Home / Journals / CMC / Online First
Special Issues
Table of Content
  • Open Access

    ARTICLE

    Adaptive Resource Allocation Algorithm for 5G Vehicular Cloud Communication

    Huanhuan Li1,2,*, Hongchang Wei2, Zheliang Chen2, Yue Xu3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052155
    (This article belongs to the Special Issue: Advanced Communication and Networking Technologies for Internet of Things and Internet of Vehicles)
    Abstract The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges, such as low user utilization, unbalanced resource allocation, and extended adaptive allocation time. We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues. This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components. It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes. Furthermore, this study analyzes the single-hop and multi-hop modes in… More >

  • Open Access

    ARTICLE

    Application of Stork Optimization Algorithm for Solving Sustainable Lot Size Optimization

    Tareq Hamadneh1, Khalid Kaabneh2, Omar Alssayed3, Gulnara Bektemyssova4,*, Galymzhan Shaikemelev4, Dauren Umutkulov4, Zoubida Benmamoun5, Zeinab Monrazeri6, Mohammad Dehghani6,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052401
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract The efficiency of businesses is often hindered by the challenges encountered in traditional Supply Chain Management (SCM), which is characterized by elevated risks due to inadequate accountability and transparency. To address these challenges and improve operations in green manufacturing, optimization algorithms play a crucial role in supporting decision-making processes. In this study, we propose a solution to the green lot size optimization issue by leveraging bio-inspired algorithms, notably the Stork Optimization Algorithm (SOA). The SOA draws inspiration from the hunting and winter migration strategies employed by storks in nature. The theoretical framework of SOA is… More >

  • Open Access

    ARTICLE

    Software Vulnerability Mining and Analysis Based on Deep Learning

    Shibin Zhao*, Junhu Zhu, Jianshan Peng
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.041949
    (This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
    Abstract In recent years, the rapid development of computer software has led to numerous security problems, particularly software vulnerabilities. These flaws can cause significant harm to users’ privacy and property. Current security defect detection technology relies on manual or professional reasoning, leading to missed detection and high false detection rates. Artificial intelligence technology has led to the development of neural network models based on machine learning or deep learning to intelligently mine holes, reducing missed alarms and false alarms. So, this project aims to study Java source code defect detection methods for defects like null pointer… More >

  • Open Access

    ARTICLE

    Sec-Auditor: A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness

    Guodong Han, Hecheng Li*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.053077
    (This article belongs to the Special Issue: Trustworthy Wireless Computing Power Networks Assisted by Blockchain)
    Abstract Currently, there is a growing trend among users to store their data in the cloud. However, the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks. Additionally, when users perform file operations, the semantic integrity of the data can be compromised. Ensuring both data integrity and semantic correctness has become a critical issue that requires attention. We introduce a pioneering solution called Sec-Auditor, the first of its kind with the ability to verify data integrity and semantic correctness simultaneously, while maintaining a constant communication cost independent of the audited… More >

  • Open Access

    ARTICLE

    SNR and RSSI Based an Optimized Machine Learning Based Indoor Localization Approach: Multistory Round Building Scenario over LoRa Network

    Muhammad Ayoub Kamal1,3, Muhammad Mansoor Alam1,2,4,6, Aznida Abu Bakar Sajak1, Mazliham Mohd Su’ud2,5,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052169
    Abstract In situations when the precise position of a machine is unknown, localization becomes crucial. This research focuses on improving the position prediction accuracy over long-range (LoRa) network using an optimized machine learning-based technique. In order to increase the prediction accuracy of the reference point position on the data collected using the fingerprinting method over LoRa technology, this study proposed an optimized machine learning (ML) based algorithm. Received signal strength indicator (RSSI) data from the sensors at different positions was first gathered via an experiment through the LoRa network in a multistory round layout building. The More >

  • Open Access

    ARTICLE

    A Shared Natural Neighbors Based-Hierarchical Clustering Algorithm for Discovering Arbitrary-Shaped Clusters

    Zhongshang Chen, Ji Feng*, Fapeng Cai, Degang Yang
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052114
    (This article belongs to the Special Issue: Advanced Data Mining Techniques: Security, Intelligent Systems and Applications)
    Abstract In clustering algorithms, the selection of neighbors significantly affects the quality of the final clustering results. While various neighbor relationships exist, such as K-nearest neighbors, natural neighbors, and shared neighbors, most neighbor relationships can only handle single structural relationships, and the identification accuracy is low for datasets with multiple structures. In life, people’s first instinct for complex things is to divide them into multiple parts to complete. Partitioning the dataset into more sub-graphs is a good idea approach to identifying complex structures. Taking inspiration from this, we propose a novel neighbor method: Shared Natural Neighbors (SNaN). More >

  • Open Access

    ARTICLE

    Two-Stage IoT Computational Task Offloading Decision-Making in MEC with Request Holding and Dynamic Eviction

    Dayong Wang1,*, Kamalrulnizam Bin Abu Bakar1, Babangida Isyaku2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051944
    (This article belongs to the Special Issue: Intelligent Management and Machine Learning for Big Data in IoT-Enabled Pervasive Computing)
    Abstract The rapid development of Internet of Things (IoT) technology has led to a significant increase in the computational task load of Terminal Devices (TDs). TDs reduce response latency and energy consumption with the support of task-offloading in Multi-access Edge Computing (MEC). However, existing task-offloading optimization methods typically assume that MEC’s computing resources are unlimited, and there is a lack of research on the optimization of task-offloading when MEC resources are exhausted. In addition, existing solutions only decide whether to accept the offloaded task request based on the single decision result of the current time slot,… More >

  • Open Access

    ARTICLE

    Multi-Level Image Segmentation Combining Chaotic Initialized Chimp Optimization Algorithm and Cauchy Mutation

    Shujing Li, Zhangfei Li, Wenhui Cheng, Chenyang Qi, Linguo Li*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051928
    Abstract To enhance the diversity and distribution uniformity of initial population, as well as to avoid local extrema in the Chimp Optimization Algorithm (CHOA), this paper improves the CHOA based on chaos initialization and Cauchy mutation. First, Sin chaos is introduced to improve the random population initialization scheme of the CHOA, which not only guarantees the diversity of the population, but also enhances the distribution uniformity of the initial population. Next, Cauchy mutation is added to optimize the global search ability of the CHOA in the process of position (threshold) updating to avoid the CHOA falling More >

  • Open Access

    ARTICLE

    IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN

    Yanhua Liu1,2,3, Yuting Han1,2,3, Hui Chen1,2,3, Baokang Zhao4,*, Xiaofeng Wang4, Ximeng Liu1,2,3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051194
    (This article belongs to the Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract As the scale of the networks continually expands, the detection of distributed denial of service (DDoS) attacks has become increasingly vital. We propose an intelligent detection model named IGED by using improved generalized entropy and deep neural network (DNN). The initial detection is based on improved generalized entropy to filter out as much normal traffic as possible, thereby reducing data volume. Then the fine detection is based on DNN to perform precise DDoS detection on the filtered suspicious traffic, enhancing the neural network’s generalization capabilities. Experimental results show that the proposed method can efficiently distinguish More >

  • Open Access

    ARTICLE

    Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies

    Waseem Akram1, Khalid Mahmood2, Hafiz Burhan ul Haq3, Muhammad Asif3, Shehzad Ashraf Chaudhry4,5, Taeshik Shon6,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052405
    Abstract Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol (HTTP) requests and maintains the states of clients’ information over the Internet. HTTP cookies are exploited to carry client patterns observed by a website. These client patterns facilitate the particular client’s future visit to the corresponding website. However, security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser. Several protocols have been introduced that maintain HTTP cookies, but many of those fail to achieve More >

