Home / Journals / CMC / Vol.80, No.3, 2024
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    HWD-YOLO: A New Vision-Based Helmet Wearing Detection Method

    Licheng Sun1, Heping Li2,3, Liang Wang1,4,*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4543-4560, 2024, DOI:10.32604/cmc.2024.055115 - 12 September 2024
    Abstract It is crucial to ensure workers wear safety helmets when working at a workplace with a high risk of safety accidents, such as construction sites and mine tunnels. Although existing methods can achieve helmet detection in images, their accuracy and speed still need improvements since complex, cluttered, and large-scale scenes of real workplaces cause server occlusion, illumination change, scale variation, and perspective distortion. So, a new safety helmet-wearing detection method based on deep learning is proposed. Firstly, a new multi-scale contextual aggregation module is proposed to aggregate multi-scale feature information globally and highlight the details… More >

  • Open AccessOpen Access

    ARTICLE

    Diabetic Retinopathy Detection: A Hybrid Intelligent Approach

    Atta Rahman1,*, Mustafa Youldash2, Ghaida Alshammari2, Abrar Sebiany2, Joury Alzayat2, Manar Alsayed2, Mona Alqahtani2, Noor Aljishi2
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4561-4576, 2024, DOI:10.32604/cmc.2024.055106 - 12 September 2024
    (This article belongs to the Special Issue: Deep Learning in Medical Imaging-Disease Segmentation and Classification)
    Abstract Diabetes is a serious health condition that can cause several issues in human body organs such as the heart and kidney as well as a serious eye disease called diabetic retinopathy (DR). Early detection and treatment are crucial to prevent complete blindness or partial vision loss. Traditional detection methods, which involve ophthalmologists examining retinal fundus images, are subjective, expensive, and time-consuming. Therefore, this study employs artificial intelligence (AI) technology to perform faster and more accurate binary classifications and determine the presence of DR. In this regard, we employed three promising machine learning models namely, support… More >

  • Open AccessOpen Access

    ARTICLE

    AMAD: Adaptive Mapping Approach for Datacenter Networks, an Energy-Friend Resource Allocation Framework via Repeated Leader Follower Game

    Ahmad Nahar Quttoum1,*, Muteb Alshammari2
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4577-4601, 2024, DOI:10.32604/cmc.2024.054102 - 12 September 2024
    Abstract Cloud Datacenter Network (CDN) providers usually have the option to scale their network structures to allow for far more resource capacities, though such scaling options may come with exponential costs that contradict their utility objectives. Yet, besides the cost of the physical assets and network resources, such scaling may also impose more loads on the electricity power grids to feed the added nodes with the required energy to run and cool, which comes with extra costs too. Thus, those CDN providers who utilize their resources better can certainly afford their services at lower price-units when… More >

  • Open AccessOpen Access

    ARTICLE

    IMTNet: Improved Multi-Task Copy-Move Forgery Detection Network with Feature Decoupling and Multi-Feature Pyramid

    Huan Wang1, Hong Wang1, Zhongyuan Jiang2,*, Qing Qian1, Yong Long1
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4603-4620, 2024, DOI:10.32604/cmc.2024.053740 - 12 September 2024
    (This article belongs to the Special Issue: Multimedia Security in Deep Learning)
    Abstract Copy-Move Forgery Detection (CMFD) is a technique that is designed to identify image tampering and locate suspicious areas. However, the practicality of the CMFD is impeded by the scarcity of datasets, inadequate quality and quantity, and a narrow range of applicable tasks. These limitations significantly restrict the capacity and applicability of CMFD. To overcome the limitations of existing methods, a novel solution called IMTNet is proposed for CMFD by employing a feature decoupling approach. Firstly, this study formulates the objective task and network relationship as an optimization problem using transfer learning. Furthermore, it thoroughly discusses… More >

  • Open AccessOpen Access

    ARTICLE

    FIBTNet: Building Change Detection for Remote Sensing Images Using Feature Interactive Bi-Temporal Network

