Computers, Materials & Continua is a peer-reviewed Open Access journal that publishes all types of academic papers in the areas of computer networks, artificial intelligence, big data, software engineering, multimedia, cyber security, internet of things, materials genome, integrated materials science, and data analysis, modeling, designing and manufacturing of modern functional and multifunctional materials. This journal is published monthly by Tech Science Press.
SCI: 2023 Impact Factor 2.1; Scopus CiteScore (Impact per Publication 2023): 5.3; SNIP (Source Normalized Impact per Paper 2023): 0.73; Ei Compendex; Cambridge Scientific Abstracts; INSPEC Databases; Science Navigator; EBSCOhost; ProQuest Central; Zentralblatt für Mathematik; Portico, etc.
Open Access
TECHNICAL REPORT
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1-11, 2025, DOI:10.32604/cmc.2025.062666 - 26 March 2025
Abstract NJmat is a user-friendly, data-driven machine learning interface designed for materials design and analysis. The platform integrates advanced computational techniques, including natural language processing (NLP), large language models (LLM), machine learning potentials (MLP), and graph neural networks (GNN), to facilitate materials discovery. The platform has been applied in diverse materials research areas, including perovskite surface design, catalyst discovery, battery materials screening, structural alloy design, and molecular informatics. By automating feature selection, predictive modeling, and result interpretation, NJmat accelerates the development of high-performance materials across energy storage, conversion, and structural applications. Additionally, NJmat serves as an… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 13-64, 2025, DOI:10.32604/cmc.2025.062819 - 26 March 2025
Abstract Edge Machine Learning (EdgeML) and Tiny Machine Learning (TinyML) are fast-growing fields that bring machine learning to resource-constrained devices, allowing real-time data processing and decision-making at the network’s edge. However, the complexity of model conversion techniques, diverse inference mechanisms, and varied learning strategies make designing and deploying these models challenging. Additionally, deploying TinyML models on resource-constrained hardware with specific software frameworks has broadened EdgeML’s applications across various sectors. These factors underscore the necessity for a comprehensive literature review, as current reviews do not systematically encompass the most recent findings on these topics. Consequently, it provides… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 65-77, 2025, DOI:10.32604/cmc.2025.059727 - 26 March 2025
(This article belongs to the Special Issue: Advances in Computational Materials Science: Focusing on Atomic-Scale Simulations and AI-Driven Innovations)
Abstract To explore atomic-level phenomena in the Cu-Ni-Sn alloy, a second nearest-neighbor modified embedded-atom method (2NN MEAM) potential has been developed for the Cu-Ni-Sn system, building upon the work of other researchers. This potential demonstrates remarkable accuracy in predicting the lattice constant, with a relative error of less than 0.5% when compared to density functional theory (DFT) results, and it achieves a 10% relative error in the enthalpy of formation compared to experimental data, marking substantial advancements over prior models. The bulk modulus is predicted with a relative error of 8% compared to DFT. Notably, the More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 79-96, 2025, DOI:10.32604/cmc.2025.061741 - 26 March 2025
Abstract This paper employs the Direct Finite Element Squared (DFE2) method to develop Sparse Polynomial Chaos Expansions (SPCE) models for analyzing the electromechanical properties of multiscale piezoelectric structures. By incorporating variations in piezoelectric and elastic constants, the DFE2 method is utilized to simulate the statistical characteristics—such as expected values and standard deviations—of electromechanical properties, including Mises stress, maximum in-plane principal strain, electric potential gradient, and electric potential, under varying parameters. This approach achieves a balance between computational efficiency and accuracy. Different SPCE models are used to investigate the influence of piezoelectric and elastic constants on multiscale piezoelectric More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 97-114, 2025, DOI:10.32604/cmc.2025.063441 - 26 March 2025
(This article belongs to the Special Issue: Selected Papers from the International Multi-Conference on Engineering and Technology Innovation 2024 (IMETI2024))
Abstract Precision steel balls are critical components in precision bearings. Surface defects on the steel balls will significantly reduce their useful life and cause linear or rotational transmission errors. Human visual inspection of precision steel balls demands significant labor work. Besides, human inspection cannot maintain consistent quality assurance. To address these limitations and reduce inspection time, a convolutional neural network (CNN) based optical inspection system has been developed that automatically detects steel ball defects using a novel designated vertical mechanism. During image detection processing, two key challenges were addressed and resolved. They are the reflection caused… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 115-136, 2025, DOI:10.32604/cmc.2025.062729 - 26 March 2025
Abstract Improving website security to prevent malicious online activities is crucial, and CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) has emerged as a key strategy for distinguishing human users from automated bots. Text-based CAPTCHAs, designed to be easily decipherable by humans yet challenging for machines, are a common form of this verification. However, advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising efficiency. In our comprehensive investigation into CAPTCHA recognition, we have tailored the renowned UpDown image captioning model specifically for this… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 137-155, 2025, DOI:10.32604/cmc.2025.060534 - 26 March 2025
Abstract Relation extraction plays a crucial role in numerous downstream tasks. Dialogue relation extraction focuses on identifying relations between two arguments within a given dialogue. To tackle the problem of low information density in dialogues, methods based on trigger enhancement have been proposed, yielding positive results. However, trigger enhancement faces challenges, which cause suboptimal model performance. First, the proportion of annotated triggers is low in DialogRE. Second, feature representations of triggers and arguments often contain conflicting information. In this paper, we propose a novel Multi-Feature Filtering and Fusion trigger enhancement approach to overcome these limitations. We first… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 157-175, 2025, DOI:10.32604/cmc.2025.059863 - 26 March 2025
Abstract Transfer-based Adversarial Attacks (TAAs) can deceive a victim model even without prior knowledge. This is achieved by leveraging the property of adversarial examples. That is, when generated from a surrogate model, they retain their features if applied to other models due to their good transferability. However, adversarial examples often exhibit overfitting, as they are tailored to exploit the particular architecture and feature representation of source models. Consequently, when attempting black-box transfer attacks on different target models, their effectiveness is decreased. To solve this problem, this study proposes an approach based on a Regularized Constrained Feature More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 177-199, 2025, DOI:10.32604/cmc.2025.062133 - 26 March 2025