  • Open Access

    ARTICLE

    Personalized Lower Limb Gait Reconstruction Modeling Based on RFA-ProMP

    Chunhong Zeng, Kang Lu, Zhiqin He*, Qinmu Wu
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051551
    (This article belongs to the Special Issue: Intelligent Manufacturing, Robotics and Control Engineering)
    Abstract Personalized gait curves are generated to enhance patient adaptability to gait trajectories used for passive training in the early stage of rehabilitation for hemiplegic patients. The article utilizes the random forest algorithm to construct a gait parameter model, which maps the relationship between parameters such as height, weight, age, gender, and gait speed, achieving prediction of key points on the gait curve. To enhance prediction accuracy, an attention mechanism is introduced into the algorithm to focus more on the main features. Meanwhile, to ensure high similarity between the reconstructed gait curve and the normal one, More >

  • Open Access

    ARTICLE

    Fake News Detection Based on Cross-Modal Message Aggregation and Gated Fusion Network

    Fangfang Shan1,2,*, Mengyao Liu1,2, Menghan Zhang1,2, Zhenyu Wang1,2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.053937
    Abstract Social media has become increasingly significant in modern society, but it has also turned into a breeding ground for the propagation of misleading information, potentially causing a detrimental impact on public opinion and daily life. Compared to pure text content, multmodal content significantly increases the visibility and share ability of posts. This has made the search for efficient modality representations and cross-modal information interaction methods a key focus in the field of multimodal fake news detection. To effectively address the critical challenge of accurately detecting fake news on social media, this paper proposes a fake… More >

  • Open Access

    ARTICLE

    Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images

    Roseline Oluwaseun Ogundokun1,2, Joseph Bamidele Awotunde3, Hakeem Babalola Akande4, Cheng-Chi Lee5,6,*, Agbotiname Lucky Imoize7,8
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052153
    Abstract Mobile technology is developing significantly. Mobile phone technologies have been integrated into the healthcare industry to help medical practitioners. Typically, computer vision models focus on image detection and classification issues. MobileNetV2 is a computer vision model that performs well on mobile devices, but it requires cloud services to process biometric image information and provide predictions to users. This leads to increased latency. Processing biometrics image datasets on mobile devices will make the prediction faster, but mobiles are resource-restricted devices in terms of storage, power, and computational speed. Hence, a model that is small in size,… More >

  • Open Access

    ARTICLE

    Dynamic Offloading and Scheduling Strategy for Telematics Tasks Based on Latency Minimization

    Yu Zhou1, Yun Zhang1, Guowei Li1, Hang Yang1, Wei Zhang1, Ting Lyu2, Yueqiang Xu2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050975
    (This article belongs to the Special Issue: Advanced Communication and Networking Technologies for Internet of Things and Internet of Vehicles)
    Abstract In current research on task offloading and resource scheduling in vehicular networks, vehicles are commonly assumed to maintain constant speed or relatively stationary states, and the impact of speed variations on task offloading is often overlooked. It is frequently assumed that vehicles can be accurately modeled during actual motion processes. However, in vehicular dynamic environments, both the tasks generated by the vehicles and the vehicles’ surroundings are constantly changing, making it difficult to achieve real-time modeling for actual dynamic vehicular network scenarios. Taking into account the actual dynamic vehicular scenarios, this paper considers the real-time… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning and Machine Learning-Based Approach to Classify Defects in Hot Rolled Steel Strips for Smart Manufacturing

    Tajmal Hussain, Jungpyo Hong*, Jongwon Seok*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050884
    (This article belongs to the Special Issue: Advanced Artificial Intelligence and Machine Learning Frameworks for Signal and Image Processing Applications)
    Abstract Smart manufacturing is a process that optimizes factory performance and production quality by utilizing various technologies including the Internet of Things (IoT) and artificial intelligence (AI). Quality control is an important part of today’s smart manufacturing process, effectively reducing costs and enhancing operational efficiency. As technology in the industry becomes more advanced, identifying and classifying defects has become an essential element in ensuring the quality of products during the manufacturing process. In this study, we introduce a CNN model for classifying defects on hot-rolled steel strip surfaces using hybrid deep learning techniques, incorporating a global… More >

  • Open Access

    ARTICLE

    A Prediction-Based Multi-Objective VM Consolidation Approach for Cloud Data Centers

    Xialin Liu1,2,3,*, Junsheng Wu4, Lijun Chen2,3, Jiyuan Hu5
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050626
    Abstract Virtual machine (VM) consolidation aims to run VMs on the least number of physical machines (PMs). The optimal consolidation significantly reduces energy consumption (EC), quality of service (QoS) in applications, and resource utilization. This paper proposes a prediction-based multi-objective VM consolidation approach to search for the best mapping between VMs and PMs with good timeliness and practical value. We use a hybrid model based on Auto-Regressive Integrated Moving Average (ARIMA) and Support Vector Regression (SVR) (HPAS) as a prediction model and consolidate VMs to PMs based on prediction results by HPAS, aiming at minimizing the More >

  • Open Access

    ARTICLE

    CRBFT: A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains

    Xiangyu Wu1, Xuehui Du1,*, Qiantao Yang1,2, Aodi Liu1, Na Wang1, Wenjuan Wang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052708
    Abstract Blockchain has been widely used in finance, the Internet of Things (IoT), supply chains, and other scenarios as a revolutionary technology. Consensus protocol plays a vital role in blockchain, which helps all participants to maintain the storage state consistently. However, with the improvement of network environment complexity and system scale, blockchain development is limited by the performance, security, and scalability of the consensus protocol. To address this problem, this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance (PBFT) and proposes a Byzantine fault-tolerant (BFT) consensus… More >

  • Open Access

    ARTICLE

    Knowledge Reasoning Method Based on Deep Transfer Reinforcement Learning: DTRLpath

    Shiming Lin1,2,3, Ling Ye2, Yijie Zhuang1, Lingyun Lu2,*, Shaoqiu Zheng2,*, Chenxi Huang1, Ng Yin Kwee4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051379
    Abstract In recent years, with the continuous development of deep learning and knowledge graph reasoning methods, more and more researchers have shown great interest in improving knowledge graph reasoning methods by inferring missing facts through reasoning. By searching paths on the knowledge graph and making fact and link predictions based on these paths, deep learning-based Reinforcement Learning (RL) agents can demonstrate good performance and interpretability. Therefore, deep reinforcement learning-based knowledge reasoning methods have rapidly emerged in recent years and have become a hot research topic. However, even in a small and fixed knowledge graph reasoning action… More >

  • Open Access

    REVIEW

    An Integrated Analysis of Yield Prediction Models: A Comprehensive Review of Advancements and Challenges

    Nidhi Parashar1, Prashant Johri1, Arfat Ahmad Khan5, Nitin Gaur1, Seifedine Kadry2,3,4,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050240
    Abstract The growing global requirement for food and the need for sustainable farming in an era of a changing climate and scarce resources have inspired substantial crop yield prediction research. Deep learning (DL) and machine learning (ML) models effectively deal with such challenges. This research paper comprehensively analyses recent advancements in crop yield prediction from January 2016 to March 2024. In addition, it analyses the effectiveness of various input parameters considered in crop yield prediction models. We conducted an in-depth search and gathered studies that employed crop modeling and AI-based methods to predict crop yield. The… More >

  • Open Access

    REVIEW

    Open-Source Software Defined Networking Controllers: State-of-the-Art, Challenges and Solutions for Future Network Providers