    Jing Wang1,2,*, Tianwen Lin1, Chen Zhang1, Jun Peng1,*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4621-4641, 2024, DOI:10.32604/cmc.2024.053206 - 12 September 2024
    Abstract In this paper, a feature interactive bi-temporal change detection network (FIBTNet) is designed to solve the problem of pseudo change in remote sensing image building change detection. The network improves the accuracy of change detection through bi-temporal feature interaction. FIBTNet designs a bi-temporal feature exchange architecture (EXA) and a bi-temporal difference extraction architecture (DFA). EXA improves the feature exchange ability of the model encoding process through multiple space, channel or hybrid feature exchange methods, while DFA uses the change residual (CR) module to improve the ability of the model decoding process to extract different features More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization

    Zinah Khalid Jasim Jasim*, Sefer Kurnaz*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4643-4662, 2024, DOI:10.32604/cmc.2024.055195 - 12 September 2024
    (This article belongs to the Special Issue: Data and Image Processing in Intelligent Information Systems)
    Abstract This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization (ACO) algorithm. Image steganography, a technique of embedding hidden information in digital photographs, should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least suspect. The contemporary methods of steganography are at best a compromise between these two. In this paper, we present our approach, entitled Ant Colony Optimization (ACO)-Least Significant Bit (LSB), which attempts to optimize the capacity in steganographic embedding. The approach makes use… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment

    Aljuaid Turkea Ayedh M1,2,*, Ainuddin Wahid Abdul Wahab1,*, Mohd Yamani Idna Idris1,3
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4663-4686, 2024, DOI:10.32604/cmc.2024.055287 - 12 September 2024
    Abstract Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources. This paper proposes a method for enforcing access decisions that is adaptable and dynamic, based on multilayer hybrid deep learning techniques, particularly the Tabular Deep Neural Network TabularDNN method. This technique transforms… More >

  • Open AccessOpen Access

    ARTICLE

    Pyramid Separable Channel Attention Network for Single Image Super-Resolution

    Congcong Ma1,3, Jiaqi Mi2, Wanlin Gao1,3, Sha Tao1,3,*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4687-4701, 2024, DOI:10.32604/cmc.2024.055803 - 12 September 2024
    (This article belongs to the Special Issue: Data and Image Processing in Intelligent Information Systems)
    Abstract Single Image Super-Resolution (SISR) technology aims to reconstruct a clear, high-resolution image with more information from an input low-resolution image that is blurry and contains less information. This technology has significant research value and is widely used in fields such as medical imaging, satellite image processing, and security surveillance. Despite significant progress in existing research, challenges remain in reconstructing clear and complex texture details, with issues such as edge blurring and artifacts still present. The visual perception effect still needs further enhancement. Therefore, this study proposes a Pyramid Separable Channel Attention Network (PSCAN) for the… More >

  • Open AccessOpen Access

    ARTICLE

    A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing

    Hawazen Alzahrani1, Tarek Sheltami1, Abdulaziz Barnawi2, Muhammad Imam2,*, Ansar Yaser3
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4703-4728, 2024, DOI:10.32604/cmc.2024.054203 - 12 September 2024
    Abstract The Internet of Things (IoT) links various devices to digital services and significantly improves the quality of our lives. However, as IoT connectivity is growing rapidly, so do the risks of network vulnerabilities and threats. Many interesting Intrusion Detection Systems (IDSs) are presented based on machine learning (ML) techniques to overcome this problem. Given the resource limitations of fog computing environments, a lightweight IDS is essential. This paper introduces a hybrid deep learning (DL) method that combines convolutional neural networks (CNN) and long short-term memory (LSTM) to build an energy-aware, anomaly-based IDS. We test this… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking

    Cong Shen1,*, Wei Zhang1,2,*, Tanping Zhou1,2, Yiming Zhang1, Lingling Zhang3
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4729-4748, 2024, DOI:10.32604/cmc.2024.054434 - 12 September 2024
    Abstract With the increasing awareness of privacy protection and the improvement of relevant laws, federal learning has gradually become a new choice for cross-agency and cross-device machine learning. In order to solve the problems of privacy leakage, high computational overhead and high traffic in some federated learning schemes, this paper proposes a multiplicative double privacy mask algorithm which is convenient for homomorphic addition aggregation. The combination of homomorphic encryption and secret sharing ensures that the server cannot compromise user privacy from the private gradient uploaded by the participants. At the same time, the proposed TQRR (Top-Q-Random-R) More >