Abstract The machining process remains relevant for manufacturing high-quality and high-precision parts, which can be found in industries such as aerospace and aeronautical, with many produced by turning, drilling, and milling processes. Monitoring and analyzing tool wear during these processes is crucial to assess the tool’s life and optimize the tool’s performance under study; as such, standards detail procedures to measure and assess tool wear for various tools. Measuring wear in machining tools can be time-consuming, as the process is usually manual, requiring human interaction and judgment. In the present work, an automated offline flank wear… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 201-217, 2025, DOI:10.32604/cmc.2025.061527 - 26 March 2025
Abstract We analyze the suitability of existing pre-trained transformer-based language models (PLMs) for abstractive text summarization on German technical healthcare texts. The study focuses on the multilingual capabilities of these models and their ability to perform the task of abstractive text summarization in the healthcare field. The research hypothesis was that large language models could perform high-quality abstractive text summarization on German technical healthcare texts, even if the model is not specifically trained in that language. Through experiments, the research questions explore the performance of transformer language models in dealing with complex syntax constructs, the difference… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 219-238, 2025, DOI:10.32604/cmc.2025.059745 - 26 March 2025
Abstract With the advancements in parameter-efficient transfer learning techniques, it has become feasible to leverage large pre-trained language models for downstream tasks under low-cost and low-resource conditions. However, applying this technique to multimodal knowledge transfer introduces a significant challenge: ensuring alignment across modalities while minimizing the number of additional parameters required for downstream task adaptation. This paper introduces UniTrans, a framework aimed at facilitating efficient knowledge transfer across multiple modalities. UniTrans leverages Vector-based Cross-modal Random Matrix Adaptation to enable fine-tuning with minimal parameter overhead. To further enhance modality alignment, we introduce two key components: the Multimodal More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 239-258, 2025, DOI:10.32604/cmc.2025.061377 - 26 March 2025
Abstract Large-scale neural networks-based federated learning (FL) has gained public recognition for its effective capabilities in distributed training. Nonetheless, the open system architecture inherent to federated learning systems raises concerns regarding their vulnerability to potential attacks. Poisoning attacks turn into a major menace to federated learning on account of their concealed property and potent destructive force. By altering the local model during routine machine learning training, attackers can easily contaminate the global model. Traditional detection and aggregation solutions mitigate certain threats, but they are still insufficient to completely eliminate the influence generated by attackers. Therefore, federated… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 259-279, 2025, DOI:10.32604/cmc.2025.062608 - 26 March 2025
Abstract Underwater wireless sensor networks (UWSNs) rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the sink. However, many existing data aggregation techniques are designed exclusively for static networks and fail to reflect the dynamic nature of underwater environments. Additionally, conventional multi-hop data gathering techniques often lead to energy depletion problems near the sink, commonly known as the energy hole issue. Moreover, cluster-based aggregation methods face significant challenges such as cluster head (CH) failures and collisions within clusters that degrade overall network performance. To address these limitations,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 281-308, 2025, DOI:10.32604/cmc.2025.059597 - 26 March 2025
Abstract The successful penetration of government, corporate, and organizational IT systems by state and non-state actors deploying APT vectors continues at an alarming pace. Advanced Persistent Threat (APT) attacks continue to pose significant challenges for organizations despite technological advancements in artificial intelligence (AI)-based defense mechanisms. While AI has enhanced organizational capabilities for deterrence, detection, and mitigation of APTs, the global escalation in reported incidents, particularly those successfully penetrating critical government infrastructure has heightened concerns among information technology (IT) security administrators and decision-makers. Literature review has identified the stealthy lateral movement (LM) of malware within the initially… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 309-333, 2025, DOI:10.32604/cmc.2025.060455 - 26 March 2025
Abstract Social media has significantly accelerated the rapid dissemination of information, but it also boosts propagation of fake news, posing serious challenges to public awareness and social stability. In real-world contexts, the volume of trustable information far exceeds that of rumors, resulting in a class imbalance that leads models to prioritize the majority class during training. This focus diminishes the model’s ability to recognize minority class samples. Furthermore, models may experience overfitting when encountering these minority samples, further compromising their generalization capabilities. Unlike node-level classification tasks, fake news detection in social networks operates on graph-level samples,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 335-355, 2025, DOI:10.32604/cmc.2025.061243 - 26 March 2025
(This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)
Abstract Previous research utilizing Cartoon Generative Adversarial Network (CartoonGAN) has encountered limitations in managing intricate outlines and accurately representing lighting effects, particularly in complex scenes requiring detailed shading and contrast. This paper presents a novel Enhanced Pixel Integration (EPI) technique designed to improve the visual quality of images generated by CartoonGAN. Rather than modifying the core model, the EPI approach employs post-processing adjustments that enhance images without significant computational overhead. In this method, images produced by CartoonGAN are converted from Red-Green-Blue (RGB) to Hue-Saturation-Value (HSV) format, allowing for precise adjustments in hue, saturation, and brightness, thereby… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 357-380, 2025, DOI:10.32604/cmc.2025.060709 - 26 March 2025
Abstract Federated learning is a machine learning framework designed to protect privacy by keeping training data on clients’ devices without sharing private data. It trains a global model through collaboration between clients and the server. However, the presence of data heterogeneity can lead to inefficient model training and even reduce the final model’s accuracy and generalization capability. Meanwhile, data scarcity can result in suboptimal cluster distributions for few-shot clients in centralized clustering tasks, and standalone personalization tasks may cause severe overfitting issues. To address these limitations, we introduce a federated learning dual optimization model based on… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 381-405, 2025, DOI:10.32604/cmc.2025.062452 - 26 March 2025
