Home / Journals / CMC / Vol.80, No.1, 2024
Special Issues
Table of Content
  • Open AccessOpen Access

    REVIEW

    A Comprehensive Survey on Deep Learning Multi-Modal Fusion: Methods, Technologies and Applications

    Tianzhe Jiao, Chaopeng Guo, Xiaoyue Feng, Yuming Chen, Jie Song*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1-35, 2024, DOI:10.32604/cmc.2024.053204
    Abstract Multi-modal fusion technology gradually become a fundamental task in many fields, such as autonomous driving, smart healthcare, sentiment analysis, and human-computer interaction. It is rapidly becoming the dominant research due to its powerful perception and judgment capabilities. Under complex scenes, multi-modal fusion technology utilizes the complementary characteristics of multiple data streams to fuse different data types and achieve more accurate predictions. However, achieving outstanding performance is challenging because of equipment performance limitations, missing information, and data noise. This paper comprehensively reviews existing methods based on multi-modal fusion techniques and completes a detailed and in-depth analysis.… More >

  • Open AccessOpen Access

    REVIEW

    A Comprehensive Survey of Recent Transformers in Image, Video and Diffusion Models

    Dinh Phu Cuong Le1,2, Dong Wang1, Viet-Tuan Le3,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 37-60, 2024, DOI:10.32604/cmc.2024.050790
    Abstract Transformer models have emerged as dominant networks for various tasks in computer vision compared to Convolutional Neural Networks (CNNs). The transformers demonstrate the ability to model long-range dependencies by utilizing a self-attention mechanism. This study aims to provide a comprehensive survey of recent transformer-based approaches in image and video applications, as well as diffusion models. We begin by discussing existing surveys of vision transformers and comparing them to this work. Then, we review the main components of a vanilla transformer network, including the self-attention mechanism, feed-forward network, position encoding, etc. In the main part of More >

  • Open AccessOpen Access

    REVIEW

    Caching Strategies in NDN Based Wireless Ad Hoc Network: A Survey

    Ahmed Khalid1, Rana Asif Rehman1, Byung-Seo Kim2,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 61-103, 2024, DOI:10.32604/cmc.2024.049981
    Abstract Wireless Ad Hoc Networks consist of devices that are wirelessly connected. Mobile Ad Hoc Networks (MANETs), Internet of Things (IoT), and Vehicular Ad Hoc Networks (VANETs) are the main domains of wireless ad hoc network. Internet is used in wireless ad hoc network. Internet is based on Transmission Control Protocol (TCP)/Internet Protocol (IP) network where clients and servers interact with each other with the help of IP in a pre-defined environment. Internet fetches data from a fixed location. Data redundancy, mobility, and location dependency are the main issues of the IP network paradigm. All these… More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced GAN for Image Generation

    Chunwei Tian1,2,3,4, Haoyang Gao2,3, Pengwei Wang2, Bob Zhang1,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 105-118, 2024, DOI:10.32604/cmc.2024.052097
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract Generative adversarial networks (GANs) with gaming abilities have been widely applied in image generation. However, gamistic generators and discriminators may reduce the robustness of the obtained GANs in image generation under varying scenes. Enhancing the relation of hierarchical information in a generation network and enlarging differences of different network architectures can facilitate more structural information to improve the generation effect for image generation. In this paper, we propose an enhanced GAN via improving a generator for image generation (EIGGAN). EIGGAN applies a spatial attention to a generator to extract salient information to enhance the truthfulness… More >

  • Open AccessOpen Access

    ARTICLE

    A New Speed Limit Recognition Methodology Based on Ensemble Learning: Hardware Validation

    Mohamed Karray1,*, Nesrine Triki2,*, Mohamed Ksantini2
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 119-138, 2024, DOI:10.32604/cmc.2024.051562
    Abstract Advanced Driver Assistance Systems (ADAS) technologies can assist drivers or be part of automatic driving systems to support the driving process and improve the level of safety and comfort on the road. Traffic Sign Recognition System (TSRS) is one of the most important components of ADAS. Among the challenges with TSRS is being able to recognize road signs with the highest accuracy and the shortest processing time. Accordingly, this paper introduces a new real time methodology recognizing Speed Limit Signs based on a trio of developed modules. Firstly, the Speed Limit Detection (SLD) module uses… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images

    Roseline Oluwaseun Ogundokun1,2, Joseph Bamidele Awotunde3, Hakeem Babalola Akande4, Cheng-Chi Lee5,6,*, Agbotiname Lucky Imoize7,8
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 139-161, 2024, DOI:10.32604/cmc.2024.052153
    Abstract Mobile technology is developing significantly. Mobile phone technologies have been integrated into the healthcare industry to help medical practitioners. Typically, computer vision models focus on image detection and classification issues. MobileNetV2 is a computer vision model that performs well on mobile devices, but it requires cloud services to process biometric image information and provide predictions to users. This leads to increased latency. Processing biometrics image datasets on mobile devices will make the prediction faster, but mobiles are resource-restricted devices in terms of storage, power, and computational speed. Hence, a model that is small in size,… More >

