CMCOpen Access

Computers, Materials & Continua

ISSN:1546-2218(print)
ISSN:1546-2226(online)
Publication Frequency:Monthly

  • Online
    Articles

    6346

  • on board
    editors

    244

Special Issues
Table of Content


About the Journal

Computers, Materials & Continua is a peer-reviewed Open Access journal that publishes all types of academic papers in the areas of computer networks, artificial intelligence, big data, software engineering, multimedia, cyber security, internet of things, materials genome, integrated materials science, and data analysis, modeling, designing and manufacturing of modern functional and multifunctional materials. This journal is published monthly by Tech Science Press.

Indexing and Abstracting

SCI: 2023 Impact Factor 2.1; Scopus CiteScore (Impact per Publication 2023): 5.3; SNIP (Source Normalized Impact per Paper 2023): 0.73; Ei Compendex; Cambridge Scientific Abstracts; INSPEC Databases; Science Navigator; EBSCOhost; ProQuest Central; Zentralblatt für Mathematik; Portico, etc.

  • Open Access

    COMMENTARY

    From Data to Discovery: How AI-Driven Materials Databases Are Reshaping Research

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1555-1559, 2025, DOI:10.32604/cmc.2025.064061 - 16 April 2025
    Abstract AI-driven materials databases are transforming research by integrating experimental and computational data to enhance discovery and optimization. Platforms such as Digital Catalysis Platform (DigCat) and Dynamic Database of Solid-State Electrolyte (DDSE) demonstrate how machine learning and predictive modeling can improve catalyst and solid-state electrolyte development. These databases facilitate data standardization, high-throughput screening, and cross-disciplinary collaboration, addressing key challenges in materials informatics. As AI techniques advance, materials databases are expected to play an increasingly vital role in accelerating research and innovation. More >

  • Open Access

    REVIEW

    Blockchain Integration in IoT: Applications, Opportunities, and Challenges

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1561-1605, 2025, DOI:10.32604/cmc.2025.063304 - 16 April 2025
    Abstract The Internet has been enhanced recently by blockchain and Internet of Things (IoT) networks. The Internet of Things is a network of various sensor-equipped devices. It gradually integrates the Internet, sensors, and cloud computing. Blockchain is based on encryption algorithms, which are shared database technologies on the Internet. Blockchain technology has grown significantly because of its features, such as flexibility, support for integration, anonymity, decentralization, and independent control. Computational nodes in the blockchain network are used to verify online transactions. However, this integration creates scalability, interoperability, and security challenges. Over the last decade, several advancements… More >

  • Open Access

    ARTICLE

    A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1607-1621, 2025, DOI:10.32604/cmc.2025.062801 - 16 April 2025
    (This article belongs to the Special Issue: Artificial Intelligence Current Perspectives and Alternative Paths: From eXplainable AI to Generative AI and Data Visualization Technologies)
    Abstract The growing sophistication of cyberthreats, among others the Distributed Denial of Service attacks, has exposed limitations in traditional rule-based Security Information and Event Management systems. While machine learning–based intrusion detection systems can capture complex network behaviours, their “black-box” nature often limits trust and actionable insight for security operators. This study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules, thereby enhancing the detection of Distributed Denial of Service (DDoS) attacks. The proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules More >

  • Open Access

    ARTICLE

    Application of Multi-Criteria Decision and Simulation Approaches to Selection of Additive Manufacturing Technology for Aerospace Application

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1623-1648, 2025, DOI:10.32604/cmc.2025.062092 - 16 April 2025
    (This article belongs to the Special Issue: Design, Optimisation and Applications of Additive Manufacturing Technologies)
    Abstract This study evaluates the Fuzzy Analytical Hierarchy Process (FAHP) as a multi-criteria decision (MCD) support tool for selecting appropriate additive manufacturing (AM) techniques that align with cleaner production and environmental sustainability. The FAHP model was validated using an example of the production of aircraft components (specifically fuselage) employing AM technologies such as Wire Arc Additive Manufacturing (WAAM), laser powder bed fusion (L-PBF), Binder Jetting (BJ), Selective Laser Sintering (SLS), and Laser Metal Deposition (LMD). The selection criteria prioritized eco-friendly manufacturing considerations, including the quality and properties of the final product (e.g., surface finish, high strength,… More >

  • Open Access

    ARTICLE

    Priority-Aware Resource Allocation for VNF Deployment in Service Function Chains Based on Graph Reinforcement Learning

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1649-1665, 2025, DOI:10.32604/cmc.2025.062716 - 16 April 2025
    (This article belongs to the Special Issue: Graph Neural Networks: Methods and Applications in Graph-related Problems)
    Abstract Recently, Network Functions Virtualization (NFV) has become a critical resource for optimizing capability utilization in the 5G/B5G era. NFV decomposes the network resource paradigm, demonstrating the efficient utilization of Network Functions (NFs) to enable configurable service priorities and resource demands. Telecommunications Service Providers (TSPs) face challenges in network utilization, as the vast amounts of data generated by the Internet of Things (IoT) overwhelm existing infrastructures. IoT applications, which generate massive volumes of diverse data and require real-time communication, contribute to bottlenecks and congestion. In this context, Multi-access Edge Computing (MEC) is employed to support resource… More >

  • Open Access

    ARTICLE

    A Category-Agnostic Hybrid Contrastive Learning Method for Few-Shot Point Cloud Object Detection

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1667-1681, 2025, DOI:10.32604/cmc.2025.062161 - 16 April 2025
    Abstract Few-shot point cloud 3D object detection (FS3D) aims to identify and locate objects of novel classes within point clouds using knowledge acquired from annotated base classes and a minimal number of samples from the novel classes. Due to imbalanced training data, existing FS3D methods based on fully supervised learning can lead to overfitting toward base classes, which impairs the network’s ability to generalize knowledge learned from base classes to novel classes and also prevents the network from extracting distinctive foreground and background representations for novel class objects. To address these issues, this thesis proposes a… More >

  • Open Access

    ARTICLE

    Joint Generation of Distractors for Multiple-Choice Questions: A Text-to-Text Approach

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1683-1705, 2025, DOI:10.32604/cmc.2025.062004 - 16 April 2025
    Abstract Generation of good-quality distractors is a key and time-consuming task associated with multiple-choice questions (MCQs), one of the assessment items that have dominated the educational field for years. Recent advances in language models and architectures present an opportunity for helping teachers to generate and update these elements to the required speed and scale of widespread increase in online education. This study focuses on a text-to-text approach for joints generation of distractors for MCQs, where the context, question and correct answer are used as input, while the set of distractors corresponds to the output, allowing the… More >

  • Open Access

    ARTICLE

    Two-Stage Category-Guided Frequency Modulation for Few-Shot Semantic Segmentation

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1707-1726, 2025, DOI:10.32604/cmc.2025.062412 - 16 April 2025
    Abstract Semantic segmentation of novel object categories with limited labeled data remains a challenging problem in computer vision. Few-shot segmentation methods aim to address this problem by recognizing objects from specific target classes with a few provided examples. Previous approaches for few-shot semantic segmentation typically represent target classes using class prototypes. These prototypes are matched with the features of the query set to get segmentation results. However, class prototypes are usually obtained by applying global average pooling on masked support images. Global pooling discards much structural information, which may reduce the accuracy of model predictions. To… More >

  • Open Access

    ARTICLE

    A Novel Approach to Enhanced Cancelable Multi-Biometrics Personal Identification Based on Incremental Deep Learning

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1727-1752, 2025, DOI:10.32604/cmc.2025.063227 - 16 April 2025
    Abstract The field of biometric identification has seen significant advancements over the years, with research focusing on enhancing the accuracy and security of these systems. One of the key developments is the integration of deep learning techniques in biometric systems. However, despite these advancements, certain challenges persist. One of the most significant challenges is scalability over growing complexity. Traditional methods either require maintaining and securing a growing database, introducing serious security challenges, or relying on retraining the entire model when new data is introduced—a process that can be computationally expensive and complex. This challenge underscores the… More >

  • Open Access

    ARTICLE

    HyTiFRec: Hybrid Time-Frequency Dual-Branch Transformer for Sequential Recommendation

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1753-1769, 2025, DOI:10.32604/cmc.2025.062599 - 16 April 2025
    (This article belongs to the Special Issue: Advances in Deep Learning and Neural Networks: Architectures, Applications, and Challenges)
    Abstract Recently, many Sequential Recommendation methods adopt self-attention mechanisms to model user preferences. However, these methods tend to focus more on low-frequency information while neglecting high-frequency information, which makes them ineffective in balancing users’ long- and short-term preferences. At the same time, many methods overlook the potential of frequency domain methods, ignoring their efficiency in processing frequency information. To overcome this limitation, we shift the focus to the combination of time and frequency domains and propose a novel Hybrid Time-Frequency Dual-Branch Transformer for Sequential Recommendation, namely HyTiFRec. Specifically, we design two hybrid filter modules: the learnable… More >

  • Open Access

    ARTICLE

    An Adaptive Cooperated Shuffled Frog-Leaping Algorithm for Parallel Batch Processing Machines Scheduling in Fabric Dyeing Processes