    Johari Abdul Rahim1, Rosdiadee Nordin2,*, Oluwatosin Ahmed Amodu3,4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.047009
    Abstract Software Defined Networking (SDN) is programmable by separation of forwarding control through the centralization of the controller. The controller plays the role of the ‘brain’ that dictates the intelligent part of SDN technology. Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them. There are several SDN controllers available in the open market besides a large number of commercial controllers; some are developed to meet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System (ONOS). This paper… More >

  • Open Access

    ARTICLE

    Two Stages Segmentation Algorithm of Breast Tumor in DCE-MRI Based on Multi-Scale Feature and Boundary Attention Mechanism

    Bing Li1,2,*, Liangyu Wang1, Xia Liu1,2, Hongbin Fan1, Bo Wang3, Shoudi Tong1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052009
    (This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
    Abstract Nuclear magnetic resonance imaging of breasts often presents complex backgrounds. Breast tumors exhibit varying sizes, uneven intensity, and indistinct boundaries. These characteristics can lead to challenges such as low accuracy and incorrect segmentation during tumor segmentation. Thus, we propose a two-stage breast tumor segmentation method leveraging multi-scale features and boundary attention mechanisms. Initially, the breast region of interest is extracted to isolate the breast area from surrounding tissues and organs. Subsequently, we devise a fusion network incorporating multi-scale features and boundary attention mechanisms for breast tumor segmentation.We incorporate multi-scale parallel dilated convolution modules into the… More >

  • Open Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051307
    (This article belongs to the Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open Access

    ARTICLE

    Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051996
    Abstract This study describes improving network security by implementing and assessing an intrusion detection system (IDS) based on deep neural networks (DNNs). The paper investigates contemporary technical ways for enhancing intrusion detection performance, given the vital relevance of safeguarding computer networks against harmful activity. The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset, a popular benchmark for IDS research. The model performs well in both the training and validation stages, with 91.30% training accuracy and 94.38% validation accuracy. Thus, the model shows good learning and generalization capabilities with minor losses of… More >

  • Open Access

    ARTICLE

    Orbit Weighting Scheme in the Context of Vector Space Information Retrieval

    Ahmad Ababneh1, Yousef Sanjalawe2, Salam Fraihat3,*, Salam Al-E’mari4, Hamzah Alqudah5
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050600
    Abstract This study introduces the Orbit Weighting Scheme (OWS), a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval (IR) models, which have traditionally relied on weighting schemes like tf-idf and BM25. These conventional methods often struggle with accurately capturing document relevance, leading to inefficiencies in both retrieval performance and index size management. OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space, emphasizing term relationships and distribution patterns overlooked by existing models. Our research focuses on evaluating OWS’s impact… More >

  • Open Access

    ARTICLE

    KGTLIR: An Air Target Intention Recognition Model Based on Knowledge Graph and Deep Learning

    Bo Cao1,*, Qinghua Xing2, Longyue Li2, Huaixi Xing1, Zhanfu Song1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052842
    Abstract As a core part of battlefield situational awareness, air target intention recognition plays an important role in modern air operations. Aiming at the problems of insufficient feature extraction and misclassification in intention recognition, this paper designs an air target intention recognition method (KGTLIR) based on Knowledge Graph and Deep Learning. Firstly, the intention recognition model based on Deep Learning is constructed to mine the temporal relationship of intention features using dilated causal convolution and the spatial relationship of intention features using a graph attention mechanism. Meanwhile, the accuracy, recall, and F1-score after iteration are introduced More >

  • Open Access

    ARTICLE

    Sentiment Analysis Using E-Commerce Review Keyword-Generated Image with a Hybrid Machine Learning-Based Model

    Jiawen Li1,2, Yuesheng Huang1, Yayi Lu1, Leijun Wang1,*, Yongqi Ren1, Rongjun Chen1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052666
    Abstract In the context of the accelerated pace of daily life and the development of e-commerce, online shopping is a mainstream way for consumers to access products and services. To understand their emotional expressions in facing different shopping experience scenarios, this paper presents a sentiment analysis method that combines the e-commerce review keyword-generated image with a hybrid machine learning-based model, in which the Word2Vec-TextRank is used to extract keywords that act as the inputs for generating the related images by generative Artificial Intelligence (AI). Subsequently, a hybrid Convolutional Neural Network and Support Vector Machine (CNN-SVM) model… More >

  • Open Access

    ARTICLE

    EDU-GAN: Edge Enhancement Generative Adversarial Networks with Dual-Domain Discriminators for Inscription Images Denoising

    Yunjing Liu1,, Erhu Zhang1,2,,*, Jingjing Wang3, Guangfeng Lin2, Jinghong Duan4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052611
    Abstract Recovering high-quality inscription images from unknown and complex inscription noisy images is a challenging research issue. Different from natural images, character images pay more attention to stroke information. However, existing models mainly consider pixel-level information while ignoring structural information of the character, such as its edge and glyph, resulting in reconstructed images with mottled local structure and character damage. To solve these problems, we propose a novel generative adversarial network (GAN) framework based on an edge-guided generator and a discriminator constructed by a dual-domain U-Net framework, i.e., EDU-GAN. Unlike existing frameworks, the generator introduces the… More >

  • Open Access

    ARTICLE

    Enhancing AI System Privacy: An Automatic Tool for Achieving GDPR Compliance in NoSQL Databases

    Yifei Zhao, Zhaohui Li, Siyi Lv*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052310
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract The EU’s Artificial Intelligence Act (AI Act) imposes requirements for the privacy compliance of AI systems. AI systems must comply with privacy laws such as the GDPR when providing services. These laws provide users with the right to issue a Data Subject Access Request (DSAR). Responding to such requests requires database administrators to identify information related to an individual accurately. However, manual compliance poses significant challenges and is error-prone. Database administrators need to write queries through time-consuming labor. The demand for large amounts of data by AI systems has driven the development of NoSQL databases.… More >

  • Open Access

    ARTICLE

    YOLO-O2E: A Variant YOLO Model for Anomalous Rail Fastening Detection

    Zhuhong Chu1, Jianxun Zhang1,*, Chengdong Wang2, Changhui Yang3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052269
    (This article belongs to the Special Issue: The Latest Deep Learning Architectures for Artificial Intelligence Applications)
    Abstract Rail fasteners are a crucial component of the railway transportation safety system. These fasteners, distinguished by their high length-to-width ratio, frequently encounter elevated failure rates, necessitating manual inspection and maintenance. Manual inspection not only consumes time but also poses the risk of potential oversights. With the advancement of deep learning technology in rail fasteners, challenges such as the complex background of rail fasteners and the similarity in their states are addressed. We have proposed an efficient and high-precision rail fastener detection algorithm, named YOLO-O2E (you only look once-O2E). Firstly, we propose the EFOV (Enhanced Field… More >

  • Open Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052070
    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

  • Open Access

    ARTICLE

    Phishing Attacks Detection Using Ensemble Machine Learning Algorithms

    Nisreen Innab1, Ahmed Abdelgader Fadol Osman2, Mohammed Awad Mohammed Ataelfadiel2, Marwan Abu-Zanona3,*, Bassam Mohammad Elzaghmouri4, Farah H. Zawaideh5, Mouiad Fadeil Alawneh6
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051778
    Abstract Phishing, an Internet fraud where individuals are deceived into revealing critical personal and account information, poses a significant risk to both consumers and web-based institutions. Data indicates a persistent rise in phishing attacks. Moreover, these fraudulent schemes are progressively becoming more intricate, thereby rendering them more challenging to identify. Hence, it is imperative to utilize sophisticated algorithms to address this issue. Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors. Machine learning (ML) approaches can identify common characteristics in most phishing assaults. In this paper, we propose an ensemble approach… More >

