首页 > 最新文献

Cmc-computers Materials & Continua最新文献

英文 中文
Clustering Indoor Location Data for Social Distancing and Human Mobility to Combat COVID-19 聚类室内位置数据以保持社交距离和人员流动以应对COVID-19
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.021756
K. R. Uthayan, G. Lakshmi Vara Prasad, V. Mohan, C. Bharatiraja, Irina V. Pustokhina, Denis A. Pustokhin, Vicente Garc韆 D韆z
The world is experiencing the unprecedented time of a pandemic caused by the coronavirus disease (i.e., COVID-19). As a countermeasure, contact tracing and social distancing are essential to prevent the transmission of the virus, which can be achieved using indoor location analytics. Based on the indoor location analytics, the human mobility on a site can be monitored and planned to minimize human's contact and enforce social distancing to contain the transmission of COVID-19. Given the indoor location data, the clustering can be applied to cluster spatial data, spatio-temporal data and movement behavior features for proximity detection or contact tracing applications. More specifically, we propose the Coherent Moving Cluster (CMC) algorithm for contact tracing, the density-based clustering (DBScan) algorithm for identification of hotspots and the trajectory clustering (TRACLUS) algorithm for clustering indoor trajectories. The feature extraction mechanism is then developed to extract useful and valuable features that can assist the proposed system to construct the network of users based on the similarity of themovement behaviors of the users. The network of users is used to model an optimization problem to manage the human mobility on a site. The objective function is formulated to minimize the probability of contact between the users and the optimization problem is solved using the proposed effective scheduling solution based on OR-Tools. The simulation results show that the proposed indoor location analytics system outperforms the existing clustering methods by about 30% in terms of accuracy of clustering trajectories. By adopting this system for human mobility management, the count of close contacts among the users within a confined area can be reduced by 80% in the scenario where all users are allowed to access the site. © 2022 Tech Science Press. All rights reserved.
世界正在经历前所未有的冠状病毒病(即COVID-19)大流行时期。作为对策,接触者追踪和保持社会距离对于防止病毒传播至关重要,这可以通过室内定位分析来实现。基于室内位置分析,可以监测和规划站点内的人员流动,以最大限度地减少人员接触,并强制保持社交距离,以遏制COVID-19的传播。基于室内位置数据,聚类可以应用于聚类空间数据、时空数据和运动行为特征,用于接近检测或接触跟踪应用。更具体地说,我们提出了用于接触追踪的相干移动聚类(CMC)算法,用于识别热点的基于密度的聚类(DBScan)算法和用于聚类室内轨迹的轨迹聚类(TRACLUS)算法。然后开发了特征提取机制,以提取有用和有价值的特征,这些特征可以帮助所提出的系统基于用户运动行为的相似性构建用户网络。利用用户网络来建模一个优化问题,以管理站点上的人员移动性。以最小化用户之间的接触概率为目标函数,利用提出的基于OR-Tools的有效调度方案求解优化问题。仿真结果表明,所提出的室内位置分析系统的聚类轨迹精度比现有的聚类方法提高了30%左右。通过采用该系统进行人员流动管理,在允许所有用户进入站点的情况下,在受限区域内用户之间的密切接触次数可以减少80%。©2022科技科学出版社。版权所有。
{"title":"Clustering Indoor Location Data for Social Distancing and Human Mobility to Combat COVID-19","authors":"K. R. Uthayan, G. Lakshmi Vara Prasad, V. Mohan, C. Bharatiraja, Irina V. Pustokhina, Denis A. Pustokhin, Vicente Garc韆 D韆z","doi":"10.32604/cmc.2022.021756","DOIUrl":"https://doi.org/10.32604/cmc.2022.021756","url":null,"abstract":"The world is experiencing the unprecedented time of a pandemic caused by the coronavirus disease (i.e., COVID-19). As a countermeasure, contact tracing and social distancing are essential to prevent the transmission of the virus, which can be achieved using indoor location analytics. Based on the indoor location analytics, the human mobility on a site can be monitored and planned to minimize human's contact and enforce social distancing to contain the transmission of COVID-19. Given the indoor location data, the clustering can be applied to cluster spatial data, spatio-temporal data and movement behavior features for proximity detection or contact tracing applications. More specifically, we propose the Coherent Moving Cluster (CMC) algorithm for contact tracing, the density-based clustering (DBScan) algorithm for identification of hotspots and the trajectory clustering (TRACLUS) algorithm for clustering indoor trajectories. The feature extraction mechanism is then developed to extract useful and valuable features that can assist the proposed system to construct the network of users based on the similarity of themovement behaviors of the users. The network of users is used to model an optimization problem to manage the human mobility on a site. The objective function is formulated to minimize the probability of contact between the users and the optimization problem is solved using the proposed effective scheduling solution based on OR-Tools. The simulation results show that the proposed indoor location analytics system outperforms the existing clustering methods by about 30% in terms of accuracy of clustering trajectories. By adopting this system for human mobility management, the count of close contacts among the users within a confined area can be reduced by 80% in the scenario where all users are allowed to access the site. © 2022 Tech Science Press. All rights reserved.