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1771-1789, 2025, DOI:10.32604/cmc.2025.063944 - 16 April 2025
    (This article belongs to the Special Issue: Algorithms for Planning and Scheduling Problems)
    Abstract Fabric dyeing is a critical production process in the clothing industry and heavily relies on batch processing machines (BPM). In this study, the parallel BPM scheduling problem with machine eligibility in fabric dyeing is considered, and an adaptive cooperated shuffled frog-leaping algorithm (ACSFLA) is proposed to minimize makespan and total tardiness simultaneously. ACSFLA determines the search times for each memeplex based on its quality, with more searches in high-quality memeplexes. An adaptive cooperated and diversified search mechanism is applied, dynamically adjusting search strategies for each memeplex based on their dominance relationships and quality. During the… More >

  • Open Access

    ARTICLE

    An Enhanced Fuzzy Routing Protocol for Energy Optimization in the Underwater Wireless Sensor Networks

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1791-1820, 2025, DOI:10.32604/cmc.2025.063962 - 16 April 2025
    Abstract Underwater Wireless Sensor Networks (UWSNs) are gaining popularity because of their potential uses in oceanography, seismic activity monitoring, environmental preservation, and underwater mapping. Yet, these networks are faced with challenges such as self-interference, long propagation delays, limited bandwidth, and changing network topologies. These challenges are coped with by designing advanced routing protocols. In this work, we present Under Water Fuzzy-Routing Protocol for Low power and Lossy networks (UWF-RPL), an enhanced fuzzy-based protocol that improves decision-making during path selection and traffic distribution over different network nodes. Our method extends RPL with the aid of fuzzy logic More >

  • Open Access

    ARTICLE

    Hardware-Enabled Key Generation in Industry 4.0 Cryptosystems through Analog Hyperchaotic Signals

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1821-1853, 2025, DOI:10.32604/cmc.2025.059012 - 16 April 2025
    Abstract The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers. Specific lightweight cryptosystems are needed to protect those links, as the hardware node tends to be resource-constrained. Then Pseudo Random Number Generators are employed to produce random keys, whose final behavior depends on the initial seed. To guarantee good mathematical behavior, most key generators need an unpredictable voltage signal as input. However, physical signals evolve slowly and have a significant autocorrelation, so they do not have enough entropy to support high-randomness seeds. Then, electronic… More >

  • Open Access

    ARTICLE

    Deterministic Convergence Analysis for GRU Networks via Smoothing Regularization

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1855-1879, 2025, DOI:10.32604/cmc.2025.061913 - 16 April 2025
    Abstract In this study, we present a deterministic convergence analysis of Gated Recurrent Unit (GRU) networks enhanced by a smoothing regularization technique. While GRU architectures effectively mitigate gradient vanishing/exploding issues in sequential modeling, they remain prone to overfitting, particularly under noisy or limited training data. Traditional regularization, despite enforcing sparsity and accelerating optimization, introduces non-differentiable points in the error function, leading to oscillations during training. To address this, we propose a novel smoothing regularization framework that replaces the non-differentiable absolute function with a quadratic approximation, ensuring gradient continuity and stabilizing the optimization landscape. Theoretically, we rigorously… More >

  • Open Access

    ARTICLE

    P2V-Fabric: Privacy-Preserving Video Using Hyperledger Fabric

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1881-1900, 2025, DOI:10.32604/cmc.2025.061733 - 16 April 2025
    Abstract The proliferation of Internet of Things (IoT) devices introduces substantial security challenges. Currently, privacy constitutes a significant concern for individuals. While maintaining privacy within these systems is an essential characteristic, it often necessitates certain compromises, such as complexity and scalability, thereby complicating management efforts. The principal challenge lies in ensuring confidentiality while simultaneously preserving individuals’ anonymity within the system. To address this, we present our proposed architecture for managing IoT devices using blockchain technology. Our proposed architecture works on and off blockchain and is integrated with dashcams and closed-circuit television (CCTV) security cameras. In this… More >

  • Open Access

    ARTICLE

    An Enhanced VIKOR and Its Revisit for the Manufacturing Process Application

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1901-1927, 2025, DOI:10.32604/cmc.2025.063543 - 16 April 2025
    Abstract VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) has been developed and applied for over twenty-five years, gaining recognition as a prominent multi-criteria decision-making (MCDM) method. Over this period, numerous studies have explored its applications, conducted comparative analyses, integrated it with other methods, and proposed various modifications to enhance its performance. This paper aims to delve into the fundamental principles and objectives of VIKOR, which aim to maximize group utility and minimize individual regret simultaneously. However, this study identifies a significant limitation in the VIKOR methodology: its process amplifies the weight of individual regret, and the calculated… More >

  • Open Access

    ARTICLE

    DAFPN-YOLO: An Improved UAV-Based Object Detection Algorithm Based on YOLOv8s

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1929-1949, 2025, DOI:10.32604/cmc.2025.061363 - 16 April 2025
    Abstract UAV-based object detection is rapidly expanding in both civilian and military applications, including security surveillance, disaster assessment, and border patrol. However, challenges such as small objects, occlusions, complex backgrounds, and variable lighting persist due to the unique perspective of UAV imagery. To address these issues, this paper introduces DAFPN-YOLO, an innovative model based on YOLOv8s (You Only Look Once version 8s). The model strikes a balance between detection accuracy and speed while reducing parameters, making it well-suited for multi-object detection tasks from drone perspectives. A key feature of DAFPN-YOLO is the enhanced Drone-AFPN (Adaptive Feature… More >

  • Open Access

    ARTICLE

    Cyclical Training Framework with Graph Feature Optimization for Knowledge Graph Reasoning

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1951-1971, 2025, DOI:10.32604/cmc.2025.060134 - 16 April 2025
    Abstract Knowledge graphs (KGs), which organize real-world knowledge in triples, often suffer from issues of incompleteness. To address this, multi-hop knowledge graph reasoning (KGR) methods have been proposed for interpretable knowledge graph completion. The primary approaches to KGR can be broadly classified into two categories: reinforcement learning (RL)-based methods and sequence-to-sequence (seq2seq)-based methods. While each method has its own distinct advantages, they also come with inherent limitations. To leverage the strengths of each method while addressing their weaknesses, we propose a cyclical training method that alternates for several loops between the seq2seq training phase and the… More >

  • Open Access

    ARTICLE

    Integrating Edge Intelligence with Blockchain-Driven Secured IoT Healthcare Optimization Model

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1973-1986, 2025, DOI:10.32604/cmc.2025.063077 - 16 April 2025
    Abstract The Internet of Things (IoT) and edge computing have substantially contributed to the development and growth of smart cities. It handled time-constrained services and mobile devices to capture the observing environment for surveillance applications. These systems are composed of wireless cameras, digital devices, and tiny sensors to facilitate the operations of crucial healthcare services. Recently, many interactive applications have been proposed, including integrating intelligent systems to handle data processing and enable dynamic communication functionalities for crucial IoT services. Nonetheless, most solutions lack optimizing relaying methods and impose excessive overheads for maintaining devices’ connectivity. Alternatively, data More >

  • Open Access

    ARTICLE

    Obstacle Avoidance Path Planning for Delta Robots Based on Digital Twin and Deep Reinforcement Learning

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1987-2001, 2025, DOI:10.32604/cmc.2025.060384 - 16 April 2025
    (This article belongs to the Special Issue: Enhancing IoT Cyber-Resilience: Convergence of AI, Digital Twins, and the Metaverse )
    Abstract Despite its immense potential, the application of digital twin technology in real industrial scenarios still faces numerous challenges. This study focuses on industrial assembly lines in sectors such as microelectronics, pharmaceuticals, and food packaging, where precision and speed are paramount, applying digital twin technology to the robotic assembly process. The innovation of this research lies in the development of a digital twin architecture and system for Delta robots that is suitable for real industrial environments. Based on this system, a deep reinforcement learning algorithm for obstacle avoidance path planning in Delta robots has been developed, More >

  • Open Access

    ARTICLE

    Intelligent Vehicle Lane-Changing Strategy through Polynomial and Game Theory

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2003-2023, 2025, DOI:10.32604/cmc.2025.062653 - 16 April 2025
    (This article belongs to the Special Issue: Intelligent Manufacturing, Robotics and Control Engineering)
    Abstract This paper introduces a lane-changing strategy aimed at trajectory planning and tracking control for intelligent vehicles navigating complex driving environments. A fifth-degree polynomial is employed to generate a set of potential lane-changing trajectories in the Frenet coordinate system. These trajectories are evaluated using non-cooperative game theory, considering the interaction between the target vehicle and its surroundings. Models considering safety payoffs, speed payoffs, comfort payoffs, and aggressiveness are formulated to obtain a Nash equilibrium solution. This way, collision avoidance is ensured, and an optimal lane change trajectory is planned. Three game scenarios are discussed, and the More >

  • Open Access

    ARTICLE

    A Lightweight Convolutional Neural Network with Squeeze and Excitation Module for Security Authentication Using Wireless Channel

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2025-2040, 2025, DOI:10.32604/cmc.2025.061869 - 16 April 2025
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract Physical layer authentication (PLA) in the context of the Internet of Things (IoT) has gained significant attention. Compared with traditional encryption and blockchain technologies, PLA provides a more computationally efficient alternative to exploiting the properties of the wireless medium itself. Some existing PLA solutions rely on static mechanisms, which are insufficient to address the authentication challenges in fifth generation (5G) and beyond wireless networks. Additionally, with the massive increase in mobile device access, the communication security of the IoT is vulnerable to spoofing attacks. To overcome the above challenges, this paper proposes a lightweight deep More >

