Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (127)
  • Open Access

    REVIEW

    A Survey of Lung Nodules Detection and Classification from CT Scan Images

    Salman Ahmed1, Fazli Subhan2,3, Mazliham Mohd Su’ud3,*, Muhammad Mansoor Alam3,4, Adil Waheed5

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1483-1511, 2024, DOI:10.32604/csse.2024.053997 - 22 November 2024

    Abstract In the contemporary era, the death rate is increasing due to lung cancer. However, technology is continuously enhancing the quality of well-being. To improve the survival rate, radiologists rely on Computed Tomography (CT) scans for early detection and diagnosis of lung nodules. This paper presented a detailed, systematic review of several identification and categorization techniques for lung nodules. The analysis of the report explored the challenges, advancements, and future opinions in computer-aided diagnosis CAD systems for detecting and classifying lung nodules employing the deep learning (DL) algorithm. The findings also highlighted the usefulness of DL… More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Joint Resource Allocation Strategies in Federated Edge Learning

    Jingbo Zhang1, Qiong Wu1,*, Pingyi Fan2, Qiang Fan3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1953-1998, 2024, DOI:10.32604/cmc.2024.057006 - 18 November 2024

    Abstract Federated Edge Learning (FEL), an emerging distributed Machine Learning (ML) paradigm, enables model training in a distributed environment while ensuring user privacy by using physical separation for each user’s data. However, with the development of complex application scenarios such as the Internet of Things (IoT) and Smart Earth, the conventional resource allocation schemes can no longer effectively support these growing computational and communication demands. Therefore, joint resource optimization may be the key solution to the scaling problem. This paper simultaneously addresses the multifaceted challenges of computation and communication, with the growing multiple resource demands. We… More >

  • Open Access

    REVIEW

    Computing Challenges of UAV Networks: A Comprehensive Survey

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Xianxuan Lin4,*, Farman Ali5,*, Ahmad Ali AlZubi6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1999-2051, 2024, DOI:10.32604/cmc.2024.056183 - 18 November 2024

    Abstract Devices and networks constantly upgrade, leading to rapid technological evolution. Three-dimensional (3D) point cloud transmission plays a crucial role in aerial computing terminology, facilitating information exchange. Various network types, including sensor networks and 5G mobile networks, support this transmission. Notably, Flying Ad hoc Networks (FANETs) utilize Unmanned Aerial Vehicles (UAVs) as nodes, operating in a 3D environment with Six Degrees of Freedom (6DoF). This study comprehensively surveys UAV networks, focusing on models for Light Detection and Ranging (LiDAR) 3D point cloud compression/transmission. Key topics covered include autonomous navigation, challenges in video streaming infrastructure, motivations for More >

  • Open Access

    ARTICLE

    Association between Job Satisfaction and Stress or Depressive Symptom of Employed Persons with Disabilities: Findings from the Panel Survey of Employment for the Disabled 2016–2023

    Jeong Min Yang1, Ji Sung Hong1, Jae Hyun Kim2,*

    International Journal of Mental Health Promotion, Vol.26, No.10, pp. 791-803, 2024, DOI:10.32604/ijmhp.2024.056433 - 31 October 2024

    Abstract Background: This study conducted a longitudinal analysis of the association between job satisfaction and stress or depressive symptoms of employed persons with disabilities (PWDs) based on the data from the 1st to 8th Pannel Survey of Employment for the Disabled (PSED). Methods: After excluding missing values, data on 1614 participants at baseline (1st wave) were analyzed using the chi-square test and generalized estimating equation (GEE) model for data from 1st to 8thPSED. Results: It was found that for each one-unit increase in the job satisfaction score, the stress scale decreased by 0.004 (B: −0.004, 95% CI:… More >

  • Open Access

    REVIEW

    Digital Image Steganographer Identification: A Comprehensive Survey

    Qianqian Zhang1,2,3, Yi Zhang1,2, Yuanyuan Ma3, Yanmei Liu1,2, Xiangyang Luo1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 105-131, 2024, DOI:10.32604/cmc.2024.055735 - 15 October 2024

