Home / Journals / CMC / Vol.79, No.3, 2024
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning

    Zhihui Song, Jinchen Xu, Kewei Li, Zheng Shan*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4573-4601, 2024, DOI:10.32604/cmc.2024.049310 - 20 June 2024
    Abstract Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representations. However, due to limitations in code representation and neural network design, the validity and practicality of the model still need to be improved. Additionally, due to differences in programming languages, most methods lack cross-language detection generality. To address these issues, in this paper, we analyze the shortcomings of previous code representations and neural networks. We propose a novel hierarchical code representation that combines Concrete Syntax Trees (CST)… More >

  • Open AccessOpen Access

    ARTICLE

    Exploring Multi-Task Learning for Forecasting Energy-Cost Resource Allocation in IoT-Cloud Systems

    Mohammad Aldossary1,*, Hatem A. Alharbi2, Nasir Ayub3
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4603-4620, 2024, DOI:10.32604/cmc.2024.050862 - 20 June 2024
    Abstract Cloud computing has become increasingly popular due to its capacity to perform computations without relying on physical infrastructure, thereby revolutionizing computer processes. However, the rising energy consumption in cloud centers poses a significant challenge, especially with the escalating energy costs. This paper tackles this issue by introducing efficient solutions for data placement and node management, with a clear emphasis on the crucial role of the Internet of Things (IoT) throughout the research process. The IoT assumes a pivotal role in this study by actively collecting real-time data from various sensors strategically positioned in and around… More >

  • Open AccessOpen Access

    ARTICLE

    BDPartNet: Feature Decoupling and Reconstruction Fusion Network for Infrared and Visible Image

    Xuejie Wang1, Jianxun Zhang1,*, Ye Tao2, Xiaoli Yuan1, Yifan Guo1
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4621-4639, 2024, DOI:10.32604/cmc.2024.051556 - 20 June 2024
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract While single-modal visible light images or infrared images provide limited information, infrared light captures significant thermal radiation data, whereas visible light excels in presenting detailed texture information. Combining images obtained from both modalities allows for leveraging their respective strengths and mitigating individual limitations, resulting in high-quality images with enhanced contrast and rich texture details. Such capabilities hold promising applications in advanced visual tasks including target detection, instance segmentation, military surveillance, pedestrian detection, among others. This paper introduces a novel approach, a dual-branch decomposition fusion network based on AutoEncoder (AE), which decomposes multi-modal features into intensity… More >

  • Open AccessOpen Access

    ARTICLE

    SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm

    Jiahui Liu1,2, Lang Li1,2,*, Di Li1,2, Yu Ou1,2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4641-4657, 2024, DOI:10.32604/cmc.2024.051613 - 20 June 2024
    Abstract Correlation power analysis (CPA) combined with genetic algorithms (GA) now achieves greater attack efficiency and can recover all subkeys simultaneously. However, two issues in GA-based CPA still need to be addressed: key degeneration and slow evolution within populations. These challenges significantly hinder key recovery efforts. This paper proposes a screening correlation power analysis framework combined with a genetic algorithm, named SFGA-CPA, to address these issues. SFGA-CPA introduces three operations designed to exploit CPA characteristics: propagative operation, constrained crossover, and constrained mutation. Firstly, the propagative operation accelerates population evolution by maximizing the number of correct bytes… More >

  • Open AccessOpen Access

    ARTICLE

    Exploring Motor Imagery EEG: Enhanced EEG Microstate Analysis with GMD-Driven Density Canopy Method

    Xin Xiong1, Jing Zhang1, Sanli Yi1, Chunwu Wang2, Ruixiang Liu3, Jianfeng He1,*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4659-4681, 2024, DOI:10.32604/cmc.2024.050528 - 20 June 2024
    (This article belongs to the Special Issue: Advanced Artificial Intelligence and Machine Learning Frameworks for Signal and Image Processing Applications)
    Abstract The analysis of microstates in EEG signals is a crucial technique for understanding the spatiotemporal dynamics of brain electrical activity. Traditional methods such as Atomic Agglomerative Hierarchical Clustering (AAHC), K-means clustering, Principal Component Analysis (PCA), and Independent Component Analysis (ICA) are limited by a fixed number of microstate maps and insufficient capability in cross-task feature extraction. Tackling these limitations, this study introduces a Global Map Dissimilarity (GMD)-driven density canopy K-means clustering algorithm. This innovative approach autonomously determines the optimal number of EEG microstate topographies and employs Gaussian kernel density estimation alongside the GMD index for… More >