  • Open Access

    ARTICLE

    Integration of Federated Learning and Graph Convolutional Networks for Movie Recommendation Systems

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2041-2057, 2025, DOI:10.32604/cmc.2025.061166 - 16 April 2025
    (This article belongs to the Special Issue: Advances in AI Techniques in Convergence ICT)
    Abstract Recommendation systems (RSs) are crucial in personalizing user experiences in digital environments by suggesting relevant content or items. Collaborative filtering (CF) is a widely used personalization technique that leverages user-item interactions to generate recommendations. However, it struggles with challenges like the cold-start problem, scalability issues, and data sparsity. To address these limitations, we develop a Graph Convolutional Networks (GCNs) model that captures the complex network of interactions between users and items, identifying subtle patterns that traditional methods may overlook. We integrate this GCNs model into a federated learning (FL) framework, enabling the model to learn… More >

  • Open Access

    ARTICLE

    DRG-DCC: A Driving Risk Gaming Based Distributed Congestion Control Method for C-V2X Technology

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2059-2086, 2025, DOI:10.32604/cmc.2025.060392 - 16 April 2025
    (This article belongs to the Special Issue: Advanced Communication and Networking Technologies for Internet of Things and Internet of Vehicles)
    Abstract Congestion control is an inherent challenge of V2X (Vehicle to Everything) technologies. Due to the use of a broadcasting mechanism, channel congestion becomes severe with the increase in vehicle density. The researchers suggested reducing the frequency of packet dissemination to relieve congestion, which caused a rise in road driving risk. Obviously, high-risk vehicles should be able to send messages timely to alarm surrounding vehicles. Therefore, packet dissemination frequency should be set according to the corresponding vehicle’s risk level, which is hard to evaluate. In this paper, a two-stage fuzzy inference model is constructed to evaluate More >

  • Open Access

    ARTICLE

    Frequency-Quantized Variational Autoencoder Based on 2D-FFT for Enhanced Image Reconstruction and Generation

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2087-2107, 2025, DOI:10.32604/cmc.2025.060252 - 16 April 2025
    Abstract As a form of discrete representation learning, Vector Quantized Variational Autoencoders (VQ-VAE) have increasingly been applied to generative and multimodal tasks due to their ease of embedding and representative capacity. However, existing VQ-VAEs often perform quantization in the spatial domain, ignoring global structural information and potentially suffering from codebook collapse and information coupling issues. This paper proposes a frequency quantized variational autoencoder (FQ-VAE) to address these issues. The proposed method transforms image features into linear combinations in the frequency domain using a 2D fast Fourier transform (2D-FFT) and performs adaptive quantization on these frequency components… More >

  • Open Access

    ARTICLE

    Dynamic Spatial Focus in Alzheimer’s Disease Diagnosis via Multiple CNN Architectures and Dynamic GradNet

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2109-2142, 2025, DOI:10.32604/cmc.2025.062923 - 16 April 2025
    (This article belongs to the Special Issue: Cutting-Edge Machine Learning and AI Innovations in Medical Imaging Diagnosis)
    Abstract The evolving field of Alzheimer’s disease (AD) diagnosis has greatly benefited from deep learning models for analyzing brain magnetic resonance (MR) images. This study introduces Dynamic GradNet, a novel deep learning model designed to increase diagnostic accuracy and interpretability for multiclass AD classification. Initially, four state-of-the-art convolutional neural network (CNN) architectures, the self-regulated network (RegNet), residual network (ResNet), densely connected convolutional network (DenseNet), and efficient network (EfficientNet), were comprehensively compared via a unified preprocessing pipeline to ensure a fair evaluation. Among these models, EfficientNet consistently demonstrated superior performance in terms of accuracy, precision, recall, and… More >

  • Open Access

    ARTICLE

    DCS-SOCP-SVM: A Novel Integrated Sampling and Classification Algorithm for Imbalanced Datasets

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2143-2159, 2025, DOI:10.32604/cmc.2025.060739 - 16 April 2025
    Abstract When dealing with imbalanced datasets, the traditional support vector machine (SVM) tends to produce a classification hyperplane that is biased towards the majority class, which exhibits poor robustness. This paper proposes a high-performance classification algorithm specifically designed for imbalanced datasets. The proposed method first uses a biased second-order cone programming support vector machine (B-SOCP-SVM) to identify the support vectors (SVs) and non-support vectors (NSVs) in the imbalanced data. Then, it applies the synthetic minority over-sampling technique (SV-SMOTE) to oversample the support vectors of the minority class and uses the random under-sampling technique (NSV-RUS) multiple times More >

  • Open Access

    ARTICLE

    Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps: An Ultra-Wide Range Dynamics for Image Encryption

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2161-2188, 2025, DOI:10.32604/cmc.2025.063729 - 16 April 2025
    Abstract Data security has become a growing priority due to the increasing frequency of cyber-attacks, necessitating the development of more advanced encryption algorithms. This paper introduces Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps (SQQLSR), a quantum-based chaos map designed to generate one-dimensional chaotic sequences with an ultra-wide parameter range. The proposed model leverages quantum superposition using Hadamard gates and quantum rotations along the X, Y, and Z axes to enhance randomness. Extensive numerical experiments validate the effectiveness of SQQLSR. The proposed method achieves a maximum Lyapunov exponent (LE) of ≈55.265, surpassing traditional chaotic maps in unpredictability. The bifurcation analysis… More >

  • Open Access

    ARTICLE

    An Improved Knowledge Distillation Algorithm and Its Application to Object Detection

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2189-2205, 2025, DOI:10.32604/cmc.2025.060609 - 16 April 2025
    Abstract Knowledge distillation (KD) is an emerging model compression technique for learning compact object detector models. Previous KD often focused solely on distilling from the logits layer or the feature intermediate layers, which may limit the comprehensive learning of the student network. Additionally, the imbalance between the foreground and background also affects the performance of the model. To address these issues, this paper employs feature-based distillation to enhance the detection performance of the bounding box localization part, and logit-based distillation to improve the detection performance of the category prediction part. Specifically, for the intermediate layer feature… More >

  • Open Access

    ARTICLE

    GMS: A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2207-2220, 2025, DOI:10.32604/cmc.2025.061455 - 16 April 2025
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract With the rapid proliferation of Internet of Things (IoT) devices, ensuring their communication security has become increasingly important. Blockchain and smart contract technologies, with their decentralized nature, provide strong security guarantees for IoT. However, at the same time, smart contracts themselves face numerous security challenges, among which reentrancy vulnerabilities are particularly prominent. Existing detection tools for reentrancy vulnerabilities often suffer from high false positive and false negative rates due to their reliance on identifying patterns related to specific transfer functions. To address these limitations, this paper proposes a novel detection method that combines pattern matching… More >

  • Open Access

    ARTICLE

    Multi-Scale Vision Transformer with Dynamic Multi-Loss Function for Medical Image Retrieval and Classification

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2221-2244, 2025, DOI:10.32604/cmc.2025.061977 - 16 April 2025
    (This article belongs to the Special Issue: Emerging Trends and Applications of Deep Learning for Biomedical Signal and Image Processing)
    Abstract This paper introduces a novel method for medical image retrieval and classification by integrating a multi-scale encoding mechanism with Vision Transformer (ViT) architectures and a dynamic multi-loss function. The multi-scale encoding significantly enhances the model’s ability to capture both fine-grained and global features, while the dynamic loss function adapts during training to optimize classification accuracy and retrieval performance. Our approach was evaluated on the ISIC-2018 and ChestX-ray14 datasets, yielding notable improvements. Specifically, on the ISIC-2018 dataset, our method achieves an F1-Score improvement of +4.84% compared to the standard ViT, with a precision increase of +5.46% More >

  • Open Access

    ARTICLE

    An Improved Lightweight Safety Helmet Detection Algorithm for YOLOv8

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2245-2265, 2025, DOI:10.32604/cmc.2025.061519 - 16 April 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Detecting individuals wearing safety helmets in complex environments faces several challenges. These factors include limited detection accuracy and frequent missed or false detections. Additionally, existing algorithms often have excessive parameter counts, complex network structures, and high computational demands. These challenges make it difficult to deploy such models efficiently on resource-constrained devices like embedded systems. Aiming at this problem, this research proposes an optimized and lightweight solution called FGP-YOLOv8, an improved version of YOLOv8n. The YOLOv8 backbone network is replaced with the FasterNet model to reduce parameters and computational demands while local convolution layers are added.… More >

  • Open Access

    ARTICLE

    DMF: A Deep Multimodal Fusion-Based Network Traffic Classification Model

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2267-2285, 2025, DOI:10.32604/cmc.2025.061767 - 16 April 2025
    Abstract With the rise of encrypted traffic, traditional network analysis methods have become less effective, leading to a shift towards deep learning-based approaches. Among these, multimodal learning-based classification methods have gained attention due to their ability to leverage diverse feature sets from encrypted traffic, improving classification accuracy. However, existing research predominantly relies on late fusion techniques, which hinder the full utilization of deep features within the data. To address this limitation, we propose a novel multimodal encrypted traffic classification model that synchronizes modality fusion with multiscale feature extraction. Specifically, our approach performs real-time fusion of modalities More >

