Cmc-computers Materials & Continua最新文献

筛选
英文 中文
Clustering Indoor Location Data for Social Distancing and Human Mobility to Combat COVID-19 聚类室内位置数据以保持社交距离和人员流动以应对COVID-19
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.021756
K. R. Uthayan, G. Lakshmi Vara Prasad, V. Mohan, C. Bharatiraja, Irina V. Pustokhina, Denis A. Pustokhin, Vicente Garc韆 D韆z
{"title":"Clustering Indoor Location Data for Social Distancing and Human Mobility to Combat COVID-19","authors":"K. R. Uthayan, G. Lakshmi Vara Prasad, V. Mohan, C. Bharatiraja, Irina V. Pustokhina, Denis A. Pustokhin, Vicente Garc韆 D韆z","doi":"10.32604/cmc.2022.021756","DOIUrl":"https://doi.org/10.32604/cmc.2022.021756","url":null,"abstract":"The world is experiencing the unprecedented time of a pandemic caused by the coronavirus disease (i.e., COVID-19). As a countermeasure, contact tracing and social distancing are essential to prevent the transmission of the virus, which can be achieved using indoor location analytics. Based on the indoor location analytics, the human mobility on a site can be monitored and planned to minimize human's contact and enforce social distancing to contain the transmission of COVID-19. Given the indoor location data, the clustering can be applied to cluster spatial data, spatio-temporal data and movement behavior features for proximity detection or contact tracing applications. More specifically, we propose the Coherent Moving Cluster (CMC) algorithm for contact tracing, the density-based clustering (DBScan) algorithm for identification of hotspots and the trajectory clustering (TRACLUS) algorithm for clustering indoor trajectories. The feature extraction mechanism is then developed to extract useful and valuable features that can assist the proposed system to construct the network of users based on the similarity of themovement behaviors of the users. The network of users is used to model an optimization problem to manage the human mobility on a site. The objective function is formulated to minimize the probability of contact between the users and the optimization problem is solved using the proposed effective scheduling solution based on OR-Tools. The simulation results show that the proposed indoor location analytics system outperforms the existing clustering methods by about 30% in terms of accuracy of clustering trajectories. By adopting this system for human mobility management, the count of close contacts among the users within a confined area can be reduced by 80% in the scenario where all users are allowed to access the site. © 2022 Tech Science Press. All rights reserved.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"34 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87139241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust Authentication and Session Key Agreement Protocol for Satellite Communications 卫星通信鲁棒认证与会话密钥协议
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.023697
S. Soltani, Seyed Amin Hosseini Seno, J. Rejito, R. Budiarto
{"title":"Robust Authentication and Session Key Agreement Protocol for Satellite Communications","authors":"S. Soltani, Seyed Amin Hosseini Seno, J. Rejito, R. Budiarto","doi":"10.32604/cmc.2022.023697","DOIUrl":"https://doi.org/10.32604/cmc.2022.023697","url":null,"abstract":": Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities. Moreover, we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography (ECC). We show that the proposed protocol meets common security requirements and is resistant to known security attacks. Moreover, we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications (AVISPA) formal verification tool and On-the fly Model-Checker (OFMC) and ATtack SEarcher (ATSE) model checkers. We have also proved the security of the session key exchange of our protocol using the Real or Random (RoR) model. Finally, the comparison of our scheme with similar methods shows its superiority.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"336 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80782215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Image Restoration Model: A Defense Method Against Adversarial Attacks 深度图像恢复模型:对抗对抗性攻击的防御方法
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020111
Kazim Ali, Adnan N. Quershi, Ahmad Alauddin Bin Arifin, Muhammad Shahid Bhatti, A. Sohail, Rohail Hassan
{"title":"Deep Image Restoration Model: A Defense Method Against Adversarial Attacks","authors":"Kazim Ali, Adnan N. Quershi, Ahmad Alauddin Bin Arifin, Muhammad Shahid Bhatti, A. Sohail, Rohail Hassan","doi":"10.32604/cmc.2022.020111","DOIUrl":"https://doi.org/10.32604/cmc.2022.020111","url":null,"abstract":"These days, deep learning and computer vision are much-growing fields in this modern world of information technology. Deep learning algorithms and computer vision have achieved great success in different applications like image classification, speech recognition, self-driving vehicles, disease diagnostics, and many more. Despite success in various applications, it is found that these learning algorithms face severe threats due to adversarial attacks. Adversarial examples are inputs like images in the computer vision field, which are intentionally slightly changed or perturbed. These changes are humanly imperceptible. But are misclassified by a model with high probability and severely affects the performance or prediction. In this scenario, we present a deep image restoration model that restores adversarial examples so that the target model is classified correctly again. We proved that our defense method against adversarial attacks based on a deep image restoration model is simple and state-of-the-art by providing strong experimental results evidence. We have used MNIST and CIFAR10 datasets for experiments and analysis of our defense method. In the end, we have compared our method to other state-ofthe-art defense methods and proved that our results are better than other rival methods.