Computers, Materials & Continua is a peer-reviewed Open Access journal that publishes all types of academic papers in the areas of computer networks, artificial intelligence, big data, software engineering, multimedia, cyber security, internet of things, materials genome, integrated materials science, and data analysis, modeling, designing and manufacturing of modern functional and multifunctional materials. This journal is published monthly by Tech Science Press.
SCI: 2023 Impact Factor 2.1; Scopus CiteScore (Impact per Publication 2023): 5.3; SNIP (Source Normalized Impact per Paper 2023): 0.73; Ei Compendex; Cambridge Scientific Abstracts; INSPEC Databases; Science Navigator; EBSCOhost; ProQuest Central; Zentralblatt für Mathematik; Portico, etc.
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1-39, 2025, DOI:10.32604/cmc.2024.058926 - 03 January 2025
Abstract With the rapid development of artificial intelligence, the Internet of Things (IoT) can deploy various machine learning algorithms for network and application management. In the IoT environment, many sensors and devices generate massive data, but data security and privacy protection have become a serious challenge. Federated learning (FL) can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing. This review aims to deeply explore the combination of FL and the IoT, and analyze the application of federated learning in the IoT from More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 41-72, 2025, DOI:10.32604/cmc.2024.058036 - 03 January 2025
Abstract In computer vision and artificial intelligence, automatic facial expression-based emotion identification of humans has become a popular research and industry problem. Recent demonstrations and applications in several fields, including computer games, smart homes, expression analysis, gesture recognition, surveillance films, depression therapy, patient monitoring, anxiety, and others, have brought attention to its significant academic and commercial importance. This study emphasizes research that has only employed facial images for face expression recognition (FER), because facial expressions are a basic way that people communicate meaning to each other. The immense achievement of deep learning has resulted in a… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 73-102, 2025, DOI:10.32604/cmc.2024.059370 - 03 January 2025
(This article belongs to the Special Issue: Challenges and Innovations in Multimedia Encryption and Information Security)
Abstract With the rapid advancement of visual generative models such as Generative Adversarial Networks (GANs) and stable Diffusion, the creation of highly realistic Deepfake through automated forgery has significantly progressed. This paper examines the advancements in Deepfake detection and defense technologies, emphasizing the shift from passive detection methods to proactive digital watermarking techniques. Passive detection methods, which involve extracting features from images or videos to identify forgeries, encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics. In contrast, proactive digital watermarking techniques embed specific markers into images or videos, facilitating More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 103-137, 2025, DOI:10.32604/cmc.2024.059050 - 03 January 2025
Abstract Software-defined networking (SDN) is an innovative paradigm that separates the control and data planes, introducing centralized network control. SDN is increasingly being adopted by Carrier Grade networks, offering enhanced network management capabilities than those of traditional networks. However, because SDN is designed to ensure high-level service availability, it faces additional challenges. One of the most critical challenges is ensuring efficient detection and recovery from link failures in the data plane. Such failures can significantly impact network performance and lead to service outages, making resiliency a key concern for the effective adoption of SDN. Since the More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 139-172, 2025, DOI:10.32604/cmc.2024.057587 - 03 January 2025
Abstract Software-related security aspects are a growing and legitimate concern, especially with 5G data available just at our palms. To conduct research in this field, periodic comparative analysis is needed with the new techniques coming up rapidly. The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle (SDLC) by analyzing the articles published in the last two decades and to propose a way forward. This review follows Kitchenham’s review protocol. The review has been divided into three main stages including planning, execution, and analysis.… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 173-191, 2025, DOI:10.32604/cmc.2024.059284 - 03 January 2025
Abstract Previous multi-view 3D human pose estimation methods neither correlate different human joints in each view nor model learnable correlations between the same joints in different views explicitly, meaning that skeleton structure information is not utilized and multi-view pose information is not completely fused. Moreover, existing graph convolutional operations do not consider the specificity of different joints and different views of pose information when processing skeleton graphs, making the correlation weights between nodes in the graph and their neighborhood nodes shared. Existing Graph Convolutional Networks (GCNs) cannot extract global and deep-level skeleton structure information and view… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 193-222, 2025, DOI:10.32604/cmc.2024.059950 - 03 January 2025
(This article belongs to the Special Issue: Multiscale and Multiphysics Computational Methods of Heterogeneous Materials and Structures)
Abstract In this manuscript, we propose an analytical equivalent linear viscoelastic constitutive model for fiber-reinforced composites, bypassing general computational homogenization. The method is based on the reduced-order homogenization (ROH) approach. The ROH method typically involves solving multiple finite element problems under periodic conditions to evaluate elastic strain and eigenstrain influence functions in an ‘off-line’ stage, which offers substantial cost savings compared to direct computational homogenization methods. Due to the unique structure of the fibrous unit cell, “off-line” stage calculation can be eliminated by influence functions obtained analytically. Introducing the standard solid model to the ROH method More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 223-257, 2025, DOI:10.32604/cmc.2024.059441 - 03 January 2025
(This article belongs to the Special Issue: Multiscale and Multiphysics Computational Methods of Heterogeneous Materials and Structures)
