CMES: The Application Channel for the 2022 Young Researcher Award is now Open
Empowering Human Decision-Making in AI Models: The Path to Trust and Transparency
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960
Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial when implementing network operations at… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 943-958, 2023, DOI:10.32604/cmc.2023.034078
Abstract Big data is usually unstructured, and many applications require the analysis in real-time. Decision tree (DT) algorithm is widely used to analyze big data. Selecting the optimal depth of DT is time-consuming process as it requires many iterations. In this paper, we have designed a modified version of a (DT). The tree aims to achieve optimal depth by self-tuning running parameters and improving the accuracy. The efficiency of the modified (DT) was verified using two datasets (airport and fire datasets). The airport dataset has 500000 instances and the fire dataset has 600000 instances. A comparison has been made between the… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 669-681, 2023, DOI:10.32604/cmc.2022.033939
Abstract This paper presents a compact Multiple Input Multiple Output (MIMO) antenna with WLAN band notch for Ultra-Wideband (UWB) applications. The antenna is designed on 0.8 mm thick low-cost FR-4 substrate having a compact size of 22 mm × 30 mm. The proposed antenna comprises of two monopole patches on the top layer of substrate while having a shared ground on its bottom layer. The mutual coupling between adjacent patches has been reduced by using a novel stub with shared ground structure. The stub consists of complementary rectangular slots that disturb the surface current direction and thus result in reducing mutual… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 393-407, 2023, DOI:10.32604/cmc.2023.033536
Abstract Watermarking of digital images is required in diversified applications ranging from medical imaging to commercial images used over the web. Usually, the copyright information is embossed over the image in the form of a logo at the corner or diagonal text in the background. However, this form of visible watermarking is not suitable for a large class of applications. In all such cases, a hidden watermark is embedded inside the original image as proof of ownership. A large number of techniques and algorithms are proposed by researchers for invisible watermarking. In this paper, we focus on issues that are critical… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2137-2153, 2023, DOI:10.32604/cmc.2023.036861
Abstract Encryption algorithms are one of the methods to protect data during its transmission through an unsafe transmission medium. But encryption methods need a lot of time during encryption and decryption, so it is necessary to find encryption algorithms that consume little time while preserving the security of the data. In this paper, more than one algorithm was combined to obtain high security with a short implementation time. A chaotic system, DNA computing, and Salsa20 were combined. A proposed 5D chaos system was used to generate more robust keys in a Salsa algorithm and DNA computing. Also, the confusion is performed… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1711-1733, 2023, DOI:10.32604/cmc.2023.036680
Abstract Various regions are becoming increasingly vulnerable to the increased frequency of floods due to the recent changes in climate and precipitation patterns throughout the world. As a result, specific infrastructures, notably bridges, would experience significant flooding for which they were not intended and would be submerged. The flow field and shear stress distribution around tandem bridge piers under pressurized flow conditions for various bridge deck widths are examined using a series of three-dimensional (3D) simulations. It is indicated that scenarios with a deck width to pier diameter (Ld/p) ratio of 3 experience the highest levels of turbulent disturbance. In addition,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1657-1669, 2023, DOI:10.32604/cmc.2023.036558
Abstract The marine environment is becoming increasingly complex due to the various marine vehicles, and the diversity of maritime objects poses a challenge to marine environmental governance. Maritime object detection technology plays an important role in this segment. In the field of computer vision, there is no sufficiently comprehensive public dataset for maritime objects in the contrast to the automotive application domain. The existing maritime datasets either have no bounding boxes (which are made for object classification) or cover limited varieties of maritime objects. To fulfil the vacancy, this paper proposed the Multi-Category Large-Scale Dataset for Maritime Object Detection (MCMOD) which… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1353-1369, 2023, DOI:10.32604/cmc.2023.036453
Abstract The current advancement in cloud computing, Artificial Intelligence (AI), and the Internet of Things (IoT) transformed the traditional healthcare system into smart healthcare. Healthcare services could be enhanced by incorporating key techniques like AI and IoT. The convergence of AI and IoT provides distinct opportunities in the medical field. Fall is regarded as a primary cause of death or post-traumatic complication for the ageing population. Therefore, earlier detection of older person falls in smart homes is required to improve the survival rate of an individual or provide the necessary support. Lately, the emergence of IoT, AI, smartphones, wearables, and so… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 293-309, 2023, DOI:10.32604/cmc.2023.036438
Abstract Medical images are used as a diagnostic tool, so protecting their confidentiality has long been a topic of study. From this, we propose a Resnet50-DCT-based zero watermarking algorithm for use with medical images. To begin, we use Resnet50, a pre-training network, to draw out the deep features of medical images. Then the deep features are transformed by DCT transform and the perceptual hash function is used to generate the feature vector. The original watermark is chaotic scrambled to get the encrypted watermark, and the watermark information is embedded into the original medical image by XOR operation, and the logical key… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1271-1290, 2023, DOI:10.32604/cmc.2023.036422
Abstract Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One of the online security challenges… More >