  • Open AccessOpen Access

    ARTICLE

    Joint Rain Streaks & Haze Removal Network for Object Detection

    Ragini Thatikonda1, Prakash Kodali1,*, Ramalingaswamy Cheruku2, Eswaramoorthy K.V3
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4683-4702, 2024, DOI:10.32604/cmc.2024.051844 - 20 June 2024
    Abstract In the realm of low-level vision tasks, such as image deraining and dehazing, restoring images distorted by adverse weather conditions remains a significant challenge. The emergence of abundant computational resources has driven the dominance of deep Convolutional Neural Networks (CNNs), supplanting traditional methods reliant on prior knowledge. However, the evolution of CNN architectures has tended towards increasing complexity, utilizing intricate structures to enhance performance, often at the expense of computational efficiency. In response, we propose the Selective Kernel Dense Residual M-shaped Network (SKDRMNet), a flexible solution adept at balancing computational efficiency with network accuracy. A… More >

  • Open AccessOpen Access

    ARTICLE

    CrossLinkNet: An Explainable and Trustworthy AI Framework for Whole-Slide Images Segmentation

    Peng Xiao1, Qi Zhong2, Jingxue Chen1, Dongyuan Wu1, Zhen Qin1, Erqiang Zhou1,*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4703-4724, 2024, DOI:10.32604/cmc.2024.049791 - 20 June 2024
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract In the intelligent medical diagnosis area, Artificial Intelligence (AI)’s trustworthiness, reliability, and interpretability are critical, especially in cancer diagnosis. Traditional neural networks, while excellent at processing natural images, often lack interpretability and adaptability when processing high-resolution digital pathological images. This limitation is particularly evident in pathological diagnosis, which is the gold standard of cancer diagnosis and relies on a pathologist’s careful examination and analysis of digital pathological slides to identify the features and progression of the disease. Therefore, the integration of interpretable AI into smart medical diagnosis is not only an inevitable technological trend but… More >

  • Open AccessOpen Access

    ARTICLE

    Solar Radiation Estimation Based on a New Combined Approach of Artificial Neural Networks (ANN) and Genetic Algorithms (GA) in South Algeria

    Djeldjli Halima1,*, Benatiallah Djelloul1, Ghasri Mehdi2, Tanougast Camel3, Benatiallah Ali4, Benabdelkrim Bouchra1
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4725-4740, 2024, DOI:10.32604/cmc.2024.051002 - 20 June 2024
    (This article belongs to the Special Issue: Recent Advances in Ensemble Framework of Meta-heuristics and Machine Learning: Methods and Applications)
    Abstract When designing solar systems and assessing the effectiveness of their many uses, estimating sun irradiance is a crucial first step. This study examined three approaches (ANN, GA-ANN, and ANFIS) for estimating daily global solar radiation (GSR) in the south of Algeria: Adrar, Ouargla, and Bechar. The proposed hybrid GA-ANN model, based on genetic algorithm-based optimization, was developed to improve the ANN model. The GA-ANN and ANFIS models performed better than the standalone ANN-based model, with GA-ANN being better suited for forecasting in all sites, and it performed the best with the best values in the… More >

    Graphic Abstract

    Solar Radiation Estimation Based on a New Combined Approach of Artificial Neural Networks (ANN) and Genetic Algorithms (GA) in South Algeria

  • Open AccessOpen Access

    ARTICLE

    Multiscale and Auto-Tuned Semi-Supervised Deep Subspace Clustering and Its Application in Brain Tumor Clustering