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"34 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85057975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Efficient Cluster-Based Optimal Resource Management in IoT Environment 物联网环境下基于能效集群的资源优化管理
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.017910
J. V. Anchitaalagammai, T. Jayasankar, P. Selvaraj, Mohamed Yacin Sikkandar, M. Zakarya, M. Elhoseny, K. Shankar
{"title":"Energy Efficient Cluster-Based Optimal Resource Management in IoT Environment","authors":"J. V. Anchitaalagammai, T. Jayasankar, P. Selvaraj, Mohamed Yacin Sikkandar, M. Zakarya, M. Elhoseny, K. Shankar","doi":"10.32604/cmc.2022.017910","DOIUrl":"https://doi.org/10.32604/cmc.2022.017910","url":null,"abstract":": Internet of Things (IoT) is a technological revolution that redefined communication and computation of modern era. IoT generally refers to a network of gadgets linked via wireless network and communicates via internet. Resource management, especially energy management, is a critical issue when designing IoT devices. Several studies reported that clustering and routing are energy efficient solutions for optimal management of resources in IoT environment. In this point of view, the current study devises a new Energy-Efficient Clustering-based Routing technique for Resource Management i.e., EECBRM in IoT environment. The proposed EECBRM model has three stages namely, fuzzy logic-based clustering, Lion Whale Optimization with Tumbling (LWOT)-based routing and cluster maintenance phase. The proposed EECBRM model was validated through a series of experiments and the results were verified under several aspects. EECBRM model was compared with existing methods in terms of energy efficiency, delay, number of data transmission, and network lifetime. When simulated, in comparison with other methods, EECBRM model yielded excellent results in a significant manner. Thus, the efficiency of the proposed model is established.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"29 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85518367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SutteARIMA: A Novel Method for Forecasting the Infant Mortality Rate in Indonesia SutteARIMA:一种预测印度尼西亚婴儿死亡率的新方法
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.021382
A. Saleh Ahmar, Eva Boj del Val, M. A. El Safty, Sami Saleh Alzahrani, Hamed El-Khawaga
{"title":"SutteARIMA: A Novel Method for Forecasting the Infant Mortality Rate in Indonesia","authors":"A. Saleh Ahmar, Eva Boj del Val, M. A. El Safty, Sami Saleh Alzahrani, Hamed El-Khawaga","doi":"10.32604/cmc.2022.021382","DOIUrl":"https://doi.org/10.32604/cmc.2022.021382","url":null,"abstract":": This study focuses on the novel forecasting method (SutteARIMA) and its application in predicting Infant Mortality Rate data in Indonesia. It undertakes a comparison of the most popular and widely used four forecasting methods: ARIMA, Neural Networks Time Series (NNAR), Holt-Winters, and SutteARIMA. The data used were obtained from the website of the World Bank. The data consisted of the annual infant mortality rate (per 1000 live births) from 1991 to 2019. To determine a suitable and best method for predicting Infant Mortality rate, the forecasting results of these four methods were compared based on the mean absolute percentage error (MAPE) and mean squared error (MSE). The results of the study showed that the accuracy level of SutteARIMA method (MAPE: 0.83% and MSE: 0.046) in predicting Infant Mortality rate in Indonesia was smaller than the other three forecasting methods, specifically the ARIMA (0.2.2) with a MAPE of 1.21% and a MSE of 0.146; the NNAR with a MAPE of 7.95% and a MSE of 3.90; and the Holt-Winters with a MAPE of 1.03% and a MSE: of 0.083.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"83 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83255120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Milestones of Wireless Communication Networks and Technology Prospect of Next Generation (6G) 无线通信网络里程碑与下一代(6G)技术展望
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.023500
Mohammed H. Alsharif, Md. Sanwar Hossain, Abu Jahid, Muhammad Asghar Khan, Bong Jun Choi, Samih M. M. Mostafa
{"title":"Milestones of Wireless Communication Networks and Technology Prospect of Next Generation (6G)","authors":"Mohammed H. Alsharif, Md. Sanwar Hossain, Abu Jahid, Muhammad Asghar Khan, Bong Jun Choi, Samih M. M. Mostafa","doi":"10.32604/cmc.2022.023500","DOIUrl":"https://doi.org/10.32604/cmc.2022.023500","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"27 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83255325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Novel Cryptocurrency Prediction Method Using Optimum CNN 一种新的基于最优CNN的加密货币预测方法