  • Open Access

    ARTICLE

    Machine Learning Model for Wind Power Forecasting Using Enhanced Multilayer Perceptron

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2287-2303, 2025, DOI:10.32604/cmc.2025.061320 - 16 April 2025
    Abstract Wind power forecasting plays a crucial role in optimizing the integration of wind energy into the grid by predicting wind patterns and energy output. This enhances the efficiency and reliability of renewable energy systems. Forecasting approaches inform energy management strategies, reduce reliance on fossil fuels, and support the broader transition to sustainable energy solutions. The primary goal of this study is to introduce an effective methodology for estimating wind power through temporal data analysis. This research advances an optimized Multilayer Perceptron (MLP) model using recently proposed metaheuristic optimization algorithms, namely the Fire Hawk Optimizer (FHO)… More >

  • Open Access

    ARTICLE

    Multimodal Neural Machine Translation Based on Knowledge Distillation and Anti-Noise Interaction

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2305-2322, 2025, DOI:10.32604/cmc.2025.061145 - 16 April 2025
    Abstract Within the realm of multimodal neural machine translation (MNMT), addressing the challenge of seamlessly integrating textual data with corresponding image data to enhance translation accuracy has become a pressing issue. We saw that discrepancies between textual content and associated images can lead to visual noise, potentially diverting the model’s focus away from the textual data and so affecting the translation’s comprehensive effectiveness. To solve this visual noise problem, we propose an innovative KDNR-MNMT model. The model combines the knowledge distillation technique with an anti-noise interaction mechanism, which makes full use of the synthesized graphic knowledge… More >

  • Open Access

    ARTICLE

    Improving Hornet Detection with the YOLOv7-Tiny Model: A Case Study on Asian Hornets

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2323-2349, 2025, DOI:10.32604/cmc.2025.063270 - 16 April 2025
    Abstract Bees play a crucial role in the global food chain, pollinating over 75% of food and producing valuable products such as bee pollen, propolis, and royal jelly. However, the Asian hornet poses a serious threat to bee populations by preying on them and disrupting agricultural ecosystems. To address this issue, this study developed a modified YOLOv7tiny (You Only Look Once) model for efficient hornet detection. The model incorporated space-to-depth (SPD) and squeeze-and-excitation (SE) attention mechanisms and involved detailed annotation of the hornet’s head and full body, significantly enhancing the detection of small objects. The Taguchi… More >

  • Open Access

    ARTICLE

    Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2351-2373, 2025, DOI:10.32604/cmc.2025.062324 - 16 April 2025
    Abstract The advent of the digital age has consistently provided impetus for facilitating global trade, as evidenced by the numerous customs clearance documents and participants involved in the international trade process, including enterprises, agents, and government departments. However, the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes. In addressing this need, this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption (MA-ABE) in combination with blockchain technology. This scheme supports proxy decryption, attribute revocation, and policy update,… More >

  • Open Access

    ARTICLE

    Real-Time Proportional-Integral-Derivative (PID) Tuning Based on Back Propagation (BP) Neural Network for Intelligent Vehicle Motion Control

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2375-2401, 2025, DOI:10.32604/cmc.2025.061894 - 16 April 2025
    (This article belongs to the Special Issue: Collaborative Edge Intelligence and Its Emerging Applications)
    Abstract Over 1.3 million people die annually in traffic accidents, and this tragic fact highlights the urgent need to enhance the intelligence of traffic safety and control systems. In modern industrial and technological applications and collaborative edge intelligence, control systems are crucial for ensuring efficiency and safety. However, deficiencies in these systems can lead to significant operational risks. This paper uses edge intelligence to address the challenges of achieving target speeds and improving efficiency in vehicle control, particularly the limitations of traditional Proportional-Integral-Derivative (PID) controllers in managing nonlinear and time-varying dynamics, such as varying road conditions… More >

  • Open Access

    ARTICLE

    Numerical Homogenization Approach for the Analysis of Honeycomb Sandwich Shell Structures

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2403-2428, 2025, DOI:10.32604/cmc.2025.060672 - 16 April 2025
    (This article belongs to the Special Issue: Advanced Modeling of Smart and Composite Materials and Structures)
    Abstract This study conducts a thorough examination of honeycomb sandwich panels with a lattice core, adopting advanced computational techniques for their modeling. The research extends its analysis to investigate the natural frequency behavior of sandwich panels, encompassing the comprehensive assessment of the entire panel structure. At its core, the research applies the Representative Volume Element (RVE) theory to establish the equivalent material properties, thereby enhancing the predictive capabilities of lattice structure simulations. The methodology applies these properties in the core of infinite panels, which are modeled using double periodic boundary conditions to explore their natural frequencies.… More >

  • Open Access

    ARTICLE

    Two-Hop Delay-Aware Energy Efficiency Resource Allocation in Space-Air-Ground Integrated Smart Grid Network

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2429-2447, 2025, DOI:10.32604/cmc.2025.062067 - 16 April 2025
    Abstract The lack of communication infrastructure in remote regions presents significant obstacles to gathering data from smart power sensors (SPSs) in smart grid networks. In such cases, a space-air-ground integrated network serves as an effective emergency solution. This study addresses the challenge of optimizing the energy efficiency of data transmission from SPSs to low Earth orbit (LEO) satellites through unmanned aerial vehicles (UAVs), considering both effective capacity and fronthaul link capacity constraints. Due to the non-convex nature of the problem, the objective function is reformulated, and a delay-aware energy-efficient power allocation and UAV trajectory design (DEPATD)… More >

  • Open Access

    ARTICLE

    A Tolerant and Energy Optimization Approach for Internet of Things to Enhance the QoS Using Adaptive Blended Marine Predators Algorithm

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2449-2479, 2025, DOI:10.32604/cmc.2025.061486 - 16 April 2025
    Abstract The rapid expansion of Internet of Things (IoT) networks has introduced challenges in network management, primarily in maintaining energy efficiency and robust connectivity across an increasing array of devices. This paper introduces the Adaptive Blended Marine Predators Algorithm (AB-MPA), a novel optimization technique designed to enhance Quality of Service (QoS) in IoT systems by dynamically optimizing network configurations for improved energy efficiency and stability. Our results represent significant improvements in network performance metrics such as energy consumption, throughput, and operational stability, indicating that AB-MPA effectively addresses the pressing needs of modern IoT environments. Nodes are More >

  • Open Access

    ARTICLE

    Automatic Pancreas Segmentation in CT Images Using EfficientNetV2 and Multi-Branch Structure

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2481-2504, 2025, DOI:10.32604/cmc.2025.060961 - 16 April 2025
    Abstract Automatic pancreas segmentation plays a pivotal role in assisting physicians with diagnosing pancreatic diseases, facilitating treatment evaluations, and designing surgical plans. Due to the pancreas’s tiny size, significant variability in shape and location, and low contrast with surrounding tissues, achieving high segmentation accuracy remains challenging. To improve segmentation precision, we propose a novel network utilizing EfficientNetV2 and multi-branch structures for automatically segmenting the pancreas from CT images. Firstly, an EfficientNetV2 encoder is employed to extract complex and multi-level features, enhancing the model’s ability to capture the pancreas’s intricate morphology. Then, a residual multi-branch dilated attention… More >

  • Open Access

    ARTICLE

    Collaborative Decomposition Multi-Objective Improved Elephant Clan Optimization Based on Penalty-Based and Normal Boundary Intersection

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2505-2523, 2025, DOI:10.32604/cmc.2025.060887 - 16 April 2025
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract In recent years, decomposition-based evolutionary algorithms have become popular algorithms for solving multi-objective problems in real-life scenarios. In these algorithms, the reference vectors of the Penalty-Based boundary intersection (PBI) are distributed parallelly while those based on the normal boundary intersection (NBI) are distributed radially in a conical shape in the objective space. To improve the problem-solving effectiveness of multi-objective optimization algorithms in engineering applications, this paper addresses the improvement of the Collaborative Decomposition (CoD) method, a multi-objective decomposition technique that integrates PBI and NBI, and combines it with the Elephant Clan Optimization Algorithm, introducing the… More >

  • Open Access

    ARTICLE

    Robust Real-Time Analysis of Cow Behaviors Using Accelerometer Sensors and Decision Trees with Short Data Windows and Misalignment Compensation

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2525-2553, 2025, DOI:10.32604/cmc.2025.062590 - 16 April 2025
    Abstract This study focuses on the design and validation of a behavior classification system for cattle using behavioral data collected through accelerometer sensors. Data collection and behavioral analysis are achieved using machine learning (ML) algorithms through accelerometer sensors. However, behavioral analysis poses challenges due to the complexity of cow activities. The task becomes more challenging in a real-time behavioral analysis system with the requirement for shorter data windows and energy constraints. Shorter windows may lack sufficient information, reducing algorithm performance. Additionally, the sensor’s position on the cows may shift during practical use, altering the collected accelerometer… More >

  • Open Access

    ARTICLE

    TIPS: Tailored Information Extraction in Public Security Using Domain-Enhanced Large Language Model