    Zhenyu Qian1, Yizhang Jiang1, Zhou Hong1, Lijun Huang2, Fengda Li3, KhinWee Lai6, Kaijian Xia4,5,6,*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4741-4762, 2024, DOI:10.32604/cmc.2024.050920 - 20 June 2024
    (This article belongs to the Special Issue: Advanced Artificial Intelligence and Machine Learning Frameworks for Signal and Image Processing Applications)
    Abstract In this paper, we introduce a novel Multi-scale and Auto-tuned Semi-supervised Deep Subspace Clustering (MAS-DSC) algorithm, aimed at addressing the challenges of deep subspace clustering in high-dimensional real-world data, particularly in the field of medical imaging. Traditional deep subspace clustering algorithms, which are mostly unsupervised, are limited in their ability to effectively utilize the inherent prior knowledge in medical images. Our MAS-DSC algorithm incorporates a semi-supervised learning framework that uses a small amount of labeled data to guide the clustering process, thereby enhancing the discriminative power of the feature representations. Additionally, the multi-scale feature extraction… More >

    Graphic Abstract

    Multiscale and Auto-Tuned Semi-Supervised Deep Subspace Clustering and Its Application in Brain Tumor Clustering

  • Open AccessOpen Access

    ARTICLE

    Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things

    Jingjing Nie1,*, Zhenhua Chen2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4763-4779, 2024, DOI:10.32604/cmc.2024.051181 - 20 June 2024
    Abstract The Internet of Medical Things (IoMT) is an application of the Internet of Things (IoT) in the medical field. It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems, which is essential in smart healthcare. However, Personal Health Records (PHRs) are normally kept in public cloud servers controlled by IoMT service providers, so privacy and security incidents may be frequent. Fortunately, Searchable Encryption (SE), which can be used to execute queries on encrypted data, can address the issue above. Nevertheless, most existing SE schemes cannot solve the vector dominance threshold… More >

  • Open AccessOpen Access

    ARTICLE

    Security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application

    Ahmed Redha Mahlous*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4781-4803, 2024, DOI:10.32604/cmc.2024.050821 - 20 June 2024
    Abstract Smart agriculture modifies traditional farming practices, and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies. In today’s world where technology is everything, these technologies are utilized to streamline regular tasks and procedures in agriculture, one of the largest and most significant industries in every nation. This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems. Divided into three main sections—security analysis, system architecture and design and risk assessment of Cyber-Physical Systems (CPS) applications—the study delves… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning-Based ECG Classification for Arterial Fibrillation Detection

    Muhammad Sohail Irshad1,2,*, Tehreem Masood1,2, Arfan Jaffar1,2, Muhammad Rashid3, Sheeraz Akram1,2,4,*, Abeer Aljohani5
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4805-4824, 2024, DOI:10.32604/cmc.2024.050931 - 20 June 2024
    (This article belongs to the Special Issue: Deep Learning in Medical Imaging-Disease Segmentation and Classification)
    Abstract The application of deep learning techniques in the medical field, specifically for Atrial Fibrillation (AFib) detection through Electrocardiogram (ECG) signals, has witnessed significant interest. Accurate and timely diagnosis increases the patient’s chances of recovery. However, issues like overfitting and inconsistent accuracy across datasets remain challenges. In a quest to address these challenges, a study presents two prominent deep learning architectures, ResNet-50 and DenseNet-121, to evaluate their effectiveness in AFib detection. The aim was to create a robust detection mechanism that consistently performs well. Metrics such as loss, accuracy, precision, sensitivity, and Area Under the Curve… More >

  • Open AccessOpen Access

    ARTICLE

    Improving the Transmission Security of Vein Images Using a Bezier Curve and Long Short-Term Memory

    Ahmed H. Alhadethi1,*, Ikram Smaoui2, Ahmed Fakhfakh3, Saad M. Darwish4
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4825-4844, 2024, DOI:10.32604/cmc.2024.047852 - 20 June 2024
    (This article belongs to the Special Issue: Advances and Applications in Signal, Image and Video Processing)
    Abstract The act of transmitting photos via the Internet has become a routine and significant activity. Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced. This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images. The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression. This paper introduces… More >

  • Open AccessOpen Access

    ARTICLE

    A Robust Approach for Multi Classification-Based Intrusion Detection through Stacking Deep Learning Models

    Samia Allaoua Chelloug*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4845-4861, 2024, DOI:10.32604/cmc.2024.051539 - 20 June 2024
    Abstract Intrusion detection is a predominant task that monitors and protects the network infrastructure. Therefore, many datasets have been published and investigated by researchers to analyze and understand the problem of intrusion prediction and detection. In particular, the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) is an extensively used benchmark dataset for evaluating intrusion detection systems (IDSs) as it incorporates various network traffic attacks. It is worth mentioning that a large number of studies have tackled the problem of intrusion detection using machine learning models, but the performance of these models often decreases when evaluated on… More >