Abstract Image processing plays a vital role in various fields such as autonomous systems, healthcare, and cataloging, especially when integrated with deep learning (DL). It is crucial in medical diagnostics, including the early detection of diseases like chronic obstructive pulmonary disease (COPD), which claimed 3.2 million lives in 2015. COPD, a life-threatening condition often caused by prolonged exposure to lung irritants and smoking, progresses through stages. Early diagnosis through image processing can significantly improve survival rates. COPD encompasses chronic bronchitis (CB) and emphysema; CB particularly increases in smokers and generally affects individuals between 50 and 70… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 407-434, 2025, DOI:10.32604/cmc.2025.061694 - 26 March 2025
(This article belongs to the Special Issue: Heuristic Algorithms for Optimizing Network Technologies: Innovations and Applications)
Abstract To transmit customer power data collected by smart meters (SMs) to utility companies, data must first be transmitted to the corresponding data aggregation point (DAP) of the SM. The number of DAPs installed and the installation location greatly impact the whole network. For the traditional DAP placement algorithm, the number of DAPs must be set in advance, but determining the best number of DAPs is difficult, which undoubtedly reduces the overall performance of the network. Moreover, the excessive gap between the loads of different DAPs is also an important factor affecting the quality of the… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 435-453, 2025, DOI:10.32604/cmc.2025.057792 - 26 March 2025
Abstract Duplicate bug reporting is a critical problem in the software repositories’ mining area. Duplicate bug reports can lead to redundant efforts, wasted resources, and delayed software releases. Thus, their accurate identification is essential for streamlining the bug triage process mining area. Several researchers have explored classical information retrieval, natural language processing, text and data mining, and machine learning approaches. The emergence of large language models (LLMs) (ChatGPT and Huggingface) has presented a new line of models for semantic textual similarity (STS). Although LLMs have shown remarkable advancements, there remains a need for longitudinal studies to… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 455-473, 2025, DOI:10.32604/cmc.2025.060617 - 26 March 2025
(This article belongs to the Special Issue: Computing Technology in the Design and Manufacturing of Advanced Materials)
Abstract Fatigue damage is a primary contributor to the failure of composite structures, underscoring the critical importance of monitoring its progression to ensure structural safety. This paper introduces an innovative approach to fatigue damage monitoring in composite structures, leveraging a hybrid methodology that integrates the Whale Optimization Algorithm (WOA)-Backpropagation (BP) neural network with an ultrasonic guided wave feature selection algorithm. Initially, a network of piezoelectric ceramic sensors is employed to transmit and capture ultrasonic-guided waves, thereby establishing a signal space that correlates with the structural condition. Subsequently, the Relief-F algorithm is applied for signal feature extraction,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 475-496, 2025, DOI:10.32604/cmc.2025.060170 - 26 March 2025
(This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
Abstract Data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data analysis. Traditional clustering algorithms, such as K-means, are widely used due to their simplicity and efficiency. This paper proposes a novel Spiral Mechanism-Optimized Phasmatodea Population Evolution Algorithm (SPPE) to improve clustering performance. The SPPE algorithm introduces several enhancements to the standard Phasmatodea Population Evolution (PPE) algorithm. Firstly, a Variable Neighborhood Search (VNS) factor is incorporated to strengthen the local search capability and foster population diversity. Secondly, a position update model, incorporating a spiral mechanism, is… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 497-515, 2025, DOI:10.32604/cmc.2025.060244 - 26 March 2025
(This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
Abstract Real-time semantic segmentation tasks place stringent demands on network inference speed, often requiring a reduction in network depth to decrease computational load. However, shallow networks tend to exhibit degradation in feature extraction completeness and inference accuracy. Therefore, balancing high performance with real-time requirements has become a critical issue in the study of real-time semantic segmentation. To address these challenges, this paper proposes a lightweight bilateral dual-residual network. By introducing a novel residual structure combined with feature extraction and fusion modules, the proposed network significantly enhances representational capacity while reducing computational costs. Specifically, an improved compound… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 517-536, 2025, DOI:10.32604/cmc.2025.060368 - 26 March 2025
Abstract Stroke is a leading cause of death and disability worldwide, significantly impairing motor and cognitive functions. Effective rehabilitation is often hindered by the heterogeneity of stroke lesions, variability in recovery patterns, and the complexity of electroencephalography (EEG) signals, which are often contaminated by artifacts. Accurate classification of motor imagery (MI) tasks, involving the mental simulation of movements, is crucial for assessing rehabilitation strategies but is challenged by overlapping neural signatures and patient-specific variability. To address these challenges, this study introduces a graph-attentive convolutional long short-term memory (LSTM) network (GACL-Net), a novel hybrid deep learning model… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 537-557, 2025, DOI:10.32604/cmc.2025.061379 - 26 March 2025
Abstract Tires are integral to vehicular systems, directly influencing both safety and overall performance. Traditional tire pressure inspection methods—such as manual or gauge-based approaches—are often time-consuming, prone to inconsistency, and lack the flexibility needed to meet diverse operational demands. In this research, we introduce an AI-driven tire pressure detection system that leverages an enhanced GoogLeNet architecture incorporating a novel Softplus-LReLU activation function. By combining the smooth, non-saturating characteristics of Softplus with a linear adjustment term, this activation function improves computational efficiency and helps stabilize network gradients, thereby mitigating issues such as gradient vanishing and neuron death.… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 559-574, 2025, DOI:10.32604/cmc.2025.061579 - 26 March 2025
(This article belongs to the Special Issue: Research on Deep Learning-based Object Detection and Its Derivative Key Technologies)
Abstract Detecting abnormal cervical cells is crucial for early identification and timely treatment of cervical cancer. However, this task is challenging due to the morphological similarities between abnormal and normal cells and the significant variations in cell size. Pathologists often refer to surrounding cells to identify abnormalities. To emulate this slide examination behavior, this study proposes a Multi-Scale Feature Fusion Network (MSFF-Net) for detecting cervical abnormal cells. MSFF-Net employs a Cross-Scale Pooling Model (CSPM) to effectively capture diverse features and contextual information, ranging from local details to the overall structure. Additionally, a Multi-Scale Fusion Attention (MSFA)… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 575-593, 2025, DOI:10.32604/cmc.2025.062445 - 26 March 2025
