Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (389)
  • Open Access

    ARTICLE

    Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography

    Zainatul Yushaniza Mohamed Yusoff1, Mohamad Khairi Ishak2,*, Lukman A. B. Rahim3, Mohd Shahrimie Mohd Asaari1

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1669-1697, 2024, DOI:10.32604/csse.2024.056741 - 22 November 2024

    Abstract The rapid adoption of Internet of Things (IoT) technologies has introduced significant security challenges across the physical, network, and application layers, particularly with the widespread use of the Message Queue Telemetry Transport (MQTT) protocol, which, while efficient in bandwidth consumption, lacks inherent security features, making it vulnerable to various cyber threats. This research addresses these challenges by presenting a secure, lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things (IoT) networks. The proposed solution builds upon the Dang-Scheme, a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it… More >

  • Open Access

    ARTICLE

    SAR-LtYOLOv8: A Lightweight YOLOv8 Model for Small Object Detection in SAR Ship Images

    Conghao Niu1,*, Dezhi Han1, Bing Han2, Zhongdai Wu2

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1723-1748, 2024, DOI:10.32604/csse.2024.056736 - 22 November 2024

    Abstract The high coverage and all-weather capabilities of Synthetic Aperture Radar (SAR) image ship detection make it a widely accepted method for maritime ship positioning and identification. However, SAR ship detection faces challenges such as indistinct ship contours, low resolution, multi-scale features, noise, and complex background interference. This paper proposes a lightweight YOLOv8 model for small object detection in SAR ship images, incorporating key structures to enhance performance. The YOLOv8 backbone is replaced by the Slim Backbone (SB), and the Delete Medium-sized Detection Head (DMDH) structure is eliminated to concentrate on shallow features. Dynamically adjusting the… More >

  • Open Access

    ARTICLE

    Improving Badminton Action Recognition Using Spatio-Temporal Analysis and a Weighted Ensemble Learning Model

    Farida Asriani1,2, Azhari Azhari1,*, Wahyono Wahyono1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3079-3096, 2024, DOI:10.32604/cmc.2024.058193 - 18 November 2024

    Abstract Incredible progress has been made in human action recognition (HAR), significantly impacting computer vision applications in sports analytics. However, identifying dynamic and complex movements in sports like badminton remains challenging due to the need for precise recognition accuracy and better management of complex motion patterns. Deep learning techniques like convolutional neural networks (CNNs), long short-term memory (LSTM), and graph convolutional networks (GCNs) improve recognition in large datasets, while the traditional machine learning methods like SVM (support vector machines), RF (random forest), and LR (logistic regression), combined with handcrafted features and ensemble approaches, perform well but… More >

  • Open Access

    ARTICLE

    GL-YOLOv5: An Improved Lightweight Non-Dimensional Attention Algorithm Based on YOLOv5

    Yuefan Liu, Ducheng Zhang, Chen Guo*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3281-3299, 2024, DOI:10.32604/cmc.2024.057294 - 18 November 2024

    Abstract Craniocerebral injuries represent the primary cause of fatalities among riders involved in two-wheeler accidents; nevertheless, the prevalence of helmet usage among these riders remains alarmingly low. Consequently, the accurate identification of riders who are wearing safety helmets is of paramount importance. Current detection algorithms exhibit several limitations, including inadequate accuracy, substantial model size, and suboptimal performance in complex environments with small targets. To address these challenges, we propose a novel lightweight detection algorithm, termed GL-YOLOv5, which is an enhancement of the You Only Look Once version 5 (YOLOv5) framework. This model incorporates a Global DualPooling… More >

  • Open Access

    ARTICLE

    A Lightweight UAV Visual Obstacle Avoidance Algorithm Based on Improved YOLOv8

    Zongdong Du1,2, Xuefeng Feng3, Feng Li3, Qinglong Xian3, Zhenhong Jia1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2607-2627, 2024, DOI:10.32604/cmc.2024.056616 - 18 November 2024

    Abstract The importance of unmanned aerial vehicle (UAV) obstacle avoidance algorithms lies in their ability to ensure flight safety and collision avoidance, thereby protecting people and property. We propose UAD-YOLOv8, a lightweight YOLOv8-based obstacle detection algorithm optimized for UAV obstacle avoidance. The algorithm enhances the detection capability for small and irregular obstacles by removing the P5 feature layer and introducing deformable convolution v2 (DCNv2) to optimize the cross stage partial bottleneck with 2 convolutions and fusion (C2f) module. Additionally, it reduces the model’s parameter count and computational load by constructing the unite ghost and depth-wise separable… More >