  • Open AccessOpen Access

    ARTICLE

    MSD-Net: Pneumonia Classification Model Based on Multi-Scale Directional Feature Enhancement

    Tao Zhou1,3, Yujie Guo1,3,*, Caiyue Peng1,3, Yuxia Niu1,3, Yunfeng Pan1,3, Huiling Lu2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4863-4882, 2024, DOI:10.32604/cmc.2024.050767 - 20 June 2024
    (This article belongs to the Special Issue: Deep Learning in Medical Imaging-Disease Segmentation and Classification)
    Abstract Computer-aided diagnosis of pneumonia based on deep learning is a research hotspot. However, there are some problems that the features of different sizes and different directions are not sufficient when extracting the features in lung X-ray images. A pneumonia classification model based on multi-scale directional feature enhancement MSD-Net is proposed in this paper. The main innovations are as follows: Firstly, the Multi-scale Residual Feature Extraction Module (MRFEM) is designed to effectively extract multi-scale features. The MRFEM uses dilated convolutions with different expansion rates to increase the receptive field and extract multi-scale features effectively. Secondly, the… More >

  • Open AccessOpen Access

    ARTICLE

    The Lightweight Edge-Side Fault Diagnosis Approach Based on Spiking Neural Network

    Jingting Mei, Yang Yang*, Zhipeng Gao, Lanlan Rui, Yijing Lin
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4883-4904, 2024, DOI:10.32604/cmc.2024.051860 - 20 June 2024
    Abstract Network fault diagnosis methods play a vital role in maintaining network service quality and enhancing user experience as an integral component of intelligent network management. Considering the unique characteristics of edge networks, such as limited resources, complex network faults, and the need for high real-time performance, enhancing and optimizing existing network fault diagnosis methods is necessary. Therefore, this paper proposes the lightweight edge-side fault diagnosis approach based on a spiking neural network (LSNN). Firstly, we use the Izhikevich neurons model to replace the Leaky Integrate and Fire (LIF) neurons model in the LSNN model. Izhikevich… More >

  • Open AccessOpen Access

    ARTICLE

    Optimised CNN Architectures for Handwritten Arabic Character Recognition

    Salah Alghyaline*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4905-4924, 2024, DOI:10.32604/cmc.2024.052016 - 20 June 2024
    Abstract Handwritten character recognition is considered challenging compared with machine-printed characters due to the different human writing styles. Arabic is morphologically rich, and its characters have a high similarity. The Arabic language includes 28 characters. Each character has up to four shapes according to its location in the word (at the beginning, middle, end, and isolated). This paper proposed 12 CNN architectures for recognizing handwritten Arabic characters. The proposed architectures were derived from the popular CNN architectures, such as VGG, ResNet, and Inception, to make them applicable to recognizing character-size images. The experimental results on three More >

  • Open AccessOpen Access

    ARTICLE

    Probability-Enhanced Anchor-Free Detector for Remote-Sensing Object Detection

    Chengcheng Fan1,2,*, Zhiruo Fang3
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4925-4943, 2024, DOI:10.32604/cmc.2024.049710 - 20 June 2024
    Abstract Anchor-free object-detection methods achieve a significant advancement in field of computer vision, particularly in the realm of real-time inferences. However, in remote sensing object detection, anchor-free methods often lack of capability in separating the foreground and background. This paper proposes an anchor-free method named probability-enhanced anchor-free detector (ProEnDet) for remote sensing object detection. First, a weighted bidirectional feature pyramid is used for feature extraction. Second, we introduce probability enhancement to strengthen the classification of the object’s foreground and background. The detector uses the logarithm likelihood as the final score to improve the classification of the More >

  • Open AccessOpen Access

    ARTICLE

    Developing a Model for Parkinson’s Disease Detection Using Machine Learning Algorithms

