Journals / CMC / Vol.58, No.3
Table of Content


    A Privacy-Preserving Algorithm for Clinical Decision-Support Systems Using Random Forest

    Alia Alabdulkarim1, Mznah Al-Rodhaan2, Yuan Tian*,3, Abdullah Al-Dhelaan2
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 585-601, 2019, DOI:10.32604/cmc.2019.05637
    Abstract Clinical decision-support systems are technology-based tools that help healthcare providers enhance the quality of their services to satisfy their patients and earn their trust. These systems are used to improve physicians’ diagnostic processes in terms of speed and accuracy. Using data-mining techniques, a clinical decision support system builds a classification model from hospital’s dataset for diagnosing new patients using their symptoms. In this work, we propose a privacy-preserving clinical decision-support system that uses a privacy-preserving random forest algorithm to diagnose new symptoms without disclosing patients’ information and exposing them to cyber and network attacks. Solving the same problem with a… More >


    An Energy-Efficient Protocol Using an Objective Function & Random Search with Jumps for WSN

    Mohammed Kaddi1,3,*, Khelifa Benahmed2, Mohammed Omari3
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 603-624, 2019, DOI:10.32604/cmc.2019.05341
    Abstract Wireless Sensor Networks (WSNs) have hardware and software limitations and are deployed in hostile environments. The problem of energy consumption in WSNs has become a very important axis of research. To obtain good performance in terms of the network lifetime, several routing protocols have been proposed in the literature. Hierarchical routing is considered to be the most favorable approach in terms of energy efficiency. It is based on the concept parent-child hierarchy where the child nodes forward their messages to their parent, and then the parent node forwards them, directly or via other parent nodes, to the base station (sink).… More >


    An Automated Player Detection and Tracking in Basketball Game

    P. K. Santhosh1,*, B. Kaarthick2
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 625-639, 2019, DOI:10.32604/cmc.2019.05161
    Abstract Vision-based player recognition is critical in sports applications. Accuracy, efficiency, and Low memory utilization is alluring for ongoing errands, for example, astute communicates and occasion classification. We developed an algorithm that tracks the movements of different players from a video of a basketball game. With their position tracked, we then proceed to map the position of these players onto an image of a basketball court. The purpose of tracking player is to provide the maximum amount of information to basketball coaches and organizations, so that they can better design mechanisms of defence and attack. Overall, our model has a high… More >


    Optimal Building Frame Column Design Based on the Genetic Algorithm

    Tao Shen1,*, Yukari Nagai1, Chan Gao2
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 641-651, 2019, DOI:10.32604/cmc.2019.04885
    Abstract Building structure is like the skeleton of the building, it bears the effects of various forces and forms a supporting system, which is the material basis on which the building depends. Hence building structure design is a vital part in architecture design, architects often explore novel applications of their technologies for building structure innovation. However, such searches relied on experiences, expertise or gut feeling. In this paper, a new design method for the optimal building frame column design based on the genetic algorithm is proposed. First of all, in order to construct the optimal model of the building frame column,… More >


    RETRACTED: Implementation System of Human Eye Tracking Algorithm Based on FPGA

    Zhong Liu1,2, Xin’an Wang1, Chengjun Sun1, Ken Lu3
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 653-664, 2019, DOI:10.32604/cmc.2019.04597
    Abstract With the high-speed development of transportation industry, highway traffic safety has become a considerable problem. Meanwhile, with the development of embedded system and hardware chip, in recent years, human eye detection eye tracking and positioning technology have been more and more widely used in man-machine interaction, security access control and visual detection.
    In this paper, the high parallelism of FPGA was utilized to realize an elliptical approximate real-time human eye tracking system, which was achieved by the series register structure and random sample consensus (RANSAC), thus improving the speed of image processing without using external memory. Because eye images acquired by… More >


    Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition

    Wentao Ma1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Yuanjing Luo1, Neal N. Xiong2
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 665-677, 2019, DOI:10.32604/cmc.2019.05683
    Abstract As the first barrier to protect cyberspace, the CAPTCHA has made significant contributions to maintaining Internet security and preventing malicious attacks. By researching the CAPTCHA, we can find its vulnerability and improve the security of CAPTCHA. Recently, many studies have shown that improving the image preprocessing effect of the CAPTCHA, which can achieve a better recognition rate by the state-of-the-art machine learning algorithms. There are many kinds of noise and distortion in the CAPTCHA images of this experiment. We propose an adaptive median filtering algorithm based on divide and conquer in this paper. Firstly, the filtering window data quickly sorted… More >