  • Open Access

    ARTICLE

    Wild Gibbon Optimization Algorithm

    Jia Guo1,2,4,6, Jin Wang2, Ke Yan3, Qiankun Zuo1,2,4,*, Ruiheng Li1,2,4, Zhou He1,2,4, Dong Wang5, Yuji Sato6
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051336
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract Complex optimization problems hold broad significance across numerous fields and applications. However, as the dimensionality of such problems increases, issues like the curse of dimensionality and local optima trapping also arise. To address these challenges, this paper proposes a novel Wild Gibbon Optimization Algorithm (WGOA) based on an analysis of wild gibbon population behavior. WGOA comprises two strategies: community search and community competition. The community search strategy facilitates information exchange between two gibbon families, generating multiple candidate solutions to enhance algorithm diversity. Meanwhile, the community competition strategy reselects leaders for the population after each iteration, More >

  • Open Access

    ARTICLE

    SMSTracker: A Self-Calibration Multi-Head Self-Attention Transformer for Visual Object Tracking

    Zhongyang Wang, Hu Zhu, Feng Liu*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050959
    (This article belongs to the Special Issue: Recognition Tasks with Transformers)
    Abstract Visual object tracking plays a crucial role in computer vision. In recent years, researchers have proposed various methods to achieve high-performance object tracking. Among these, methods based on Transformers have become a research hotspot due to their ability to globally model and contextualize information. However, current Transformer-based object tracking methods still face challenges such as low tracking accuracy and the presence of redundant feature information. In this paper, we introduce self-calibration multi-head self-attention Transformer (SMSTracker) as a solution to these challenges. It employs a hybrid tensor decomposition self-organizing multi-head self-attention transformer mechanism, which not only… More >

  • Open Access

    ARTICLE

    Contemporary Study for Detection of COVID-19 Using Machine Learning with Explainable AI

    Saad Akbar1,2, Humera Azam1, Sulaiman Sulmi Almutairi3,*, Omar Alqahtani4, Habib Shah4, Aliya Aleryani4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050913
    (This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
    Abstract The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic tools. In this article, a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplored dataset obtained from a private hospital for detecting COVID-19, pneumonia, and normal conditions in chest X-ray images (CXIs) is proposed coupled with Explainable Artificial Intelligence (XAI). Our study leverages less preprocessing with pre-trained cutting-edge models like InceptionV3, VGG16, and VGG19 that excel in the task of feature extraction. The methodology is further enhanced by the inclusion of the t-SNE (t-Distributed… More >

  • Open Access

    ARTICLE

    Automatic Rule Discovery for Data Transformation Using Fusion of Diversified Feature Formats

    G. Sunil Santhosh Kumar1,2,*, M. Rudra Kumar3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050143
    Abstract This article presents an innovative approach to automatic rule discovery for data transformation tasks leveraging XGBoost, a machine learning algorithm renowned for its efficiency and performance. The framework proposed herein utilizes the fusion of diversified feature formats, specifically, metadata, textual, and pattern features. The goal is to enhance the system’s ability to discern and generalize transformation rules from source to destination formats in varied contexts. Firstly, the article delves into the methodology for extracting these distinct features from raw data and the pre-processing steps undertaken to prepare the data for the model. Subsequent sections expound… More >

  • Open Access

    ARTICLE

    A Novel 3D Gait Model for Subject Identification Robust against Carrying and Dressing Variations

    Jian Luo1,*, Bo Xu1, Tardi Tjahjadi2, Jian Yi1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050018
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract Subject identification via the subject’s gait is challenging due to variations in the subject’s carrying and dressing conditions in real-life scenes. This paper proposes a novel targeted 3-dimensional (3D) gait model (3DGait) represented by a set of interpretable 3DGait descriptors based on a 3D parametric body model. The 3DGait descriptors are utilised as invariant gait features in the 3DGait recognition method to address object carrying and dressing. The 3DGait recognition method involves 2-dimensional (2D) to 3DGait data learning based on 3D virtual samples, a semantic gait parameter estimation Long Short Time Memory (LSTM) network (3D-SGPE-LSTM), a feature fusion… More >

  • Open Access

    ARTICLE

    Refined Anam-Net: Lightweight Deep Learning Model for Improved Segmentation Performance of Optic Cup and Disc for Glaucoma Diagnosis

    Khursheed Aurangzeb*, Syed Irtaza Haider, Musaed Alhussein
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.048987
    Abstract In this work, we aim to introduce some modifications to the Anam-Net deep neural network (DNN) model for segmenting optic cup (OC) and optic disc (OD) in retinal fundus images to estimate the cup-to-disc ratio (CDR). The CDR is a reliable measure for the early diagnosis of Glaucoma. In this study, we developed a lightweight DNN model for OC and OD segmentation in retinal fundus images. Our DNN model is based on modifications to Anam-Net, incorporating an anamorphic depth embedding block. To reduce computational complexity, we employ a fixed filter size for all convolution layers… More >

  • Open Access

    ARTICLE

    MarkNeRF: Watermarking for Neural Radiance Field

    Lifeng Chen1,2, Jia Liu1,2,*, Wenquan Sun1,2, Weina Dong1,2, Xiaozhong Pan1,2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051608
    (This article belongs to the Special Issue: Multimedia Security in Deep Learning)
    Abstract This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field (NeRF) models. We employ an embedding network to integrate the watermark into the images within the training set. Then, the NeRF model is utilized for 3D modeling. For copyright verification, a secret image is generated by inputting a confidential viewpoint into NeRF. On this basis, design an extraction network to extract embedded watermark images from confidential viewpoints. In the event of suspicion regarding the unauthorized usage of NeRF in a black-box scenario, the verifier can extract More >

  • Open Access

    ARTICLE

    Floating Waste Discovery by Request via Object-Centric Learning

    Bingfei Fu*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052656
    (This article belongs to the Special Issue: The Latest Deep Learning Architectures for Artificial Intelligence Applications)
    Abstract Discovering floating wastes, especially bottles on water, is a crucial research problem in environmental hygiene. Nevertheless, real-world applications often face challenges such as interference from irrelevant objects and the high cost associated with data collection. Consequently, devising algorithms capable of accurately localizing specific objects within a scene in scenarios where annotated data is limited remains a formidable challenge. To solve this problem, this paper proposes an object discovery by request problem setting and a corresponding algorithmic framework. The proposed problem setting aims to identify specified objects in scenes, and the associated algorithmic framework comprises pseudo… More >

  • Open Access

    ARTICLE

    Learning Dual-Layer User Representation for Enhanced Item Recommendation

    Fuxi Zhu1, Jin Xie2,*, Mohammed Alshahrani3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051046
    (This article belongs to the Special Issue: The Next-generation Deep Learning Approaches to Emerging Real-world Applications)
    Abstract User representation learning is crucial for capturing different user preferences, but it is also critical challenging because user intentions are latent and dispersed in complex and different patterns of user-generated data, and thus cannot be measured directly. Text-based data models can learn user representations by mining latent semantics, which is beneficial to enhancing the semantic function of user representations. However, these technologies only extract common features in historical records and cannot represent changes in user intentions. However, sequential feature can express the user’s interests and intentions that change time by time. But the sequential recommendation… More >

  • Open Access

    ARTICLE

    A Hybrid Feature Fusion Traffic Sign Detection Algorithm Based on YOLOv7

    Bingyi Ren1,4, Juwei Zhang2,3,4,*, Tong Wang2,4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052667
    (This article belongs to the Special Issue: Metaheuristics, Soft Computing, and Machine Learning in Image Processing and Computer Vision)
    Abstract Autonomous driving technology has entered a period of rapid development, and traffic sign detection is one of the important tasks. Existing target detection networks are difficult to adapt to scenarios where target sizes are seriously imbalanced, and traffic sign targets are small and have unclear features, which makes detection more difficult. Therefore, we propose a Hybrid Feature Fusion Traffic Sign detection algorithm based on YOLOv7 (HFFTYOLO). First, a self-attention mechanism is incorporated at the end of the backbone network to calculate feature interactions within scales; Secondly, the cross-scale fusion part of the neck introduces a… More >