    Naif Al Mudawi*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4945-4962, 2024, DOI:10.32604/cmc.2024.048967 - 20 June 2024
    Abstract Parkinson’s disease (PD) is a chronic neurological condition that progresses over time. People start to have trouble speaking, writing, walking, or performing other basic skills as dopamine-generating neurons in some brain regions are injured or die. The patient’s symptoms become more severe due to the worsening of their signs over time. In this study, we applied state-of-the-art machine learning algorithms to diagnose Parkinson’s disease and identify related risk factors. The research worked on the publicly available dataset on PD, and the dataset consists of a set of significant characteristics of PD. We aim to apply… More >

  • Open AccessOpen Access

    ARTICLE

    Empowering Diagnosis: Cutting-Edge Segmentation and Classification in Lung Cancer Analysis

    Iftikhar Naseer1,2, Tehreem Masood1,2, Sheeraz Akram3,*, Zulfiqar Ali4, Awais Ahmad3, Shafiq Ur Rehman3, Arfan Jaffar1,2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4963-4977, 2024, DOI:10.32604/cmc.2024.050204 - 20 June 2024
    (This article belongs to the Special Issue: Deep Learning in Medical Imaging-Disease Segmentation and Classification)
    Abstract Lung cancer is a leading cause of global mortality rates. Early detection of pulmonary tumors can significantly enhance the survival rate of patients. Recently, various Computer-Aided Diagnostic (CAD) methods have been developed to enhance the detection of pulmonary nodules with high accuracy. Nevertheless, the existing methodologies cannot obtain a high level of specificity and sensitivity. The present study introduces a novel model for Lung Cancer Segmentation and Classification (LCSC), which incorporates two improved architectures, namely the improved U-Net architecture and the improved AlexNet architecture. The LCSC model comprises two distinct stages. The first stage involves… More >

  • Open AccessOpen Access

    ARTICLE

    Abnormal Action Recognition with Lightweight Pose Estimation Network in Electric Power Training Scene

    Yunfeng Cai1, Ran Qin1, Jin Tang1, Long Zhang1, Xiaotian Bi1, Qing Yang2,*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4979-4994, 2024, DOI:10.32604/cmc.2024.050435 - 20 June 2024
    Abstract Electric power training is essential for ensuring the safety and reliability of the system. In this study, we introduce a novel Abnormal Action Recognition (AAR) system that utilizes a Lightweight Pose Estimation Network (LPEN) to efficiently and effectively detect abnormal fall-down and trespass incidents in electric power training scenarios. The LPEN network, comprising three stages—MobileNet, Initial Stage, and Refinement Stage—is employed to swiftly extract image features, detect human key points, and refine them for accurate analysis. Subsequently, a Pose-aware Action Analysis Module (PAAM) captures the positional coordinates of human skeletal points in each frame. Finally, More >

  • Open AccessOpen Access

    ARTICLE

    THAPE: A Tunable Hybrid Associative Predictive Engine Approach for Enhancing Rule Interpretability in Association Rule Learning for the Retail Sector

    Monerah Alawadh*, Ahmed Barnawi
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4995-5015, 2024, DOI:10.32604/cmc.2024.048762 - 20 June 2024
    (This article belongs to the Special Issue: Intelligent Computing Techniques and Their Real Life Applications)
    Abstract Association rule learning (ARL) is a widely used technique for discovering relationships within datasets. However, it often generates excessive irrelevant or ambiguous rules. Therefore, post-processing is crucial not only for removing irrelevant or redundant rules but also for uncovering hidden associations that impact other factors. Recently, several post-processing methods have been proposed, each with its own strengths and weaknesses. In this paper, we propose THAPE (Tunable Hybrid Associative Predictive Engine), which combines descriptive and predictive techniques. By leveraging both techniques, our aim is to enhance the quality of analyzing generated rules. This includes removing irrelevant… More >

  • Open AccessOpen Access

    ARTICLE

    Research on the IL-Bagging-DHKELM Short-Term Wind Power Prediction Algorithm Based on Error AP Clustering Analysis