    A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things

    Baowei Wang1,2,*, Weiwen Kong1, Wei Li1, Neal N. Xiong3
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 679-695, 2019, DOI:10.32604/cmc.2019.06106
    Abstract Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only increase the data size, but… More >


    Investigation on the Chinese Text Sentiment Analysis Based on Convolutional Neural Networks in Deep Learning

    Feng Xu1, Xuefen Zhang2,*, Zhanhong Xin1, Alan Yang3
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 697-709, 2019, DOI:10.32604/cmc.2019.05375
    Abstract Nowadays, the amount of wed data is increasing at a rapid speed, which presents a serious challenge to the web monitoring. Text sentiment analysis, an important research topic in the area of natural language processing, is a crucial task in the web monitoring area. The accuracy of traditional text sentiment analysis methods might be degraded in dealing with mass data. Deep learning is a hot research topic of the artificial intelligence in the recent years. By now, several research groups have studied the sentiment analysis of English texts using deep learning methods. In contrary, relatively few works have so far… More >


    An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks

    Jin Wang1,2,3, Yu Gao3, Wei Liu3, Wenbing Wu1, Se-Jung Lim4,*
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 711-725, 2019, DOI:10.32604/cmc.2019.05450
    Abstract Recently, Wireless sensor networks (WSNs) have become very popular research topics which are applied to many applications. They provide pervasive computing services and techniques in various potential applications for the Internet of Things (IoT). An Asynchronous Clustering and Mobile Data Gathering based on Timer Mechanism (ACMDGTM) algorithm is proposed which would mitigate the problem of “hot spots” among sensors to enhance the lifetime of networks. The clustering process takes sensors’ location and residual energy into consideration to elect suitable cluster heads. Furthermore, one mobile sink node is employed to access cluster heads in accordance with the data overflow time and… More >


    Yield Stress Prediction Model of RAFM Steel Based on the Improved GDM-SA-SVR Algorithm

    Sifan Long1, Ming Zhao2,*, Xinfu He3
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 727-760, 2019, DOI:10.32604/cmc.2019.04454
    Abstract With the development of society and the exhaustion of fossil energy, researcher need to identify new alternative energy sources. Nuclear energy is a very good choice, but the key to the successful application of nuclear technology is determined primarily by the behavior of nuclear materials in reactors. Therefore, we studied the radiation performance of the fusion material reduced activation ferritic/martensitic (RAFM) steel. The main novelty of this paper are the statistical analysis of RAFM steel data sets through related statistical analysis and the formula derivation of the gradient descent method (GDM) which combines the gradient descent search strategy of the… More >


    A Straightforward Direct Traction Boundary Integral Method for Two-Dimensional Crack Problems Simulation of Linear Elastic Materials

    Chao Zhang1, Chunhe Yang1, Shangwei Wu2,3, Xiaolong Zhang1,2, Wen Nie2,*
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 761-775, 2019, DOI:10.32604/cmc.2019.04363
    Abstract This paper presents a direct traction boundary integral equation method (DTBIEM) for two-dimensional crack problems of materials. The traction boundary integral equation was collocated on both the external boundary and either side of the crack surfaces. The displacements and tractions were used as unknowns on the external boundary, while the relative crack opening displacement (RCOD) was chosen as unknowns on either side of crack surfaces to keep the single-domain merit. Only one side of the crack surfaces was concerned and needed to be discretized, thus the proposed method resulted in a smaller system of algebraic equations compared with the dual… More >


    Effect of Reinforcement Corrosion Sediment Distribution Characteristics on Concrete Damage Behavior

    Fenghua Yuan1, Qing Zhang1,*, Xiaozhou Xia1
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 777-793, 2019, DOI:10.32604/cmc.2019.04182
    Abstract Reinforcement corrosion directly affects the mechanical behavior of reinforced concrete structures. An electric corrosion test was conducted on a reinforced concrete test specimen, and a finite element model of the reinforcement corrosion damage was established. In addition, the damage behavior of reinforced concrete under different corrosion sediment distribution characteristics and different corrosion rates was studied. It was noted that when corrosion sediments are in a “semiellipse+semicircle” distribution, the results of numerical calculation are consistent with those obtained experimentally, reflecting the damage characteristics of reinforced concrete test specimens. Further, the results showed that the distribution characteristics of corrosion sediments greatly influence… More >