  • Open AccessOpen Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 163-193, 2024, DOI:10.32604/cmc.2024.051307
    (This article belongs to the Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open AccessOpen Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 195-215, 2024, DOI:10.32604/cmc.2024.052070
    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing AI System Privacy: An Automatic Tool for Achieving GDPR Compliance in NoSQL Databases

    Yifei Zhao, Zhaohui Li, Siyi Lv*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 217-234, 2024, DOI:10.32604/cmc.2024.052310
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract The EU’s Artificial Intelligence Act (AI Act) imposes requirements for the privacy compliance of AI systems. AI systems must comply with privacy laws such as the GDPR when providing services. These laws provide users with the right to issue a Data Subject Access Request (DSAR). Responding to such requests requires database administrators to identify information related to an individual accurately. However, manual compliance poses significant challenges and is error-prone. Database administrators need to write queries through time-consuming labor. The demand for large amounts of data by AI systems has driven the development of NoSQL databases.… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel 3D Gait Model for Subject Identification Robust against Carrying and Dressing Variations

    Jian Luo1,*, Bo Xu1, Tardi Tjahjadi2, Jian Yi1
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 235-261, 2024, DOI:10.32604/cmc.2024.050018
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract Subject identification via the subject’s gait is challenging due to variations in the subject’s carrying and dressing conditions in real-life scenes. This paper proposes a novel targeted 3-dimensional (3D) gait model (3DGait) represented by a set of interpretable 3DGait descriptors based on a 3D parametric body model. The 3DGait descriptors are utilised as invariant gait features in the 3DGait recognition method to address object carrying and dressing. The 3DGait recognition method involves 2-dimensional (2D) to 3DGait data learning based on 3D virtual samples, a semantic gait parameter estimation Long Short Time Memory (LSTM) network (3D-SGPE-LSTM), a feature fusion… More >

  • Open AccessOpen Access

    ARTICLE

    Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies

    Waseem Akram1, Khalid Mahmood2, Hafiz Burhan ul Haq3, Muhammad Asif3, Shehzad Ashraf Chaudhry4,5, Taeshik Shon6,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 263-280, 2024, DOI:10.32604/cmc.2024.052405
    Abstract Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol (HTTP) requests and maintains the states of clients’ information over the Internet. HTTP cookies are exploited to carry client patterns observed by a website. These client patterns facilitate the particular client’s future visit to the corresponding website. However, security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser. Several protocols have been introduced that maintain HTTP cookies, but many of those fail to achieve More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Clustering Network Based on Matrix Factorization

    Jieren Cheng1,3, Jimei Li1,3,*, Faqiang Zeng1,3, Zhicong Tao1,3, Yue Yang2,3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 281-298, 2024, DOI:10.32604/cmc.2024.051816
    Abstract Contrastive learning is a significant research direction in the field of deep learning. However, existing data augmentation methods often lead to issues such as semantic drift in generated views while the complexity of model pre-training limits further improvement in the performance of existing methods. To address these challenges, we propose the Efficient Clustering Network based on Matrix Factorization (ECN-MF). Specifically, we design a batched low-rank Singular Value Decomposition (SVD) algorithm for data augmentation to eliminate redundant information and uncover major patterns of variation and key information in the data. Additionally, we design a Mutual Information-Enhanced More >

  • Open AccessOpen Access

    ARTICLE

    Knowledge Reasoning Method Based on Deep Transfer Reinforcement Learning: DTRLpath

    Shiming Lin1,2,3, Ling Ye2, Yijie Zhuang1, Lingyun Lu2,*, Shaoqiu Zheng2,*, Chenxi Huang1, Ng Yin Kwee4
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 299-317, 2024, DOI:10.32604/cmc.2024.051379
    Abstract In recent years, with the continuous development of deep learning and knowledge graph reasoning methods, more and more researchers have shown great interest in improving knowledge graph reasoning methods by inferring missing facts through reasoning. By searching paths on the knowledge graph and making fact and link predictions based on these paths, deep learning-based Reinforcement Learning (RL) agents can demonstrate good performance and interpretability. Therefore, deep reinforcement learning-based knowledge reasoning methods have rapidly emerged in recent years and have become a hot research topic. However, even in a small and fixed knowledge graph reasoning action… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols

    Ibrahim Alameri1,*, Tawfik Al-Hadhrami2, Anjum Nazir3, Abdulsamad Ebrahim Yahya4, Atef Gharbi5
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 319-339, 2024, DOI:10.32604/cmc.2024.052999
    Abstract This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network (MANET) routing protocols: Destination Sequenced Distance Vector (DSDV), Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zone Routing Protocol (ZRP). In this paper, the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis, Mann-Whitney, and Friedman. It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns. The study is premised upon the Quality of More >