Abstract For the first time, the linear and nonlinear vibrations of composite rectangular sandwich plates with various geometric patterns of lattice core have been analytically examined in this work. The plate comprises a lattice core located in the middle and several homogeneous orthotropic layers that are symmetrical relative to it. For this purpose, the partial differential equations of motion have been derived based on the first-order shear deformation theory, employing Hamilton’s principle and Von Kármán’s nonlinear displacement-strain relations. Then, the nonlinear partial differential equations of the plate are converted into a time-dependent nonlinear ordinary differential equation… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 259-278, 2025, DOI:10.32604/cmc.2024.057257 - 03 January 2025
(This article belongs to the Special Issue: Innovative AI Applications in Pattern Recognition and Visual Data Processing and Hiding)
Abstract This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology. By combining the strengths of blockchain and generative AI, the research team aimed to address the timely challenge of safeguarding visual medical content. The participating researchers conducted a comprehensive analysis, examining the vulnerabilities of medical AI services, personal information protection issues, and overall security weaknesses. This multifaceted exploration led to an in-depth evaluation of the model’s performance and security. Notably, the correlation between accuracy, detection rate, and error rate was… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 279-305, 2025, DOI:10.32604/cmc.2024.055943 - 03 January 2025
Abstract Joint Multimodal Aspect-based Sentiment Analysis (JMASA) is a significant task in the research of multimodal fine-grained sentiment analysis, which combines two subtasks: Multimodal Aspect Term Extraction (MATE) and Multimodal Aspect-oriented Sentiment Classification (MASC). Currently, most existing models for JMASA only perform text and image feature encoding from a basic level, but often neglect the in-depth analysis of unimodal intrinsic features, which may lead to the low accuracy of aspect term extraction and the poor ability of sentiment prediction due to the insufficient learning of intra-modal features. Given this problem, we propose a Text-Image Feature Fine-grained… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 307-325, 2025, DOI:10.32604/cmc.2024.057491 - 03 January 2025
Abstract Large-scale Language Models (LLMs) have achieved significant breakthroughs in Natural Language Processing (NLP), driven by the pre-training and fine-tuning paradigm. While this approach allows models to specialize in specific tasks with reduced training costs, the substantial memory requirements during fine-tuning present a barrier to broader deployment. Parameter-Efficient Fine-Tuning (PEFT) techniques, such as Low-Rank Adaptation (LoRA), and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency. Among these, QLoRA, which combines PEFT and quantization, has demonstrated notable success in reducing memory footprints during fine-tuning, prompting the development… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 327-343, 2025, DOI:10.32604/cmc.2024.058143 - 03 January 2025
(This article belongs to the Special Issue: From Nodes to Knowledge: Harnessing Wireless Sensor Networks)
Abstract Wireless sensor network (WSN) technologies have advanced significantly in recent years. Within WSNs, machine learning algorithms are crucial in selecting cluster heads (CHs) based on various quality of service (QoS) metrics. This paper proposes a new clustering routing protocol employing the Traveling Salesman Problem (TSP) to locate the optimal path traversed by the Mobile Data Collector (MDC), in terms of energy and QoS efficiency. To be more specific, to minimize energy consumption in the CH election stage, we have developed the M-T protocol using the K-Means and the grid clustering algorithms. In addition, to improve More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 345-369, 2025, DOI:10.32604/cmc.2024.060335 - 03 January 2025
(This article belongs to the Special Issue: Particle Swarm Optimization: Advances and Applications)
Abstract The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life. The development of the Internet of Things (IoT) relies on the support of base stations, which provide a solid foundation for achieving a more intelligent way of living. In a specific area, achieving higher signal coverage with fewer base stations has become an urgent problem. Therefore, this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization (EPSO)… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 371-388, 2025, DOI:10.32604/cmc.2024.058885 - 03 January 2025
(This article belongs to the Special Issue: Recent Advances in Ensemble Framework of Meta-heuristics and Machine Learning: Methods and Applications)
Abstract The distributed permutation flow shop scheduling problem (DPFSP) has received increasing attention in recent years. The iterated greedy algorithm (IGA) serves as a powerful optimizer for addressing such a problem because of its straightforward, single-solution evolution framework. However, a potential draw-back of IGA is the lack of utilization of historical information, which could lead to an imbalance between exploration and exploitation, especially in large-scale DPFSPs. As a consequence, this paper develops an IGA with memory and learning mechanisms (MLIGA) to efficiently solve the DPFSP targeted at the mini-mal makespan. In MLIGA, we incorporate a memory… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 389-406, 2025, DOI:10.32604/cmc.2024.059238 - 03 January 2025
Abstract Open networks and heterogeneous services in the Internet of Vehicles (IoV) can lead to security and privacy challenges. One key requirement for such systems is the preservation of user privacy, ensuring a seamless experience in driving, navigation, and communication. These privacy needs are influenced by various factors, such as data collected at different intervals, trip durations, and user interactions. To address this, the paper proposes a Support Vector Machine (SVM) model designed to process large amounts of aggregated data and recommend privacy-preserving measures. The model analyzes data based on user demands and interactions with service More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 407-426, 2025, DOI:10.32604/cmc.2024.056730 - 03 January 2025
