large dataset of authentic and deep fake medical… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2483-2502, 2023, DOI:10.32604/cmc.2023.040485
Abstract Computing-intensive and latency-sensitive user requests pose significant challenges to traditional cloud computing. In response to these challenges, mobile edge computing (MEC) has emerged as a new paradigm that extends the computational, caching, and communication capabilities of cloud computing. By caching certain services on edge nodes, computational support can be provided for requests that are offloaded to the edges. However, previous studies on task offloading have generally not considered the impact of caching mechanisms and the cache space occupied by services. This oversight can lead to problems, such as high delays in task executions and invalidation of offloading decisions. To optimize… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2503-2530, 2023, DOI:10.32604/cmc.2023.040505
Abstract With the rapid development of intelligent manufacturing and the changes in market demand, the current manufacturing industry presents the characteristics of multi-varieties, small batches, customization, and a short production cycle, with the whole production process having certain flexibility. In this paper, a mathematical model is established with the minimum production cycle as the optimization objective for the dual-resource batch scheduling of the flexible job shop, and an improved nested optimization algorithm is designed to solve the problem. The outer layer batch optimization problem is solved by the improved simulated annealing algorithm. The inner double resource scheduling problem is solved by… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2531-2549, 2023, DOI:10.32604/cmc.2023.040776
Abstract With the application and development of blockchain technology, many problems faced by blockchain traceability are gradually exposed. Such as cross-chain information collaboration, data separation and storage, multi-system, multi-security domain collaboration, etc. To solve these problems, it is proposed to construct trust domains based on federated chains. The public chain is used as the authorization chain to build a cross-domain data traceability mechanism applicable to multi-domain collaboration. First, the architecture of the blockchain cross-domain model is designed. Combined with the data access strategy and the decision mechanism, the open and transparent judgment of cross-domain permission and cross-domain identity authentication is realized.… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2551-2570, 2023, DOI:10.32604/cmc.2023.039164
Abstract The detection of brain disease is an essential issue in medical and research areas. Deep learning techniques have shown promising results in detecting and diagnosing brain diseases using magnetic resonance imaging (MRI) images. These techniques involve training neural networks on large datasets of MRI images, allowing the networks to learn patterns and features indicative of different brain diseases. However, several challenges and limitations still need to be addressed further to improve the accuracy and effectiveness of these techniques. This paper implements a Feature Enhanced Stacked Auto Encoder (FESAE) model to detect brain diseases. The standard stack auto encoder’s results are… More >
Open Access
RETRACTION
CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2571-2571, 2023, DOI:10.32604/cmc.2023.045533
Abstract This article has no abstract. More >