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2555-2572, 2025, DOI:10.32604/cmc.2025.060318 - 16 April 2025
    Abstract Processing police incident data in public security involves complex natural language processing (NLP) tasks, including information extraction. This data contains extensive entity information—such as people, locations, and events—while also involving reasoning tasks like personnel classification, relationship judgment, and implicit inference. Moreover, utilizing models for extracting information from police incident data poses a significant challenge—data scarcity, which limits the effectiveness of traditional rule-based and machine-learning methods. To address these, we propose TIPS. In collaboration with public security experts, we used de-identified police incident data to create templates that enable large language models (LLMs) to populate data More >

  • Open Access

    ARTICLE

    Modeling and Performance Evaluation of Streaming Data Processing System in IoT Architecture

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2573-2598, 2025, DOI:10.32604/cmc.2025.062007 - 16 April 2025
    Abstract With the widespread application of Internet of Things (IoT) technology, the processing of massive real-time streaming data poses significant challenges to the computational and data-processing capabilities of systems. Although distributed streaming data processing frameworks such as Apache Flink and Apache Spark Streaming provide solutions, meeting stringent response time requirements while ensuring high throughput and resource utilization remains an urgent problem. To address this, the study proposes a formal modeling approach based on Performance Evaluation Process Algebra (PEPA), which abstracts the core components and interactions of cloud-based distributed streaming data processing systems. Additionally, a generic service… More >

  • Open Access

    ARTICLE

    ALCTS—An Assistive Learning and Communicative Tool for Speech and Hearing Impaired Students

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2599-2617, 2025, DOI:10.32604/cmc.2025.062695 - 16 April 2025
    Abstract Hearing and Speech impairment can be congenital or acquired. Hearing and speech-impaired students often hesitate to pursue higher education in reputable institutions due to their challenges. However, the development of automated assistive learning tools within the educational field has empowered disabled students to pursue higher education in any field of study. Assistive learning devices enable students to access institutional resources and facilities fully. The proposed assistive learning and communication tool allows hearing and speech-impaired students to interact productively with their teachers and classmates. This tool converts the audio signals into sign language videos for the… More >

  • Open Access

    ARTICLE

    TRLLD: Load Level Detection Algorithm Based on Threshold Recognition for Load Time Series

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2619-2642, 2025, DOI:10.32604/cmc.2025.062526 - 16 April 2025
    Abstract Load time series analysis is critical for resource management and optimization decisions, especially automated analysis techniques. Existing research has insufficiently interpreted the overall characteristics of samples, leading to significant differences in load level detection conclusions for samples with different characteristics (trend, seasonality, cyclicality). Achieving automated, feature-adaptive, and quantifiable analysis methods remains a challenge. This paper proposes a Threshold Recognition-based Load Level Detection Algorithm (TRLLD), which effectively identifies different load level regions in samples of arbitrary size and distribution type based on sample characteristics. By utilizing distribution density uniformity, the algorithm classifies data points and ultimately… More >

  • Open Access

    ARTICLE

    Robust Detection for Fisheye Camera Based on Contrastive Learning

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2643-2658, 2025, DOI:10.32604/cmc.2025.061690 - 16 April 2025
    Abstract Fisheye cameras offer a significantly larger field of view compared to conventional cameras, making them valuable tools in the field of computer vision. However, their unique optical characteristics often lead to image distortions, which pose challenges for object detection tasks. To address this issue, we propose Yolo-CaSKA (Yolo with Contrastive Learning and Selective Kernel Attention), a novel training method that enhances object detection on fisheye camera images. The standard image and the corresponding distorted fisheye image pairs are used as positive samples, and the rest of the image pairs are used as negative samples, which More >

  • Open Access

    ARTICLE

    Fake News Detection Based on Cross-Modal Ambiguity Computation and Multi-Scale Feature Fusion

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2659-2675, 2025, DOI:10.32604/cmc.2025.060025 - 16 April 2025
    Abstract With the rapid growth of social media, the spread of fake news has become a growing problem, misleading the public and causing significant harm. As social media content is often composed of both images and text, the use of multimodal approaches for fake news detection has gained significant attention. To solve the problems existing in previous multi-modal fake news detection algorithms, such as insufficient feature extraction and insufficient use of semantic relations between modes, this paper proposes the MFFFND-Co (Multimodal Feature Fusion Fake News Detection with Co-Attention Block) model. First, the model deeply explores the More >

  • Open Access

    ARTICLE

    Barber Optimization Algorithm: A New Human-Based Approach for Solving Optimization Problems

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2677-2718, 2025, DOI:10.32604/cmc.2025.064087 - 16 April 2025
    (This article belongs to the Special Issue: Advanced Bio-Inspired Optimization Algorithms and Applications)
    Abstract In this study, a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm (BaOA). Inspired by the human interactions between barbers and customers, BaOA captures two key processes: the customer’s selection of a hairstyle and the detailed refinement during the haircut. These processes are translated into a mathematical framework that forms the foundation of BaOA, consisting of two critical phases: exploration, representing the creative selection process, and exploitation, which focuses on refining details for optimization. The performance of BaOA is evaluated using 52 standard… More >

  • Open Access

    ARTICLE

    Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2719-2734, 2025, DOI:10.32604/cmc.2025.059949 - 16 April 2025
    Abstract AI applications have become ubiquitous, bringing significant convenience to various industries. In e-commerce, AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market strategy development. However, if the data used for AI applications is damaged or lost, it will inevitably affect the effectiveness of these AI applications. Therefore, it is essential to verify the integrity of e-commerce data. Although existing Provable Data Possession (PDP) protocols can verify the integrity of cloud data, they are not suitable for e-commerce scenarios due to the limited computational capabilities of edge servers, which More >

  • Open Access

    ARTICLE

    Token Masked Pose Transformers Are Efficient Learners

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2735-2750, 2025, DOI:10.32604/cmc.2025.059006 - 16 April 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract In recent years, Transformer has achieved remarkable results in the field of computer vision, with its built-in attention layers effectively modeling global dependencies in images by transforming image features into token forms. However, Transformers often face high computational costs when processing large-scale image data, which limits their feasibility in real-time applications. To address this issue, we propose Token Masked Pose Transformers (TMPose), constructing an efficient Transformer network for pose estimation. This network applies semantic-level masking to tokens and employs three different masking strategies to optimize model performance, aiming to reduce computational complexity. Experimental results show More >

  • Open Access

    ARTICLE

    CG-FCLNet: Category-Guided Feature Collaborative Learning Network for Semantic Segmentation of Remote Sensing Images

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2751-2771, 2025, DOI:10.32604/cmc.2025.060860 - 16 April 2025
    Abstract Semantic segmentation of remote sensing images is a critical research area in the field of remote sensing. Despite the success of Convolutional Neural Networks (CNNs), they often fail to capture inter-layer feature relationships and fully leverage contextual information, leading to the loss of important details. Additionally, due to significant intra-class variation and small inter-class differences in remote sensing images, CNNs may experience class confusion. To address these issues, we propose a novel Category-Guided Feature Collaborative Learning Network (CG-FCLNet), which enables fine-grained feature extraction and adaptive fusion. Specifically, we design a Feature Collaborative Learning Module (FCLM)… More >

  • Open Access

    ARTICLE

    A Fuzzy Multi-Objective Framework for Energy Optimization and Reliable Routing in Wireless Sensor Networks via Particle Swarm Optimization

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2773-2792, 2025, DOI:10.32604/cmc.2025.061773 - 16 April 2025
    (This article belongs to the Special Issue: AI-Assisted Energy Harvesting Techniques and its Applications in Wireless Sensor Networks)
    Abstract Wireless Sensor Networks (WSNs) are one of the best technologies of the 21st century and have seen tremendous growth over the past decade. Much work has been put into its development in various aspects such as architectural attention, routing protocols, location exploration, time exploration, etc. This research aims to optimize routing protocols and address the challenges arising from conflicting objectives in WSN environments, such as balancing energy consumption, ensuring routing reliability, distributing network load, and selecting the shortest path. Many optimization techniques have shown success in achieving one or two objectives but struggle to achieve… More >

  • Open Access

    ARTICLE

    Ensemble of Deep Learning with Crested Porcupine Optimizer Based Autism Spectrum Disorder Detection Using Facial Images

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2793-2807, 2025, DOI:10.32604/cmc.2025.062266 - 16 April 2025
    (This article belongs to the Special Issue: Advancements in Machine Learning and Artificial Intelligence for Pattern Detection and Predictive Analytics in Healthcare)
    Abstract Autism spectrum disorder (ASD) is a multifaceted neurological developmental condition that manifests in several ways. Nearly all autistic children remain undiagnosed before the age of three. Developmental problems affecting face features are often associated with fundamental brain disorders. The facial evolution of newborns with ASD is quite different from that of typically developing children. Early recognition is very significant to aid families and parents in superstition and denial. Distinguishing facial features from typically developing children is an evident manner to detect children analyzed with ASD. Presently, artificial intelligence (AI) significantly contributes to the emerging computer-aided… More >

  • Open Access

    ARTICLE

    Causal Representation Enhances Cross-Domain Named Entity Recognition in Large Language Models

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2809-2828, 2025, DOI:10.32604/cmc.2025.061359 - 16 April 2025
    Abstract Large language models cross-domain named entity recognition task in the face of the scarcity of large language labeled data in a specific domain, due to the entity bias arising from the variation of entity information between different domains, which makes large language models prone to spurious correlations problems when dealing with specific domains and entities. In order to solve this problem, this paper proposes a cross-domain named entity recognition method based on causal graph structure enhancement, which captures the cross-domain invariant causal structural representations between feature representations of text sequences and annotation sequences by establishing… More >

