Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (444)
  • Open Access

    ARTICLE

    An Intelligent Security Service Optimization Method Based on Knowledge Base

    Xianju Gao*, Huachun Zhou, Weilin Wang, Jingfu Yan

    Computer Systems Science and Engineering, Vol.49, pp. 19-48, 2025, DOI:10.32604/csse.2024.058327 - 03 January 2025

    Abstract The network security knowledge base standardizes and integrates network security data, providing a reliable foundation for real-time network security protection solutions. However, current research on network security knowledge bases mainly focuses on their construction, while the potential to optimize intelligent security services for real-time network security protection requires further exploration. Therefore, how to effectively utilize the vast amount of historical knowledge in the field of network security and establish a feedback mechanism to update it in real time, thereby enhancing the detection capability of security services against malicious traffic, has become an important issue. Our… More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Federated Learning Applications in Computational Mental Healthcare

    Vajratiya Vajrobol1, Geetika Jain Saxena2, Amit Pundir2, Sanjeev Singh1, Akshat Gaurav3, Savi Bansal4,5, Razaz Waheeb Attar6, Mosiur Rahman7, Brij B. Gupta7,8,9,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 49-90, 2025, DOI:10.32604/cmes.2024.056500 - 17 December 2024

    Abstract Mental health is a significant issue worldwide, and the utilization of technology to assist mental health has seen a growing trend. This aims to alleviate the workload on healthcare professionals and aid individuals. Numerous applications have been developed to support the challenges in intelligent healthcare systems. However, because mental health data is sensitive, privacy concerns have emerged. Federated learning has gotten some attention. This research reviews the studies on federated learning and mental health related to solving the issue of intelligent healthcare systems. It explores various dimensions of federated learning in mental health, such as More >

  • Open Access

    ARTICLE

    Context-Aware Feature Extraction Network for High-Precision UAV-Based Vehicle Detection in Urban Environments

    Yahia Said1,*, Yahya Alassaf2, Taoufik Saidani3, Refka Ghodhbani3, Olfa Ben Rhaiem4, Ali Ahmad Alalawi1

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4349-4370, 2024, DOI:10.32604/cmc.2024.058903 - 19 December 2024

    Abstract The integration of Unmanned Aerial Vehicles (UAVs) into Intelligent Transportation Systems (ITS) holds transformative potential for real-time traffic monitoring, a critical component of emerging smart city infrastructure. UAVs offer unique advantages over stationary traffic cameras, including greater flexibility in monitoring large and dynamic urban areas. However, detecting small, densely packed vehicles in UAV imagery remains a significant challenge due to occlusion, variations in lighting, and the complexity of urban landscapes. Conventional models often struggle with these issues, leading to inaccurate detections and reduced performance in practical applications. To address these challenges, this paper introduces CFEMNet,… More >

  • Open Access

    REVIEW

    Recent Technology Advancements in Smart City Management: A Review

    Chiranjeevi Karri1,2,*, José J. M. Machado3, João Manuel R. S. Tavares1, Deepak Kumar Jain4, Suresh Dannana5, Santosh Kumar Gottapu6, Amir H. Gandomi7,8

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3617-3663, 2024, DOI:10.32604/cmc.2024.058461 - 19 December 2024

    Abstract The rapid population growth, insecure lifestyle, wastage of natural resources, indiscipline behavior of human beings, urgency in the medical field, security of patient information, agricultural-related problems, and automation requirements in industries are the reasons for invention of technologies. Smart cities aim to address these challenges through the integration of technology, data, and innovative practices. Building a smart city involves integrating advanced technologies and data-driven solutions to enhance urban living, improve resource efficiency, and create sustainable environments. This review presents five of the most critical technologies for smart and/or safe cities, addressing pertinent topics such as More >

  • Open Access

    ARTICLE

    A Novel Approach for Android Malware Detection Based on Intelligent Computing

    Manh Vu Minh*, Cho Do Xuan

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4371-4396, 2024, DOI:10.32604/cmc.2024.058168 - 19 December 2024

    Abstract Detecting malware on mobile devices using the Android operating system has become a critical challenge in the field of cybersecurity, in the context of the rapid increase in the number of malware variants and the frequency of attacks targeting Android devices. In this paper, we propose a novel intelligent computational method to enhance the effectiveness of Android malware detection models. The proposed method combines two main techniques: (1) constructing a malware behavior profile and (2) extracting features from the malware behavior profile using graph neural networks. Specifically, to effectively construct an Android malware behavior profile,… More >

  • Open Access

    ARTICLE

    Advancing Deepfake Detection Using Xception Architecture: A Robust Approach for Safeguarding against Fabricated News on Social Media