  • Open Access

    ARTICLE

    Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS

    Kenian Wang1,2,*, Yuan Hong1,2, Chunxiao Li2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052088
    Abstract With the exponential increase in information security risks, ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment. However, experts possess a limited understanding of fundamental security elements, such as assets, threats, and vulnerabilities, due to the confidentiality of airborne networks, resulting in cognitive uncertainty. Therefore, the Pythagorean fuzzy Analytic Hierarchy Process (AHP) Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks. First, Pythagorean fuzzy AHP is employed to construct an index system… More >

  • Open Access

    ARTICLE

    MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection

    Yu Yan1, Yu Yang1,*, Shen Fang1, Minna Gao2, Yiding Chen1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051685
    Abstract In the face of the effective popularity of the Internet of Things (IoT), but the frequent occurrence of cybersecurity incidents, various cybersecurity protection means have been proposed and applied. Among them, Intrusion Detection System (IDS) has been proven to be stable and efficient. However, traditional intrusion detection methods have shortcomings such as low detection accuracy and inability to effectively identify malicious attacks. To address the above problems, this paper fully considers the superiority of deep learning models in processing high-dimensional data, and reasonable data type conversion methods can extract deep features and detect classification using… More >

  • Open Access

    ARTICLE

    5G Resource Allocation Using Feature Selection and Greylag Goose Optimization Algorithm

    Amel Ali Alhussan1, S. K. Towfek2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049874
    Abstract In the contemporary world of highly efficient technological development, fifth-generation technology (5G) is seen as a vital step forward with theoretical maximum download speeds of up to twenty gigabits per second (Gbps). As far as the current implementations are concerned, they are at the level of slightly below 1 Gbps, but this allowed a great leap forward from fourth generation technology (4G), as well as enabling significantly reduced latency, making 5G an absolute necessity for applications such as gaming, virtual conferencing, and other interactive electronic processes. Prospects of this change are not limited to connectivity… More >

  • Open Access

    ARTICLE

    Development of a Novel Noise Reduction Algorithm for Smart Checkout RFID System in Retail Stores

    Shazielya Shamsul1, Mohammed A. H. Ali1,2,*, Salwa Hanim Abdul-Rashid1,2, Atef M. Ghaleb3, Fahad M. Alqahtani4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049257
    (This article belongs to the Special Issue: Advanced Data Science Technology for Intelligent Decision Systems)
    Abstract This paper presents a smart checkout system designed to mitigate the issues of noise and errors present in the existing barcode and RFID-based systems used at retail stores’ checkout counters. This is achieved by integrating a novel AI algorithm, called Improved Laser Simulator Logic (ILSL) into the RFID system. The enhanced RFID system was able to improve the accuracy of item identification, reduce noise interference, and streamline the overall checkout process. The potential of the system for noise detection and elimination was initially investigated through a simulation study using MATLAB and ILSL algorithm. Subsequently, it More >

  • Open Access

    ARTICLE

    Efficient Clustering Network Based on Matrix Factorization

    Jieren Cheng1,3, Jimei Li1,3,*, Faqiang Zeng1,3, Zhicong Tao1,3, Yue Yang2,3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051816
    Abstract Contrastive learning is a significant research direction in the field of deep learning. However, existing data augmentation methods often lead to issues such as semantic drift in generated views while the complexity of model pre-training limits further improvement in the performance of existing methods. To address these challenges, we propose the Efficient Clustering Network based on Matrix Factorization (ECN-MF). Specifically, we design a batched low-rank Singular Value Decomposition (SVD) algorithm for data augmentation to eliminate redundant information and uncover major patterns of variation and key information in the data. Additionally, we design a Mutual Information-Enhanced More >

  • Open Access

    ARTICLE

    Optimized Binary Neural Networks for Road Anomaly Detection: A TinyML Approach on Edge Devices

    Amna Khatoon1, Weixing Wang1,*, Asad Ullah2, Limin Li3,*, Mengfei Wang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051147
    (This article belongs to the Special Issue: Data and Image Processing in Intelligent Information Systems)
    Abstract Integrating Tiny Machine Learning (TinyML) with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level. Constrained devices efficiently implement a Binary Neural Network (BNN) for road feature extraction, utilizing quantization and compression through a pruning strategy. The modifications resulted in a 28-fold decrease in memory usage and a 25% enhancement in inference speed while only experiencing a 2.5% decrease in accuracy. It showcases its superiority over conventional detection algorithms in different road image scenarios. Although constrained by computer resources and training datasets, our results indicate opportunities for More >

  • Open Access

    ARTICLE

    An Improved Iterated Greedy Algorithm for Solving Rescue Robot Path Planning Problem with Limited Survival Time

    Xiaoqing Wang1, Peng Duan1,*, Leilei Meng1,*, Kaidong Yang2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050612
    (This article belongs to the Special Issue: Recent Advances in Ensemble Framework of Meta-heuristics and Machine Learning: Methods and Applications)
    Abstract Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster scenario. In this study, we investigated the post-disaster rescue path planning problem and modeled this problem as a variant of the travel salesman problem (TSP) with life-strength constraints. To address this problem, we proposed an improved iterated greedy (IIG) algorithm. First, a push-forward insertion heuristic (PFIH) strategy was employed to generate a high-quality initial solution. Second, a greedy-based insertion strategy was designed and used in the destruction-construction stage to increase the algorithm’s exploration ability. Furthermore,… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things: A Hybrid Approach

    Amal Al-Rasheed1, Rahim Khan2,3,*, Tahani Alsaed4, Mahwish Kundi2,5, Mohamad Hanif Md. Saad6, Mahidur R. Sarker7,8
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049215
    (This article belongs to the Special Issue: Multimedia Encryption and Information Security)
    Abstract Due to the overwhelming characteristics of the Internet of Things (IoT) and its adoption in approximately every aspect of our lives, the concept of individual devices’ privacy has gained prominent attention from both customers, i.e., people, and industries as wearable devices collect sensitive information about patients (both admitted and outdoor) in smart healthcare infrastructures. In addition to privacy, outliers or noise are among the crucial issues, which are directly correlated with IoT infrastructures, as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing, i.e.,… More >

  • Open Access

    ARTICLE

    A Machine Learning Approach to Cyberbullying Detection in Arabic Tweets

    Dhiaa Musleh1, Atta Rahman1,*, Mohammed Abbas Alkherallah1, Menhal Kamel Al-Bohassan1, Mustafa Mohammed Alawami1, Hayder Ali Alsebaa1, Jawad Ali Alnemer1, Ghazi Fayez Al-Mutairi1, May Issa Aldossary2, Dalal A. Aldowaihi1, Fahd Alhaidari3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.048003
    Abstract With the rapid growth of internet usage, a new situation has been created that enables practicing bullying. Cyberbullying has increased over the past decade, and it has the same adverse effects as face-to-face bullying, like anger, sadness, anxiety, and fear. With the anonymity people get on the internet, they tend to be more aggressive and express their emotions freely without considering the effects, which can be a reason for the increase in cyberbullying and it is the main motive behind the current study. This study presents a thorough background of cyberbullying and the techniques used… More >

  • Open Access

    ARTICLE

    Cloud-Edge Collaborative Federated GAN Based Data Processing for IoT-Empowered Multi-Flow Integrated Energy Aggregation Dispatch