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"34 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87139241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust Authentication and Session Key Agreement Protocol for Satellite Communications 卫星通信鲁棒认证与会话密钥协议
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.023697
S. Soltani, Seyed Amin Hosseini Seno, J. Rejito, R. Budiarto
: Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities. Moreover, we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography (ECC). We show that the proposed protocol meets common security requirements and is resistant to known security attacks. Moreover, we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications (AVISPA) formal verification tool and On-the fly Model-Checker (OFMC) and ATtack SEarcher (ATSE) model checkers. We have also proved the security of the session key exchange of our protocol using the Real or Random (RoR) model. Finally, the comparison of our scheme with similar methods shows its superiority.
卫星网络被认为是当今世界上最重要的通信基础设施,它补充了陆地网络并为其用户提供有价值的服务。这些网络的广泛覆盖和服务稳定性使其越来越受欢迎。由于对卫星通信的窃听和主动入侵比地面网络容易得多,因此确保卫星通信的安全至关重要。目前,针对卫星通信的身份验证和密钥交换,已经提出了几种协议,但都不能完全满足安全要求。在本文中,我们研究了其中一个协议并确定了其安全漏洞。此外,我们还提出了一种使用椭圆曲线加密(ECC)的鲁棒安全认证和会话密钥协商协议。我们证明了所提出的协议满足常见的安全需求,并且能够抵抗已知的安全攻击。此外,我们使用互联网安全协议和应用程序的自动验证(AVISPA)形式验证工具和动态模型检查器(OFMC)和攻击搜索器(ATSE)模型检查器证明了所提出的方案满足安全特性。我们还使用Real or Random (RoR)模型证明了我们协议会话密钥交换的安全性。最后,通过与同类方法的比较,证明了该方案的优越性。
{"title":"Robust Authentication and Session Key Agreement Protocol for Satellite Communications","authors":"S. Soltani, Seyed Amin Hosseini Seno, J. Rejito, R. Budiarto","doi":"10.32604/cmc.2022.023697","DOIUrl":"https://doi.org/10.32604/cmc.2022.023697","url":null,"abstract":": Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities. Moreover, we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography (ECC). We show that the proposed protocol meets common security requirements and is resistant to known security attacks. Moreover, we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications (AVISPA) formal verification tool and On-the fly Model-Checker (OFMC) and ATtack SEarcher (ATSE) model checkers. We have also proved the security of the session key exchange of our protocol using the Real or Random (RoR) model. Finally, the comparison of our scheme with similar methods shows its superiority.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"336 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80782215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Image Restoration Model: A Defense Method Against Adversarial Attacks 深度图像恢复模型:对抗对抗性攻击的防御方法
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020111
Kazim Ali, Adnan N. Quershi, Ahmad Alauddin Bin Arifin, Muhammad Shahid Bhatti, A. Sohail, Rohail Hassan
These days, deep learning and computer vision are much-growing fields in this modern world of information technology. Deep learning algorithms and computer vision have achieved great success in different applications like image classification, speech recognition, self-driving vehicles, disease diagnostics, and many more. Despite success in various applications, it is found that these learning algorithms face severe threats due to adversarial attacks. Adversarial examples are inputs like images in the computer vision field, which are intentionally slightly changed or perturbed. These changes are humanly imperceptible. But are misclassified by a model with high probability and severely affects the performance or prediction. In this scenario, we present a deep image restoration model that restores adversarial examples so that the target model is classified correctly again. We proved that our defense method against adversarial attacks based on a deep image restoration model is simple and state-of-the-art by providing strong experimental results evidence. We have used MNIST and CIFAR10 datasets for experiments and analysis of our defense method. In the end, we have compared our method to other state-ofthe-art defense methods and proved that our results are better than other rival methods.