Abstract To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants, this research focuses on addressing the complex supply relationships in the automotive market, improving data sharing and interactions across various platforms, and achieving more detailed integration of data and operations. We propose a trust evaluation permission delegation method based on the automotive industry chain. The proposed method combines smart contracts with trust evaluation mechanisms, dynamically calculating the trust value of users based on the historical behavior of the delegated entity, network environment, and other More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 427-442, 2025, DOI:10.32604/cmc.2024.057045 - 03 January 2025
(This article belongs to the Special Issue: Best Practices for Smart Grid SCADA Security Systems Using Artificial Intelligence (AI) Models)
Abstract The rapid proliferation of electric vehicle (EV) charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system. This study presents an innovative anomaly detection framework for EV charging stations, addressing the unique challenges posed by third-party aggregation platforms. Our approach integrates node equations-based on the parameter identification with a novel deep learning model, xDeepCIN, to detect abnormal data reporting indicative of aggregation attacks. We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation. The xDeepCIN model, incorporating a Compressed Interaction Network, has the ability… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 443-466, 2025, DOI:10.32604/cmc.2024.059047 - 03 January 2025
(This article belongs to the Special Issue: Security and Privacy in IoT and Smart City: Current Challenges and Future Directions)
Abstract Internet of Things (IoT) refers to the infrastructures that connect smart devices to the Internet, operating autonomously. This connectivity makes it possible to harvest vast quantities of data, creating new opportunities for the emergence of unprecedented knowledge. To ensure IoT securit, various approaches have been implemented, such as authentication, encoding, as well as devices to guarantee data integrity and availability. Among these approaches, Intrusion Detection Systems (IDS) is an actual security solution, whose performance can be enhanced by integrating various algorithms, including Machine Learning (ML) and Deep Learning (DL), enabling proactive and accurate detection of… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 467-483, 2025, DOI:10.32604/cmc.2024.056930 - 03 January 2025
Abstract The proliferation of robot accounts on social media platforms has posed a significant negative impact, necessitating robust measures to counter network anomalies and safeguard content integrity. Social robot detection has emerged as a pivotal yet intricate task, aimed at mitigating the dissemination of misleading information. While graph-based approaches have attained remarkable performance in this realm, they grapple with a fundamental limitation: the homogeneity assumption in graph convolution allows social robots to stealthily evade detection by mingling with genuine human profiles. To unravel this challenge and thwart the camouflage tactics, this work proposed an innovative social… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 485-498, 2025, DOI:10.32604/cmc.2024.057224 - 03 January 2025
Abstract In the field of intelligent education, the integration of artificial intelligence, especially deep learning technologies, has garnered significant attention. Knowledge tracing (KT) plays a pivotal role in this field by predicting students’ future performance through the analysis of historical interaction data, thereby assisting educators in evaluating knowledge mastery and tailoring instructional strategies. Traditional knowledge tracing methods, largely based on Recurrent Neural Networks (RNNs) and Transformer models, primarily focus on capturing long-term interaction patterns in sequential data. However, these models may neglect crucial short-term dynamics and other relevant features. This paper introduces a novel approach to… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 499-520, 2025, DOI:10.32604/cmc.2025.058361 - 03 January 2025
(This article belongs to the Special Issue: Advancements in Machine Fault Diagnosis and Prognosis: Data-Driven Approaches and Autonomous Systems)
Abstract This study investigates the application of Learnable Memory Vision Transformers (LMViT) for detecting metal surface flaws, comparing their performance with traditional CNNs, specifically ResNet18 and ResNet50, as well as other transformer-based models including Token to Token ViT, ViT without memory, and Parallel ViT. Leveraging a widely-used steel surface defect dataset, the research applies data augmentation and t-distributed stochastic neighbor embedding (t-SNE) to enhance feature extraction and understanding. These techniques mitigated overfitting, stabilized training, and improved generalization capabilities. The LMViT model achieved a test accuracy of 97.22%, significantly outperforming ResNet18 (88.89%) and ResNet50 (88.90%), as well… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 521-542, 2025, DOI:10.32604/cmc.2024.058063 - 03 January 2025
Abstract Solar cell defect detection is crucial for quality inspection in photovoltaic power generation modules. In the production process, defect samples occur infrequently and exhibit random shapes and sizes, which makes it challenging to collect defective samples. Additionally, the complex surface background of polysilicon cell wafers complicates the accurate identification and localization of defective regions. This paper proposes a novel Lightweight Multi-scale Feature Fusion network (LMFF) to address these challenges. The network comprises a feature extraction network, a multi-scale feature fusion module (MFF), and a segmentation network. Specifically, a feature extraction network is proposed to obtain… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 543-560, 2025, DOI:10.32604/cmc.2024.056478 - 03 January 2025
(This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
Abstract Existing semi-supervised medical image segmentation algorithms use copy-paste data augmentation to correct the labeled-unlabeled data distribution mismatch. However, current copy-paste methods have three limitations: (1) training the model solely with copy-paste mixed pictures from labeled and unlabeled input loses a lot of labeled information; (2) low-quality pseudo-labels can cause confirmation bias in pseudo-supervised learning on unlabeled data; (3) the segmentation performance in low-contrast and local regions is less than optimal. We design a Stochastic Augmentation-Based Dual-Teaching Auxiliary Training Strategy (SADT), which enhances feature diversity and learns high-quality features to overcome these problems. To be more… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 561-577, 2025, DOI:10.32604/cmc.2024.057213 - 03 January 2025
