Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (227)
  • Open Access

    ARTICLE

    PIDINet-MC: Real-Time Multi-Class Edge Detection with PiDiNet

    Mingming Huang1, Yunfan Ye1,*, Zhiping Cai2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-17, 2026, DOI:10.32604/cmc.2025.072399 - 09 December 2025

    Abstract As a fundamental component in computer vision, edges can be categorized into four types based on discontinuities in reflectance, illumination, surface normal, or depth. While deep CNNs have significantly advanced generic edge detection, real-time multi-class semantic edge detection under resource constraints remains challenging. To address this, we propose a lightweight framework based on PiDiNet that enables fine-grained semantic edge detection. Our model simultaneously predicts background and four edge categories from full-resolution inputs, balancing accuracy and efficiency. Key contributions include: a multi-channel output structure expanding binary edge prediction to five classes, supported by a deep supervision More >

  • Open Access

    ARTICLE

    CLF-YOLOv8: Lightweight Multi-Scale Fusion with Focal Geometric Loss for Real-Time Night Maritime Detection

    Zhonghao Wang1,2, Xin Liu1,2,*, Changhua Yue3, Haiwen Yuan4

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.071813 - 09 December 2025

    Abstract To address critical challenges in nighttime ship detection—high small-target missed detection (over 20%), insufficient lightweighting, and limited generalization due to scarce, low-quality datasets—this study proposes a systematic solution. First, a high-quality Night-Ships dataset is constructed via CycleGAN-based day-night transfer, combined with a dual-threshold cleaning strategy (Laplacian variance sharpness filtering and brightness-color deviation screening). Second, a Cross-stage Lightweight Fusion-You Only Look Once version 8 (CLF-YOLOv8) is proposed with key improvements: the Neck network is reconstructed by replacing Cross Stage Partial (CSP) structure with the Cross Stage Partial Multi-Scale Convolutional Block (CSP-MSCB) and integrating Bidirectional Feature Pyramid More >

  • Open Access

    ARTICLE

    Industrial EdgeSign: NAS-Optimized Real-Time Hand Gesture Recognition for Operator Communication in Smart Factories

    Meixi Chu1, Xinyu Jiang1,*, Yushu Tao2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.071533 - 09 December 2025

    Abstract Industrial operators need reliable communication in high-noise, safety-critical environments where speech or touch input is often impractical. Existing gesture systems either miss real-time deadlines on resource-constrained hardware or lose accuracy under occlusion, vibration, and lighting changes. We introduce Industrial EdgeSign, a dual-path framework that combines hardware-aware neural architecture search (NAS) with large multimodal model (LMM) guided semantics to deliver robust, low-latency gesture recognition on edge devices. The searched model uses a truncated ResNet50 front end, a dimensional-reduction network that preserves spatiotemporal structure for tubelet-based attention, and localized Transformer layers tuned for on-device inference. To reduce… More >

  • Open Access

    ARTICLE

    FD-YOLO: An Attention-Augmented Lightweight Network for Real-Time Industrial Fabric Defect Detection

    Shaobo Kang, Mingzhi Yang*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.071488 - 09 December 2025

    Abstract Fabric defect detection plays a vital role in ensuring textile quality. However, traditional manual inspection methods are often inefficient and inaccurate. To overcome these limitations, we propose FD-YOLO, an enhanced lightweight detection model based on the YOLOv11n framework. The proposed model introduces the Bi-level Routing Attention (BRAttention) mechanism to enhance defect feature extraction, enabling more detailed feature representation. It proposes Deep Progressive Cross-Scale Fusion Neck (DPCSFNeck) to better capture small-scale defects and incorporates a Multi-Scale Dilated Residual (MSDR) module to strengthen multi-scale feature representation. Furthermore, a Shared Detail-Enhanced Lightweight Head (SDELHead) is employed to reduce More >

  • Open Access

    ARTICLE

    Improving Real-Time Animal Detection Using Group Sparsity in YOLOv8: A Solution for Animal-Toy Differentiation

    Zia Ur Rehman1, Ahmad Syed2,*, Abu Tayab3, Ghanshyam G. Tejani4,5,*, Doaa Sami Khafaga6, El-Sayed M. El-kenawy7,8

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-25, 2026, DOI:10.32604/cmc.2025.070310 - 09 December 2025

    Abstract Object detection, a major challenge in computer vision and pattern recognition, plays a significant part in many applications, crossing artificial intelligence, face recognition, and autonomous driving. It involves focusing on identifying the detection, localization, and categorization of targets in images. A particularly important emerging task is distinguishing real animals from toy replicas in real-time, mostly for smart camera systems in both urban and natural environments. However, that difficult task is affected by factors such as showing angle, occlusion, light intensity, variations, and texture differences. To tackle these challenges, this paper recommends Group Sparse YOLOv8 (You… More >

  • Open Access

    ARTICLE

    A Multi-Stage Pipeline for Date Fruit Processing: Integrating YOLOv11 Detection, Classification, and Automated Counting