  • Open AccessOpen Access

    ARTICLE

    Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias

    Batyrkhan Omarov1,2,*, Meirzhan Baikuvekov1, Daniyar Sultan1, Nurzhan Mukazhanov3, Madina Suleimenova2, Maigul Zhekambayeva3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 341-359, 2024, DOI:10.32604/cmc.2024.052437
    Abstract This research introduces an innovative ensemble approach, combining Deep Residual Networks (ResNets) and Bidirectional Gated Recurrent Units (BiGRU), augmented with an Attention Mechanism, for the classification of heart arrhythmias. The escalating prevalence of cardiovascular diseases necessitates advanced diagnostic tools to enhance accuracy and efficiency. The model leverages the deep hierarchical feature extraction capabilities of ResNets, which are adept at identifying intricate patterns within electrocardiogram (ECG) data, while BiGRU layers capture the temporal dynamics essential for understanding the sequential nature of ECG signals. The integration of an Attention Mechanism refines the model’s focus on critical segments… More >

  • Open AccessOpen Access

    ARTICLE

    A Gaussian Noise-Based Algorithm for Enhancing Backdoor Attacks

    Hong Huang, Yunfei Wang*, Guotao Yuan, Xin Li
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 361-387, 2024, DOI:10.32604/cmc.2024.051633
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract Deep Neural Networks (DNNs) are integral to various aspects of modern life, enhancing work efficiency. Nonetheless, their susceptibility to diverse attack methods, including backdoor attacks, raises security concerns. We aim to investigate backdoor attack methods for image categorization tasks, to promote the development of DNN towards higher security. Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples, and the meticulous data screening by developers, hindering practical attack implementation. To overcome these challenges, this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation (GN-TUAP) algorithm. This approach… More >

  • Open AccessOpen Access

    REVIEW

    An Integrated Analysis of Yield Prediction Models: A Comprehensive Review of Advancements and Challenges

    Nidhi Parashar1, Prashant Johri1, Arfat Ahmad Khan5, Nitin Gaur1, Seifedine Kadry2,3,4,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 389-425, 2024, DOI:10.32604/cmc.2024.050240
    Abstract The growing global requirement for food and the need for sustainable farming in an era of a changing climate and scarce resources have inspired substantial crop yield prediction research. Deep learning (DL) and machine learning (ML) models effectively deal with such challenges. This research paper comprehensively analyses recent advancements in crop yield prediction from January 2016 to March 2024. In addition, it analyses the effectiveness of various input parameters considered in crop yield prediction models. We conducted an in-depth search and gathered studies that employed crop modeling and AI-based methods to predict crop yield. The… More >

  • Open AccessOpen Access

    ARTICLE

    Improving Network Availability through Optimized Multipath Routing and Incremental Deployment Strategies

    Wei Zhang1, Haijun Geng2,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 427-448, 2024, DOI:10.32604/cmc.2024.051871
    Abstract Currently, distributed routing protocols are constrained by offering a single path between any pair of nodes, thereby limiting the potential throughput and overall network performance. This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted. In contrast, routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution. Multipath routing, as a fundamental concept, surpasses the limitations of traditional shortest path first protocols. It not only redirects traffic to unused resources, effectively mitigating network congestion, but… More >

  • Open AccessOpen Access

    ARTICLE

    Improved YOLOv8n Model for Detecting Helmets and License Plates on Electric Bicycles

    Qunyue Mu1,2, Qiancheng Yu1,2,*, Chengchen Zhou1,2, Lei Liu1,2, Xulong Yu1,2
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 449-466, 2024, DOI:10.32604/cmc.2024.051728
    Abstract Wearing helmets while riding electric bicycles can significantly reduce head injuries resulting from traffic accidents. To effectively monitor compliance, the utilization of target detection algorithms through traffic cameras plays a vital role in identifying helmet usage by electric bicycle riders and recognizing license plates on electric bicycles. However, manual enforcement by traffic police is time-consuming and labor-intensive. Traditional methods face challenges in accurately identifying small targets such as helmets and license plates using deep learning techniques. This paper proposes an enhanced model for detecting helmets and license plates on electric bicycles, addressing these challenges. The More >

  • Open AccessOpen Access

    ARTICLE

    Target Detection on Water Surfaces Using Fusion of Camera and LiDAR Based Information

    Yongguo Li, Yuanrong Wang, Jia Xie*, Caiyin Xu, Kun Zhang
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 467-486, 2024, DOI:10.32604/cmc.2024.051426
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract To address the challenges of missed detections in water surface target detection using solely visual algorithms in unmanned surface vehicle (USV) perception, this paper proposes a method based on the fusion of visual and LiDAR point-cloud projection for water surface target detection. Firstly, the visual recognition component employs an improved YOLOv7 algorithm based on a self-built dataset for the detection of water surface targets. This algorithm modifies the original YOLOv7 architecture to a Slim-Neck structure, addressing the problem of excessive redundant information during feature extraction in the original YOLOv7 network model. Simultaneously, this modification simplifies… More >

  • Open AccessOpen Access

    ARTICLE

    GAN-DIRNet: A Novel Deformable Image Registration Approach for Multimodal Histological Images