(This article belongs to the Special Issue: Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems)
Abstract Detecting pavement cracks is critical for road safety and infrastructure management. Traditional methods, relying on manual inspection and basic image processing, are time-consuming and prone to errors. Recent deep-learning (DL) methods automate crack detection, but many still struggle with variable crack patterns and environmental conditions. This study aims to address these limitations by introducing the MaskerTransformer, a novel hybrid deep learning model that integrates the precise localization capabilities of Mask Region-based Convolutional Neural Network (Mask R-CNN) with the global contextual awareness of Vision Transformer (ViT). The research focuses on leveraging the strengths of both architectures… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 579-607, 2025, DOI:10.32604/cmc.2024.059805 - 03 January 2025
Abstract The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network traffic. Cloud environments pose significant challenges in maintaining privacy and security. Global approaches, such as IDS, have been developed to tackle these issues. However, most conventional Intrusion Detection System (IDS) models struggle with unseen cyberattacks and complex high-dimensional data. In fact, this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system, named INTRUMER, which offers balanced accuracy, reliability, and security in cloud settings by multiple modules working together within it. The traffic captured… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 609-625, 2025, DOI:10.32604/cmc.2024.056651 - 03 January 2025
Abstract Stock price prediction is a typical complex time series prediction problem characterized by dynamics, nonlinearity, and complexity. This paper introduces a generative adversarial network model that incorporates an attention mechanism (GAN-LSTM-Attention) to improve the accuracy of stock price prediction. Firstly, the generator of this model combines the Long and Short-Term Memory Network (LSTM), the Attention Mechanism and, the Fully-Connected Layer, focusing on generating the predicted stock price. The discriminator combines the Convolutional Neural Network (CNN) and the Fully-Connected Layer to discriminate between real stock prices and generated stock prices. Secondly, to evaluate the practical application… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 627-644, 2025, DOI:10.32604/cmc.2024.056077 - 03 January 2025
(This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
Abstract Bone age assessment (BAA) aims to determine whether a child’s growth and development are normal concerning their chronological age. To predict bone age more accurately based on radiographs, and for the left-hand X-ray images of different races model can have better adaptability, we propose a neural network in parallel with the quantitative features from the left-hand bone measurements for BAA. In this study, a lightweight feature extractor (LFE) is designed to obtain the feature maps from radiographs, and a module called attention eraser module (AEM) is proposed to capture the fine-grained features. Meanwhile, the dimensional… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 645-674, 2025, DOI:10.32604/cmc.2024.058081 - 03 January 2025
(This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
Abstract Previous studies have shown that deep learning is very effective in detecting known attacks. However, when facing unknown attacks, models such as Deep Neural Networks (DNN) combined with Long Short-Term Memory (LSTM), Convolutional Neural Networks (CNN) combined with LSTM, and so on are built by simple stacking, which has the problems of feature loss, low efficiency, and low accuracy. Therefore, this paper proposes an autonomous detection model for Distributed Denial of Service attacks, Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention (MSCNN-BiGRU-SHA), which is based on a Multi-strategy Integrated Zebra Optimization Algorithm (MI-ZOA). The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 675-712, 2025, DOI:10.32604/cmc.2024.058656 - 03 January 2025
Abstract In the rapidly evolving landscape of television advertising, optimizing ad schedules to maximize viewer engagement and revenue has become significant. Traditional methods often operate in silos, limiting the potential insights gained from broader data analysis due to concerns over privacy and data sharing. This article introduces a novel approach that leverages Federated Learning (FL) to enhance TV ad schedule optimization, combining the strengths of local optimization techniques with the power of global Machine Learning (ML) models to uncover actionable insights without compromising data privacy. It combines linear programming for initial ads scheduling optimization with ML—specifically,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 713-727, 2025, DOI:10.32604/cmc.2024.057655 - 03 January 2025
Abstract Underwater target detection is extensively applied in domains such as underwater search and rescue, environmental monitoring, and marine resource surveys. It is crucial in enabling autonomous underwater robot operations and promoting ocean exploration. Nevertheless, low imaging quality, harsh underwater environments, and obscured objects considerably increase the difficulty of detecting underwater targets, making it difficult for current detection methods to achieve optimal performance. In order to enhance underwater object perception and improve target detection precision, we propose a lightweight underwater target detection method using You Only Look Once (YOLO) v8 with multi-scale cross-channel attention (MSCCA), named… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 729-749, 2025, DOI:10.32604/cmc.2024.055768 - 03 January 2025
Abstract Micro-expressions (ME) recognition is a complex task that requires advanced techniques to extract informative features from facial expressions. Numerous deep neural networks (DNNs) with convolutional structures have been proposed. However, unlike DNNs, shallow convolutional neural networks often outperform deeper models in mitigating overfitting, particularly with small datasets. Still, many of these methods rely on a single feature for recognition, resulting in an insufficient ability to extract highly effective features. To address this limitation, in this paper, an Improved Dual-stream Shallow Convolutional Neural Network based on an Extreme Gradient Boosting Algorithm (IDSSCNN-XgBoost) is introduced for ME… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 751-775, 2025, DOI:10.32604/cmc.2024.057606 - 03 January 2025