    Jing Gao*, Mingxuan Ji, Hongjiang Wang, Zhongxiao Du
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5017-5030, 2024, DOI:10.32604/cmc.2024.050158 - 20 June 2024
    Abstract With the continuous advancement of China’s “peak carbon dioxide emissions and Carbon Neutrality” process, the proportion of wind power is increasing. In the current research, aiming at the problem that the forecasting model is outdated due to the continuous updating of wind power data, a short-term wind power forecasting algorithm based on Incremental Learning-Bagging Deep Hybrid Kernel Extreme Learning Machine (IL-Bagging-DHKELM) error affinity propagation cluster analysis is proposed. The algorithm effectively combines deep hybrid kernel extreme learning machine (DHKELM) with incremental learning (IL). Firstly, an initial wind power prediction model is trained using the Bagging-DHKELM… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Secure Development in Globally Distributed Software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems

    Marya Iqbal1, Yaser Hafeez1, Nabil Almashfi2, Amjad Alsirhani3, Faeiz Alserhani4, Sadia Ali1, Mamoona Humayun5,*, Muhammad Jamal6
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5031-5049, 2024, DOI:10.32604/cmc.2024.051371 - 20 June 2024
    Abstract Embracing software product lines (SPLs) is pivotal in the dynamic landscape of contemporary software development. However, the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL variability, underscoring the critical importance of robust cybersecurity measures. This paper advocates for leveraging machine learning (ML) to address variability management issues and fortify the security of SPL. In the context of the broader special issue theme on innovative cybersecurity approaches, our proposed ML-based framework offers an interdisciplinary perspective, blending insights from computing, social sciences, and business. Specifically, it employs ML for demand analysis, More >

  • Open AccessOpen Access

    ARTICLE

    Vehicle Abnormal Behavior Detection Based on Dense Block and Soft Thresholding

    Yuanyao Lu1,*, Wei Chen2, Zhanhe Yu1, Jingxuan Wang1, Chaochao Yang2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5051-5066, 2024, DOI:10.32604/cmc.2024.050865 - 20 June 2024
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract With the rapid advancement of social economies, intelligent transportation systems are gaining increasing attention. Central to these systems is the detection of abnormal vehicle behavior, which remains a critical challenge due to the complexity of urban roadways and the variability of external conditions. Current research on detecting abnormal traffic behaviors is still nascent, with significant room for improvement in recognition accuracy. To address this, this research has developed a new model for recognizing abnormal traffic behaviors. This model employs the R3D network as its core architecture, incorporating a dense block to facilitate feature reuse. This… More >

  • Open AccessOpen Access

    ARTICLE

    Learning Vector Quantization-Based Fuzzy Rules Oversampling Method

    Jiqiang Chen, Ranran Han, Dongqing Zhang, Litao Ma*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5067-5082, 2024, DOI:10.32604/cmc.2024.051494 - 20 June 2024
    Abstract Imbalanced datasets are common in practical applications, and oversampling methods using fuzzy rules have been shown to enhance the classification performance of imbalanced data by taking into account the relationship between data attributes. However, the creation of fuzzy rules typically depends on expert knowledge, which may not fully leverage the label information in training data and may be subjective. To address this issue, a novel fuzzy rule oversampling approach is developed based on the learning vector quantization (LVQ) algorithm. In this method, the label information of the training data is utilized to determine the antecedent… More >

  • Open AccessOpen Access

    ARTICLE

    GCAGA: A Gini Coefficient-Based Optimization Strategy for Computation Offloading in Multi-User-Multi-Edge MEC System

    Junqing Bai1, Qiuchao Dai1,*, Yingying Li2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5083-5103, 2024, DOI:10.32604/cmc.2024.050921 - 20 June 2024
    Abstract To support the explosive growth of Information and Communications Technology (ICT), Mobile Edge Computing (MEC) provides users with low latency and high bandwidth service by offloading computational tasks to the network’s edge. However, resource-constrained mobile devices still suffer from a capacity mismatch when faced with latency-sensitive and compute-intensive emerging applications. To address the difficulty of running computationally intensive applications on resource-constrained clients, a model of the computation offloading problem in a network consisting of multiple mobile users and edge cloud servers is studied in this paper. Then a user benefit function EoU (Experience of Users) is… More >

  • Open AccessOpen Access

    ARTICLE

    Distributed Graph Database Load Balancing Method Based on Deep Reinforcement Learning