    Research on the Law of Garlic Price Based on Big Data

    Feng Guo1, Pingzeng Liu1,*, Chao Zhang1, Weijie Chen1, Wei Han2, Wanming Ren4, Yong Zheng4, Jianrui Ding3
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 795-808, 2019, DOI:10.32604/cmc.2019.03795
    Abstract In view of the frequent fluctuation of garlic price under the market economy and the current situation of garlic price, the fluctuation of garlic price in the circulation link of garlic industry chain is analyzed, and the application mode of multidisciplinary in the agricultural industry is discussed. On the basis of the big data platform of garlic industry chain, this paper constructs a Garch model to analyze the fluctuation law of garlic price in the circulation link and provides the garlic industry service from the angle of price fluctuation combined with the economic analysis. The research shows that the average… More >


    Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States

    Gang Xu1,2,*, Ke Xiao1,*, Zongpeng Li3, Xin-Xin Niu2,4, Michael Ryan5
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 809-827, 2019, DOI:10.32604/cmc.2019.04400
    Abstract In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our… More >


    R2N: A Novel Deep Learning Architecture for Rain Removal from Single Image

    Yecai Guo1,2,*, Chen Li1,2, Qi Liu3
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 829-843, 2019, DOI:10.32604/cmc.2019.03729
    Abstract Visual degradation of captured images caused by rainy streaks under rainy weather can adversely affect the performance of many open-air vision systems. Hence, it is necessary to address the problem of eliminating rain streaks from the individual rainy image. In this work, a deep convolution neural network (CNN) based method is introduced, called Rain-Removal Net (R2N), to solve the single image de-raining issue. Firstly, we decomposed the rainy image into its high-frequency detail layer and low-frequency base layer. Then, we used the high-frequency detail layer to input the carefully designed CNN architecture to learn the mapping between it and its… More >


    Dynamic Trust Model Based on Service Recommendation in Big Data

    Gang Wang1,*, Mengjuan Liu2
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 845-857, 2019, DOI:10.32604/cmc.2019.03678
    Abstract In big data of business service or transaction, it is impossible to provide entire information to both of services from cyber system, so some service providers made use of maliciously services to get more interests. Trust management is an effective solution to deal with these malicious actions. This paper gave a trust computing model based on service-recommendation in big data. This model takes into account difference of recommendation trust between familiar node and stranger node. Thus, to ensure accuracy of recommending trust computing, paper proposed a fine-granularity similarity computing method based on the similarity of service concept domain ontology. This… More >


    Modeling and Analysis the Effects of EMP on the Balise System

    Zhiwei Gao1,*, Shuai Zhang1, Li Hao1, Ning Cao2
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 859-878, 2019, DOI:10.32604/cmc.2019.03634
    Abstract Balise system is one kind of high-rate point-mode data transmission equipment. It plays an indispensable role in Chinese Train Control System (CTCS), and it has been immigrated and widely used for passenger dedicated lines and high-speed lines. Thus, its working conditions directly affect train operation safety. However, the balise information transmission system (BITS) is based on the principle of electromagnetic induction, and the communication process is susceptible to external electromagnetic interference. Therefore, it is vital to study the influence of transient signal interference on the balise system. This paper builds the up-link model between the vehicle antena and the balise,… More >


    Efficient Construction of B-Spline Curves with Minimal Internal Energy

    Gang Xu1,*, Yufan Zhu1, Lishan Deng1, Guozhao Wang2, Bojian Li1, Kin-chuen Hui3
    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 879-892, 2019, DOI:10.32604/cmc.2019.03752
    Abstract In this paper, we propose an efficient method to construct energy-minimizing B-spline curves by using discrete mask method. The linear relations between control points are firstly derived for different energy-minimization problems, then the construction of B-spline curve with minimal internal energy can be addressed by solving a sparse linear system. The existence and uniqueness of the solution for the linear system are also proved. Experimental results show the efficiency of the proposed approach, and its application in G1 blending curve construction is also presented. More >

Share Link

WeChat scan