    Ali S. Alzaharani, Abid Iqbal*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-27, 2026, DOI:10.32604/cmc.2025.070410 - 10 November 2025

    Abstract In this study, an automated multimodal system for detecting, classifying, and dating fruit was developed using a two-stage YOLOv11 pipeline. In the first stage, the YOLOv11 detection model locates individual date fruits in real time by drawing bounding boxes around them. These bounding boxes are subsequently passed to a YOLOv11 classification model, which analyzes cropped images and assigns class labels. An additional counting module automatically tallies the detected fruits, offering a near-instantaneous estimation of quantity. The experimental results suggest high precision and recall for detection, high classification accuracy (across 15 classes), and near-perfect counting in More >

  • Open Access

    ARTICLE

    PhishNet: A Real-Time, Scalable Ensemble Framework for Smishing Attack Detection Using Transformers and LLMs

    Abeer Alhuzali1,*, Qamar Al-Qahtani1, Asmaa Niyazi1, Lama Alshehri1, Fatemah Alharbi2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.069491 - 10 November 2025

    Abstract The surge in smishing attacks underscores the urgent need for robust, real-time detection systems powered by advanced deep learning models. This paper introduces PhishNet, a novel ensemble learning framework that integrates transformer-based models (RoBERTa) and large language models (LLMs) (GPT-OSS 120B, LLaMA3.3 70B, and Qwen3 32B) to enhance smishing detection performance significantly. To mitigate class imbalance, we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques. Our system employs a dual-layer voting mechanism: weighted majority voting among LLMs and a final ensemble vote to classify messages as ham, spam, or smishing. Experimental More >

  • Open Access

    ARTICLE

    Time-Resolved Experimental Analysis of Granite–Mortar Interface Permeability under High-Temperature Conditions

    Wei Chen*, Yuanteng Zhao, Yue Liang

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.12, pp. 3033-3053, 2025, DOI:10.32604/fdmp.2025.073778 - 31 December 2025

    Abstract In deep underground engineering, geological disposal of nuclear waste, and geothermal development, the granite–mortar interface represents a critical weak zone that strongly influences sealing performance under high-temperature conditions. While previous studies have primarily focused on single materials, the dynamic evolution of interface permeability under thermal loading remains insufficiently understood. In this study, time-resolved gas permeability measurements under thermal cycling (20°C → 150°C → 20°C) were conducted, complemented by multi-scale microstructural characterization, to investigate the nonlinear evolution of permeability. Experimental results indicate that interface permeability at room temperature is approximately one order of magnitude higher than… More >

  • Open Access

    ARTICLE

    E-AAPIV: Merkle Tree-Based Real-Time Android Manifest Integrity Verification for Mobile Payment Security

    Mostafa Mohamed Ahmed Mohamed Alsaedy1,*, Atef Zaki Ghalwash1, Aliaa Abd Elhalim Yousif2, Safaa Magdy Azzam1

    Journal of Cyber Security, Vol.7, pp. 653-674, 2025, DOI:10.32604/jcs.2025.073547 - 24 December 2025

    Abstract Mobile financial applications and payment systems face significant security challenges from reverse engineering attacks. Attackers can decompile Android Package Kit (APK) files, modify permissions, and repackage applications with malicious capabilities. This work introduces E-AAPIV (Enhanced Android Apps Permissions Integrity Verifier), an advanced framework that uses Merkle Tree technology for real-time manifest integrity verification. The proposed system constructs cryptographic Merkle Tree from AndroidManifest.xml permission structures. It establishes secure client-server connections using Elliptic Curve Diffie-Hellman Protocol (ECDH-P384) key exchange. Root hashes are encrypted with Advanced Encryption Standard-256-Galois/Counter Mode (AES-256-GCM), integrated with hardware-backed Android Keystore for enhanced security. More >

  • Open Access

    REVIEW

    Next-Generation Lightweight Explainable AI for Cybersecurity: A Review on Transparency and Real-Time Threat Mitigation

    Khulud Salem Alshudukhi1,*, Sijjad Ali2, Mamoona Humayun3,*, Omar Alruwaili4

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.3, pp. 3029-3085, 2025, DOI:10.32604/cmes.2025.073705 - 23 December 2025

    Abstract Problem: The integration of Artificial Intelligence (AI) into cybersecurity, while enhancing threat detection, is hampered by the “black box” nature of complex models, eroding trust, accountability, and regulatory compliance. Explainable AI (XAI) aims to resolve this opacity but introduces a critical new vulnerability: the adversarial exploitation of model explanations themselves. Gap: Current research lacks a comprehensive synthesis of this dual role of XAI in cybersecurity—as both a tool for transparency and a potential attack vector. There is a pressing need to systematically analyze the trade-offs between interpretability and security, evaluate defense mechanisms, and outline a… More >

Displaying 1-10 on page 1 of 227. Per Page