如今,深度学习和计算机视觉是现代信息技术世界中发展迅速的领域。深度学习算法和计算机视觉在图像分类、语音识别、自动驾驶汽车、疾病诊断等不同应用中取得了巨大成功。尽管在各种应用中取得了成功,但由于对抗性攻击,这些学习算法面临着严重的威胁。对抗性示例是像计算机视觉领域中的图像一样的输入,它们被有意地轻微改变或干扰。这些变化是人类难以察觉的。但被模型错误分类的概率很大,严重影响了性能或预测。在这种情况下,我们提出了一种深度图像恢复模型,该模型可以恢复对抗性示例,以便再次正确分类目标模型。通过提供强有力的实验结果证据,证明了基于深度图像恢复模型的对抗性攻击防御方法简单、先进。我们使用MNIST和CIFAR10数据集对我们的防御方法进行了实验和分析。最后,我们将我们的方法与其他最先进的防御方法进行了比较,证明了我们的结果优于其他竞争对手的方法。
{"title":"Deep Image Restoration Model: A Defense Method Against Adversarial Attacks","authors":"Kazim Ali, Adnan N. Quershi, Ahmad Alauddin Bin Arifin, Muhammad Shahid Bhatti, A. Sohail, Rohail Hassan","doi":"10.32604/cmc.2022.020111","DOIUrl":"https://doi.org/10.32604/cmc.2022.020111","url":null,"abstract":"These days, deep learning and computer vision are much-growing fields in this modern world of information technology. Deep learning algorithms and computer vision have achieved great success in different applications like image classification, speech recognition, self-driving vehicles, disease diagnostics, and many more. Despite success in various applications, it is found that these learning algorithms face severe threats due to adversarial attacks. Adversarial examples are inputs like images in the computer vision field, which are intentionally slightly changed or perturbed. These changes are humanly imperceptible. But are misclassified by a model with high probability and severely affects the performance or prediction. In this scenario, we present a deep image restoration model that restores adversarial examples so that the target model is classified correctly again. We proved that our defense method against adversarial attacks based on a deep image restoration model is simple and state-of-the-art by providing strong experimental results evidence. We have used MNIST and CIFAR10 datasets for experiments and analysis of our defense method. In the end, we have compared our method to other state-ofthe-art defense methods and proved that our results are better than other rival methods.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"34 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85057975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Efficient Cluster-Based Optimal Resource Management in IoT Environment 物联网环境下基于能效集群的资源优化管理
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.017910
J. V. Anchitaalagammai, T. Jayasankar, P. Selvaraj, Mohamed Yacin Sikkandar, M. Zakarya, M. Elhoseny, K. Shankar
: Internet of Things (IoT) is a technological revolution that redefined communication and computation of modern era. IoT generally refers to a network of gadgets linked via wireless network and communicates via internet. Resource management, especially energy management, is a critical issue when designing IoT devices. Several studies reported that clustering and routing are energy efficient solutions for optimal management of resources in IoT environment. In this point of view, the current study devises a new Energy-Efficient Clustering-based Routing technique for Resource Management i.e., EECBRM in IoT environment. The proposed EECBRM model has three stages namely, fuzzy logic-based clustering, Lion Whale Optimization with Tumbling (LWOT)-based routing and cluster maintenance phase. The proposed EECBRM model was validated through a series of experiments and the results were verified under several aspects. EECBRM model was compared with existing methods in terms of energy efficiency, delay, number of data transmission, and network lifetime. When simulated, in comparison with other methods, EECBRM model yielded excellent results in a significant manner. Thus, the efficiency of the proposed model is established.
