Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (460)
  • Open Access

    ARTICLE

    Real-Time Mouth State Detection Based on a BiGRU-CLPSO Hybrid Model with Facial Landmark Detection for Healthcare Monitoring Applications

    Mong-Fong Horng1,#, Thanh-Lam Nguyen1,#, Thanh-Tuan Nguyen2,*, Chin-Shiuh Shieh1,*, Lan-Yuen Guo3, Chen-Fu Hung4, Chun-Chih Lo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.075064 - 29 January 2026

    Abstract The global population is rapidly expanding, driving an increasing demand for intelligent healthcare systems. Artificial intelligence (AI) applications in remote patient monitoring and diagnosis have achieved remarkable progress and are emerging as a major development trend. Among these applications, mouth motion tracking and mouth-state detection represent an important direction, providing valuable support for diagnosing neuromuscular disorders such as dysphagia, Bell’s palsy, and Parkinson’s disease. In this study, we focus on developing a real-time system capable of monitoring and detecting mouth state that can be efficiently deployed on edge devices. The proposed system integrates the Facial… More >

  • Open Access

    ARTICLE

    TransCarbonNet: Multi-Day Grid Carbon Intensity Forecasting Using Hybrid Self-Attention and Bi-LSTM Temporal Fusion for Sustainable Energy Management

    Amel Ksibi*, Hatoon Albadah, Ghadah Aldehim, Manel Ayadi

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2025.073533 - 29 January 2026

    Abstract Sustainable energy systems will entail a change in the carbon intensity projections, which should be carried out in a proper manner to facilitate the smooth running of the grid and reduce greenhouse emissions. The present article outlines the TransCarbonNet, a novel hybrid deep learning framework with self-attention characteristics added to the bidirectional Long Short-Term Memory (Bi-LSTM) network to forecast the carbon intensity of the grid several days. The proposed temporal fusion model not only learns the local temporal interactions but also the long-term patterns of the carbon emission data; hence, it is able to give… More >

  • Open Access

    ARTICLE

    Thimerosal Inhibits Tumor Malignant Progression through Direct Action and Enhancing the Efficacy of PD-1-Based Immunotherapy

    Ping Wang1,2,#, Yan-Han Chen1,2,#, Ze-Tao Zhan1,2, Jun-Xiang Zeng1,2, Yu Chen3,4, Yuan Lin1,2, Tao Chen1,5,*, Wei-Jie Zhou1,2,5,*

    Oncology Research, Vol.34, No.2, 2026, DOI:10.32604/or.2025.071902 - 19 January 2026

    Abstract Background: Thimerosal is a mercury-containing preservative widely used in vaccines. This study aimed to investigate its potential antitumor effects and mechanisms in solid malignancies, particularly colorectal cancer (CRC) and melanoma. Methods: A combination of in vitro and in vivo approaches was employed. Cell proliferation, apoptosis, migration, and invasion were assessed using Cell Counting Kit-8 (CCK-8), colony formation, ATP viability, Western blotting, flow cytometry, wound-healing and Transwell assays. Subcutaneous, lung metastases, and Azoxymethane/Dextran Sulfate Sodium Salt (AOM/DSS)-induced colitis-associated CRC models were established to examine antitumor efficacy and safety. The functional role of mercury ions was validated using structural… More >

  • Open Access

    ARTICLE

    FRF-BiLSTM: Recognising and Mitigating DDoS Attacks through a Secure Decentralized Feature Optimized Federated Learning Approach

    Sushruta Mishra1, Sunil Kumar Mohapatra2, Kshira Sagar Sahoo3, Anand Nayyar4, Tae-Kyung Kim5,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072493 - 12 January 2026

    Abstract With an increase in internet-connected devices and a dependency on online services, the threat of Distributed Denial of Service (DDoS) attacks has become a significant concern in cybersecurity. The proposed system follows a multi-step process, beginning with the collection of datasets from different edge devices and network nodes. To verify its effectiveness, experiments were conducted using the CICDoS2017, NSL-KDD, and CICIDS benchmark datasets alongside other existing models. Recursive feature elimination (RFE) with random forest is used to select features from the CICDDoS2019 dataset, on which a BiLSTM model is trained on local nodes. Local models… More >

  • Open Access

    ARTICLE

    A Firefly Algorithm-Optimized CNN–BiLSTM Model for Automated Detection of Bone Cancer and Marrow Cell Abnormalities

    Ishaani Priyadarshini*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072343 - 12 January 2026