  • Open Access

    ARTICLE

    TransSSA: Invariant Cue Perceptual Feature Focused Learning for Dynamic Fruit Target Detection

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2829-2850, 2025, DOI:10.32604/cmc.2025.063287 - 16 April 2025
    Abstract In the field of automated fruit harvesting, precise and efficient fruit target recognition and localization play a pivotal role in enhancing the efficiency of harvesting robots. However, this domain faces two core challenges: firstly, the dynamic nature of the automatic picking process requires fruit target detection algorithms to adapt to multi-view characteristics, ensuring effective recognition of the same fruit from different perspectives. Secondly, fruits in natural environments often suffer from interference factors such as overlapping, occlusion, and illumination fluctuations, which increase the difficulty of image capture and recognition. To address these challenges, this study conducted… More >

  • Open Access

    ARTICLE

    TMRE: Novel Algorithm for Computing Daily Reference Evapotranspiration Using Transformer-Based Models

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2851-2864, 2025, DOI:10.32604/cmc.2025.060365 - 16 April 2025
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications)
    Abstract Reference Evapotranspiration (ETo) is widely used to assess total water loss between land and atmosphere due to its importance in maintaining the atmospheric water balance, especially in agricultural and environmental management. Accurate estimation of ETo is challenging due to its dependency on multiple climatic variables, including temperature, humidity, and solar radiation, making it a complex multivariate time-series problem. Traditional machine learning and deep learning models have been applied to forecast ETo, achieving moderate success. However, the introduction of transformer-based architectures in time-series forecasting has opened new possibilities for more precise ETo predictions. In this study,… More >

  • Open Access

    ARTICLE

    A Deep Learning-Based Salient Feature-Preserving Algorithm for Mesh Simplification

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2865-2888, 2025, DOI:10.32604/cmc.2025.060260 - 16 April 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract The Quadric Error Metrics (QEM) algorithm is a widely used method for mesh simplification; however, it often struggles to preserve high-frequency geometric details, leading to the loss of salient features. To address this limitation, we propose the Salient Feature Sampling Points-based QEM (SFSP-QEM)—also referred to as the Deep Learning-Based Salient Feature-Preserving Algorithm for Mesh Simplification—which incorporates a Salient Feature-Preserving Point Sampler (SFSP). This module leverages deep learning techniques to prioritize the preservation of key geometric features during simplification. Experimental results demonstrate that SFSP-QEM significantly outperforms traditional QEM in preserving geometric details. Specifically, for general models… More >

  • Open Access

    ARTICLE

    Deep Learning Algorithm for Person Re-Identification Based on Dual Network Architecture

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2889-2905, 2025, DOI:10.32604/cmc.2025.061421 - 16 April 2025
    Abstract Changing a person’s posture and low resolution are the key challenges for person re-identification (ReID) in various deep learning applications. In this paper, we introduce an innovative architecture using a dual attention network that includes an attention module and a joint measurement module of spatial-temporal information. The proposed approach can be classified into two main tasks. Firstly, the spatial attention feature map is formed by aggregating features in the spatial dimension. Additionally, the same operation is carried out on the channel dimension to form channel attention feature maps. Therefore, the receptive field size is adjusted… More >

  • Open Access

    ARTICLE

    Bidirectional LSTM-Based Energy Consumption Forecasting: Advancing AI-Driven Cloud Integration for Cognitive City Energy Management

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2907-2926, 2025, DOI:10.32604/cmc.2025.063809 - 16 April 2025
    (This article belongs to the Special Issue: Empowered Connected Futures of AI, IoT, and Cloud Computing in the Development of Cognitive Cities)
    Abstract Efficient energy management is a cornerstone of advancing cognitive cities, where AI, IoT, and cloud computing seamlessly integrate to meet escalating global energy demands. Within this context, the ability to forecast electricity consumption with precision is vital, particularly in residential settings where usage patterns are highly variable and complex. This study presents an innovative approach to energy consumption forecasting using a bidirectional Long Short-Term Memory (LSTM) network. Leveraging a dataset containing over two million multivariate, time-series observations collected from a single household over nearly four years, our model addresses the limitations of traditional time-series forecasting… More >

  • Open Access

    ARTICLE

    Joint Watermarking and Encryption for Social Image Sharing

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2927-2946, 2025, DOI:10.32604/cmc.2025.062051 - 16 April 2025
    Abstract With the fast development of multimedia social platforms, content dissemination on social media platforms is becoming more popular. Social image sharing can also raise privacy concerns. Image encryption can protect social images. However, most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain. In this work, the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption. First, the fingerprint code with a hierarchical community structure is designed based on social network analysis. Then, discrete wavelet transform (DWT) from block discrete cosine transform (DCT) directly… More >

  • Open Access

    ARTICLE

    An Attention-Based CNN Framework for Alzheimer’s Disease Staging with Multi-Technique XAI Visualization

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2947-2969, 2025, DOI:10.32604/cmc.2025.062719 - 16 April 2025
    (This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
    Abstract Alzheimer’s disease (AD) is a significant challenge in modern healthcare, with early detection and accurate staging remaining critical priorities for effective intervention. While Deep Learning (DL) approaches have shown promise in AD diagnosis, existing methods often struggle with the issues of precision, interpretability, and class imbalance. This study presents a novel framework that integrates DL with several eXplainable Artificial Intelligence (XAI) techniques, in particular attention mechanisms, Gradient-Weighted Class Activation Mapping (Grad-CAM), and Local Interpretable Model-Agnostic Explanations (LIME), to improve both model interpretability and feature selection. The study evaluates four different DL architectures (ResMLP, VGG16, Xception, More >

  • Open Access

    ARTICLE

    Entropy-Bottleneck-Based Privacy Protection Mechanism for Semantic Communication

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2971-2988, 2025, DOI:10.32604/cmc.2025.061563 - 16 April 2025
    (This article belongs to the Special Issue: Privacy-Preserving Deep Learning and its Advanced Applications)
    Abstract With the rapid development of artificial intelligence and the Internet of Things, along with the growing demand for privacy-preserving transmission, the need for efficient and secure communication systems has become increasingly urgent. Traditional communication methods transmit data at the bit level without considering its semantic significance, leading to redundant transmission overhead and reduced efficiency. Semantic communication addresses this issue by extracting and transmitting only the most meaningful semantic information, thereby improving bandwidth efficiency. However, despite reducing the volume of data, it remains vulnerable to privacy risks, as semantic features may still expose sensitive information. To… More >

  • Open Access

    ARTICLE

    Chinese Named Entity Recognition Method for Musk Deer Domain Based on Cross-Attention Enhanced Lexicon Features

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2989-3005, 2025, DOI:10.32604/cmc.2025.063008 - 16 April 2025
    (This article belongs to the Special Issue: Advances in Deep Learning and Neural Networks: Architectures, Applications, and Challenges)
    Abstract Named entity recognition (NER) in musk deer domain is the extraction of specific types of entities from unstructured texts, constituting a fundamental component of the knowledge graph, Q&A system, and text summarization system of musk deer domain. Due to limited annotated data, diverse entity types, and the ambiguity of Chinese word boundaries in musk deer domain NER, we present a novel NER model, CAELF-GP, which is based on cross-attention mechanism enhanced lexical features (CAELF). Specifically, we employ BERT as a character encoder and advocate the integration of external lexical information at the character representation layer.… More >

  • Open Access

    ARTICLE

    Machine Learning for Smart Soil Monitoring

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3007-3023, 2025, DOI:10.32604/cmc.2025.063146 - 16 April 2025
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications)
    Abstract Environmental protection requires identifying, investigating, and raising awareness about safeguarding nature from the harmful effects of both anthropogenic and natural events. This process of environmental protection is essential for maintaining human well-being. In this context, it is critical to monitor and safeguard the personal environment, which includes maintaining a healthy diet and ensuring plant safety. Living in a balanced environment and ensuring the safety of plants for green spaces and a healthy diet require controlling the nature and quality of the soil in our environment. To ensure soil quality, it is imperative to monitor and… More >

  • Open Access

    ARTICLE

    Ordered Clustering-Based Semantic Music Recommender System Using Deep Learning Selection

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3025-3057, 2025, DOI:10.32604/cmc.2025.061343 - 16 April 2025
    Abstract Music recommendation systems are essential due to the vast amount of music available on streaming platforms, which can overwhelm users trying to find new tracks that match their preferences. These systems analyze users’ emotional responses, listening habits, and personal preferences to provide personalized suggestions. A significant challenge they face is the “cold start” problem, where new users have no past interactions to guide recommendations. To improve user experience, these systems aim to effectively recommend music even to such users by considering their listening behavior and music popularity. This paper introduces a novel music recommendation system… More >

  • Open Access

    ARTICLE

    Advancing Railway Infrastructure Monitoring: A Case Study on Railway Pole Detection

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3059-3073, 2025, DOI:10.32604/cmc.2024.057949 - 16 April 2025
    Abstract The development of artificial intelligence (AI) technologies creates a great chance for the iteration of railway monitoring. This paper proposes a comprehensive method for railway utility pole detection. The framework of this paper on railway systems consists of two parts: point cloud preprocessing and railway utility pole detection. This method overcomes the challenges of dynamic environment adaptability, reliance on lighting conditions, sensitivity to weather and environmental conditions, and visual occlusion issues present in 2D images and videos, which utilize mobile LiDAR (Laser Radar) acquisition devices to obtain point cloud data. Due to factors such as… More >