    Abstract The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse. Identifying steganographer is essential in tracing secret information origins and preventing illicit covert communication online. Accurately discerning a steganographer from many normal users is challenging due to various factors, such as the complexity in obtaining the steganography algorithm, extracting highly separability features, and modeling the cover data. After extensive exploration, several methods have been proposed for steganographer identification. This paper presents a survey of existing studies. Firstly, we provide a concise introduction to the More >

  • Open Access

    REVIEW

    Robust Deep Image Watermarking: A Survey

    Yuanjing Luo, Xichen Tan, Zhiping Cai*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 133-160, 2024, DOI:10.32604/cmc.2024.055150 - 15 October 2024

    Abstract In the era of internet proliferation, safeguarding digital media copyright and integrity, especially for images, is imperative. Digital watermarking stands out as a pivotal solution for image security. With the advent of deep learning, watermarking has seen significant advancements. Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces, resilient to various attacks. These methods, characterized by a streamlined encoder-decoder architecture, have shown enhanced performance through the incorporation of novel training modules. This article offers an in-depth analysis of deep watermarking’s core technologies, current status, and prospective More >

  • Open Access

    REVIEW

    Exploring Frontier Technologies in Video-Based Person Re-Identification: A Survey on Deep Learning Approach

    Jiahe Wang1, Xizhan Gao1,*, Fa Zhu2, Xingchi Chen3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 25-51, 2024, DOI:10.32604/cmc.2024.054895 - 15 October 2024

    Abstract Video-based person re-identification (Re-ID), a subset of retrieval tasks, faces challenges like uncoordinated sample capturing, viewpoint variations, occlusions, cluttered backgrounds, and sequence uncertainties. Recent advancements in deep learning have significantly improved video-based person Re-ID, laying a solid foundation for further progress in the field. In order to enrich researchers’ insights into the latest research findings and prospective developments, we offer an extensive overview and meticulous analysis of contemporary video-based person Re-ID methodologies, with a specific emphasis on network architecture design and loss function design. Firstly, we introduce methods based on network architecture design and loss… More >

  • Open Access

    ARTICLE

    Net Effect of Short-Term Smoking Cessation on Mental Health Changes: Inverse Probability of Treatment Weighting and Difference-in-Differences Method

    Ji-Su Park1, Tae-Hyeon Lee2, Il-Su Park3,*

    International Journal of Mental Health Promotion, Vol.26, No.9, pp. 745-755, 2024, DOI:10.32604/ijmhp.2024.054630 - 20 September 2024

    Abstract Background: In response to the need for research clearly demonstrating the net effect of smoking cessation on mental health status, considering the causal relationship between smoking cessation and changes in mental health status, this study was undertaken. Thus, this study aimed to examine the net effect of short-term smoking cessation on five specific mental health metrics and the overall mental health status score. Methods: We used data from the first wave of the Korean Health Panel (KHP) Survey (2011–2013, 2016–2018) and focused on men aged 19 years and older, to explore the effects of smoking… More >

  • Open Access

    REVIEW

    Confusing Object Detection: A Survey

    Kunkun Tong1,#, Guchu Zou2,#, Xin Tan1,*, Jingyu Gong1, Zhenyi Qi2, Zhizhong Zhang1, Yuan Xie1, Lizhuang Ma1

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3421-3461, 2024, DOI:10.32604/cmc.2024.055327 - 12 September 2024

    Abstract Confusing object detection (COD), such as glass, mirrors, and camouflaged objects, represents a burgeoning visual detection task centered on pinpointing and distinguishing concealed targets within intricate backgrounds, leveraging deep learning methodologies. Despite garnering increasing attention in computer vision, the focus of most existing works leans toward formulating task-specific solutions rather than delving into in-depth analyses of methodological structures. As of now, there is a notable absence of a comprehensive systematic review that focuses on recently proposed deep learning-based models for these specific tasks. To fill this gap, our study presents a pioneering review that covers… More >

  • Open Access

    REVIEW

    Survey on Video Security: Examining Threats, Challenges, and Future Trends

    Ali Asghar1,#, Amna Shifa2,#, Mamoona Naveed Asghar2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3591-3635, 2024, DOI:10.32604/cmc.2024.054654 - 12 September 2024

    Abstract Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it… More >

Displaying 1-10 on page 1 of 127. Per Page