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020823
A. Naseer, E. Nava Baro, Sultan Daud Khan, Yolanda Vila, Jennifer Doyle
{"title":"A Novel Cryptocurrency Prediction Method Using Optimum CNN","authors":"A. Naseer, E. Nava Baro, Sultan Daud Khan, Yolanda Vila, Jennifer Doyle","doi":"10.32604/cmc.2022.020823","DOIUrl":"https://doi.org/10.32604/cmc.2022.020823","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"3 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83658648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT & AI Enabled Three-Phase Secure and Non-Invasive COVID 19 Diagnosis System 支持物联网和人工智能的三相安全无创COVID - 19诊断系统
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020238
Muneeb Ur Rehman, Fawad Ahmed, Muhammad Attique Khan, U. Tariq, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad
{"title":"IoT & AI Enabled Three-Phase Secure and Non-Invasive COVID 19 Diagnosis System","authors":"Muneeb Ur Rehman, Fawad Ahmed, Muhammad Attique Khan, U. Tariq, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad","doi":"10.32604/cmc.2022.020238","DOIUrl":"https://doi.org/10.32604/cmc.2022.020238","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"69 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83826061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks 基于3D-CNN和LSTM网络的动态手势识别
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.019586
Muneeb Ur Rehman, Fawad Ahmed, Muhammad Attique Khan, U. Tariq, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad
{"title":"Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks","authors":"Muneeb Ur Rehman, Fawad Ahmed, Muhammad Attique Khan, U. Tariq, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad","doi":"10.32604/cmc.2022.019586","DOIUrl":"https://doi.org/10.32604/cmc.2022.019586","url":null,"abstract":": Recognition of dynamic hand gestures in real-time is a difficult task because the system can never know when or from where the gesture starts and ends in a video stream. Many researchers have been working on vision-based gesture recognition due to its various applications. This paper proposes a deep learning architecture based on the combination of a 3D Convolutional Neural Network (3D-CNN) and a Long Short-Term Memory (LSTM) network. The proposed architecture extracts spatial-temporal information from video sequences input while avoiding extensive computation. The 3D-CNN is used for the extraction of spectral and spatial features which are then given to the LSTM network through which classification is carried out. The proposed model is a light-weight architecture with only 3.7 million training parameters. The model has been evaluated on 15 classes from the 20BN-jester dataset available publicly. The model was trained on 2000 video-clips per class which were separated into 80% training and 20% validation sets. An accuracy of 99% and 97% was achieved on training and testing data, respectively. We further show that the combination of 3D-CNN with LSTM gives superior results as compared to MobileNetv2 + LSTM.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"16 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81799271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Edge Metric Dimension of Honeycomb and Hexagonal Networks for IoT 物联网蜂窝和六角形网络的边缘度量尺寸
IF 3.1 4区 计算机科学
Cmc-computers Materials & Continua Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.023003
S. Abbas, Z. Raza, Nida Siddiqui, Faheem Khan, T. Whangbo
{"title":"Edge Metric Dimension of Honeycomb and Hexagonal Networks for IoT","authors":"S. Abbas, Z. Raza, Nida Siddiqui, Faheem Khan, T. Whangbo","doi":"10.32604/cmc.2022.023003","DOIUrl":"https://doi.org/10.32604/cmc.2022.023003","url":null,"abstract":": Wireless Sensor Network (WSN) is considered to be one of the fundamental technologies employed in the Internet of things (IoT); hence, enabling diverse applications for carrying out real-time observations. Robot navigation in such networks was the main motivation for the introduction of the concept of landmarks. A robot can identify its own location by sending signals to obtain the distances between itself and the landmarks. Considering networks to be a type of graph, this concept was redefined as metric dimension of a graph which is the minimum number of nodes needed to identify all the nodes of the graph. This idea was extended to the concept of edge metric dimension of a graph G , which is the minimum number of nodes needed in a graph to uniquely identify each edge of the network. Regular plane networks can be easily constructed by repeating regular polygons. This design is of extreme importance as it yields high overall performance; hence, it can be used in various networking and IoT domains. The honeycomb and the hexagonal networks are two such popular mesh-derived parallel networks. In this paper, it is proved that the minimum landmarks required for the honeycomb network HC ( n ), and the hexagonal network HX ( n ) are 3 and 6 respectively. The bounds for the landmarks required for the hex-derived network HDN 1( n ) are also proposed.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"14 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81856015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信