物联网(IoT)是一场重新定义现代通信和计算的技术革命。物联网通常是指通过无线网络连接并通过互联网进行通信的设备网络。在设计物联网设备时,资源管理,特别是能源管理是一个关键问题。一些研究报告称,集群和路由是物联网环境中资源优化管理的节能解决方案。从这个角度来看,本研究设计了一种新的高效节能的基于聚类的资源管理路由技术,即物联网环境下的EECBRM。提出的EECBRM模型分为三个阶段,即基于模糊逻辑的聚类、基于LWOT的路由优化和集群维护阶段。通过一系列实验对提出的EECBRM模型进行了验证,并从几个方面对结果进行了验证。将EECBRM模型与现有方法在能效、时延、数据传输次数、网络寿命等方面进行比较。仿真结果表明,与其他方法相比,EECBRM模型取得了很好的效果。由此证明了所提模型的有效性。
{"title":"Energy Efficient Cluster-Based Optimal Resource Management in IoT Environment","authors":"J. V. Anchitaalagammai, T. Jayasankar, P. Selvaraj, Mohamed Yacin Sikkandar, M. Zakarya, M. Elhoseny, K. Shankar","doi":"10.32604/cmc.2022.017910","DOIUrl":"https://doi.org/10.32604/cmc.2022.017910","url":null,"abstract":": Internet of Things (IoT) is a technological revolution that redefined communication and computation of modern era. IoT generally refers to a network of gadgets linked via wireless network and communicates via internet. Resource management, especially energy management, is a critical issue when designing IoT devices. Several studies reported that clustering and routing are energy efficient solutions for optimal management of resources in IoT environment. In this point of view, the current study devises a new Energy-Efficient Clustering-based Routing technique for Resource Management i.e., EECBRM in IoT environment. The proposed EECBRM model has three stages namely, fuzzy logic-based clustering, Lion Whale Optimization with Tumbling (LWOT)-based routing and cluster maintenance phase. The proposed EECBRM model was validated through a series of experiments and the results were verified under several aspects. EECBRM model was compared with existing methods in terms of energy efficiency, delay, number of data transmission, and network lifetime. When simulated, in comparison with other methods, EECBRM model yielded excellent results in a significant manner. Thus, the efficiency of the proposed model is established.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"29 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85518367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SutteARIMA: A Novel Method for Forecasting the Infant Mortality Rate in Indonesia SutteARIMA:一种预测印度尼西亚婴儿死亡率的新方法
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.021382
A. Saleh Ahmar, Eva Boj del Val, M. A. El Safty, Sami Saleh Alzahrani, Hamed El-Khawaga
: This study focuses on the novel forecasting method (SutteARIMA) and its application in predicting Infant Mortality Rate data in Indonesia. It undertakes a comparison of the most popular and widely used four forecasting methods: ARIMA, Neural Networks Time Series (NNAR), Holt-Winters, and SutteARIMA. The data used were obtained from the website of the World Bank. The data consisted of the annual infant mortality rate (per 1000 live births) from 1991 to 2019. To determine a suitable and best method for predicting Infant Mortality rate, the forecasting results of these four methods were compared based on the mean absolute percentage error (MAPE) and mean squared error (MSE). The results of the study showed that the accuracy level of SutteARIMA method (MAPE: 0.83% and MSE: 0.046) in predicting Infant Mortality rate in Indonesia was smaller than the other three forecasting methods, specifically the ARIMA (0.2.2) with a MAPE of 1.21% and a MSE of 0.146; the NNAR with a MAPE of 7.95% and a MSE of 3.90; and the Holt-Winters with a MAPE of 1.03% and a MSE: of 0.083.