  • Open Access

    ARTICLE

    Enhancing Educational Materials: Integrating Emojis and AI Models into Learning Management Systems

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3075-3095, 2025, DOI:10.32604/cmc.2025.062360 - 16 April 2025
    Abstract The integration of visual elements, such as emojis, into educational content represents a promising approach to enhancing student engagement and comprehension. However, existing efforts in emoji integration often lack systematic frameworks capable of addressing the contextual and pedagogical nuances required for effective implementation. This paper introduces a novel framework that combines Data-Driven Error-Correcting Output Codes (DECOC), Long Short-Term Memory (LSTM) networks, and Multi-Layer Deep Neural Networks (ML-DNN) to identify optimal emoji placements within computer science course materials. The originality of the proposed system lies in its ability to leverage sentiment analysis techniques and contextual embeddings… More >

  • Open Access

    ARTICLE

    PNSS: Unknown Face Presentation Attack Detection with Pseudo Negative Sample Synthesis

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3097-3112, 2025, DOI:10.32604/cmc.2025.061019 - 16 April 2025
    (This article belongs to the Special Issue: Multimedia Security in Deep Learning)
    Abstract Face Presentation Attack Detection (fPAD) plays a vital role in securing face recognition systems against various presentation attacks. While supervised learning-based methods demonstrate effectiveness, they are prone to overfitting to known attack types and struggle to generalize to novel attack scenarios. Recent studies have explored formulating fPAD as an anomaly detection problem or one-class classification task, enabling the training of generalized models for unknown attack detection. However, conventional anomaly detection approaches encounter difficulties in precisely delineating the boundary between bonafide samples and unknown attacks. To address this challenge, we propose a novel framework focusing on… More >

  • Open Access

    ARTICLE

    A Deep Learning Framework for Arabic Cyberbullying Detection in Social Networks

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3113-3134, 2025, DOI:10.32604/cmc.2025.062724 - 16 April 2025
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract Social media has emerged as one of the most transformative developments on the internet, revolutionizing the way people communicate and interact. However, alongside its benefits, social media has also given rise to significant challenges, one of the most pressing being cyberbullying. This issue has become a major concern in modern society, particularly due to its profound negative impacts on the mental health and well-being of its victims. In the Arab world, where social media usage is exceptionally high, cyberbullying has become increasingly prevalent, necessitating urgent attention. Early detection of harmful online behavior is critical to… More >

  • Open Access

    ARTICLE

    Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3135-3163, 2025, DOI:10.32604/cmc.2025.062469 - 16 April 2025
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract Evolutionary algorithms have been extensively utilized in practical applications. However, manually designed population updating formulas are inherently prone to the subjective influence of the designer. Genetic programming (GP), characterized by its tree-based solution structure, is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems. This paper introduces a GP-based framework (GP-EAs) for the autonomous generation of update formulas, aiming to reduce human intervention. Partial modifications to tree-based GP have been instigated, encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.… More >

  • Open Access

    ARTICLE

    Leveraging Transformers for Detection of Arabic Cyberbullying on Social Media: Hybrid Arabic Transformers

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3165-3185, 2025, DOI:10.32604/cmc.2025.061674 - 16 April 2025
    Abstract Cyberbullying is a remarkable issue in the Arabic-speaking world, affecting children, organizations, and businesses. Various efforts have been made to combat this problem through proposed models using machine learning (ML) and deep learning (DL) approaches utilizing natural language processing (NLP) methods and by proposing relevant datasets. However, most of these endeavors focused predominantly on the English language, leaving a substantial gap in addressing Arabic cyberbullying. Given the complexities of the Arabic language, transfer learning techniques and transformers present a promising approach to enhance the detection and classification of abusive content by leveraging large and pretrained… More >

  • Open Access

    ARTICLE

    End-to-End Audio Pattern Recognition Network for Overcoming Feature Limitations in Human-Machine Interaction

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3187-3210, 2025, DOI:10.32604/cmc.2025.061920 - 16 April 2025
    Abstract In recent years, audio pattern recognition has emerged as a key area of research, driven by its applications in human-computer interaction, robotics, and healthcare. Traditional methods, which rely heavily on handcrafted features such as Mel filters, often suffer from information loss and limited feature representation capabilities. To address these limitations, this study proposes an innovative end-to-end audio pattern recognition framework that directly processes raw audio signals, preserving original information and extracting effective classification features. The proposed framework utilizes a dual-branch architecture: a global refinement module that retains channel and temporal details and a multi-scale embedding… More >

  • Open Access

    ARTICLE

    Deep Learning Based Online Defect Detection Method for Automotive Sealing Rings

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3211-3226, 2025, DOI:10.32604/cmc.2025.059389 - 16 April 2025
    Abstract Manufacturers must identify and classify various defects in automotive sealing rings to ensure product quality. Deep learning algorithms show promise in this field, but challenges remain, especially in detecting small-scale defects under harsh industrial conditions with multimodal data. This paper proposes an enhanced version of You Only Look Once (YOLO)v8 for improved defect detection in automotive sealing rings. We introduce the Multi-scale Adaptive Feature Extraction (MAFE) module, which integrates Deformable Convolutional Network (DCN) and Space-to-Depth (SPD) operations. This module effectively captures long-range dependencies, enhances spatial aggregation, and minimizes information loss of small objects during feature More >

  • Open Access

    ARTICLE

    Leveraging Edge Optimize Vision Transformer for Monkeypox Lesion Diagnosis on Mobile Devices

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3227-3245, 2025, DOI:10.32604/cmc.2025.062376 - 16 April 2025
    (This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
    Abstract Rapid and precise diagnostic tools for Monkeypox (Mpox) lesions are crucial for effective treatment because their symptoms are similar to those of other pox-related illnesses, like smallpox and chickenpox. The morphological similarities between smallpox, chickenpox, and monkeypox, particularly in how they appear as rashes and skin lesions, which can sometimes make diagnosis challenging. Chickenpox lesions appear in many simultaneous phases and are more diffuse, often beginning on the trunk. In contrast, monkeypox lesions emerge progressively and are typically centralized on the face, palms, and soles. To provide accessible diagnostics, this study introduces a novel method… More >

  • Open Access

    ARTICLE

    A Chinese Named Entity Recognition Method for News Domain Based on Transfer Learning and Word Embeddings

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3247-3275, 2025, DOI:10.32604/cmc.2025.060422 - 16 April 2025
    Abstract Named Entity Recognition (NER) is vital in natural language processing for the analysis of news texts, as it accurately identifies entities such as locations, persons, and organizations, which is crucial for applications like news summarization and event tracking. However, NER in the news domain faces challenges due to insufficient annotated data, complex entity structures, and strong context dependencies. To address these issues, we propose a new Chinese-named entity recognition method that integrates transfer learning with word embeddings. Our approach leverages the ERNIE pre-trained model for transfer learning and obtaining general language representations and incorporates the More >

  • Open Access

    ARTICLE

    Event-Driven Attention Network: A Cross-Modal Framework for Efficient Image-Text Retrieval in Mass Gathering Events

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3277-3301, 2025, DOI:10.32604/cmc.2025.061037 - 16 April 2025
    Abstract Research on mass gathering events is critical for ensuring public security and maintaining social order. However, most of the existing works focus on crowd behavior analysis areas such as anomaly detection and crowd counting, and there is a relative lack of research on mass gathering behaviors. We believe real-time detection and monitoring of mass gathering behaviors are essential for migrating potential security risks and emergencies. Therefore, it is imperative to develop a method capable of accurately identifying and localizing mass gatherings before disasters occur, enabling prompt and effective responses. To address this problem, we propose… More >

  • Open Access

    ARTICLE

    UltraSegNet: A Hybrid Deep Learning Framework for Enhanced Breast Cancer Segmentation and Classification on Ultrasound Images

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3303-3333, 2025, DOI:10.32604/cmc.2025.063470 - 16 April 2025
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications)
    Abstract Segmenting a breast ultrasound image is still challenging due to the presence of speckle noise, dependency on the operator, and the variation of image quality. This paper presents the UltraSegNet architecture that addresses these challenges through three key technical innovations: This work adds three things: (1) a changed ResNet-50 backbone with sequential 3 convolutions to keep fine anatomical details that are needed for finding lesion boundaries; (2) a computationally efficient regional attention mechanism that works on high-resolution features without using a transformer’s extra memory; and (3) an adaptive feature fusion strategy that changes local and… More >

  • Open Access

    ARTICLE

    SA-ResNet: An Intrusion Detection Method Based on Spatial Attention Mechanism and Residual Neural Network Fusion

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3335-3350, 2025, DOI:10.32604/cmc.2025.061206 - 16 April 2025
    Abstract The rapid development and widespread adoption of Internet technology have significantly increased Internet traffic, highlighting the growing importance of network security. Intrusion Detection Systems (IDS) are essential for safeguarding network integrity. To address the low accuracy of existing intrusion detection models in identifying network attacks, this paper proposes an intrusion detection method based on the fusion of Spatial Attention mechanism and Residual Neural Network (SA-ResNet). Utilizing residual connections can effectively capture local features in the data; by introducing a spatial attention mechanism, the global dependency relationships of intrusion features can be extracted, enhancing the intrusion More >