  • Open AccessOpen Access

    ARTICLE

    Computational Approach for Automated Segmentation and Classification of Region of Interest in Lateral Breast Thermograms

    Dennies Tsietso1,*, Abid Yahya1, Ravi Samikannu1, Basit Qureshi2, Muhammad Babar3,*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4749-4765, 2024, DOI:10.32604/cmc.2024.052793 - 12 September 2024
    (This article belongs to the Special Issue: Privacy-Aware AI-based Models for Cancer Diagnosis)
    Abstract Breast cancer is one of the major health issues with high mortality rates and a substantial impact on patients and healthcare systems worldwide. Various Computer-Aided Diagnosis (CAD) tools, based on breast thermograms, have been developed for early detection of this disease. However, accurately segmenting the Region of Interest (ROI) from thermograms remains challenging. This paper presents an approach that leverages image acquisition protocol parameters to identify the lateral breast region and estimate its bottom boundary using a second-degree polynomial. The proposed method demonstrated high efficacy, achieving an impressive Jaccard coefficient of 86% and a Dice… More >

  • Open AccessOpen Access

    ARTICLE

    GATiT: An Intelligent Diagnosis Model Based on Graph Attention Network Incorporating Text Representation in Knowledge Reasoning

    Yu Song, Pengcheng Wu, Dongming Dai, Mingyu Gui, Kunli Zhang*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4767-4790, 2024, DOI:10.32604/cmc.2024.053506 - 12 September 2024
    (This article belongs to the Special Issue: Graph Neural Networks: Methods and Applications in Graph-related Problems)
    Abstract The growing prevalence of knowledge reasoning using knowledge graphs (KGs) has substantially improved the accuracy and efficiency of intelligent medical diagnosis. However, current models primarily integrate electronic medical records (EMRs) and KGs into the knowledge reasoning process, ignoring the differing significance of various types of knowledge in EMRs and the diverse data types present in the text. To better integrate EMR text information, we propose a novel intelligent diagnostic model named the Graph ATtention network incorporating Text representation in knowledge reasoning (GATiT), which comprises text representation, subgraph construction, knowledge reasoning, and diagnostic classification. In the… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization

    Ahmad Yahiya Ahmad Bani Ahmad1, Jafar Alzubi2, Sophers James3, Vincent Omollo Nyangaresi4,5,*, Chanthirasekaran Kutralakani6, Anguraju Krishnan7
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4791-4812, 2024, DOI:10.32604/cmc.2024.052771 - 12 September 2024
    Abstract In recent years, wearable devices-based Human Activity Recognition (HAR) models have received significant attention. Previously developed HAR models use hand-crafted features to recognize human activities, leading to the extraction of basic features. The images captured by wearable sensors contain advanced features, allowing them to be analyzed by deep learning algorithms to enhance the detection and recognition of human actions. Poor lighting and limited sensor capabilities can impact data quality, making the recognition of human actions a challenging task. The unimodal-based HAR approaches are not suitable in a real-time environment. Therefore, an updated HAR model is… More >

  • Open AccessOpen Access

    ARTICLE

    Guided-YNet: Saliency Feature-Guided Interactive Feature Enhancement Lung Tumor Segmentation Network

    Tao Zhou1,3, Yunfeng Pan1,3,*, Huiling Lu2, Pei Dang1,3, Yujie Guo1,3, Yaxing Wang1,3
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4813-4832, 2024, DOI:10.32604/cmc.2024.054685 - 12 September 2024
    (This article belongs to the Special Issue: Deep Learning in Medical Imaging-Disease Segmentation and Classification)
    Abstract Multimodal lung tumor medical images can provide anatomical and functional information for the same lesion. Such as Positron Emission Computed Tomography (PET), Computed Tomography (CT), and PET-CT. How to utilize the lesion anatomical and functional information effectively and improve the network segmentation performance are key questions. To solve the problem, the Saliency Feature-Guided Interactive Feature Enhancement Lung Tumor Segmentation Network (Guide-YNet) is proposed in this paper. Firstly, a double-encoder single-decoder U-Net is used as the backbone in this model, a single-coder single-decoder U-Net is used to generate the saliency guided feature using PET image and… More >