    Shuming Sha1,2, Naiwang Guo3, Wang Luo1,2, Yong Zhang1,2,*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5105-5124, 2024, DOI:10.32604/cmc.2024.049584 - 20 June 2024
    Abstract This paper focuses on the scheduling problem of workflow tasks that exhibit interdependencies. Unlike independent batch tasks, workflows typically consist of multiple subtasks with intrinsic correlations and dependencies. It necessitates the distribution of various computational tasks to appropriate computing node resources in accordance with task dependencies to ensure the smooth completion of the entire workflow. Workflow scheduling must consider an array of factors, including task dependencies, availability of computational resources, and the schedulability of tasks. Therefore, this paper delves into the distributed graph database workflow task scheduling problem and proposes a workflow scheduling methodology based… More >

  • Open AccessOpen Access

    ARTICLE

    A Federated Learning Framework with Blockchain-Based Auditable Participant Selection

    Huang Zeng, Mingtian Zhang, Tengfei Liu, Anjia Yang*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5125-5142, 2024, DOI:10.32604/cmc.2024.052846 - 20 June 2024
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract Federated learning is an important distributed model training technique in Internet of Things (IoT), in which participant selection is a key component that plays a role in improving training efficiency and model accuracy. This module enables a central server to select a subset of participants to perform model training based on data and device information. By doing so, selected participants are rewarded and actively perform model training, while participants that are detrimental to training efficiency and model accuracy are excluded. However, in practice, participants may suspect that the central server may have miscalculated and thus… More >

  • Open AccessOpen Access

    ARTICLE

    A Dual Domain Robust Reversible Watermarking Algorithm for Frame Grouping Videos Using Scene Smoothness

    Yucheng Liang1,2,*, Ke Niu1,2,*, Yingnan Zhang1,2, Yifei Meng1,2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5143-5174, 2024, DOI:10.32604/cmc.2024.051364 - 20 June 2024
    Abstract The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grouping videos. Grounded in the H.264 video coding standard, the algorithm first employs traditional robust watermark stitching technology to embed watermark information in the low-frequency coefficient domain of the U channel. Subsequently, it utilizes histogram migration techniques in the high-frequency coefficient domain of the U channel to embed auxiliary information, enabling successful watermark extraction and lossless recovery of the original video content. Experimental results demonstrate the algorithm’s strong imperceptibility, with… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Gene Selection Methods for High-Dimensional Lung Cancer Data Using Improved Arithmetic Optimization Algorithm

    Mutasem K. Alsmadi*
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5175-5200, 2024, DOI:10.32604/cmc.2024.044065 - 20 June 2024
    (This article belongs to the Special Issue: Advanced Artificial Intelligence and Machine Learning Frameworks for Signal and Image Processing Applications)
    Abstract Lung cancer is among the most frequent cancers in the world, with over one million deaths per year. Classification is required for lung cancer diagnosis and therapy to be effective, accurate, and reliable. Gene expression microarrays have made it possible to find genetic biomarkers for cancer diagnosis and prediction in a high-throughput manner. Machine Learning (ML) has been widely used to diagnose and classify lung cancer where the performance of ML methods is evaluated to identify the appropriate technique. Identifying and selecting the gene expression patterns can help in lung cancer diagnoses and classification. Normally,… More >

  • Open AccessOpen Access

    ARTICLE

    An Opposition-Based Learning-Based Search Mechanism for Flying Foxes Optimization Algorithm

    Chen Zhang1, Liming Liu1, Yufei Yang1, Yu Sun1, Jiaxu Ning2, Yu Zhang3, Changsheng Zhang1,4,*, Ying Guo4
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5201-5223, 2024, DOI:10.32604/cmc.2024.050863 - 20 June 2024
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract The flying foxes optimization (FFO) algorithm, as a newly introduced metaheuristic algorithm, is inspired by the survival tactics of flying foxes in heat wave environments. FFO preferentially selects the best-performing individuals. This tendency will cause the newly generated solution to remain closely tied to the candidate optimal in the search area. To address this issue, the paper introduces an opposition-based learning-based search mechanism for FFO algorithm (IFFO). Firstly, this paper introduces niching techniques to improve the survival list method, which not only focuses on the adaptability of individuals but also considers the population’s crowding degree More >