Abstract The correction of Light Detection and Ranging (LiDAR) intensity data is of great significance for enhancing its application value. However, traditional intensity correction methods based on Terrestrial Laser Scanning (TLS) technology rely on manual site setup to collect intensity training data at different distances and incidence angles, which is noisy and limited in sample quantity, restricting the improvement of model accuracy. To overcome this limitation, this study proposes a fine-grained intensity correction modeling method based on Mobile Laser Scanning (MLS) technology. The method utilizes the continuous scanning characteristics of MLS technology to obtain dense point… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 595-617, 2025, DOI:10.32604/cmc.2025.060295 - 26 March 2025
(This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
Abstract The primary challenge in weakly supervised semantic segmentation is effectively leveraging weak annotations while minimizing the performance gap compared to fully supervised methods. End-to-end model designs have gained significant attention for improving training efficiency. Most current algorithms rely on Convolutional Neural Networks (CNNs) for feature extraction. Although CNNs are proficient at capturing local features, they often struggle with global context, leading to incomplete and false Class Activation Mapping (CAM). To address these limitations, this work proposes a Contextual Prototype-Based End-to-End Weakly Supervised Semantic Segmentation (CPEWS) model, which improves feature extraction by utilizing the Vision Transformer… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 619-634, 2025, DOI:10.32604/cmc.2025.060094 - 26 March 2025
(This article belongs to the Special Issue: The Next-generation Deep Learning Approaches to Emerging Real-world Applications)
Abstract The proliferation of deep learning (DL) has amplified the demand for processing large and complex datasets for tasks such as modeling, classification, and identification. However, traditional DL methods compromise client privacy by collecting sensitive data, underscoring the necessity for privacy-preserving solutions like Federated Learning (FL). FL effectively addresses escalating privacy concerns by facilitating collaborative model training without necessitating the sharing of raw data. Given that FL clients autonomously manage training data, encouraging client engagement is pivotal for successful model training. To overcome challenges like unreliable communication and budget constraints, we present ENTIRE, a contract-based dynamic… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 635-659, 2025, DOI:10.32604/cmc.2025.061062 - 26 March 2025
(This article belongs to the Special Issue: Next-Generation AI for Ethical and Explainable Decision-Making in Critical Systems)
Abstract Predictive maintenance plays a crucial role in preventing equipment failures and minimizing operational downtime in modern industries. However, traditional predictive maintenance methods often face challenges in adapting to diverse industrial environments and ensuring the transparency and fairness of their predictions. This paper presents a novel predictive maintenance framework that integrates deep learning and optimization techniques while addressing key ethical considerations, such as transparency, fairness, and explainability, in artificial intelligence driven decision-making. The framework employs an Autoencoder for feature reduction, a Convolutional Neural Network for pattern recognition, and a Long Short-Term Memory network for temporal analysis.… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 661-683, 2025, DOI:10.32604/cmc.2025.063687 - 26 March 2025
(This article belongs to the Special Issue: Security and Privacy in IoT and Smart City: Current Challenges and Future Directions)
Abstract The smart home platform integrates with Internet of Things (IoT) devices, smartphones, and cloud servers, enabling seamless and convenient services. It gathers and manages extensive user data, including personal information, device operations, and patterns of user behavior. Such data plays an essential role in criminal investigations, highlighting the growing importance of specialized smart home forensics. Given the rapid advancement in smart home software and hardware technologies, many companies are introducing new devices and services that expand the market. Consequently, scalable and platform-specific forensic research is necessary to support efficient digital investigations across diverse smart home… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 685-700, 2025, DOI:10.32604/cmc.2025.060713 - 26 March 2025
(This article belongs to the Special Issue: Advances in Computational Materials Science: Focusing on Atomic-Scale Simulations and AI-Driven Innovations)
Abstract The deep potential (DP) is an innovative approach based on deep learning that uses ab initio calculation data derived from density functional theory (DFT), to create high-accuracy potential functions for various materials. Platinum (Pt) is a rare metal with significant potential in energy and catalytic applications, However, there are challenges in accurately capturing its physical properties due to high experimental costs and the limitations of traditional empirical methods. This study employs deep learning methods to construct high-precision potential models for single-element systems of Pt and validates their predictive performance in complex environments. The newly developed DP… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 701-718, 2025, DOI:10.32604/cmc.2025.060137 - 26 March 2025
(This article belongs to the Special Issue: Advances in Action Recognition: Algorithms, Applications, and Emerging Trends)
Abstract Graph convolutional network (GCN) as an essential tool in human action recognition tasks have achieved excellent performance in previous studies. However, most current skeleton-based action recognition using GCN methods use a shared topology, which cannot flexibly adapt to the diverse correlations between joints under different motion features. The video-shooting angle or the occlusion of the body parts may bring about errors when extracting the human pose coordinates with estimation algorithms. In this work, we propose a novel graph convolutional learning framework, called PCCTR-GCN, which integrates pose correction and channel topology refinement for skeleton-based human action… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 719-738, 2025, DOI:10.32604/cmc.2025.060836 - 26 March 2025
Abstract With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 739-760, 2025, DOI:10.32604/cmc.2025.059807 - 26 March 2025
(This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
Abstract Brain tumor classification is crucial for personalized treatment planning. Although deep learning-based Artificial Intelligence (AI) models can automatically analyze tumor images, fine details of small tumor regions may be overlooked during global feature extraction. Therefore, we propose a brain tumor Magnetic Resonance Imaging (MRI) classification model based on a global-local parallel dual-branch structure. The global branch employs ResNet50 with a Multi-Head Self-Attention (MHSA) to capture global contextual information from whole brain images, while the local branch utilizes VGG16 to extract fine-grained features from segmented brain tumor regions. The features from both branches are processed through More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 761-783, 2025, DOI:10.32604/cmc.2025.060395 - 26 March 2025