本研究的重点是新的预测方法(SutteARIMA)及其在预测印度尼西亚婴儿死亡率数据中的应用。它比较了最流行和最广泛使用的四种预测方法:ARIMA,神经网络时间序列(NNAR), Holt-Winters和SutteARIMA。所使用的数据来自世界银行的网站。数据包括1991年至2019年的年度婴儿死亡率(每1000名活产婴儿)。通过平均绝对百分比误差(MAPE)和均方误差(MSE)对4种方法的预测结果进行比较,以确定最适合的婴儿死亡率预测方法。研究结果表明,SutteARIMA方法预测印度尼西亚婴儿死亡率的准确率水平(MAPE为0.83%,MSE为0.046)低于其他3种预测方法,其中ARIMA方法(0.2.2)的MAPE为1.21%,MSE为0.146;NNAR的MAPE为7.95%,MSE为3.90;Holt-Winters的MAPE为1.03%,MSE为0.083。
{"title":"SutteARIMA: A Novel Method for Forecasting the Infant Mortality Rate in Indonesia","authors":"A. Saleh Ahmar, Eva Boj del Val, M. A. El Safty, Sami Saleh Alzahrani, Hamed El-Khawaga","doi":"10.32604/cmc.2022.021382","DOIUrl":"https://doi.org/10.32604/cmc.2022.021382","url":null,"abstract":": This study focuses on the novel forecasting method (SutteARIMA) and its application in predicting Infant Mortality Rate data in Indonesia. It undertakes a comparison of the most popular and widely used four forecasting methods: ARIMA, Neural Networks Time Series (NNAR), Holt-Winters, and SutteARIMA. The data used were obtained from the website of the World Bank. The data consisted of the annual infant mortality rate (per 1000 live births) from 1991 to 2019. To determine a suitable and best method for predicting Infant Mortality rate, the forecasting results of these four methods were compared based on the mean absolute percentage error (MAPE) and mean squared error (MSE). The results of the study showed that the accuracy level of SutteARIMA method (MAPE: 0.83% and MSE: 0.046) in predicting Infant Mortality rate in Indonesia was smaller than the other three forecasting methods, specifically the ARIMA (0.2.2) with a MAPE of 1.21% and a MSE of 0.146; the NNAR with a MAPE of 7.95% and a MSE of 3.90; and the Holt-Winters with a MAPE of 1.03% and a MSE: of 0.083.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"83 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83255120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Milestones of Wireless Communication Networks and Technology Prospect of Next Generation (6G) 无线通信网络里程碑与下一代(6G)技术展望
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.023500
Mohammed H. Alsharif, Md. Sanwar Hossain, Abu Jahid, Muhammad Asghar Khan, Bong Jun Choi, Samih M. M. Mostafa
{"title":"Milestones of Wireless Communication Networks and Technology Prospect of Next Generation (6G)","authors":"Mohammed H. Alsharif, Md. Sanwar Hossain, Abu Jahid, Muhammad Asghar Khan, Bong Jun Choi, Samih M. M. Mostafa","doi":"10.32604/cmc.2022.023500","DOIUrl":"https://doi.org/10.32604/cmc.2022.023500","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"27 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83255325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Novel Cryptocurrency Prediction Method Using Optimum CNN 一种新的基于最优CNN的加密货币预测方法
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020823
A. Naseer, E. Nava Baro, Sultan Daud Khan, Yolanda Vila, Jennifer Doyle
{"title":"A Novel Cryptocurrency Prediction Method Using Optimum CNN","authors":"A. Naseer, E. Nava Baro, Sultan Daud Khan, Yolanda Vila, Jennifer Doyle","doi":"10.32604/cmc.2022.020823","DOIUrl":"https://doi.org/10.32604/cmc.2022.020823","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"3 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83658648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT & AI Enabled Three-Phase Secure and Non-Invasive COVID 19 Diagnosis System 支持物联网和人工智能的三相安全无创COVID - 19诊断系统
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.020238
Muneeb Ur Rehman, Fawad Ahmed, Muhammad Attique Khan, U. Tariq, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad
{"title":"IoT & AI Enabled Three-Phase Secure and Non-Invasive COVID 19 Diagnosis System","authors":"Muneeb Ur Rehman, Fawad Ahmed, Muhammad Attique Khan, U. Tariq, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad","doi":"10.32604/cmc.2022.020238","DOIUrl":"https://doi.org/10.32604/cmc.2022.020238","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"69 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83826061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks 基于3D-CNN和LSTM网络的动态手势识别
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.019586
Muneeb Ur Rehman, Fawad Ahmed, Muhammad Attique Khan, U. Tariq, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad
: Recognition of dynamic hand gestures in real-time is a difficult task because the system can never know when or from where the gesture starts and ends in a video stream. Many researchers have been working on vision-based gesture recognition due to its various applications. This paper proposes a deep learning architecture based on the combination of a 3D Convolutional Neural Network (3D-CNN) and a Long Short-Term Memory (LSTM) network. The proposed architecture extracts spatial-temporal information from video sequences input while avoiding extensive computation. The 3D-CNN is used for the extraction of spectral and spatial features which are then given to the LSTM network through which classification is carried out. The proposed model is a light-weight architecture with only 3.7 million training parameters. The model has been evaluated on 15 classes from the 20BN-jester dataset available publicly. The model was trained on 2000 video-clips per class which were separated into 80% training and 20% validation sets. An accuracy of 99% and 97% was achieved on training and testing data, respectively. We further show that the combination of 3D-CNN with LSTM gives superior results as compared to MobileNetv2 + LSTM.
实时识别动态手势是一项艰巨的任务,因为系统永远无法知道视频流中手势的开始和结束时间或地点。由于基于视觉的手势识别应用广泛,许多研究者一直在研究基于视觉的手势识别。本文提出了一种基于3D卷积神经网络(3D- cnn)和长短期记忆(LSTM)网络相结合的深度学习架构。该架构从输入的视频序列中提取时空信息,同时避免了大量的计算。3D-CNN用于提取光谱和空间特征,然后将其提供给LSTM网络,通过LSTM网络进行分类。该模型是一个轻量级的体系结构,只有370万个训练参数。该模型已经在公开可用的200 bn -jester数据集中的15个类上进行了评估。该模型在每个类2000个视频片段上进行训练,这些视频片段被分成80%的训练集和20%的验证集。训练和测试数据的准确率分别达到99%和97%。我们进一步表明,与MobileNetv2 + LSTM相比,3D-CNN与LSTM的结合具有更好的效果。
{"title":"Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks","authors":"Muneeb Ur Rehman, Fawad Ahmed, Muhammad Attique Khan, U. Tariq, Faisal Abdulaziz Alfouzan, Nouf M. Alzahrani, Jawad Ahmad","doi":"10.32604/cmc.2022.019586","DOIUrl":"https://doi.org/10.32604/cmc.2022.019586","url":null,"abstract":": Recognition of dynamic hand gestures in real-time is a difficult task because the system can never know when or from where the gesture starts and ends in a video stream. Many researchers have been working on vision-based gesture recognition due to its various applications. This paper proposes a deep learning architecture based on the combination of a 3D Convolutional Neural Network (3D-CNN) and a Long Short-Term Memory (LSTM) network. The proposed architecture extracts spatial-temporal information from video sequences input while avoiding extensive computation. The 3D-CNN is used for the extraction of spectral and spatial features which are then given to the LSTM network through which classification is carried out. The proposed model is a light-weight architecture with only 3.7 million training parameters. The model has been evaluated on 15 classes from the 20BN-jester dataset available publicly. The model was trained on 2000 video-clips per class which were separated into 80% training and 20% validation sets. An accuracy of 99% and 97% was achieved on training and testing data, respectively. We further show that the combination of 3D-CNN with LSTM gives superior results as compared to MobileNetv2 + LSTM.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"16 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81799271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Edge Metric Dimension of Honeycomb and Hexagonal Networks for IoT 物联网蜂窝和六角形网络的边缘度量尺寸