  • Open Access

    ARTICLE

    A Novel YOLOv5s-Based Lightweight Model for Detecting Fish’s Unhealthy States in Aquaculture

    Bing Shi1,*, Jianhua Zhao1, Bin Ma1, Juan Huan2, Yueping Sun3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2437-2456, 2024, DOI:10.32604/cmc.2024.056377 - 18 November 2024

    Abstract Real-time detection of unhealthy fish remains a significant challenge in intensive recirculating aquaculture. Early recognition of unhealthy fish and the implementation of appropriate treatment measures are crucial for preventing the spread of diseases and minimizing economic losses. To address this issue, an improved algorithm based on the You Only Look Once v5s (YOLOv5s) lightweight model has been proposed. This enhanced model incorporates a faster lightweight structure and a new Convolutional Block Attention Module (CBAM) to achieve high recognition accuracy. Furthermore, the model introduces the α-SIoU loss function, which combines the α-Intersection over Union (α-IoU) and… More >

  • Open Access

    ARTICLE

    TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection

    Isha Sood*, Varsha Sharma

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2791-2818, 2024, DOI:10.32604/cmc.2024.055463 - 18 November 2024

    Abstract Ransomware has emerged as a critical cybersecurity threat, characterized by its ability to encrypt user data or lock devices, demanding ransom for their release. Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases, rendering them less effective against evolving ransomware families. This paper introduces TLERAD (Transfer Learning for Enhanced Ransomware Attack Detection), a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains, enabling robust detection of both known and unknown ransomware variants. The proposed method More >

  • Open Access

    ARTICLE

    Identification of M2 macrophage-related genes for establishing a prognostic model in pancreatic cancer: FCGR3A as key gene

    ZHEN WANG1, JUN FU1, SAISAI ZHU1, HAODONG TANG2, KUI SHI1, JIHUA YANG3, MENG WANG3, MENGGE WU1, DUNFENG QI1,*

    Oncology Research, Vol.32, No.12, pp. 1851-1866, 2024, DOI:10.32604/or.2024.055286 - 13 November 2024

    Abstract Background: Pancreatic ductal adenocarcinoma (PDAC) has a rich and complex tumor immune microenvironment (TIME). M2 macrophages are among the most extensively infiltrated immune cells in the TIME and are necessary for the growth and migration of cancers. However, the mechanisms and targets mediating M2 macrophage infiltration in pancreatic cancer remain elusive. Methods: The M2 macrophage infiltration score of patients was assessed using the xCell algorithm. Using weighted gene co-expression network analysis (WGCNA), module genes associated with M2 macrophages were identified, and a predictive model was designed. The variations in immunological cell patterns, cancer mutations, and… More > Graphic Abstract

    Identification of M2 macrophage-related genes for establishing a prognostic model in pancreatic cancer: <i>FCGR3A</i> as key gene

  • Open Access

    ARTICLE

    Segmentation of Head and Neck Tumors Using Dual PET/CT Imaging: Comparative Analysis of 2D, 2.5D, and 3D Approaches Using UNet Transformer

    Mohammed A. Mahdi1, Shahanawaj Ahamad2, Sawsan A. Saad3, Alaa Dafhalla3, Alawi Alqushaibi4, Rizwan Qureshi5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2351-2373, 2024, DOI:10.32604/cmes.2024.055723 - 31 October 2024

    Abstract The segmentation of head and neck (H&N) tumors in dual Positron Emission Tomography/Computed Tomography (PET/CT) imaging is a critical task in medical imaging, providing essential information for diagnosis, treatment planning, and outcome prediction. Motivated by the need for more accurate and robust segmentation methods, this study addresses key research gaps in the application of deep learning techniques to multimodal medical images. Specifically, it investigates the limitations of existing 2D and 3D models in capturing complex tumor structures and proposes an innovative 2.5D UNet Transformer model as a solution. The primary research questions guiding this study… More >

  • Open Access

    ARTICLE

    Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology

    Muhammad Imran Ghafoor1, Awad Bin Naeem2,*, Biswaranjan Senapati3, Md. Sakiul Islam Sudman4, Satyabrata Pradhan5, Debabrata Das6, Friban Almeida6, Hesham A. Sakr7

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 783-803, 2024, DOI:10.32604/iasc.2024.050819 - 31 October 2024

    Abstract The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles. The Internet of Vehicles has meaningful applications, enabling connected and autonomous vehicles to interact with infrastructure, sensors, computing nodes, humans, and fellow vehicles. Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards. This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication, utilizing encryption and the Moore curve. The proposed approach enables a vehicle to deduce the planned itinerary of Roadside More >

Displaying 1-10 on page 1 of 389. Per Page