    Abstract Early and accurate detection of bone cancer and marrow cell abnormalities is critical for timely intervention and improved patient outcomes. This paper proposes a novel hybrid deep learning framework that integrates a Convolutional Neural Network (CNN) with a Bidirectional Long Short-Term Memory (BiLSTM) architecture, optimized using the Firefly Optimization algorithm (FO). The proposed CNN-BiLSTM-FO model is tailored for structured biomedical data, capturing both local patterns and sequential dependencies in diagnostic features, while the Firefly Algorithm fine-tunes key hyperparameters to maximize predictive performance. The approach is evaluated on two benchmark biomedical datasets: one comprising diagnostic data… More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Blockchain-Enabled Techniques and Federated Learning for Secure 5G/6G Networks: Challenges, Opportunities, and Future Directions

    Muhammad Asim1,*, Abdelhamied A. Ateya1, Mudasir Ahmad Wani1,2, Gauhar Ali1, Mohammed ElAffendi1, Ahmed A. Abd El-Latif1, Reshma Siyal3

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.070684 - 12 January 2026

    Abstract The growing developments in 5G and 6G wireless communications have revolutionized communications technologies, providing faster speeds with reduced latency and improved connectivity to users. However, it raises significant security challenges, including impersonation threats, data manipulation, distributed denial of service (DDoS) attacks, and privacy breaches. Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks. This survey provides a comprehensive review of how Federated Learning (FL), Blockchain, and Digital Twin (DT) technologies can collectively enhance the security of 5G and 6G systems. Blockchain offers decentralized, immutable, and transparent mechanisms for securing More >

  • Open Access

    ARTICLE

    Numerical Simulation of Damage Behavior in Graphene-Reinforced Aluminum Matrix Composite Armatures under Multi-Physical Field Coupling

    Junwen Huo, Haicheng Liang, Weiye Dong, Xiaoming Du*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.073285 - 09 December 2025

    Abstract With the rapid advancement of electromagnetic launch technology, enhancing the structural stability and thermal resistance of armatures has become essential for improving the overall efficiency and reliability of railgun systems. Traditional aluminum alloy armatures often suffer from severe ablation, deformation, and uneven current distribution under high pulsed currents, which limit their performance and service life. To address these challenges, this study employs the Johnson–Cook constitutive model and the finite element method to develop armature models of aluminum matrix composites with varying heterogeneous graphene volume fractions. The temperature, stress, and strain of the armatures during operation… More >

  • Open Access

    ARTICLE

    Bi-STAT+: An Enhanced Bidirectional Spatio-Temporal Adaptive Transformer for Urban Traffic Flow Forecasting

    Yali Cao1, Weijian Hu1,2, Lingfang Li1,*, Minchao Li1, Meng Xu2, Ke Han2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069373 - 09 December 2025

    Abstract Traffic flow prediction constitutes a fundamental component of Intelligent Transportation Systems (ITS), playing a pivotal role in mitigating congestion, enhancing route optimization, and improving the utilization efficiency of roadway infrastructure. However, existing methods struggle in complex traffic scenarios due to static spatio-temporal embedding, restricted multi-scale temporal modeling, and weak representation of local spatial interactions. This study proposes Bi-STAT+, an enhanced bidirectional spatio-temporal attention framework to address existing limitations through three principal contributions: (1) an adaptive spatio-temporal embedding module that dynamically adjusts embeddings to capture complex traffic variations; (2) frequency-domain analysis in the temporal dimension for… More >

  • Open Access

    ARTICLE

    An Optimized Customer Churn Prediction Approach Based on Regularized Bidirectional Long Short-Term Memory Model

    Adel Saad Assiri1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069826 - 10 November 2025

    Abstract Customer churn is the rate at which customers discontinue doing business with a company over a given time period. It is an essential measure for businesses to monitor high churn rates, as they often indicate underlying issues with services, products, or customer experience, resulting in considerable income loss. Prediction of customer churn is a crucial task aimed at retaining customers and maintaining revenue growth. Traditional machine learning (ML) models often struggle to capture complex temporal dependencies in client behavior data. To address this, an optimized deep learning (DL) approach using a Regularized Bidirectional Long Short-Term… More >

  • Open Access

    ARTICLE

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    D. Bernal*, O. Ledesma, P. Lamo, J. Bermejo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-39, 2026, DOI:10.32604/cmc.2025.069746 - 10 November 2025

    Abstract This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices,… More >

Displaying 1-10 on page 1 of 460. Per Page