IF 3.1 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-01-01 DOI: 10.32604/cmc.2022.023003
S. Abbas, Z. Raza, Nida Siddiqui, Faheem Khan, T. Whangbo
: Wireless Sensor Network (WSN) is considered to be one of the fundamental technologies employed in the Internet of things (IoT); hence, enabling diverse applications for carrying out real-time observations. Robot navigation in such networks was the main motivation for the introduction of the concept of landmarks. A robot can identify its own location by sending signals to obtain the distances between itself and the landmarks. Considering networks to be a type of graph, this concept was redefined as metric dimension of a graph which is the minimum number of nodes needed to identify all the nodes of the graph. This idea was extended to the concept of edge metric dimension of a graph G , which is the minimum number of nodes needed in a graph to uniquely identify each edge of the network. Regular plane networks can be easily constructed by repeating regular polygons. This design is of extreme importance as it yields high overall performance; hence, it can be used in various networking and IoT domains. The honeycomb and the hexagonal networks are two such popular mesh-derived parallel networks. In this paper, it is proved that the minimum landmarks required for the honeycomb network HC ( n ), and the hexagonal network HX ( n ) are 3 and 6 respectively. The bounds for the landmarks required for the hex-derived network HDN 1( n ) are also proposed.
无线传感器网络(WSN)被认为是物联网(IoT)的基础技术之一;因此,使各种应用程序进行实时观测。这种网络中的机器人导航是引入地标概念的主要动机。机器人可以通过发送信号来获取自身与地标之间的距离,从而确定自己的位置。考虑到网络是一种图,这个概念被重新定义为图的度量维度,它是识别图中所有节点所需的最小节点数。这一思想被扩展到图的边缘度量维度G的概念,它是图中唯一标识网络每条边所需的最小节点数。通过重复正多边形可以很容易地构造出正平面网络。这种设计是非常重要的,因为它产生了高的整体性能;因此,它可以用于各种网络和物联网领域。蜂窝网和六边形网是两种流行的网格衍生平行网。本文证明了蜂窝网络HC (n)和六边形网络HX (n)所需的最小地标值分别为3和6。提出了十六进制网络HDN 1(n)所需的地标边界。
{"title":"Edge Metric Dimension of Honeycomb and Hexagonal Networks for IoT","authors":"S. Abbas, Z. Raza, Nida Siddiqui, Faheem Khan, T. Whangbo","doi":"10.32604/cmc.2022.023003","DOIUrl":"https://doi.org/10.32604/cmc.2022.023003","url":null,"abstract":": Wireless Sensor Network (WSN) is considered to be one of the fundamental technologies employed in the Internet of things (IoT); hence, enabling diverse applications for carrying out real-time observations. Robot navigation in such networks was the main motivation for the introduction of the concept of landmarks. A robot can identify its own location by sending signals to obtain the distances between itself and the landmarks. Considering networks to be a type of graph, this concept was redefined as metric dimension of a graph which is the minimum number of nodes needed to identify all the nodes of the graph. This idea was extended to the concept of edge metric dimension of a graph G , which is the minimum number of nodes needed in a graph to uniquely identify each edge of the network. Regular plane networks can be easily constructed by repeating regular polygons. This design is of extreme importance as it yields high overall performance; hence, it can be used in various networking and IoT domains. The honeycomb and the hexagonal networks are two such popular mesh-derived parallel networks. In this paper, it is proved that the minimum landmarks required for the honeycomb network HC ( n ), and the hexagonal network HX ( n ) are 3 and 6 respectively. The bounds for the landmarks required for the hex-derived network HDN 1( n ) are also proposed.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"14 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81856015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Cmc-computers Materials & Continua
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1