    Haiyue Li1, Jing Xie2, Jing Ke3, Ye Yuan1, Xiaoyong Pan1, Hongyi Xin4, Hongbin Shen1,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 487-506, 2024, DOI:10.32604/cmc.2024.049640
    Abstract Multi-modal histological image registration tasks pose significant challenges due to tissue staining operations causing partial loss and folding of tissue. Convolutional neural network (CNN) and generative adversarial network (GAN) are pivotal in medical image registration. However, existing methods often struggle with severe interference and deformation, as seen in histological images of conditions like Cushing’s disease. We argue that the failure of current approaches lies in underutilizing the feature extraction capability of the discriminator in GAN. In this study, we propose a novel multi-modal registration approach GAN-DIRNet based on GAN for deformable histological image registration. To… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Fractal-Based Features for Low-Power Appliances in Non-Intrusive Load Monitoring

    Anam Mughees1,2,*, Muhammad Kamran1,3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 507-526, 2024, DOI:10.32604/cmc.2024.051820
    Abstract Non-intrusive load monitoring is a method that disaggregates the overall energy consumption of a building to estimate the electric power usage and operating status of each appliance individually. Prior studies have mostly concentrated on the identification of high-power appliances like HVAC systems while overlooking the existence of low-power appliances. Low-power consumer appliances have comparable power consumption patterns, which can complicate the detection task and can be mistaken as noise. This research tackles the problem of classification of low-power appliances and uses turn-on current transients to extract novel features and develop unique appliance signatures. A hybrid… More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Binary Neural Networks for Road Anomaly Detection: A TinyML Approach on Edge Devices

    Amna Khatoon1, Weixing Wang1,*, Asad Ullah2, Limin Li3,*, Mengfei Wang1
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 527-546, 2024, DOI:10.32604/cmc.2024.051147
    (This article belongs to the Special Issue: Data and Image Processing in Intelligent Information Systems)
    Abstract Integrating Tiny Machine Learning (TinyML) with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level. Constrained devices efficiently implement a Binary Neural Network (BNN) for road feature extraction, utilizing quantization and compression through a pruning strategy. The modifications resulted in a 28-fold decrease in memory usage and a 25% enhancement in inference speed while only experiencing a 2.5% decrease in accuracy. It showcases its superiority over conventional detection algorithms in different road image scenarios. Although constrained by computer resources and training datasets, our results indicate opportunities for More >

  • Open AccessOpen Access

    ARTICLE

    Generating Factual Text via Entailment Recognition Task

    Jinqiao Dai, Pengsen Cheng, Jiayong Liu*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 547-565, 2024, DOI:10.32604/cmc.2024.051745
    Abstract Generating diverse and factual text is challenging and is receiving increasing attention. By sampling from the latent space, variational autoencoder-based models have recently enhanced the diversity of generated text. However, existing research predominantly depends on summarization models to offer paragraph-level semantic information for enhancing factual correctness. The challenge lies in effectively generating factual text using sentence-level variational autoencoder-based models. In this paper, a novel model called fact-aware conditional variational autoencoder is proposed to balance the factual correctness and diversity of generated text. Specifically, our model encodes the input sentences and uses them as facts to… More >

  • Open AccessOpen Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 567-585, 2024, DOI:10.32604/cmc.2024.052233
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network

    Wei Wu, Liang Yu, Liping Yang*, Yadong Zhang, Peng Wang
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 587-603, 2024, DOI:10.32604/cmc.2024.052655
    (This article belongs to the Special Issue: Trustworthy Wireless Computing Power Networks Assisted by Blockchain)
    Abstract As an open network architecture, Wireless Computing Power Networks (WCPN) pose new challenges for achieving efficient and secure resource management in networks, because of issues such as insecure communication channels and untrusted device terminals. Blockchain, as a shared, immutable distributed ledger, provides a secure resource management solution for WCPN. However, integrating blockchain into WCPN faces challenges like device heterogeneity, monitoring communication states, and dynamic network nature. Whereas Digital Twins (DT) can accurately maintain digital models of physical entities through real-time data updates and self-learning, enabling continuous optimization of WCPN, improving synchronization performance, ensuring real-time accuracy, More >

  • Open AccessOpen Access

    ARTICLE

    SMSTracker: A Self-Calibration Multi-Head Self-Attention Transformer for Visual Object Tracking

    Zhongyang Wang, Hu Zhu, Feng Liu*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 605-623, 2024, DOI:10.32604/cmc.2024.050959
    (This article belongs to the Special Issue: Recognition Tasks with Transformers)
    Abstract Visual object tracking plays a crucial role in computer vision. In recent years, researchers have proposed various methods to achieve high-performance object tracking. Among these, methods based on Transformers have become a research hotspot due to their ability to globally model and contextualize information. However, current Transformer-based object tracking methods still face challenges such as low tracking accuracy and the presence of redundant feature information. In this paper, we introduce self-calibration multi-head self-attention Transformer (SMSTracker) as a solution to these challenges. It employs a hybrid tensor decomposition self-organizing multi-head self-attention transformer mechanism, which not only… More >