    Zhan Shi*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051530
    Abstract The convergence of Internet of Things (IoT), 5G, and cloud collaboration offers tailored solutions to the rigorous demands of multi-flow integrated energy aggregation dispatch data processing. While generative adversarial networks (GANs) are instrumental in resource scheduling, their application in this domain is impeded by challenges such as convergence speed, inferior optimality searching capability, and the inability to learn from failed decision making feedbacks. Therefore, a cloud-edge collaborative federated GAN-based communication and computing resource scheduling algorithm with long-term constraint violation sensitiveness is proposed to address these challenges. The proposed algorithm facilitates real-time, energy-efficient data processing by More >

  • Open Access

    REVIEW

    A Comprehensive Survey of Recent Transformers in Image, Video and Diffusion Models

    Dinh Phu Cuong Le1,2, Dong Wang1, Viet-Tuan Le3,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050790
    Abstract Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks (CNNs). The transformers demonstrate the ability to model long-range dependencies by utilizing a self-attention mechanism. This study aims to provide a comprehensive survey of recent transformer-based approaches in image and video applications, as well as diffusion models. We begin by discussing existing surveys of vision transformers and comparing them to this work. Then, we review the main components of a vanilla transformer network, including the self-attention mechanism, feed-forward network, position encoding, etc. In the main part of More >

  • Open Access

    ARTICLE

    Masked Autoencoders as Single Object Tracking Learners

    Chunjuan Bo1,*, Xin Chen2, Junxing Zhang1
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052329
    (This article belongs to the Special Issue: Recognition Tasks with Transformers)
    Abstract Significant advancements have been witnessed in visual tracking applications leveraging ViT in recent years, mainly due to the formidable modeling capabilities of Vision Transformer (ViT). However, the strong performance of such trackers heavily relies on ViT models pretrained for long periods, limiting more flexible model designs for tracking tasks. To address this issue, we propose an efficient unsupervised ViT pretraining method for the tracking task based on masked autoencoders, called TrackMAE. During pretraining, we employ two shared-parameter ViTs, serving as the appearance encoder and motion encoder, respectively. The appearance encoder encodes randomly masked image data,… More >

  • Open Access

    ARTICLE

    Pulmonary Edema and Pleural Effusion Detection Using EfficientNet-V1-B4 Architecture and AdamW Optimizer from Chest X-Rays Images

    Anas AbuKaraki1, Tawfi Alrawashdeh1, Sumaya Abusaleh1, Malek Zakarya Alksasbeh1,*, Bilal Alqudah1, Khalid Alemerien2, Hamzah Alshamaseen3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051420
    (This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
    Abstract This paper presents a novel multiclass system designed to detect pleural effusion and pulmonary edema on chest X-ray images, addressing the critical need for early detection in healthcare. A new comprehensive dataset was formed by combining 28,309 samples from the ChestX-ray14, PadChest, and CheXpert databases, with 10,287, 6022, and 12,000 samples representing Pleural Effusion, Pulmonary Edema, and Normal cases, respectively. Consequently, the preprocessing step involves applying the Contrast Limited Adaptive Histogram Equalization (CLAHE) method to boost the local contrast of the X-ray samples, then resizing the images to 380 × 380 dimensions, followed by using the data… More >

  • Open Access

    ARTICLE

    Passive IoT Localization Technology Based on SD-PDOA in NLOS and Multi-Path Environments

    Junyang Liu1, Yuan Li2, Yulu Zhang2, Shuai Ma2, Gui Li3, Yi He1, Haiwen Yi1, Yue Liu1, Xiaotao Xu4, Xu Zhang1, Jinyao He1, Guangjun Wen1, Jian Li1,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049999
    Abstract Addressing the challenges of passive Radio Frequency Identification (RFID) indoor localization technology in Non-Line-of-Sight (NLoS) and multipath environments, this paper presents an innovative approach by introducing a combined technology integrating an improved Kalman Filter with Space Domain Phase Difference of Arrival (SD-PDOA) and Received Signal Strength Indicator (RSSI). This methodology utilizes the distinct channel characteristics in multipath and NLoS contexts to effectively filter out interference and accurately extract localization information, thereby facilitating high precision and stability in passive RFID localization. The efficacy of this approach is demonstrated through detailed simulations and empirical tests conducted on… More >

  • Open Access

    ARTICLE

    Enhancing Tea Leaf Disease Identification with Lightweight MobileNetV2

    Zhilin Li1,2, Yuxin Li1, Chunyu Yan1, Peng Yan1, Xiutong Li1, Mei Yu1, Tingchi Wen4,5, Benliang Xie1,2,3,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051526
    Abstract Diseases in tea trees can result in significant losses in both the quality and quantity of tea production. Regular monitoring can help to prevent the occurrence of large-scale diseases in tea plantations. However, existing methods face challenges such as a high number of parameters and low recognition accuracy, which hinders their application in tea plantation monitoring equipment. This paper presents a lightweight I-MobileNetV2 model for identifying diseases in tea leaves, to address these challenges. The proposed method first embeds a Coordinate Attention (CA) module into the original MobileNetV2 network, enabling the model to locate disease More >

  • Open Access

    ARTICLE

    A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families

    Li Li*, Qing Zhang, Youran Kong
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051916
    Abstract Due to the diversity and unpredictability of changes in malicious code, studying the traceability of variant families remains challenging. In this paper, we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants. This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images. The method includes a lightweight classifier and a simulator. The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile, embedded, and other devices. The simulator utilizes… More >

  • Open Access

    ARTICLE

    A New Speed Limit Recognition Methodology Based on Ensemble Learning: Hardware Validation

    Mohamed Karray1,*, Nesrine Triki2,*, Mohamed Ksantini2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051562
    Abstract Advanced Driver Assistance Systems (ADAS) technologies can assist drivers or be part of automatic driving systems to support the driving process and improve the level of safety and comfort on the road. Traffic Sign Recognition System (TSRS) is one of the most important components of ADAS. Among the challenges with TSRS is being able to recognize road signs with the highest accuracy and the shortest processing time. Accordingly, this paper introduces a new real time methodology recognizing Speed Limit Signs based on a trio of developed modules. Firstly, the Speed Limit Detection (SLD) module uses… More >

  • Open Access

    REVIEW

    Caching Strategies in NDN Based Wireless Ad Hoc Network: A Survey

    Ahmed Khalid1, Rana Asif Rehman1, Byung-Seo Kim2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049981
    Abstract Wireless Ad Hoc Networks consist of devices that are wirelessly connected. Mobile Ad Hoc Networks (MANETs), Internet of Things (IoT), and Vehicular Ad Hoc Networks (VANETs) are the main domains of wireless ad hoc network. Internet is used in wireless ad hoc network. Internet is based on Transmission Control Protocol (TCP)/Internet Protocol (IP) network where clients and servers interact with each other with the help of IP in a pre-defined environment. Internet fetches data from a fixed location. Data redundancy, mobility, and location dependency are the main issues of the IP network paradigm. All these… More >

  • Open Access

    ARTICLE

    Urban Electric Vehicle Charging Station Placement Optimization with Graylag Goose Optimization Voting Classifier

    Amel Ali Alhussan1, Doaa Sami Khafaga1, El-Sayed M. El-kenawy2,*, Marwa M. Eid2,3, Abdelhameed Ibrahim4
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049001
    Abstract To reduce the negative effects that conventional modes of transportation have on the environment, researchers are working to increase the use of electric vehicles. The demand for environmentally friendly transportation may be hampered by obstacles such as a restricted range and extended rates of recharge. The establishment of urban charging infrastructure that includes both fast and ultra-fast terminals is essential to address this issue. Nevertheless, the powering of these terminals presents challenges because of the high energy requirements, which may influence the quality of service. Modelling the maximum hourly capacity of each station based on… More >