  • Open AccessOpen Access

    ARTICLE

    Research on Sarcasm Detection Technology Based on Image-Text Fusion

    Xiaofang Jin1, Yuying Yang1,*, Yinan Wu1, Ying Xu2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5225-5242, 2024, DOI:10.32604/cmc.2024.050384 - 20 June 2024
    Abstract The emergence of new media in various fields has continuously strengthened the social aspect of social media. Netizens tend to express emotions in social interactions, and many people even use satire, metaphors, and other techniques to express some negative emotions, it is necessary to detect sarcasm in social comment data. For sarcasm, the more reference data modalities used, the better the experimental effect. This paper conducts research on sarcasm detection technology based on image-text fusion data. To effectively utilize the features of each modality, a feature reconstruction output algorithm is proposed. This algorithm is based… More >

  • Open AccessOpen Access

    ARTICLE

    Fine-Grained Ship Recognition Based on Visible and Near-Infrared Multimodal Remote Sensing Images: Dataset, Methodology and Evaluation

    Shiwen Song, Rui Zhang, Min Hu*, Feiyao Huang
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5243-5271, 2024, DOI:10.32604/cmc.2024.050879 - 20 June 2024
    (This article belongs to the Special Issue: Multimodal Learning in Image Processing)
    Abstract Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security. Currently, with the emergence of massive high-resolution multi-modality images, the use of multi-modality images for fine-grained recognition has become a promising technology. Fine-grained recognition of multi-modality images imposes higher requirements on the dataset samples. The key to the problem is how to extract and fuse the complementary features of multi-modality images to obtain more discriminative fusion features. The attention mechanism helps the model to pinpoint the key information in the image, resulting in a… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling and Analysis of OFDMA-NOMA-RA Protocol Considering Imperfect SIC in Multi-User Uplink WLANs

    Hailing Yang1, Suoping Li1,2,*, Duo Peng2
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5273-5294, 2024, DOI:10.32604/cmc.2024.050869 - 20 June 2024
    (This article belongs to the Special Issue: Innovative Security for the Next Generation Mobile Communication and Internet Systems)
    Abstract To address the problems of network congestion and spectrum resources shortage in multi-user large-scale scenarios, this paper proposes a twice random access OFDMA-NOMA-RA protocol combining the advantages of orthogonal frequency division multiple access (OFDMA) and non-orthogonal multiple access (NOMA). The idea of this protocol is that OFMDA is used to divide the entire frequency field into multiple orthogonal resource units (RUs), and NOMA is used on each RU to enable more users to access the channel and improve spectrum efficiency. Based on the protocol designed in this paper, in the case of imperfect successive interference… More >

  • Open AccessOpen Access

    ARTICLE

    A Deepfake Detection Algorithm Based on Fourier Transform of Biological Signal

    Yin Ni1, Wu Zeng2,*, Peng Xia1, Guang Stanley Yang3, Ruochen Tan4
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5295-5312, 2024, DOI:10.32604/cmc.2024.049911 - 20 June 2024
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract Deepfake-generated fake faces, commonly utilized in identity-related activities such as political propaganda, celebrity impersonations, evidence forgery, and familiar fraud, pose new societal threats. Although current deepfake generators strive for high realism in visual effects, they do not replicate biometric signals indicative of cardiac activity. Addressing this gap, many researchers have developed detection methods focusing on biometric characteristics. These methods utilize classification networks to analyze both temporal and spectral domain features of the remote photoplethysmography (rPPG) signal, resulting in high detection accuracy. However, in the spectral analysis, existing approaches often only consider the power spectral density… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Multi-Scale Feature Fusion Network Algorithm Based on Brain Tumor Medical Image Classification

    Yuting Zhou1, Xuemei Yang1, Junping Yin2,3,4,*, Shiqi Liu1
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5313-5333, 2024, DOI:10.32604/cmc.2024.052060 - 20 June 2024
    (This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
    Abstract Gliomas have the highest mortality rate of all brain tumors. Correctly classifying the glioma risk period can help doctors make reasonable treatment plans and improve patients’ survival rates. This paper proposes a hierarchical multi-scale attention feature fusion medical image classification network (HMAC-Net), which effectively combines global features and local features. The network framework consists of three parallel layers: The global feature extraction layer, the local feature extraction layer, and the multi-scale feature fusion layer. A linear sparse attention mechanism is designed in the global feature extraction layer to reduce information redundancy. In the local feature… More >

Per Page:

Share Link