Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,561)
  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu1, Zhe Zhang1, Shengrong Hu2, Song Sun3,*, Dapeng Liu4, Zhenyu Qiu5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099

    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on… More >

  • Open Access

    ARTICLE

    Olive Leaf Disease Detection via Wavelet Transform and Feature Fusion of Pre-Trained Deep Learning Models

    Mahmood A. Mahmood1,2,*, Khalaf Alsalem1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3431-3448, 2024, DOI:10.32604/cmc.2024.047604

    Abstract Olive trees are susceptible to a variety of diseases that can cause significant crop damage and economic losses. Early detection of these diseases is essential for effective management. We propose a novel transformed wavelet, feature-fused, pre-trained deep learning model for detecting olive leaf diseases. The proposed model combines wavelet transforms with pre-trained deep-learning models to extract discriminative features from olive leaf images. The model has four main phases: preprocessing using data augmentation, three-level wavelet transformation, learning using pre-trained deep learning models, and a fused deep learning model. In the preprocessing phase, the image dataset is augmented using techniques such as… More >

  • Open Access

    ARTICLE

    Multi-Branch High-Dimensional Guided Transformer-Based 3D Human Posture Estimation

    Xianhua Li1,2,*, Haohao Yu1, Shuoyu Tian1, Fengtao Lin3, Usama Masood1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3551-3564, 2024, DOI:10.32604/cmc.2024.047336

    Abstract The human pose paradigm is estimated using a transformer-based multi-branch multidimensional directed the three-dimensional (3D) method that takes into account self-occlusion, badly posedness, and a lack of depth data in the per-frame 3D posture estimation from two-dimensional (2D) mapping to 3D mapping. Firstly, by examining the relationship between the movements of different bones in the human body, four virtual skeletons are proposed to enhance the cyclic constraints of limb joints. Then, multiple parameters describing the skeleton are fused and projected into a high-dimensional space. Utilizing a multi-branch network, motion features between bones and overall motion features are extracted to mitigate… More >

  • Open Access

    ARTICLE

    Fake News Detection Based on Text-Modal Dominance and Fusing Multiple Multi-Model Clues

    Lifang Fu1, Huanxin Peng2,*, Changjin Ma2, Yuhan Liu2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4399-4416, 2024, DOI:10.32604/cmc.2024.047053

    Abstract In recent years, how to efficiently and accurately identify multi-model fake news has become more challenging. First, multi-model data provides more evidence but not all are equally important. Secondly, social structure information has proven to be effective in fake news detection and how to combine it while reducing the noise information is critical. Unfortunately, existing approaches fail to handle these problems. This paper proposes a multi-model fake news detection framework based on Tex-modal Dominance and fusing Multiple Multi-model Cues (TD-MMC), which utilizes three valuable multi-model clues: text-model importance, text-image complementary, and text-image inconsistency. TD-MMC is dominated by textural content and… More >

  • Open Access

    ARTICLE

    Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs

    Rahul Gupta1, Kapil Sharma1,*, R. K. Garg2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4283-4301, 2024, DOI:10.32604/cmc.2024.046890

    Abstract The prevalence of smartphones is deeply embedded in modern society, impacting various aspects of our lives. Their versatility and functionalities have fundamentally changed how we communicate, work, seek entertainment, and access information. Among the many smartphones available, those operating on the Android platform dominate, being the most widely used type. This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years. Therefore, there is an urgent need to develop new methods for detecting Android malware. The literature contains numerous works related to Android malware detection. As far as our understanding… More >

  • Open Access

    ARTICLE

    CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems

    Talal Albalawi, P. Ganeshkumar*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3511-3528, 2024, DOI:10.32604/cmc.2024.046396

    Abstract The Internet of Things (IoT) is a growing technology that allows the sharing of data with other devices across wireless networks. Specifically, IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks. In this framework, a Covariance Linear Learning Embedding Selection (CL2ES) methodology is used at first to extract the features highly associated with the IoT intrusions. Then, the Kernel Distributed Bayes Classifier (KDBC) is created to forecast attacks based on the probability distribution value precisely. In addition, a… More >

  • Open Access

    ARTICLE

    Nodule Detection Using Local Binary Pattern Features to Enhance Diagnostic Decisions

    Umar Rashid1,2,*, Arfan Jaffar1,2, Muhammad Rashid3, Mohammed S. Alshuhri4, Sheeraz Akram1,4,5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3377-3390, 2024, DOI:10.32604/cmc.2024.046320

    Abstract Pulmonary nodules are small, round, or oval-shaped growths on the lungs. They can be benign (noncancerous) or malignant (cancerous). The size of a nodule can range from a few millimeters to a few centimeters in diameter. Nodules may be found during a chest X-ray or other imaging test for an unrelated health problem. In the proposed methodology pulmonary nodules can be classified into three stages. Firstly, a 2D histogram thresholding technique is used to identify volume segmentation. An ant colony optimization algorithm is used to determine the optimal threshold value. Secondly, geometrical features such as lines, arcs, extended arcs, and… More >

  • Open Access

    ARTICLE

    Video Summarization Approach Based on Binary Robust Invariant Scalable Keypoints and Bisecting K-Means

    Sameh Zarif1,2,*, Eman Morad1, Khalid Amin1, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3565-3583, 2024, DOI:10.32604/cmc.2024.046185

    Abstract Due to the exponential growth of video data, aided by rapid advancements in multimedia technologies. It became difficult for the user to obtain information from a large video series. The process of providing an abstract of the entire video that includes the most representative frames is known as static video summarization. This method resulted in rapid exploration, indexing, and retrieval of massive video libraries. We propose a framework for static video summary based on a Binary Robust Invariant Scalable Keypoint (BRISK) and bisecting K-means clustering algorithm. The current method effectively recognizes relevant frames using BRISK by extracting keypoints and the… More >

  • Open Access

    ARTICLE

    A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images

    Yuejie Li1,2,*, Shijun Li3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3041-3070, 2024, DOI:10.32604/cmc.2023.045741

    Abstract 6G is envisioned as the next generation of wireless communication technology, promising unprecedented data speeds, ultra-low Latency, and ubiquitous Connectivity. In tandem with these advancements, blockchain technology is leveraged to enhance computer vision applications’ security, trustworthiness, and transparency. With the widespread use of mobile devices equipped with cameras, the ability to capture and recognize Chinese characters in natural scenes has become increasingly important. Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount, such as facial recognition or personal healthcare monitoring. Users can control their visual data and grant or revoke access as needed. Recognizing Chinese characters from images… More >

  • Open Access

    ARTICLE

    Enhancing ChatGPT’s Querying Capability with Voice-Based Interaction and CNN-Based Impair Vision Detection Model

    Awais Ahmad1, Sohail Jabbar1,*, Sheeraz Akram1, Anand Paul2, Umar Raza3, Nuha Mohammed Alshuqayran1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3129-3150, 2024, DOI:10.32604/cmc.2024.045385

    Abstract This paper presents an innovative approach to enhance the querying capability of ChatGPT, a conversational artificial intelligence model, by incorporating voice-based interaction and a convolutional neural network (CNN)-based impaired vision detection model. The proposed system aims to improve user experience and accessibility by allowing users to interact with ChatGPT using voice commands. Additionally, a CNN-based model is employed to detect impairments in user vision, enabling the system to adapt its responses and provide appropriate assistance. This research tackles head-on the challenges of user experience and inclusivity in artificial intelligence (AI). It underscores our commitment to overcoming these obstacles, making ChatGPT… More >

Displaying 11-20 on page 2 of 1561. Per Page