  • Open Access

    REVIEW

    A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection

    Yaqiong He, Jinlin Fan*, Huaiguang Wu
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052887
    Abstract With the rise of blockchain technology, the security issues of smart contracts have become increasingly critical. Despite the availability of numerous smart contract vulnerability detection tools, many face challenges such as slow updates, usability issues, and limited installation methods. These challenges hinder the adoption and practicality of these tools. This paper examines smart contract vulnerability detection tools from 2016 to 2023, sourced from the Web of Science (WOS) and Google Scholar. By systematically collecting, screening, and synthesizing relevant research, 38 open-source tools that provide installation methods were selected for further investigation. From a developer’s perspective,… More >

  • Open Access

    ARTICLE

    Evaluation of Industrial IoT Service Providers with TOPSIS Based on Circular Intuitionistic Fuzzy Sets

    Elif Çaloğlu Büyükselçuk*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052509
    Abstract Industrial Internet of Things (IIoT) service providers have become increasingly important in the manufacturing industry due to their ability to gather and process vast amounts of data from connected devices, enabling manufacturers to improve operational efficiency, reduce costs, and enhance product quality. These platforms provide manufacturers with real-time visibility into their production processes and supply chains, allowing them to optimize operations and make informed decisions. In addition, IIoT service providers can help manufacturers create new revenue streams through the development of innovative products and services and enable them to leverage the benefits of emerging technologies… More >

  • Open Access

    ARTICLE

    Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias

    Batyrkhan Omarov1,2,*, Meirzhan Baikuvekov1, Daniyar Sultan1, Nurzhan Mukazhanov3, Madina Suleimenova2, Maigul Zhekambayeva3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052437
    Abstract This research introduces an innovative ensemble approach, combining Deep Residual Networks (ResNets) and Bidirectional Gated Recurrent Units (BiGRU), augmented with an Attention Mechanism, for the classification of heart arrhythmias. The escalating prevalence of cardiovascular diseases necessitates advanced diagnostic tools to enhance accuracy and efficiency. The model leverages the deep hierarchical feature extraction capabilities of ResNets, which are adept at identifying intricate patterns within electrocardiogram (ECG) data, while BiGRU layers capture the temporal dynamics essential for understanding the sequential nature of ECG signals. The integration of an Attention Mechanism refines the model’s focus on critical segments… More >

  • Open Access

    ARTICLE

    Detecting XSS with Random Forest and Multi-Channel Feature Extraction

    Qiurong Qin, Yueqin Li*, Yajie Mi, Jinhui Shen, Kexin Wu, Zhenzhao Wang
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051769
    Abstract In the era of the Internet, widely used web applications have become the target of hacker attacks because they contain a large amount of personal information. Among these vulnerabilities, stealing private data through cross-site scripting (XSS) attacks is one of the most commonly used attacks by hackers. Currently, deep learning-based XSS attack detection methods have good application prospects; however, they suffer from problems such as being prone to overfitting, a high false alarm rate, and low accuracy. To address these issues, we propose a multi-stage feature extraction and fusion model for XSS detection based on… More >

  • Open Access

    ARTICLE

    A Novel Anti-Collision Algorithm for Large Scale of UHF RFID Tags Access Systems

    Xu Zhang1, Yi He1, Haiwen Yi1, Yulu Zhang2, Yuan Li2, Shuai Ma2, Gui Li3, Zhiyuan Zhao4, Yue Liu1, Junyang Liu1, Guangjun Wen1, Jian Li1,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050000
    Abstract When the radio frequency identification (RFID) system inventories multiple tags, the recognition rate will be seriously affected due to collisions. Based on the existing dynamic frame slotted Aloha (DFSA) algorithm, a sub-frame observation and cyclic redundancy check (CRC) grouping combined dynamic framed slotted Aloha (SUBF-CGDFSA) algorithm is proposed. The algorithm combines the precise estimation method of the quantity of large-scale tags, the large-scale tags grouping mechanism based on CRC pseudo-random characteristics, and the Aloha anti-collision optimization mechanism based on sub-frame observation. By grouping tags and sequentially identifying them within subframes, it accurately estimates the number More >

  • Open Access

    ARTICLE

    A Multi-Strategy-Improved Northern Goshawk Optimization Algorithm for Global Optimization and Engineering Design

    Liang Zeng1,2, Mai Hu1, Chenning Zhang1, Quan Yuan1, Shanshan Wang1,2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049717
    Abstract Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines. To enhance the performance and alleviate the limitations of the Northern Goshawk Optimization (NGO) algorithm, particularly its tendency towards premature convergence and entrapment in local optima during function optimization processes, this study introduces an advanced Improved Northern Goshawk Optimization (INGO) algorithm. This algorithm incorporates a multifaceted enhancement strategy to boost operational efficiency. Initially, a tent chaotic map is employed in the initialization phase to generate a diverse initial population, providing high-quality feasible solutions. Subsequently, after… More >

  • Open Access

    ARTICLE

    GAN-DIRNet: A Novel Deformable Image Registration Approach for Multimodal Histological Images

    Haiyue Li1, Jing Xie2, Jing Ke3, Ye Yuan1, Xiaoyong Pan1, Hongyi Xin4, Hongbin Shen1,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049640
    Abstract Multi-modal histological image registration tasks pose significant challenges due to tissue staining operations causing partial loss and folding of tissue. Convolutional neural network (CNN) and generative adversarial network (GAN) are pivotal in medical image registration. However, existing methods often struggle with severe interference and deformation, as seen in histological images of conditions like Cushing’s disease. We argue that the failure of current approaches lies in underutilizing the feature extraction capability of the discriminator in GAN. In this study, we propose a novel multi-modal registration approach GAN-DIRNet based on GAN for deformable histological image registration. To… More >

  • Open Access

    ARTICLE

    Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols

    Ibrahim Alameri1,*, Tawfik Al-Hadhrami2, Anjum Nazir3, Abdulsamad Ebrahim Yahya4, Atef Gharbi5
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052999
    Abstract This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network (MANET) routing protocols: Destination Sequenced Distance Vector (DSDV), Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zone Routing Protocol (ZRP). In this paper, the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis, Mann-Whitney, and Friedman. It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns. The study is premised upon the Quality of More >

  • Open Access

    ARTICLE

    A Tabletop Nano-CT Image Noise Reduction Network Based on 3-Dimensional Axial Attention Mechanism

    Huijuan Fu, Linlin Zhu, Chunhui Wang, Xiaoqi Xi, Yu Han, Lei Li, Yanmin Sun, Bin Yan*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.049623
    (This article belongs to the Special Issue: Advances and Applications in Signal, Image and Video Processing)
    Abstract Nano-computed tomography (Nano-CT) is an emerging, high-resolution imaging technique. However, due to their low-light properties, tabletop Nano-CT has to be scanned under long exposure conditions, which the scanning process is time-consuming. For 3D reconstruction data, this paper proposed a lightweight 3D noise reduction method for desktop-level Nano-CT called AAD-ResNet (Axial Attention DeNoise ResNet). The network is framed by the U-net structure. The encoder and decoder are incorporated with the proposed 3D axial attention mechanism and residual dense block. Each layer of the residual dense block can directly access the features of the previous layer, which More >

  • Open Access

    ARTICLE

    Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network

    Saad Abdalla Agaili Mohamed*, Sefer Kurnaz
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.050474
    (This article belongs to the Special Issue: Applying AI Techniques for Cyber Physical Systems and Security Solutions: From Research to Practice)
    Abstract VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world. However, increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorize VPN network data. We present a novel VPN network traffic flow classification method utilizing Artificial Neural Networks (ANN). This paper aims to provide a reliable system that can identify a virtual private network (VPN) traffic from intrusion attempts, data exfiltration, and denial-of-service assaults. We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns. Next, we create an ANN architecture that can… More >