Abstract In the Internet era, recommendation systems play a crucial role in helping users find relevant information from large datasets. Class imbalance is known to severely affect data quality, and therefore reduce the performance of recommendation systems. Due to the imbalance, machine learning algorithms tend to classify inputs into the positive (majority) class every time to achieve high prediction accuracy. Imbalance can be categorized such as by features and classes, but most studies consider only class imbalance. In this paper, we propose a recommendation system that can integrate multiple networks to adapt to a large number… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 777-798, 2025, DOI:10.32604/cmc.2024.059123 - 03 January 2025
Abstract Advances in software and hardware technologies have facilitated the production of quadrotor unmanned aerial vehicles (UAVs). Nowadays, people actively use quadrotor UAVs in essential missions such as search and rescue, counter-terrorism, firefighting, surveillance, and cargo transportation. While performing these tasks, quadrotors must operate in noisy environments. Therefore, a robust controller design that can control the altitude and attitude of the quadrotor in noisy environments is of great importance. Many researchers have focused only on white Gaussian noise in their studies, whereas researchers need to consider the effects of all colored noises during the operation of… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 799-816, 2025, DOI:10.32604/cmc.2024.057975 - 03 January 2025
(This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
Abstract As smart grid technology rapidly advances, the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection. Current research emphasizes data security and user privacy concerns within smart grids. However, existing methods struggle with efficiency and security when processing large-scale data. Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge. This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities. The approach optimizes data preprocessing, More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 817-842, 2025, DOI:10.32604/cmc.2024.057660 - 03 January 2025
Abstract The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats. Intrusion detection systems are crucial to network security, playing a pivotal role in safeguarding networks from potential threats. However, in the context of an evolving landscape of sophisticated and elusive attacks, existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts. To address these issues, this paper proposes a real-time network intrusion detection method based on… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 843-862, 2025, DOI:10.32604/cmc.2024.058051 - 03 January 2025
Abstract To accurately diagnose misfire faults in automotive engines, we propose a Channel Attention Convolutional Model, specifically the Squeeze-and-Excitation Networks (SENET), for classifying engine vibration signals and precisely pinpointing misfire faults. In the experiment, we established a total of 11 distinct states, encompassing the engine’s normal state, single-cylinder misfire faults, and dual-cylinder misfire faults for different cylinders. Data collection was facilitated by a highly sensitive acceleration signal collector with a high sampling rate of 20,840 Hz. The collected data were methodically divided into training and testing sets based on different experimental groups to ensure generalization and… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 863-879, 2025, DOI:10.32604/cmc.2024.057353 - 03 January 2025
(This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)
Abstract Satellite edge computing has garnered significant attention from researchers; however, processing a large volume of tasks within multi-node satellite networks still poses considerable challenges. The sharp increase in user demand for latency-sensitive tasks has inevitably led to offloading bottlenecks and insufficient computational capacity on individual satellite edge servers, making it necessary to implement effective task offloading scheduling to enhance user experience. In this paper, we propose a priority-based task scheduling strategy based on a Software-Defined Network (SDN) framework for satellite-terrestrial integrated networks, which clarifies the execution order of tasks based on their priority. Subsequently, we More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 881-911, 2025, DOI:10.32604/cmc.2024.059999 - 03 January 2025
Abstract The Internet of Things (IoT) is integral to modern infrastructure, enabling connectivity among a wide range of devices from home automation to industrial control systems. With the exponential increase in data generated by these interconnected devices, robust anomaly detection mechanisms are essential. Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns. This paper presents a novel approach utilizing generative adversarial networks (GANs) for anomaly detection in IoT systems. However, optimizing GANs involves tuning hyper-parameters such as learning rate, batch size, and optimization algorithms,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 913-928, 2025, DOI:10.32604/cmc.2024.058467 - 03 January 2025
Abstract In recent years, the number of patients with colon disease has increased significantly. Colon polyps are the precursor lesions of colon cancer. If not diagnosed in time, they can easily develop into colon cancer, posing a serious threat to patients’ lives and health. A colonoscopy is an important means of detecting colon polyps. However, in polyp imaging, due to the large differences and diverse types of polyps in size, shape, color, etc., traditional detection methods face the problem of high false positive rates, which creates problems for doctors during the diagnosis process. In order to… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 929-948, 2025, DOI:10.32604/cmc.2024.057319 - 03 January 2025
Abstract This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection systems. Combining Strengths, Weaknesses, Opportunities, Threats (SWOT) analysis data with Variation Autoencoder (VAE) and Generative Adversarial Network (GAN) the network framework model (SAE-GAN), is proposed for environmental data reconstruction. The model combines two popular generative models, GAN and VAE, to generate features conditional on categorical data embedding after SWOT Analysis. The model is capable of generating features that resemble real feature distributions and adding sample factors to more accurately track individual sample data. Reconstructed data is… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 949-976, 2025, DOI:10.32604/cmc.2024.059351 - 03 January 2025