  • Open Access

    ARTICLE

    Deepfake Detection Method Based on Spatio-Temporal Information Fusion

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3351-3368, 2025, DOI:10.32604/cmc.2025.062922 - 16 April 2025
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract As Deepfake technology continues to evolve, the distinction between real and fake content becomes increasingly blurred. Most existing Deepfake video detection methods rely on single-frame facial image features, which limits their ability to capture temporal differences between frames. Current methods also exhibit limited generalization capabilities, struggling to detect content generated by unknown forgery algorithms. Moreover, the diversity and complexity of forgery techniques introduced by Artificial Intelligence Generated Content (AIGC) present significant challenges for traditional detection frameworks, which must balance high detection accuracy with robust performance. To address these challenges, we propose a novel Deepfake detection… More >

  • Open Access

    ARTICLE

    A Comparative Study of Optimized-LSTM Models Using Tree-Structured Parzen Estimator for Traffic Flow Forecasting in Intelligent Transportation

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3369-3388, 2025, DOI:10.32604/cmc.2025.060474 - 16 April 2025
    Abstract Traffic forecasting with high precision aids Intelligent Transport Systems (ITS) in formulating and optimizing traffic management strategies. The algorithms used for tuning the hyperparameters of the deep learning models often have accurate results at the expense of high computational complexity. To address this problem, this paper uses the Tree-structured Parzen Estimator (TPE) to tune the hyperparameters of the Long Short-term Memory (LSTM) deep learning framework. The Tree-structured Parzen Estimator (TPE) uses a probabilistic approach with an adaptive searching mechanism by classifying the objective function values into good and bad samples. This ensures fast convergence in… More >

  • Open Access

    ARTICLE

    VPM-Net: Person Re-ID Network Based on Visual Prompt Technology and Multi-Instance Negative Pooling

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3389-3410, 2025, DOI:10.32604/cmc.2025.060783 - 16 April 2025
    (This article belongs to the Special Issue: Machine Vision Detection and Intelligent Recognition, 2nd Edition)
    Abstract With the rapid development of intelligent video surveillance technology, pedestrian re-identification has become increasingly important in multi-camera surveillance systems. This technology plays a critical role in enhancing public safety. However, traditional methods typically process images and text separately, applying upstream models directly to downstream tasks. This approach significantly increases the complexity of model training and computational costs. Furthermore, the common class imbalance in existing training datasets limits model performance improvement. To address these challenges, we propose an innovative framework named Person Re-ID Network Based on Visual Prompt Technology and Multi-Instance Negative Pooling (VPM-Net). First, we… More >

  • Open Access

    ARTICLE

    Optimizing Forecast Accuracy in Cryptocurrency Markets: Evaluating Feature Selection Techniques for Technical Indicators

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3411-3433, 2025, DOI:10.32604/cmc.2025.063218 - 16 April 2025
    Abstract This study provides a systematic investigation into the influence of feature selection methods on cryptocurrency price forecasting models employing technical indicators. In this work, over 130 technical indicators—covering momentum, volatility, volume, and trend-related technical indicators—are subjected to three distinct feature selection approaches. Specifically, mutual information (MI), recursive feature elimination (RFE), and random forest importance (RFI). By extracting an optimal set of 20 predictors, the proposed framework aims to mitigate redundancy and overfitting while enhancing interpretability. These feature subsets are integrated into support vector regression (SVR), Huber regressors, and k-nearest neighbors (KNN) models to forecast the… More >

  • Open Access

    ARTICLE

    A Transformer Based on Feedback Attention Mechanism for Diagnosis of Coronary Heart Disease Using Echocardiographic Images

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3435-3450, 2025, DOI:10.32604/cmc.2025.060212 - 16 April 2025
    (This article belongs to the Special Issue: Cutting-Edge Machine Learning and AI Innovations in Medical Imaging Diagnosis)
    Abstract Coronary artery disease is a highly lethal cardiovascular condition, making early diagnosis crucial for patients. Echocardiograph is employed to identify coronary heart disease (CHD). However, due to issues such as fuzzy object boundaries, complex tissue structures, and motion artifacts in ultrasound images, it is challenging to detect CHD accurately. This paper proposes an improved Transformer model based on the Feedback Self-Attention Mechanism (FSAM) for classification of ultrasound images. The model enhances attention weights, making it easier to capture complex features. Experimental results show that the proposed method achieves high levels of accuracy, recall, precision, F1 More >

  • Open Access

    ARTICLE

    DDT-Net: Deep Detail Tracking Network for Image Tampering Detection

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3451-3469, 2025, DOI:10.32604/cmc.2025.061006 - 16 April 2025
    (This article belongs to the Special Issue: Data and Image Processing in Intelligent Information Systems)
    Abstract In the field of image forensics, image tampering detection is a critical and challenging task. Traditional methods based on manually designed feature extraction typically focus on a specific type of tampering operation, which limits their effectiveness in complex scenarios involving multiple forms of tampering. Although deep learning-based methods offer the advantage of automatic feature learning, current approaches still require further improvements in terms of detection accuracy and computational efficiency. To address these challenges, this study applies the U-Net 3+ model to image tampering detection and proposes a hybrid framework, referred to as DDT-Net (Deep Detail… More >

  • Open Access

    ARTICLE

    Leveraging Unlabeled Corpus for Arabic Dialect Identification

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3471-3491, 2025, DOI:10.32604/cmc.2025.059870 - 16 April 2025
    Abstract Arabic Dialect Identification (DID) is a task in Natural Language Processing (NLP) that involves determining the dialect of a given piece of text in Arabic. The state-of-the-art solutions for DID are built on various deep neural networks that commonly learn the representation of sentences in response to a given dialect. Despite the effectiveness of these solutions, the performance heavily relies on the amount of labeled examples, which is labor-intensive to attain and may not be readily available in real-world scenarios. To alleviate the burden of labeling data, this paper introduces a novel solution that leverages… More >

  • Open Access

    ARTICLE

    Multimodal Gas Detection Using E-Nose and Thermal Images: An Approach Utilizing SRGAN and Sparse Autoencoder

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3493-3517, 2025, DOI:10.32604/cmc.2025.060764 - 16 April 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Electronic nose and thermal images are effective ways to diagnose the presence of gases in real-time real-time. Multimodal fusion of these modalities can result in the development of highly accurate diagnostic systems. The low-cost thermal imaging software produces low-resolution thermal images in grayscale format, hence necessitating methods for improving the resolution and colorizing the images. The objective of this paper is to develop and train a super-resolution generative adversarial network for improving the resolution of the thermal images, followed by a sparse autoencoder for colorization of thermal images and a multimodal convolutional neural network for… More >

  • Open Access

    ARTICLE

    Optimizing System Latency for Blockchain-Encrypted Edge Computing in Internet of Vehicles

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3519-3536, 2025, DOI:10.32604/cmc.2025.061292 - 16 April 2025
    (This article belongs to the Special Issue: Advanced Communication and Networking Technologies for Internet of Things and Internet of Vehicles)
    Abstract As Internet of Vehicles (IoV) technology continues to advance, edge computing has become an important tool for assisting vehicles in handling complex tasks. However, the process of offloading tasks to edge servers may expose vehicles to malicious external attacks, resulting in information loss or even tampering, thereby creating serious security vulnerabilities. Blockchain technology can maintain a shared ledger among servers. In the Raft consensus mechanism, as long as more than half of the nodes remain operational, the system will not collapse, effectively maintaining the system’s robustness and security. To protect vehicle information, we propose a… More >

  • Open Access

    ARTICLE

    A Task Offloading Method for Vehicular Edge Computing Based on Reputation Assessment

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3537-3552, 2025, DOI:10.32604/cmc.2025.059325 - 16 April 2025
    Abstract With the development of vehicle networks and the construction of roadside units, Vehicular Ad Hoc Networks (VANETs) are increasingly promoting cooperative computing patterns among vehicles. Vehicular edge computing (VEC) offers an effective solution to mitigate resource constraints by enabling task offloading to edge cloud infrastructure, thereby reducing the computational burden on connected vehicles. However, this sharing-based and distributed computing paradigm necessitates ensuring the credibility and reliability of various computation nodes. Existing vehicular edge computing platforms have not adequately considered the misbehavior of vehicles. We propose a practical task offloading algorithm based on reputation assessment to More >

  • Open Access

    ARTICLE

    Utilizing Machine Learning and SHAP Values for Improved and Transparent Energy Usage Predictions

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3553-3583, 2025, DOI:10.32604/cmc.2025.061400 - 16 April 2025
    Abstract The significance of precise energy usage forecasts has been highlighted by the increasing need for sustainability and energy efficiency across a range of industries. In order to improve the precision and openness of energy consumption projections, this study investigates the combination of machine learning (ML) methods with Shapley additive explanations (SHAP) values. The study evaluates three distinct models: the first is a Linear Regressor, the second is a Support Vector Regressor, and the third is a Decision Tree Regressor, which was scaled up to a Random Forest Regressor/Additions made were the third one which was… More >

Copyright © 2025 The Author(s). Published by Tech Science Press.

Share Link