  • Open AccessOpen Access

    ARTICLE

    Evolutionary Variational YOLOv8 Network for Fault Detection in Wind Turbines

    Hongjiang Wang1, Qingze Shen2,*, Qin Dai1, Yingcai Gao2, Jing Gao2, Tian Zhang3,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 625-642, 2024, DOI:10.32604/cmc.2024.051757
    (This article belongs to the Special Issue: Neural Architecture Search: Optimization, Efficiency and Application)
    Abstract Deep learning has emerged in many practical applications, such as image classification, fault diagnosis, and object detection. More recently, convolutional neural networks (CNNs), representative models of deep learning, have been used to solve fault detection. However, the current design of CNNs for fault detection of wind turbine blades is highly dependent on domain knowledge and requires a large amount of trial and error. For this reason, an evolutionary YOLOv8 network has been developed to automatically find the network architecture for wind turbine blade-based fault detection. YOLOv8 is a CNN-backed object detection model. Specifically, to reduce… More >

  • Open AccessOpen Access

    ARTICLE

    Distributed Resource Allocation in Dispersed Computing Environment Based on UAV Track Inspection in Urban Rail Transit

    Tong Gan1, Shuo Dong1, Shiyou Wang1, Jiaxin Li2,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 643-660, 2024, DOI:10.32604/cmc.2024.051408
    Abstract With the rapid development of urban rail transit, the existing track detection has some problems such as low efficiency and insufficient detection coverage, so an intelligent and automatic track detection method based on UAV is urgently needed to avoid major safety accidents. At the same time, the geographical distribution of IoT devices results in the inefficient use of the significant computing potential held by a large number of devices. As a result, the Dispersed Computing (DCOMP) architecture enables collaborative computing between devices in the Internet of Everything (IoE), promotes low-latency and efficient cross-wide applications, and… More >

  • Open AccessOpen Access

    ARTICLE

    Transformer-Based Cloud Detection Method for High-Resolution Remote Sensing Imagery

    Haotang Tan1, Song Sun2,*, Tian Cheng3, Xiyuan Shu2
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 661-678, 2024, DOI:10.32604/cmc.2024.052208
    (This article belongs to the Special Issue: The Latest Deep Learning Architectures for Artificial Intelligence Applications)
    Abstract Cloud detection from satellite and drone imagery is crucial for applications such as weather forecasting and environmental monitoring. Addressing the limitations of conventional convolutional neural networks, we propose an innovative transformer-based method. This method leverages transformers, which are adept at processing data sequences, to enhance cloud detection accuracy. Additionally, we introduce a Cyclic Refinement Architecture that improves the resolution and quality of feature extraction, thereby aiding in the retention of critical details often lost during cloud detection. Our extensive experimental validation shows that our approach significantly outperforms established models, excelling in high-resolution feature extraction and More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Tea Leaf Disease Identification with Lightweight MobileNetV2

    Zhilin Li1,2, Yuxin Li1, Chunyu Yan1, Peng Yan1, Xiutong Li1, Mei Yu1, Tingchi Wen4,5, Benliang Xie1,2,3,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 679-694, 2024, DOI:10.32604/cmc.2024.051526
    Abstract Diseases in tea trees can result in significant losses in both the quality and quantity of tea production. Regular monitoring can help to prevent the occurrence of large-scale diseases in tea plantations. However, existing methods face challenges such as a high number of parameters and low recognition accuracy, which hinders their application in tea plantation monitoring equipment. This paper presents a lightweight I-MobileNetV2 model for identifying diseases in tea leaves, to address these challenges. The proposed method first embeds a Coordinate Attention (CA) module into the original MobileNetV2 network, enabling the model to locate disease More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Rule Discovery for Data Transformation Using Fusion of Diversified Feature Formats

    G. Sunil Santhosh Kumar1,2,*, M. Rudra Kumar3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 695-713, 2024, DOI:10.32604/cmc.2024.050143
    Abstract This article presents an innovative approach to automatic rule discovery for data transformation tasks leveraging XGBoost, a machine learning algorithm renowned for its efficiency and performance. The framework proposed herein utilizes the fusion of diversified feature formats, specifically, metadata, textual, and pattern features. The goal is to enhance the system’s ability to discern and generalize transformation rules from source to destination formats in varied contexts. Firstly, the article delves into the methodology for extracting these distinct features from raw data and the pre-processing steps undertaken to prepare the data for the model. Subsequent sections expound… More >

  • Open AccessOpen Access

    ARTICLE

    Evaluation of Industrial IoT Service Providers with TOPSIS Based on Circular Intuitionistic Fuzzy Sets

    Elif Çaloğlu Büyükselçuk*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 715-746, 2024, DOI:10.32604/cmc.2024.052509
    Abstract Industrial Internet of Things (IIoT) service providers have become increasingly important in the manufacturing industry due to their ability to gather and process vast amounts of data from connected devices, enabling manufacturers to improve operational efficiency, reduce costs, and enhance product quality. These platforms provide manufacturers with real-time visibility into their production processes and supply chains, allowing them to optimize operations and make informed decisions. In addition, IIoT service providers can help manufacturers create new revenue streams through the development of innovative products and services and enable them to leverage the benefits of emerging technologies… More >