    Dunya Ahmed Alkurdi1,2,*, Mesut Cevik2, Abdurrahim Akgundogdu3

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4285-4305, 2024, DOI:10.32604/cmc.2024.057029 - 19 December 2024

    Abstract Deepfake has emerged as an obstinate challenge in a world dominated by light. Here, the authors introduce a new deepfake detection method based on Xception architecture. The model is tested exhaustively with millions of frames and diverse video clips; accuracy levels as high as 99.65% are reported. These are the main reasons for such high efficacy: superior feature extraction capabilities and stable training mechanisms, such as early stopping, characterizing the Xception model. The methodology applied is also more advanced when it comes to data preprocessing steps, making use of state-of-the-art techniques applied to ensure constant… More >

  • Open Access

    ARTICLE

    CHART: Intelligent Crime Hotspot Detection and Real-Time Tracking Using Machine Learning

    Rashid Ahmad1, Asif Nawaz1,*, Ghulam Mustafa1, Tariq Ali1, Mehdi Tlija2, Mohammed A. El-Meligy3,4, Zohair Ahmed5

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4171-4194, 2024, DOI:10.32604/cmc.2024.056971 - 19 December 2024

    Abstract Crime hotspot detection is essential for law enforcement agencies to allocate resources effectively, predict potential criminal activities, and ensure public safety. Traditional methods of crime analysis often rely on manual, time-consuming processes that may overlook intricate patterns and correlations within the data. While some existing machine learning models have improved the efficiency and accuracy of crime prediction, they often face limitations such as overfitting, imbalanced datasets, and inadequate handling of spatiotemporal dynamics. This research proposes an advanced machine learning framework, CHART (Crime Hotspot Analysis and Real-time Tracking), designed to overcome these challenges. The proposed methodology… More >

  • Open Access

    ARTICLE

    UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems

    Ting Chen1, Shujiao Wang2, Xin Fan3,*, Xiujuan Zhang2, Chuanwen Luo3, Yi Hong3

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3927-3950, 2024, DOI:10.32604/cmc.2024.056961 - 19 December 2024

    Abstract This paper investigates an unmanned aerial vehicle (UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything (V2X) systems. Due to the presence of an eavesdropper (Eve), the system’s communication links may be insecure. This paper proposes deploying an intelligent reflecting surface (IRS) on the UAV to enhance the communication performance of mobile vehicles, improve system flexibility, and alleviate eavesdropping on communication links. The links for uploading task data from vehicles to a base station (BS) are protected by IRS-assisted physical layer security (PLS). Upon receiving task data, the computing resources provided by the edge computing servers (MEC)… More >

  • Open Access

    ARTICLE

    Design and Develop Function for Research Based Application of Intelligent Internet-of-Vehicles Model Based on Fog Computing

    Abduladheem Fadhil Khudhur*, Ayça Kurnaz Türkben, Sefer Kurnaz

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3805-3824, 2024, DOI:10.32604/cmc.2024.056941 - 19 December 2024

    Abstract The fast growth in Internet-of-Vehicles (IoV) applications is rendering energy efficiency management of vehicular networks a highly important challenge. Most of the existing models are failing to handle the demand for energy conservation in large-scale heterogeneous environments. Based on Large Energy-Aware Fog (LEAF) computing, this paper proposes a new model to overcome energy-inefficient vehicular networks by simulating large-scale network scenarios. The main inspiration for this work is the ever-growing demand for energy efficiency in IoV-most particularly with the volume of generated data and connected devices. The proposed LEAF model enables researchers to perform simulations of… More >

  • Open Access

    ARTICLE

    Intelligent PID Control Method for Quadrotor UAV with Serial Humanoid Intelligence

    Linlin Zhang, Lvzhao Bai, Jianshu Liang, Zhiying Qin*, Yuejing Zhao

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1557-1579, 2024, DOI:10.32604/csse.2024.054237 - 22 November 2024

    Abstract Quadrotor unmanned aerial vehicles (UAVs) are widely used in inspection, agriculture, express delivery, and other fields owing to their low cost and high flexibility. However, the current UAV control system has shortcomings such as poor control accuracy and weak anti-interference ability to a certain extent. To address the control problem of a four-rotor UAV, we propose a method to enhance the controller’s accuracy by considering underactuated dynamics, nonlinearities, and external disturbances. A mathematical model is constructed based on the flight principles of the quadrotor UAV. We develop a control algorithm that combines humanoid intelligence with… More >

Displaying 1-10 on page 1 of 444. Per Page