Abstract App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their products. Automating the analysis of these reviews is vital for efficient review management. While traditional machine learning (ML) models rely on basic word-based feature extraction, deep learning (DL) methods, enhanced with advanced word embeddings, have shown superior performance. This research introduces a novel aspect-based sentiment analysis (ABSA) framework to classify app reviews based on key non-functional requirements, focusing on usability factors: effectiveness, efficiency, and satisfaction. We propose a hybrid DL model, combining BERT (Bidirectional Encoder Representations from Transformers) More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 977-996, 2025, DOI:10.32604/cmc.2024.058438 - 03 January 2025
Abstract The rapid development of short video platforms poses new challenges for traditional recommendation systems. Recommender systems typically depend on two types of user behavior feedback to construct user interest profiles: explicit feedback (interactive behavior), which significantly influences users’ short-term interests, and implicit feedback (viewing time), which substantially affects their long-term interests. However, the previous model fails to distinguish between these two feedback methods, leading it to predict only the overall preferences of users based on extensive historical behavior sequences. Consequently, it cannot differentiate between users’ long-term and short-term interests, resulting in low accuracy in describing… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 997-1026, 2025, DOI:10.32604/cmc.2024.057168 - 03 January 2025
Abstract The multi-objective particle swarm optimization algorithm (MOPSO) is widely used to solve multi-objective optimization problems. In the article, a multi-objective particle swarm optimization algorithm based on decomposition and multi-selection strategy is proposed to improve the search efficiency. First, two update strategies based on decomposition are used to update the evolving population and external archive, respectively. Second, a multi-selection strategy is designed. The first strategy is for the subspace without a non-dominated solution. Among the neighbor particles, the particle with the smallest penalty-based boundary intersection value is selected as the global optimal solution and the particle… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1027-1047, 2025, DOI:10.32604/cmc.2024.059789 - 03 January 2025
(This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
Abstract Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright. The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification. Some of these features are important perceptual features according to the human visual system (HVS), which means that the embedded watermark should be imperceptible in these features. Therefore, both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions. The two roles will be considered in this paper… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1049-1068, 2025, DOI:10.32604/cmc.2024.058374 - 03 January 2025
Abstract Multivariate time series forecasting is widely used in traffic planning, weather forecasting, and energy consumption. Series decomposition algorithms can help models better understand the underlying patterns of the original series to improve the forecasting accuracy of multivariate time series. However, the decomposition kernel of previous decomposition-based models is fixed, and these models have not considered the differences in frequency fluctuations between components. These problems make it difficult to analyze the intricate temporal variations of real-world time series. In this paper, we propose a series decomposition-based Mamba model, DecMamba, to obtain the intricate temporal dependencies and… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1069-1086, 2025, DOI:10.32604/cmc.2024.057349 - 03 January 2025
(This article belongs to the Special Issue: Next-Generation Techniques and Applications on Opinion Mining and Affective Computing)
Abstract With the rapid expansion of social media, analyzing emotions and their causes in texts has gained significant importance. Emotion-cause pair extraction enables the identification of causal relationships between emotions and their triggers within a text, facilitating a deeper understanding of expressed sentiments and their underlying reasons. This comprehension is crucial for making informed strategic decisions in various business and societal contexts. However, recent research approaches employing multi-task learning frameworks for modeling often face challenges such as the inability to simultaneously model extracted features and their interactions, or inconsistencies in label prediction between emotion-cause pair extraction… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1087-1107, 2025, DOI:10.32604/cmc.2024.058953 - 03 January 2025
Abstract Link failure is a critical issue in large networks and must be effectively addressed. In software-defined networks (SDN), link failure recovery schemes can be categorized into proactive and reactive approaches. Reactive schemes have longer recovery times while proactive schemes provide faster recovery but overwhelm the memory of switches by flow entries. As SDN adoption grows, ensuring efficient recovery from link failures in the data plane becomes crucial. In particular, data center networks (DCNs) demand rapid recovery times and efficient resource utilization to meet carrier-grade requirements. This paper proposes an efficient Decentralized Failure Recovery (DFR) model… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1109-1128, 2025, DOI:10.32604/cmc.2024.057706 - 03 January 2025
(This article belongs to the Special Issue: Deep Learning and Computer Vision for Industry 4.0 and Emerging Technologies)
Abstract A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition. In the coding number detection stage, Differentiable Binarization Network is used as the backbone network, combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect. In terms of text recognition, using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1129-1150, 2025, DOI:10.32604/cmc.2024.059143 - 03 January 2025
(This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
Abstract As more and more devices in Cyber-Physical Systems (CPS) are connected to the Internet, physical components such as programmable logic controller (PLC), sensors, and actuators are facing greater risks of network attacks, and fast and accurate attack detection techniques are crucial. The key problem in distinguishing between normal and abnormal sequences is to model sequential changes in a large and diverse field of time series. To address this issue, we propose an anomaly detection method based on distributed deep learning. Our method uses a bilateral filtering algorithm for sequential sequences to remove noise in the More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1151-1169, 2025, DOI:10.32604/cmc.2024.057328 - 03 January 2025