  • Open AccessOpen Access

    REVIEW

    Open-Source Software Defined Networking Controllers: State-of-the-Art, Challenges and Solutions for Future Network Providers

    Johari Abdul Rahim1, Rosdiadee Nordin2,*, Oluwatosin Ahmed Amodu3,4
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 747-800, 2024, DOI:10.32604/cmc.2024.047009
    Abstract Software Defined Networking (SDN) is programmable by separation of forwarding control through the centralization of the controller. The controller plays the role of the ‘brain’ that dictates the intelligent part of SDN technology. Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them. There are several SDN controllers available in the open market besides a large number of commercial controllers; some are developed to meet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System (ONOS). This paper… More >

  • Open AccessOpen Access

    ARTICLE

    A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families

    Li Li*, Qing Zhang, Youran Kong
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 801-818, 2024, DOI:10.32604/cmc.2024.051916
    Abstract Due to the diversity and unpredictability of changes in malicious code, studying the traceability of variant families remains challenging. In this paper, we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants. This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images. The method includes a lightweight classifier and a simulator. The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile, embedded, and other devices. The simulator utilizes… More >

  • Open AccessOpen Access

    ARTICLE

    Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network

    Saad Abdalla Agaili Mohamed*, Sefer Kurnaz
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 819-841, 2024, DOI:10.32604/cmc.2024.050474
    (This article belongs to the Special Issue: Applying AI Techniques for Cyber Physical Systems and Security Solutions: From Research to Practice)
    Abstract VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world. However, increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorize VPN network data. We present a novel VPN network traffic flow classification method utilizing Artificial Neural Networks (ANN). This paper aims to provide a reliable system that can identify a virtual private network (VPN) traffic from intrusion attempts, data exfiltration, and denial-of-service assaults. We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns. Next, we create an ANN architecture that can… More >

  • Open AccessOpen Access

    ARTICLE

    Detecting XSS with Random Forest and Multi-Channel Feature Extraction

    Qiurong Qin, Yueqin Li*, Yajie Mi, Jinhui Shen, Kexin Wu, Zhenzhao Wang
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 843-874, 2024, DOI:10.32604/cmc.2024.051769
    Abstract In the era of the Internet, widely used web applications have become the target of hacker attacks because they contain a large amount of personal information. Among these vulnerabilities, stealing private data through cross-site scripting (XSS) attacks is one of the most commonly used attacks by hackers. Currently, deep learning-based XSS attack detection methods have good application prospects; however, they suffer from problems such as being prone to overfitting, a high false alarm rate, and low accuracy. To address these issues, we propose a multi-stage feature extraction and fusion model for XSS detection based on… More >

  • Open AccessOpen Access

    ARTICLE

    MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection

    Yu Yan1, Yu Yang1,*, Shen Fang1, Minna Gao2, Yiding Chen1
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 875-896, 2024, DOI:10.32604/cmc.2024.051685
    Abstract In the face of the effective popularity of the Internet of Things (IoT), but the frequent occurrence of cybersecurity incidents, various cybersecurity protection means have been proposed and applied. Among them, Intrusion Detection System (IDS) has been proven to be stable and efficient. However, traditional intrusion detection methods have shortcomings such as low detection accuracy and inability to effectively identify malicious attacks. To address the above problems, this paper fully considers the superiority of deep learning models in processing high-dimensional data, and reasonable data type conversion methods can extract deep features and detect classification using… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Anti-Collision Algorithm for Large Scale of UHF RFID Tags Access Systems

    Xu Zhang1, Yi He1, Haiwen Yi1, Yulu Zhang2, Yuan Li2, Shuai Ma2, Gui Li3, Zhiyuan Zhao4, Yue Liu1, Junyang Liu1, Guangjun Wen1, Jian Li1,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 897-912, 2024, DOI:10.32604/cmc.2024.050000
    Abstract When the radio frequency identification (RFID) system inventories multiple tags, the recognition rate will be seriously affected due to collisions. Based on the existing dynamic frame slotted Aloha (DFSA) algorithm, a sub-frame observation and cyclic redundancy check (CRC) grouping combined dynamic framed slotted Aloha (SUBF-CGDFSA) algorithm is proposed. The algorithm combines the precise estimation method of the quantity of large-scale tags, the large-scale tags grouping mechanism based on CRC pseudo-random characteristics, and the Aloha anti-collision optimization mechanism based on sub-frame observation. By grouping tags and sequentially identifying them within subframes, it accurately estimates the number More >

  • Open AccessOpen Access

    ARTICLE

    Passive IoT Localization Technology Based on SD-PDOA in NLOS and Multi-Path Environments