Abstract Multi-modal knowledge graph completion (MMKGC) aims to complete missing entities or relations in multi-modal knowledge graphs, thereby discovering more previously unknown triples. Due to the continuous growth of data and knowledge and the limitations of data sources, the visual knowledge within the knowledge graphs is generally of low quality, and some entities suffer from the issue of missing visual modality. Nevertheless, previous studies of MMKGC have primarily focused on how to facilitate modality interaction and fusion while neglecting the problems of low modality quality and modality missing. In this case, mainstream MMKGC models only use… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 785-801, 2025, DOI:10.32604/cmc.2025.061185 - 26 March 2025
(This article belongs to the Special Issue: Advances in AI Techniques in Convergence ICT)
Abstract Smart contracts are self-executing programs on blockchains that manage complex business logic with transparency and integrity. However, their immutability after deployment makes programming errors particularly critical, as such errors can be exploited to compromise blockchain security. Existing vulnerability detection methods often rely on fixed rules or target specific vulnerabilities, limiting their scalability and adaptability to diverse smart contract scenarios. Furthermore, natural language processing approaches for source code analysis frequently fail to capture program flow, which is essential for identifying structural vulnerabilities. To address these limitations, we propose a novel model that integrates textual and structural… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 803-822, 2025, DOI:10.32604/cmc.2025.060966 - 26 March 2025
Abstract In recent years, convolutional neural networks (CNN) and Transformer architectures have made significant progress in the field of remote sensing (RS) change detection (CD). Most of the existing methods directly stack multiple layers of Transformer blocks, which achieves considerable improvement in capturing variations, but at a rather high computational cost. We propose a channel-Efficient Change Detection Network (CE-CDNet) to address the problems of high computational cost and imbalanced detection accuracy in remote sensing building change detection. The adaptive multi-scale feature fusion module (CAMSF) and lightweight Transformer decoder (LTD) are introduced to improve the change detection More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 823-844, 2025, DOI:10.32604/cmc.2025.061498 - 26 March 2025
Abstract As lithium-ion batteries become increasingly prevalent in electric scooters, vehicles, mobile devices, and energy storage systems, accurate estimation of remaining battery capacity is crucial for optimizing system performance and reliability. Unlike traditional methods that rely on static alternating internal resistance (SAIR) measurements in an open-circuit state, this study presents a real-time state of charge (SOC) estimation method combining dynamic alternating internal resistance (DAIR) with artificial neural networks (ANN). The system simultaneously measures electrochemical impedance |Z| at various frequencies, discharge C-rate, and battery surface temperature during the discharge process, using these parameters for ANN training. The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 845-860, 2025, DOI:10.32604/cmc.2025.059435 - 26 March 2025
(This article belongs to the Special Issue: Innovative Approaches to the Materials Genome: Machine Learning, Big Data, and Computational Methods for Modern Material Design and Manufacturing)
Abstract The design and development of solar dryers are crucial in regions with abundant solar energy, such as Bhopal, India, where seasonal variations significantly impact the efficiency of drying processes. The paper is focused on employing a comprehensive mathematical model to predict the dryer’s performance in drying the materials such as banana slices. To enhance this model, Hyper Tuned Swarm Optimization with Gradient Tree (HT_SOGT) was utilized to accurately predict and determine the optimal size of the dryer dimensions considering various mathematical calculations for material drying. The predictive model considered the influence of seasonal fluctuations, ensuring More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 861-876, 2025, DOI:10.32604/cmc.2025.060517 - 26 March 2025
Abstract Entity relation extraction, a fundamental and essential task in natural language processing (NLP), has garnered significant attention over an extended period., aiming to extract the core of semantic knowledge from unstructured text, i.e., entities and the relations between them. At present, the main dilemma of Chinese entity relation extraction research lies in nested entities, relation overlap, and lack of entity relation interaction. This dilemma is particularly prominent in complex knowledge extraction tasks with high-density knowledge, imprecise syntactic structure, and lack of semantic roles. To address these challenges, this paper presents an innovative “character-level” Chinese part-of-speech… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 877-896, 2025, DOI:10.32604/cmc.2025.061401 - 26 March 2025
Abstract Sarcasm detection in Natural Language Processing (NLP) has become increasingly important, particularly with the rise of social media and non-textual emotional expressions, such as images. Existing methods often rely on separate image and text modalities, which may not fully utilize the information available from both sources. To address this limitation, we propose a novel multimodal large model, i.e., the PKME-MLM (Prior Knowledge and Multi-label Emotion analysis based Multimodal Large Model for sarcasm detection). The PKME-MLM aims to enhance sarcasm detection by integrating prior knowledge to extract useful textual information from images, which is then combined… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 897-915, 2025, DOI:10.32604/cmc.2025.058714 - 26 March 2025
Abstract As technologies related to power equipment fault diagnosis and infrared temperature measurement continue to advance, the classification and identification of infrared temperature measurement images have become crucial in effective intelligent fault diagnosis of various electrical equipment. In response to the increasing demand for sufficient feature fusion in current real-time detection and low detection accuracy in existing networks for Substation fault diagnosis, we introduce an innovative method known as Gather and Distribution Mechanism-You Only Look Once (GD-YOLO). Firstly, a partial convolution group is designed based on different convolution kernels. We combine the partial convolution group with… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 917-933, 2025, DOI:10.32604/cmc.2025.059640 - 26 March 2025
Abstract This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map. The map demonstrates remarkable chaotic dynamics over a wide range of parameters. We employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map, which allows us to select optimal parameter configurations for the encryption process. Our findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors, an essential characteristic for effective encryption. The encryption technique is based on bit-plane decomposition, wherein a plain image is divided into distinct… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 935-976, 2025, DOI:10.32604/cmc.2025.061981 - 26 March 2025
Abstract In today’s fast-paced world, many elderly individuals struggle to adhere to their medication schedules, especially those with memory-related conditions like Alzheimer’s disease, leading to serious health risks, hospitalizations, and increased healthcare costs. Traditional reminder systems often fail due to a lack of personalization and real-time intervention. To address this critical challenge, we introduce MediServe, an advanced IoT-enabled medication management system that seamlessly integrates deep learning techniques to provide a personalized, secure, and adaptive solution. MediServe features a smart medication box equipped with biometric authentication, such as fingerprint recognition, ensuring authorized access to prescribed medication while… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 977-999, 2025, DOI:10.32604/cmc.2025.060319 - 26 March 2025