  • Open AccessOpen Access

    ARTICLE

    A Low Complexity ML-Based Methods for Malware Classification

    Mahmoud E. Farfoura1,*, Ahmad Alkhatib1, Deema Mohammed Alsekait2,*, Mohammad Alshinwan3,7, Sahar A. El-Rahman4, Didi Rosiyadi5, Diaa Salama AbdElminaam6,7
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4833-4857, 2024, DOI:10.32604/cmc.2024.054849 - 12 September 2024
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract The article describes a new method for malware classification, based on a Machine Learning (ML) model architecture specifically designed for malware detection, enabling real-time and accurate malware identification. Using an innovative feature dimensionality reduction technique called the Interpolation-based Feature Dimensionality Reduction Technique (IFDRT), the authors have significantly reduced the feature space while retaining critical information necessary for malware classification. This technique optimizes the model’s performance and reduces computational requirements. The proposed method is demonstrated by applying it to the BODMAS malware dataset, which contains 57,293 malware samples and 77,142 benign samples, each with a 2381-feature… More >

  • Open AccessOpen Access

    ARTICLE

    Infrared Fault Detection Method for Dense Electrolytic Bath Polar Plate Based on YOLOv5s

    Huiling Yu1, Yanqiu Hang2, Shen Shi1, Kangning Wu1, Yizhuo Zhang1,*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4859-4874, 2024, DOI:10.32604/cmc.2024.055403 - 12 September 2024
    Abstract Electrolysis tanks are used to smelt metals based on electrochemical principles, and the short-circuiting of the pole plates in the tanks in the production process will lead to high temperatures, thus affecting normal production. Aiming at the problems of time-consuming and poor accuracy of existing infrared methods for high-temperature detection of dense pole plates in electrolysis tanks, an infrared dense pole plate anomalous target detection network YOLOv5-RMF based on You Only Look Once version 5 (YOLOv5) is proposed. Firstly, we modified the Real-Time Enhanced Super-Resolution Generative Adversarial Network (Real-ESRGAN) by changing the U-shaped network (U-Net)… More >

  • Open AccessOpen Access

    ARTICLE

    Service Function Chain Deployment Algorithm Based on Multi-Agent Deep Reinforcement Learning

    Wanwei Huang1,*, Qiancheng Zhang1, Tao Liu2, Yaoli Xu1, Dalei Zhang3
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4875-4893, 2024, DOI:10.32604/cmc.2024.055622 - 12 September 2024
    Abstract Aiming at the rapid growth of network services, which leads to the problems of long service request processing time and high deployment cost in the deployment of network function virtualization service function chain (SFC) under 5G networks, this paper proposes a multi-agent deep deterministic policy gradient optimization algorithm for SFC deployment (MADDPG-SD). Initially, an optimization model is devised to enhance the request acceptance rate, minimizing the latency and deploying the cost SFC is constructed for the network resource-constrained case. Subsequently, we model the dynamic problem as a Markov decision process (MDP), facilitating adaptation to the… More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm

    Brij Bhooshan Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4895-4916, 2024, DOI:10.32604/cmc.2024.050815 - 12 September 2024
    Abstract Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape, necessitating the development of more sophisticated detection methods. Traditional machine learning approaches to phishing detection have relied heavily on feature engineering and have often fallen short in adapting to the dynamically changing patterns of phishing Uniform Resource Locator (URLs). Addressing these challenge, we introduce a framework that integrates the sequential data processing strengths of a Recurrent Neural Network (RNN) with the hyperparameter optimization prowess of the Whale Optimization Algorithm (WOA). Our model capitalizes on an extensive Kaggle dataset, featuring over 11,000 URLs, each More >