    Junyang Liu1, Yuan Li2, Yulu Zhang2, Shuai Ma2, Gui Li3, Yi He1, Haiwen Yi1, Yue Liu1, Xiaotao Xu4, Xu Zhang1, Jinyao He1, Guangjun Wen1, Jian Li1,*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 913-930, 2024, DOI:10.32604/cmc.2024.049999
    Abstract Addressing the challenges of passive Radio Frequency Identification (RFID) indoor localization technology in Non-Line-of-Sight (NLoS) and multipath environments, this paper presents an innovative approach by introducing a combined technology integrating an improved Kalman Filter with Space Domain Phase Difference of Arrival (SD-PDOA) and Received Signal Strength Indicator (RSSI). This methodology utilizes the distinct channel characteristics in multipath and NLoS contexts to effectively filter out interference and accurately extract localization information, thereby facilitating high precision and stability in passive RFID localization. The efficacy of this approach is demonstrated through detailed simulations and empirical tests conducted on… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Iterated Greedy Algorithm for Solving Rescue Robot Path Planning Problem with Limited Survival Time

    Xiaoqing Wang1, Peng Duan1,*, Leilei Meng1,*, Kaidong Yang2
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 931-947, 2024, DOI:10.32604/cmc.2024.050612
    (This article belongs to the Special Issue: Recent Advances in Ensemble Framework of Meta-heuristics and Machine Learning: Methods and Applications)
    Abstract Effective path planning is crucial for mobile robots to quickly reach rescue destination and complete rescue tasks in a post-disaster scenario. In this study, we investigated the post-disaster rescue path planning problem and modeled this problem as a variant of the travel salesman problem (TSP) with life-strength constraints. To address this problem, we proposed an improved iterated greedy (IIG) algorithm. First, a push-forward insertion heuristic (PFIH) strategy was employed to generate a high-quality initial solution. Second, a greedy-based insertion strategy was designed and used in the destruction-construction stage to increase the algorithm’s exploration ability. Furthermore,… More >

  • Open AccessOpen Access

    ARTICLE

    Learning Dual-Layer User Representation for Enhanced Item Recommendation

    Fuxi Zhu1, Jin Xie2,*, Mohammed Alshahrani3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 949-971, 2024, DOI:10.32604/cmc.2024.051046
    (This article belongs to the Special Issue: The Next-generation Deep Learning Approaches to Emerging Real-world Applications)
    Abstract User representation learning is crucial for capturing different user preferences, but it is also critical challenging because user intentions are latent and dispersed in complex and different patterns of user-generated data, and thus cannot be measured directly. Text-based data models can learn user representations by mining latent semantics, which is beneficial to enhancing the semantic function of user representations. However, these technologies only extract common features in historical records and cannot represent changes in user intentions. However, sequential feature can express the user’s interests and intentions that change time by time. But the sequential recommendation… More >

  • Open AccessOpen Access

    ARTICLE

    Cloud-Edge Collaborative Federated GAN Based Data Processing for IoT-Empowered Multi-Flow Integrated Energy Aggregation Dispatch

    Zhan Shi*
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 973-994, 2024, DOI:10.32604/cmc.2024.051530
    Abstract The convergence of Internet of Things (IoT), 5G, and cloud collaboration offers tailored solutions to the rigorous demands of multi-flow integrated energy aggregation dispatch data processing. While generative adversarial networks (GANs) are instrumental in resource scheduling, their application in this domain is impeded by challenges such as convergence speed, inferior optimality searching capability, and the inability to learn from failed decision making feedbacks. Therefore, a cloud-edge collaborative federated GAN-based communication and computing resource scheduling algorithm with long-term constraint violation sensitiveness is proposed to address these challenges. The proposed algorithm facilitates real-time, energy-efficient data processing by More >

  • Open AccessOpen Access

    REVIEW

    A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection

    Yaqiong He, Jinlin Fan*, Huaiguang Wu
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 995-1032, 2024, DOI:10.32604/cmc.2024.052887
    Abstract With the rise of blockchain technology, the security issues of smart contracts have become increasingly critical. Despite the availability of numerous smart contract vulnerability detection tools, many face challenges such as slow updates, usability issues, and limited installation methods. These challenges hinder the adoption and practicality of these tools. This paper examines smart contract vulnerability detection tools from 2016 to 2023, sourced from the Web of Science (WOS) and Google Scholar. By systematically collecting, screening, and synthesizing relevant research, 38 open-source tools that provide installation methods were selected for further investigation. From a developer’s perspective,… More >

  • Open AccessOpen Access

    ARTICLE

    A Machine Learning Approach to Cyberbullying Detection in Arabic Tweets

    Dhiaa Musleh1, Atta Rahman1,*, Mohammed Abbas Alkherallah1, Menhal Kamel Al-Bohassan1, Mustafa Mohammed Alawami1, Hayder Ali Alsebaa1, Jawad Ali Alnemer1, Ghazi Fayez Al-Mutairi1, May Issa Aldossary2, Dalal A. Aldowaihi1, Fahd Alhaidari3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1033-1054, 2024, DOI:10.32604/cmc.2024.048003
    Abstract With the rapid growth of internet usage, a new situation has been created that enables practicing bullying. Cyberbullying has increased over the past decade, and it has the same adverse effects as face-to-face bullying, like anger, sadness, anxiety, and fear. With the anonymity people get on the internet, they tend to be more aggressive and express their emotions freely without considering the effects, which can be a reason for the increase in cyberbullying and it is the main motive behind the current study. This study presents a thorough background of cyberbullying and the techniques used… More >