Abstract Semi-supervised new intent discovery is a significant research focus in natural language understanding. To address the limitations of current semi-supervised training data and the underutilization of implicit information, a Semi-supervised New Intent Discovery for Elastic Neighborhood Syntactic Elimination and Fusion model (SNID-ENSEF) is proposed. Syntactic elimination contrast learning leverages verb-dominant syntactic features, systematically replacing specific words to enhance data diversity. The radius of the positive sample neighborhood is elastically adjusted to eliminate invalid samples and improve training efficiency. A neighborhood sample fusion strategy, based on sample distribution patterns, dynamically adjusts neighborhood size and fuses sample More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1001-1022, 2025, DOI:10.32604/cmc.2025.060925 - 26 March 2025
Abstract The adoption of deep learning-based side-channel analysis (DL-SCA) is crucial for leak detection in secure products. Many previous studies have applied this method to break targets protected with countermeasures. Despite the increasing number of studies, the problem of model overfitting. Recent research mainly focuses on exploring hyperparameters and network architectures, while offering limited insights into the effects of external factors on side-channel attacks, such as the number and type of models. This paper proposes a Side-channel Analysis method based on a Stacking ensemble, called Stacking-SCA. In our method, multiple models are deeply integrated. Through the… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1023-1039, 2025, DOI:10.32604/cmc.2025.061890 - 26 March 2025
(This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications)
Abstract Mango farming significantly contributes to the economy, particularly in developing countries. However, mango trees are susceptible to various diseases caused by fungi, viruses, and bacteria, and diagnosing these diseases at an early stage is crucial to prevent their spread, which can lead to substantial losses. The development of deep learning models for detecting crop diseases is an active area of research in smart agriculture. This study focuses on mango plant diseases and employs the ConvNeXt and Vision Transformer (ViT) architectures. Two datasets were used. The first, MangoLeafBD, contains data for mango leaf diseases such as… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1041-1055, 2025, DOI:10.32604/cmc.2025.060304 - 26 March 2025
(This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
Abstract Instance segmentation is crucial in various domains, such as autonomous driving and robotics. However, there is scope for improvement in the detection speed of instance-segmentation algorithms for edge devices. Therefore, it is essential to enhance detection speed while maintaining high accuracy. In this study, we propose you only look once-layer fusion (YOLO-LF), a lightweight instance segmentation method specifically designed to optimize the speed of instance segmentation for autonomous driving applications. Based on the You Only Look Once version 8 nano (YOLOv8n) framework, we introduce a lightweight convolutional module and design a lightweight layer aggregation module… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1057-1078, 2025, DOI:10.32604/cmc.2025.059946 - 26 March 2025
(This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
Abstract Super-resolution (SR) reconstruction addresses the challenge of enhancing image resolution, which is critical in domains such as medical imaging, remote sensing, and computational photography. High-quality image reconstruction is essential for enhancing visual details and improving the accuracy of subsequent tasks. Traditional methods, including interpolation techniques and basic CNNs, often fail to recover fine textures and detailed structures, particularly in complex or high-frequency regions. In this paper, we present Deep Supervised Swin Transformer U-Net (DSSTU-Net), a novel architecture designed to improve image SR by integrating Residual Swin Transformer Blocks (RSTB) and Deep Supervision (DS) mechanisms into… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1079-1100, 2025, DOI:10.32604/cmc.2025.061836 - 26 March 2025
Abstract The rapid expansion of the Internet of Things (IoT) has led to the widespread adoption of sensor networks, with Long-Range Wide-Area Networks (LoRaWANs) emerging as a key technology due to their ability to support long-range communication while minimizing power consumption. However, optimizing network performance and energy efficiency in dynamic, large-scale IoT environments remains a significant challenge. Traditional methods, such as the Adaptive Data Rate (ADR) algorithm, often fail to adapt effectively to rapidly changing network conditions and environmental factors. This study introduces a hybrid approach that leverages Deep Learning (DL) techniques, namely Long Short-Term Memory… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1101-1116, 2025, DOI:10.32604/cmc.2025.061376 - 26 March 2025
(This article belongs to the Special Issue: Big Data and Artificial Intelligence in Control and Information System)
Abstract The task of student action recognition in the classroom is to precisely capture and analyze the actions of students in classroom videos, providing a foundation for realizing intelligent and accurate teaching. However, the complex nature of the classroom environment has added challenges and difficulties in the process of student action recognition. In this research article, with regard to the circumstances where students are prone to be occluded and classroom computing resources are restricted in real classroom scenarios, a lightweight multi-modal fusion action recognition approach is put forward. This proposed method is capable of enhancing the… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1117-1147, 2025, DOI:10.32604/cmc.2025.061948 - 26 March 2025
Abstract The increasing elderly population has heightened the need for accurate and reliable fall detection systems, as falls can lead to severe health complications. Existing systems often suffer from high false positive and false negative rates due to insufficient training data and suboptimal detection techniques. This study introduces an advanced fall detection model integrating YOLOv8, Faster R-CNN, and Generative Adversarial Networks (GANs) to enhance accuracy and robustness. A modified YOLOv8 architecture serves as the core, utilizing spatial attention mechanisms to improve critical image regions’ detection. Faster R-CNN is employed for fine-grained human posture analysis, while GANs… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1149-1171, 2025, DOI:10.32604/cmc.2025.060876 - 26 March 2025
(This article belongs to the Special Issue: Multimedia Security in Deep Learning)
Abstract Generative image steganography is a technique that directly generates stego images from secret information. Unlike traditional methods, it theoretically resists steganalysis because there is no cover image. Currently, the existing generative image steganography methods generally have good steganography performance, but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction. Therefore, this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule. Firstly, the reference image is disentangled by a content and an attribute encoder to obtain content features… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1173-1193, 2025, DOI:10.32604/cmc.2025.061150 - 26 March 2025