(This article belongs to the Special Issue: Exploring the Metaverse: Advancements in Future Networks Communication and Computing Technologies for Enhanced Quality of Experience)
Abstract The emergence of next generation networks (NextG), including 5G and beyond, is reshaping the technological landscape of cellular and mobile networks. These networks are sufficiently scaled to interconnect billions of users and devices. Researchers in academia and industry are focusing on technological advancements to achieve high-speed transmission, cell planning, and latency reduction to facilitate emerging applications such as virtual reality, the metaverse, smart cities, smart health, and autonomous vehicles. NextG continuously improves its network functionality to support these applications. Multiple input multiple output (MIMO) technology offers spectral efficiency, dependability, and overall performance in conjunction with More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1171-1192, 2025, DOI:10.32604/cmc.2024.057225 - 03 January 2025
Abstract Iced transmission line galloping poses a significant threat to the safety and reliability of power systems, leading directly to line tripping, disconnections, and power outages. Existing early warning methods of iced transmission line galloping suffer from issues such as reliance on a single data source, neglect of irregular time series, and lack of attention-based closed-loop feedback, resulting in high rates of missed and false alarms. To address these challenges, we propose an Internet of Things (IoT) empowered early warning method of transmission line galloping that integrates time series data from optical fiber sensing and weather… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1193-1210, 2025, DOI:10.32604/cmc.2024.054587 - 03 January 2025
Abstract Terrain Aided Navigation (TAN) technology has become increasingly important due to its effectiveness in environments where Global Positioning System (GPS) is unavailable. In recent years, TAN systems have been extensively researched for both aerial and underwater navigation applications. However, many TAN systems that rely on recursive Unmanned Aerial Vehicle (UAV) position estimation methods, such as Extended Kalman Filters (EKF), often face challenges with divergence and instability, particularly in highly non-linear systems. To address these issues, this paper proposes and investigates a hybrid two-stage TAN positioning system for UAVs that utilizes Particle Filter. To enhance the… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1211-1232, 2025, DOI:10.32604/cmc.2024.055243 - 03 January 2025
Abstract Renewable Energy Systems (RES) provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers (ES). However, securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic. Additionally, managing attributes, including addition, deletion, and modification, is a crucial issue in the access control scheme for RES. To address these security concerns, a trust-based ciphertext-policy attribute-based encryption (CP-ABE) device access control scheme is proposed for RES (TB-CP-ABE). This… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1233-1254, 2025, DOI:10.32604/cmc.2024.057710 - 03 January 2025
Abstract With the development of anti-virus technology, malicious documents have gradually become the main pathway of Advanced Persistent Threat (APT) attacks, therefore, the development of effective malicious document classifiers has become particularly urgent. Currently, detection methods based on document structure and behavioral features encounter challenges in feature engineering, these methods not only have limited accuracy, but also consume large resources, and usually can only detect documents in specific formats, which lacks versatility and adaptability. To address such problems, this paper proposes a novel malicious document detection method-visualizing documents as GGE images (Grayscale, Grayscale matrix, Entropy). The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1255-1276, 2025, DOI:10.32604/cmc.2024.055732 - 03 January 2025
Abstract In recent years, gait-based emotion recognition has been widely applied in the field of computer vision. However, existing gait emotion recognition methods typically rely on complete human skeleton data, and their accuracy significantly declines when the data is occluded. To enhance the accuracy of gait emotion recognition under occlusion, this paper proposes a Multi-scale Suppression Graph Convolutional Network (MS-GCN). The MS-GCN consists of three main components: Joint Interpolation Module (JI Moudle), Multi-scale Temporal Convolution Network (MS-TCN), and Suppression Graph Convolutional Network (SGCN). The JI Module completes the spatially occluded skeletal joints using the (K-Nearest Neighbors)… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1277-1293, 2025, DOI:10.32604/cmc.2024.058386 - 03 January 2025
(This article belongs to the Special Issue: Artificial Intelligence and Advanced Computation Technology in Railways)
Abstract Urban railways are vital means of public transportation in Korea. More than 30% of metropolitan residents use the railways, and this proportion is expected to increase. To enhance safety, the government has mandated the installation of closed-circuit televisions in all carriages by 2024. However, cameras still monitored humans. To address this limitation, we developed a dataset of risk factors and a smart detection system that enables an immediate response to any abnormal behavior and intensive monitoring thereof. We created an innovative learning dataset that takes into account seven unique risk factors specific to Korean railway More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1295-1311, 2025, DOI:10.32604/cmc.2024.058559 - 03 January 2025
(This article belongs to the Special Issue: Distributed Computing with Applications to IoT and BlockChain)
Abstract In response to the challenges presented by the unreliable identity of the master node, high communication overhead, and limited network support size within the Practical Byzantine Fault-Tolerant (PBFT) algorithm for consortium chains, we propose an improved PBFT algorithm based on XGBoost grouping called XG-PBFT in this paper. XG-PBFT constructs a dataset by training important parameters that affect node performance, which are used as classification indexes for nodes. The XGBoost algorithm then is employed to train the dataset, and nodes joining the system will be grouped according to the trained grouping model. Among them, the nodes… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1313-1327, 2025, DOI:10.32604/cmc.2024.056880 - 03 January 2025