  • Open AccessOpen Access

    ARTICLE

    Pulmonary Edema and Pleural Effusion Detection Using EfficientNet-V1-B4 Architecture and AdamW Optimizer from Chest X-Rays Images

    Anas AbuKaraki1, Tawfi Alrawashdeh1, Sumaya Abusaleh1, Malek Zakarya Alksasbeh1,*, Bilal Alqudah1, Khalid Alemerien2, Hamzah Alshamaseen3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1055-1073, 2024, DOI:10.32604/cmc.2024.051420
    (This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
    Abstract This paper presents a novel multiclass system designed to detect pleural effusion and pulmonary edema on chest X-ray images, addressing the critical need for early detection in healthcare. A new comprehensive dataset was formed by combining 28,309 samples from the ChestX-ray14, PadChest, and CheXpert databases, with 10,287, 6022, and 12,000 samples representing Pleural Effusion, Pulmonary Edema, and Normal cases, respectively. Consequently, the preprocessing step involves applying the Contrast Limited Adaptive Histogram Equalization (CLAHE) method to boost the local contrast of the X-ray samples, then resizing the images to 380 × 380 dimensions, followed by using the data… More >

  • Open AccessOpen Access

    ARTICLE

    Contemporary Study for Detection of COVID-19 Using Machine Learning with Explainable AI

    Saad Akbar1,2, Humera Azam1, Sulaiman Sulmi Almutairi3,*, Omar Alqahtani4, Habib Shah4, Aliya Aleryani4
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1075-1104, 2024, DOI:10.32604/cmc.2024.050913
    (This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
    Abstract The prompt spread of COVID-19 has emphasized the necessity for effective and precise diagnostic tools. In this article, a hybrid approach in terms of datasets as well as the methodology by utilizing a previously unexplored dataset obtained from a private hospital for detecting COVID-19, pneumonia, and normal conditions in chest X-ray images (CXIs) is proposed coupled with Explainable Artificial Intelligence (XAI). Our study leverages less preprocessing with pre-trained cutting-edge models like InceptionV3, VGG16, and VGG19 that excel in the task of feature extraction. The methodology is further enhanced by the inclusion of the t-SNE (t-Distributed… More >

  • Open AccessOpen Access

    ARTICLE

    Masked Autoencoders as Single Object Tracking Learners

    Chunjuan Bo1,*, Xin Chen2, Junxing Zhang1
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1105-1122, 2024, DOI:10.32604/cmc.2024.052329
    (This article belongs to the Special Issue: Recognition Tasks with Transformers)
    Abstract Significant advancements have been witnessed in visual tracking applications leveraging ViT in recent years, mainly due to the formidable modeling capabilities of Vision Transformer (ViT). However, the strong performance of such trackers heavily relies on ViT models pretrained for long periods, limiting more flexible model designs for tracking tasks. To address this issue, we propose an efficient unsupervised ViT pretraining method for the tracking task based on masked autoencoders, called TrackMAE. During pretraining, we employ two shared-parameter ViTs, serving as the appearance encoder and motion encoder, respectively. The appearance encoder encodes randomly masked image data,… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS

    Kenian Wang1,2,*, Yuan Hong1,2, Chunxiao Li2
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1123-1142, 2024, DOI:10.32604/cmc.2024.052088
    Abstract With the exponential increase in information security risks, ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment. However, experts possess a limited understanding of fundamental security elements, such as assets, threats, and vulnerabilities, due to the confidentiality of airborne networks, resulting in cognitive uncertainty. Therefore, the Pythagorean fuzzy Analytic Hierarchy Process (AHP) Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks. First, Pythagorean fuzzy AHP is employed to construct an index system… More >

  • Open AccessOpen Access

    ARTICLE

    YOLO-O2E: A Variant YOLO Model for Anomalous Rail Fastening Detection

    Zhuhong Chu1, Jianxun Zhang1,*, Chengdong Wang2, Changhui Yang3
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1143-1161, 2024, DOI:10.32604/cmc.2024.052269
    (This article belongs to the Special Issue: The Latest Deep Learning Architectures for Artificial Intelligence Applications)
    Abstract Rail fasteners are a crucial component of the railway transportation safety system. These fasteners, distinguished by their high length-to-width ratio, frequently encounter elevated failure rates, necessitating manual inspection and maintenance. Manual inspection not only consumes time but also poses the risk of potential oversights. With the advancement of deep learning technology in rail fasteners, challenges such as the complex background of rail fasteners and the similarity in their states are addressed. We have proposed an efficient and high-precision rail fastener detection algorithm, named YOLO-O2E (you only look once-O2E). Firstly, we propose the EFOV (Enhanced Field… More >

Per Page:

Share Link