(This article belongs to the Special Issue: Expanding Horizons in Ophthalmic Diagnostics: A Multidisciplinary AI Approach)
Abstract Innovation in learning algorithms has made retinal vessel segmentation and automatic grading techniques crucial for clinical diagnosis and prevention of diabetic retinopathy. The traditional methods struggle with accuracy and reliability due to multi-scale variations in retinal blood vessels and the complex pathological relationship in fundus images associated with diabetic retinopathy. While the single-modal diabetic retinopathy grading network addresses class imbalance challenges and lesion representation in fundus image data, dual-modal diabetic retinopathy grading methods offer superior performance. However, the scarcity of dual-modal data and the lack of effective feature fusion methods limit their potential due to… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1195-1218, 2025, DOI:10.32604/cmc.2025.060833 - 26 March 2025
(This article belongs to the Special Issue: Advanced Algorithms for Feature Selection in Machine Learning)
Abstract Feature selection methods rooted in rough sets confront two notable limitations: their high computational complexity and sensitivity to noise, rendering them impractical for managing large-scale and noisy datasets. The primary issue stems from these methods’ undue reliance on all samples. To overcome these challenges, we introduce the concept of cross-similarity grounded in a robust fuzzy relation and design a rapid and robust feature selection algorithm. Firstly, we construct a robust fuzzy relation by introducing a truncation parameter. Then, based on this fuzzy relation, we propose the concept of cross-similarity, which emphasizes the sample-to-sample similarity relations… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1219-1237, 2025, DOI:10.32604/cmc.2025.059856 - 26 March 2025
(This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
Abstract In this paper, a reasoning enhancement method based on RGCN (Relational Graph Convolutional Network) is proposed to improve the detection capability of UAV (Unmanned Aerial Vehicle) on fast-moving military targets in urban battlefield environments. By combining military images with the publicly available VisDrone2019 dataset, a new dataset called VisMilitary was built and multiple YOLO (You Only Look Once) models were tested on it. Due to the low confidence problem caused by fuzzy targets, the performance of traditional YOLO models on real battlefield images decreases significantly. Therefore, we propose an improved RGCN inference model, which improves More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1239-1255, 2025, DOI:10.32604/cmc.2025.061541 - 26 March 2025
Abstract The blockchain-based audiovisual transmission systems were built to create a distributed and flexible smart transport system (STS). This system lets customers, video creators, and service providers directly connect with each other. Blockchain-based STS devices need a lot of computer power to change different video feed quality and forms into different versions and structures that meet the needs of different users. On the other hand, existing blockchains can’t support live streaming because they take too long to process and don’t have enough computer power. Large amounts of video data being sent and analyzed put too much… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1257-1273, 2025, DOI:10.32604/cmc.2025.059955 - 26 March 2025
Abstract Grasping is one of the most fundamental operations in modern robotics applications. While deep reinforcement learning (DRL) has demonstrated strong potential in robotics, there is too much emphasis on maximizing the cumulative reward in executing tasks, and the potential safety risks are often ignored. In this paper, an optimization method based on safe reinforcement learning (Safe RL) is proposed to address the robotic grasping problem under safety constraints. Specifically, considering the obstacle avoidance constraints of the system, the grasping problem of the manipulator is modeled as a Constrained Markov Decision Process (CMDP). The Lagrange multiplier… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1275-1290, 2025, DOI:10.32604/cmc.2025.061490 - 26 March 2025
Abstract Sentiment analysis plays an important role in distilling and clarifying content from movie reviews, aiding the audience in understanding universal views towards the movie. However, the abundance of reviews and the risk of encountering spoilers pose challenges for efficient sentiment analysis, particularly in Arabic content. This study proposed a Stochastic Gradient Descent (SGD) machine learning (ML) model tailored for sentiment analysis in Arabic and English movie reviews. SGD allows for flexible model complexity adjustments, which can adapt well to the Involvement of Arabic language data. This adaptability ensures that the model can capture the nuances… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1291-1306, 2025, DOI:10.32604/cmc.2025.060740 - 26 March 2025
(This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
Abstract As computer data grows exponentially, detecting anomalies within system logs has become increasingly important. Current research on log anomaly detection largely depends on log templates derived from log parsing. Word embedding is utilized to extract information from these templates. However, this method neglects a portion of the content within the logs and confronts the challenge of data imbalance among various log template types after parsing. Currently, specialized research on data imbalance across log template categories remains scarce. A dual-attention-based log anomaly detection model (LogDA), which leveraged data imbalance, was proposed to address these issues in More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1307-1325, 2025, DOI:10.32604/cmc.2025.061069 - 26 March 2025
Abstract In the context of the diversity of smart terminals, the unity of the root of trust becomes complicated, which not only affects the efficiency of trust propagation, but also poses a challenge to the security of the whole system. In particular, the solidification of the root of trust in non-volatile memory (NVM) restricts the system’s dynamic updating capability, which is an obvious disadvantage in a rapidly changing security environment. To address this issue, this study proposes a novel approach to generate root security parameters using static random access memory (SRAM) physical unclonable functions (PUFs). SRAM… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1327-1345, 2025, DOI:10.32604/cmc.2025.060228 - 26 March 2025
Abstract Software defect prediction is a critical component in maintaining software quality, enabling early identification and resolution of issues that could lead to system failures and significant financial losses. With the increasing reliance on user-generated content, social media reviews have emerged as a valuable source of real-time feedback, offering insights into potential software defects that traditional testing methods may overlook. However, existing models face challenges like handling imbalanced data, high computational complexity, and insufficient integration of contextual information from these reviews. To overcome these limitations, this paper introduces the SESDP (Sentiment Analysis-Based Early Software Defect Prediction)… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1347-1366, 2025, DOI:10.32604/cmc.2025.059037 - 26 March 2025