Abstract Z-curve’s encoding and decoding algorithms are primely important in many Z-curve-based applications. The bit interleaving algorithm is the current state-of-the-art algorithm for encoding and decoding Z-curve. Although simple, its efficiency is hindered by the step-by-step coordinate shifting and bitwise operations. To tackle this problem, we first propose the efficient encoding algorithm LTFe and the corresponding decoding algorithm LTFd, which adopt two optimization methods to boost the algorithm’s efficiency: 1) we design efficient lookup tables (LT) that convert encoding and decoding operations into table-lookup operations; 2) we design a bit detection mechanism that skips partial order More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1329-1347, 2025, DOI:10.32604/cmc.2024.057460 - 03 January 2025
Abstract In dynamic scenarios, visual simultaneous localization and mapping (SLAM) algorithms often incorrectly incorporate dynamic points during camera pose computation, leading to reduced accuracy and robustness. This paper presents a dynamic SLAM algorithm that leverages object detection and regional dynamic probability. Firstly, a parallel thread employs the YOLOX object detection model to gather 2D semantic information and compensate for missed detections. Next, an improved K-means++ clustering algorithm clusters bounding box regions, adaptively determining the threshold for extracting dynamic object contours as dynamic points change. This process divides the image into low dynamic, suspicious dynamic, and high More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1349-1376, 2025, DOI:10.32604/cmc.2024.058294 - 03 January 2025
(This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
Abstract Stereoscopic agriculture, as an advanced method of agricultural production, poses new challenges for multi-task trajectory planning of unmanned aerial vehicles (UAVs). To address the need for UAVs to perform multi-task trajectory planning in stereoscopic agriculture, a multi-task trajectory planning model and algorithm (IEP-AO) that synthesizes flight safety and flight efficiency is proposed. Based on the requirements of stereoscopic agricultural geomorphological features and operational characteristics, the multi-task trajectory planning model is ensured by constructing targeted constraints at five aspects, including the path, slope, altitude, corner, energy and obstacle threat, to improve the effectiveness of the trajectory… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1377-1399, 2025, DOI:10.32604/cmc.2024.057755 - 03 January 2025
(This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)
Abstract The deployment of the Internet of Things (IoT) with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses, smart cities, and smart transportation systems. Fog computing tackles a range of challenges, including processing, storage, bandwidth, latency, and reliability, by locally distributing secure information through end nodes. Consisting of endpoints, fog nodes, and back-end cloud infrastructure, it provides advanced capabilities beyond traditional cloud computing. In smart environments, particularly within smart city transportation systems, the abundance of devices and nodes poses significant challenges related… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1401-1416, 2025, DOI:10.32604/cmc.2024.058757 - 03 January 2025
Abstract Ecological monitoring vehicles are equipped with a range of sensors and monitoring devices designed to gather data on ecological and environmental factors. These vehicles are crucial in various fields, including environmental science research, ecological and environmental monitoring projects, disaster response, and emergency management. A key method employed in these vehicles for achieving high-precision positioning is LiDAR (lightlaser detection and ranging)-Visual Simultaneous Localization and Mapping (SLAM). However, maintaining high-precision localization in complex scenarios, such as degraded environments or when dynamic objects are present, remains a significant challenge. To address this issue, we integrate both semantic and… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1417-1437, 2025, DOI:10.32604/cmc.2024.058785 - 03 January 2025
(This article belongs to the Special Issue: Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems)
Abstract Traditional data-driven fault diagnosis methods depend on expert experience to manually extract effective fault features of signals, which has certain limitations. Conversely, deep learning techniques have gained prominence as a central focus of research in the field of fault diagnosis by strong fault feature extraction ability and end-to-end fault diagnosis efficiency. Recently, utilizing the respective advantages of convolution neural network (CNN) and Transformer in local and global feature extraction, research on cooperating the two have demonstrated promise in the field of fault diagnosis. However, the cross-channel convolution mechanism in CNN and the self-attention calculations in… More >
Graphic Abstract
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1439-1458, 2025, DOI:10.32604/cmc.2024.057797 - 03 January 2025
(This article belongs to the Special Issue: Advances in Object Detection: Methods and Applications)
Abstract To maintain the reliability of power systems, routine inspections using drones equipped with advanced object detection algorithms are essential for preempting power-related issues. The increasing resolution of drone-captured images has posed a challenge for traditional target detection methods, especially in identifying small objects in high-resolution images. This study presents an enhanced object detection algorithm based on the Faster Region-based Convolutional Neural Network (Faster R-CNN) framework, specifically tailored for detecting small-scale electrical components like insulators, shock hammers, and screws in transmission line. The algorithm features an improved backbone network for Faster R-CNN, which significantly boosts the More >
Open Access
CORRECTION
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1459-1459, 2025, DOI:10.32604/cmc.2024.061588 - 03 January 2025
Abstract This article has no abstract. More >
Open Access
CORRECTION
CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1461-1461, 2025, DOI:10.32604/cmc.2024.061589 - 03 January 2025
Abstract This article has no abstract. More >