  • Open AccessOpen Access

    ARTICLE

    Knowledge-Driven Possibilistic Clustering with Automatic Cluster Elimination

    Xianghui Hu1, Yiming Tang2,3, Witold Pedrycz3,4, Jiuchuan Jiang5,*, Yichuan Jiang1,*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4917-4945, 2024, DOI:10.32604/cmc.2024.054775 - 12 September 2024
    Abstract Traditional Fuzzy C-Means (FCM) and Possibilistic C-Means (PCM) clustering algorithms are data-driven, and their objective function minimization process is based on the available numeric data. Recently, knowledge hints have been introduced to form knowledge-driven clustering algorithms, which reveal a data structure that considers not only the relationships between data but also the compatibility with knowledge hints. However, these algorithms cannot produce the optimal number of clusters by the clustering algorithm itself; they require the assistance of evaluation indices. Moreover, knowledge hints are usually used as part of the data structure (directly replacing some clustering centers),… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Multi-Criteria Decision Support System for the Best Anti-Aging Treatment Selection Process through Normal Wiggly Hesitant Fuzzy Sets

    Daekook Kang1, Ramya Lakshmanaraj2, Samayan Narayanamoorthy2, Navaneethakrishnan Suganthi Keerthana Devi2, Samayan Kalaiselvan3, Ranganathan Saraswathy4, Dragan Pamucar5,6,7,*, Vladimir Simic8,9
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4947-4972, 2024, DOI:10.32604/cmc.2024.055260 - 12 September 2024
    Abstract This socialized environment among educated and developed people causes them to focus more on their appearance and health, which turns them towards medical-related treatments, leading us to discuss anti-aging treatment methods for each age group, particularly for urban people who are interested in this. Some anti-aging therapies are used to address the alterations brought on by aging in human life without the need for surgery or negative effects. Five anti-aging therapies such as microdermabrasion or dermabrasion, laser resurfacing anti-aging skin treatments, chemical peels, dermal fillers for aged skin, and botox injections are considered in this… More >

  • Open AccessOpen Access

    ARTICLE

    YOLO-RLC: An Advanced Target-Detection Algorithm for Surface Defects of Printed Circuit Boards Based on YOLOv5

    Yuanyuan Wang1,2,*, Jialong Huang1, Md Sharid Kayes Dipu1, Hu Zhao3, Shangbing Gao1,2, Haiyan Zhang1,2, Pinrong Lv1
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4973-4995, 2024, DOI:10.32604/cmc.2024.055839 - 12 September 2024
    Abstract Printed circuit boards (PCBs) provide stable connections between electronic components. However, defective printed circuit boards may cause the entire equipment system to malfunction, resulting in incalculable losses. Therefore, it is crucial to detect defective printed circuit boards during the generation process. Traditional detection methods have low accuracy in detecting subtle defects in complex background environments. In order to improve the detection accuracy of surface defects on industrial printed circuit boards, this paper proposes a residual large kernel network based on YOLOv5 (You Only Look Once version 5) for PCBs surface defect detection, called YOLO-RLC (You… More >

  • Open AccessOpen Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024
    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

  • Open AccessOpen Access

    ARTICLE

    Spatial Attention Integrated EfficientNet Architecture for Breast Cancer Classification with Explainable AI

    Sannasi Chakravarthy1, Bharanidharan Nagarajan2, Surbhi Bhatia Khan3,7,*, Vinoth Kumar Venkatesan2, Mahesh Thyluru Ramakrishna4, Ahlam Al Musharraf5, Khursheed Aurungzeb6
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 5029-5045, 2024, DOI:10.32604/cmc.2024.052531 - 12 September 2024
    (This article belongs to the Special Issue: Privacy-Aware AI-based Models for Cancer Diagnosis)
    Abstract Breast cancer is a type of cancer responsible for higher mortality rates among women. The cruelty of breast cancer always requires a promising approach for its earlier detection. In light of this, the proposed research leverages the representation ability of pretrained EfficientNet-B0 model and the classification ability of the XGBoost model for the binary classification of breast tumors. In addition, the above transfer learning model is modified in such a way that it will focus more on tumor cells in the input mammogram. Accordingly, the work proposed an EfficientNet-B0 having a Spatial Attention Layer with More >

Per Page:

Share Link