Abstract This paper introduces an Improved Bidirectional Jump Point Search (I-BJPS) algorithm to address the challenges of the traditional Jump Point Search (JPS) in mobile robot path planning. These challenges include excessive node expansions, frequent path inflexion points, slower search times, and a high number of jump points in complex environments with large areas and dense obstacles. Firstly, we improve the heuristic functions in both forward and reverse directions to minimize expansion nodes and search time. We also introduce a node optimization strategy to reduce non-essential nodes so that the path length is optimized. Secondly, we… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1367-1398, 2025, DOI:10.32604/cmc.2025.059301 - 26 March 2025
Abstract Skin cancer is the most prevalent cancer globally, primarily due to extensive exposure to Ultraviolet (UV) radiation. Early identification of skin cancer enhances the likelihood of effective treatment, as delays may lead to severe tumor advancement. This study proposes a novel hybrid deep learning strategy to address the complex issue of skin cancer diagnosis, with an architecture that integrates a Vision Transformer, a bespoke convolutional neural network (CNN), and an Xception module. They were evaluated using two benchmark datasets, HAM10000 and Skin Cancer ISIC. On the HAM10000, the model achieves a precision of 95.46%, an… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1399-1414, 2025, DOI:10.32604/cmc.2025.059969 - 26 March 2025
(This article belongs to the Special Issue: Challenges and Innovations in Multimedia Encryption and Information Security)
Abstract Conditional proxy re-encryption (CPRE) is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular, but most of the attribute-based conditional proxy re-encryption (AB-CPRE) schemes proposed so far do not take into account the importance of user attributes. A weighted attribute-based conditional proxy re-encryption (WAB-CPRE) scheme is thus designed to provide more precise decryption rights delegation. By introducing the concept of weight attributes, the quantity of system attributes managed by the server is reduced greatly. At the same time, a weighted tree structure is constructed… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1415-1414, 2025, DOI:10.32604/cmc.2025.059839 - 26 March 2025
(This article belongs to the Special Issue: Optimization Design for Material Microstructures)
Abstract In this paper, we develop an advanced computational framework for the topology optimization of orthotropic materials using meshless methods. The approximation function is established based on the improved moving least squares (IMLS) method, which enhances the efficiency and stability of the numerical solution. The numerical solution formulas are derived using the improved element-free Galerkin (IEFG) method. We introduce the solid isotropic microstructures with penalization (SIMP) model to formulate a mathematical model for topology optimization, which effectively penalizes intermediate densities. The optimization problem is defined with the numerical solution formula and volume fraction as constraints. The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1415-1434, 2025, DOI:10.32604/cmc.2025.059797 - 26 March 2025
(This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
Abstract Infrared unmanned aerial vehicle (UAV) target detection presents significant challenges due to the interplay between small targets and complex backgrounds. Traditional methods, while effective in controlled environments, often fail in scenarios involving long-range targets, high noise levels, or intricate backgrounds, highlighting the need for more robust approaches. To address these challenges, we propose a novel three-stage UAV segmentation framework that leverages uncertainty quantification to enhance target saliency. This framework incorporates a Bayesian convolutional neural network capable of generating both segmentation maps and probabilistic uncertainty maps. By utilizing uncertainty predictions, our method refines segmentation outcomes, achieving… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1435-1450, 2025, DOI:10.32604/cmc.2025.061700 - 26 March 2025
Abstract The liver is a crucial gland and the second-largest organ in the human body and also essential in digestion, metabolism, detoxification, and immunity. Liver diseases result from factors such as viral infections, obesity, alcohol consumption, injuries, or genetic predispositions. Pose significant health risks and demand timely diagnosis and treatment to enhance survival rates. Traditionally, diagnosing liver diseases relied heavily on clinical expertise, often leading to subjective, challenging, and time-intensive processes. However, early detection is essential for effective intervention, and advancements in machine learning (ML) have demonstrated remarkable success in predicting various conditions, including Chronic Obstructive… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1451-1470, 2025, DOI:10.32604/cmc.2025.059724 - 26 March 2025
Abstract To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model, this paper proposes a network attack-defense game model (ADGM). Firstly, based on the assumption of incomplete information between the two sides of the game, the ADGM model is established, and methods of payoff quantification, equilibrium solution, and determination of strategy confrontation results are presented. Then, drawing on infectious disease dynamics, the network attack-defense situation is defined based on the density of nodes in various security states, and… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1471-1489, 2025, DOI:10.32604/cmc.2025.059784 - 26 March 2025
(This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
Abstract Security attributes are the premise and foundation for implementing Attribute-Based Access Control (ABAC) mechanisms. However, when dealing with massive volumes of unstructured text big data resources, the current attribute management methods based on manual extraction face several issues, such as high costs for attribute extraction, long processing times, unstable accuracy, and poor scalability. To address these problems, this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks. This technology leverages transfer learning ideas, utilizing Bidirectional Encoder Representations from Transformers (BERT) pre-trained language models to achieve vectorization of unstructured text… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1491-1507, 2025, DOI:10.32604/cmc.2025.059882 - 26 March 2025
Abstract The efficient implementation of the Advanced Encryption Standard (AES) is crucial for network data security. This paper presents novel hardware implementations of the AES S-box, a core component, using tower field representations and Boolean Satisfiability (SAT) solvers. Our research makes several significant contributions to the field. Firstly, we have optimized the GF() inversion, achieving a remarkable 31.35% area reduction (15.33 GE) compared to the best known implementations. Secondly, we have enhanced multiplication implementations for transformation matrices using a SAT-method based on local solutions. This approach has yielded notable improvements, such as a 22.22% reduction in More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1533-1553, 2025, DOI:10.32604/cmc.2025.062910 - 26 March 2025
Abstract Cloud storage, a core component of cloud computing, plays a vital role in the storage and management of data. Electronic Health Records (EHRs), which document users’ health information, are typically stored on cloud servers. However, users’ sensitive data would then become unregulated. In the event of data loss, cloud storage providers might conceal the fact that data has been compromised to protect their reputation and mitigate losses. Ensuring the integrity of data stored in the cloud remains a pressing issue that urgently needs to be addressed. In this paper, we propose a data auditing scheme… More >