  • Open Access

    ARTICLE

    A Gaussian Noise-Based Algorithm for Enhancing Backdoor Attacks

    Hong Huang, Yunfei Wang*, Guotao Yuan, Xin Li
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051633
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract Deep Neural Networks (DNNs) are integral to various aspects of modern life, enhancing work efficiency. Nonetheless, their susceptibility to diverse attack methods, including backdoor attacks, raises security concerns. We aim to investigate backdoor attack methods for image categorization tasks, to promote the development of DNN towards higher security. Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples, and the meticulous data screening by developers, hindering practical attack implementation. To overcome these challenges, this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation (GN-TUAP) algorithm. This approach… More >

  • Open Access

    ARTICLE

    Target Detection on Water Surfaces Using Fusion of Camera and LiDAR Based Information

    Yongguo Li, Yuanrong Wang, Jia Xie*, Caiyin Xu, Kun Zhang
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051426
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract To address the challenges of missed detections in water surface target detection using solely visual algorithms in unmanned surface vehicle (USV) perception, this paper proposes a method based on the fusion of visual and LiDAR point-cloud projection for water surface target detection. Firstly, the visual recognition component employs an improved YOLOv7 algorithm based on a self-built dataset for the detection of water surface targets. This algorithm modifies the original YOLOv7 architecture to a Slim-Neck structure, addressing the problem of excessive redundant information during feature extraction in the original YOLOv7 network model. Simultaneously, this modification simplifies… More >

  • Open Access

    ARTICLE

    Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network

    Wei Wu, Liang Yu, Liping Yang*, Yadong Zhang, Peng Wang
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052655
    (This article belongs to the Special Issue: Trustworthy Wireless Computing Power Networks Assisted by Blockchain)
    Abstract As an open network architecture, Wireless Computing Power Networks (WCPN) pose new challenges for achieving efficient and secure resource management in networks, because of issues such as insecure communication channels and untrusted device terminals. Blockchain, as a shared, immutable distributed ledger, provides a secure resource management solution for WCPN. However, integrating blockchain into WCPN faces challenges like device heterogeneity, monitoring communication states, and dynamic network nature. Whereas Digital Twins (DT) can accurately maintain digital models of physical entities through real-time data updates and self-learning, enabling continuous optimization of WCPN, improving synchronization performance, ensuring real-time accuracy, More >

  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052233
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open Access

    ARTICLE

    Transformer-Based Cloud Detection Method for High-Resolution Remote Sensing Imagery

    Haotang Tan1, Song Sun2,*, Tian Cheng3, Xiyuan Shu2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.052208
    (This article belongs to the Special Issue: The Latest Deep Learning Architectures for Artificial Intelligence Applications)
    Abstract Cloud detection from satellite and drone imagery is crucial for applications such as weather forecasting and environmental monitoring. Addressing the limitations of conventional convolutional neural networks, we propose an innovative transformer-based method. This method leverages transformers, which are adept at processing data sequences, to enhance cloud detection accuracy. Additionally, we introduce a Cyclic Refinement Architecture that improves the resolution and quality of feature extraction, thereby aiding in the retention of critical details often lost during cloud detection. Our extensive experimental validation shows that our approach significantly outperforms established models, excelling in high-resolution feature extraction and More >

  • Open Access

    ARTICLE

    Improving Network Availability through Optimized Multipath Routing and Incremental Deployment Strategies

    Wei Zhang1, Haijun Geng2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051871
    Abstract Currently, distributed routing protocols are constrained by offering a single path between any pair of nodes, thereby limiting the potential throughput and overall network performance. This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted. In contrast, routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution. Multipath routing, as a fundamental concept, surpasses the limitations of traditional shortest path first protocols. It not only redirects traffic to unused resources, effectively mitigating network congestion, but… More >

  • Open Access

    ARTICLE

    Novel Fractal-Based Features for Low-Power Appliances in Non-Intrusive Load Monitoring

    Anam Mughees1,2,*, Muhammad Kamran1,3
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051820
    Abstract Non-intrusive load monitoring is a method that disaggregates the overall energy consumption of a building to estimate the electric power usage and operating status of each appliance individually. Prior studies have mostly concentrated on the identification of high-power appliances like HVAC systems while overlooking the existence of low-power appliances. Low-power consumer appliances have comparable power consumption patterns, which can complicate the detection task and can be mistaken as noise. This research tackles the problem of classification of low-power appliances and uses turn-on current transients to extract novel features and develop unique appliance signatures. A hybrid… More >

  • Open Access

    ARTICLE

    Evolutionary Variational YOLOv8 Network for Fault Detection in Wind Turbines

    Hongjiang Wang1, Qingze Shen2,*, Qin Dai1, Yingcai Gao2, Jing Gao2, Tian Zhang3,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051757
    (This article belongs to the Special Issue: Neural Architecture Search: Optimization, Efficiency and Application)
    Abstract Deep learning has emerged in many practical applications, such as image classification, fault diagnosis, and object detection. More recently, convolutional neural networks (CNNs), representative models of deep learning, have been used to solve fault detection. However, the current design of CNNs for fault detection of wind turbine blades is highly dependent on domain knowledge and requires a large amount of trial and error. For this reason, an evolutionary YOLOv8 network has been developed to automatically find the network architecture for wind turbine blade-based fault detection. YOLOv8 is a CNN-backed object detection model. Specifically, to reduce… More >

  • Open Access

    ARTICLE

    Generating Factual Text via Entailment Recognition Task

    Jinqiao Dai, Pengsen Cheng, Jiayong Liu*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051745
    Abstract Generating diverse and factual text is challenging and is receiving increasing attention. By sampling from the latent space, variational autoencoder-based models have recently enhanced the diversity of generated text. However, existing research predominantly depends on summarization models to offer paragraph-level semantic information for enhancing factual correctness. The challenge lies in effectively generating factual text using sentence-level variational autoencoder-based models. In this paper, a novel model called fact-aware conditional variational autoencoder is proposed to balance the factual correctness and diversity of generated text. Specifically, our model encodes the input sentences and uses them as facts to… More >

  • Open Access

    ARTICLE

    Improved YOLOv8n Model for Detecting Helmets and License Plates on Electric Bicycles

    Qunyue Mu1,2, Qiancheng Yu1,2,*, Chengchen Zhou1,2, Lei Liu1,2, Xulong Yu1,2
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051728
    Abstract Wearing helmets while riding electric bicycles can significantly reduce head injuries resulting from traffic accidents. To effectively monitor compliance, the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles. However, manual enforcement by traffic police is time-consuming and labor-intensive. Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques. This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles, addressing these challenges. The More >

  • Open Access

    ARTICLE

    Distributed Resource Allocation in Dispersed Computing Environment Based on UAV Track Inspection in Urban Rail Transit

    Tong Gan1, Shuo Dong1, Shiyou Wang1, Jiaxin Li2,*
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.051408
    Abstract With the rapid development of urban rail transit, the existing track detection has some problems such as low efficiency and insufficient detection coverage, so an intelligent and automatic track detection method based on UAV is urgently needed to avoid major safety accidents. At the same time, the geographical distribution of IoT devices results in the inefficient use of the significant computing potential held by a large number of devices. As a result, the Dispersed Computing (DCOMP) architecture enables collaborative computing between devices in the Internet of Everything (IoE), promotes low-latency and efficient cross-wide applications, and… More >