Home / Journals / CMC / Vol.83, No.1, 2025
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Enhancing LoRaWAN Sensor Networks: A Deep Learning Approach for Performance Optimizing and Energy Efficiency

    Maram Alkhayyal*, Almetwally M. Mostafa
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1079-1100, 2025, DOI:10.32604/cmc.2025.061836 - 26 March 2025
    Abstract The rapid expansion of the Internet of Things (IoT) has led to the widespread adoption of sensor networks, with Long-Range Wide-Area Networks (LoRaWANs) emerging as a key technology due to their ability to support long-range communication while minimizing power consumption. However, optimizing network performance and energy efficiency in dynamic, large-scale IoT environments remains a significant challenge. Traditional methods, such as the Adaptive Data Rate (ADR) algorithm, often fail to adapt effectively to rapidly changing network conditions and environmental factors. This study introduces a hybrid approach that leverages Deep Learning (DL) techniques, namely Long Short-Term Memory… More >

  • Open AccessOpen Access

    ARTICLE

    Lightweight Classroom Student Action Recognition Method Based on Spatiotemporal Multimodal Feature Fusion

    Shaodong Zou1, Di Wu1, Jianhou Gan1,2,*, Juxiang Zhou1,2, Jiatian Mei1,2
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1101-1116, 2025, DOI:10.32604/cmc.2025.061376 - 26 March 2025
    (This article belongs to the Special Issue: Big Data and Artificial Intelligence in Control and Information System)
    Abstract The task of student action recognition in the classroom is to precisely capture and analyze the actions of students in classroom videos, providing a foundation for realizing intelligent and accurate teaching. However, the complex nature of the classroom environment has added challenges and difficulties in the process of student action recognition. In this research article, with regard to the circumstances where students are prone to be occluded and classroom computing resources are restricted in real classroom scenarios, a lightweight multi-modal fusion action recognition approach is put forward. This proposed method is capable of enhancing the… More >

  • Open AccessOpen Access

    ARTICLE

    Integrating Attention Mechanisms in YOLOv8 for Improved Fall Detection Performance

    Nizar Zaghden1, Emad Ibrahim2, Mukaram Safaldin2,*, Mahmoud Mejdoub3
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1117-1147, 2025, DOI:10.32604/cmc.2025.061948 - 26 March 2025
    Abstract The increasing elderly population has heightened the need for accurate and reliable fall detection systems, as falls can lead to severe health complications. Existing systems often suffer from high false positive and false negative rates due to insufficient training data and suboptimal detection techniques. This study introduces an advanced fall detection model integrating YOLOv8, Faster R-CNN, and Generative Adversarial Networks (GANs) to enhance accuracy and robustness. A modified YOLOv8 architecture serves as the core, utilizing spatial attention mechanisms to improve critical image regions’ detection. Faster R-CNN is employed for fine-grained human posture analysis, while GANs… More >

  • Open AccessOpen Access

    ARTICLE

    A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule

    Xiang Zhang1,2,*, Shenyan Han1,2, Wenbin Huang1,2, Daoyong Fu1,2
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1149-1171, 2025, DOI:10.32604/cmc.2025.060876 - 26 March 2025
    (This article belongs to the Special Issue: Multimedia Security in Deep Learning)
    Abstract Generative image steganography is a technique that directly generates stego images from secret information. Unlike traditional methods, it theoretically resists steganalysis because there is no cover image. Currently, the existing generative image steganography methods generally have good steganography performance, but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information extraction. Therefore, this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping rule. Firstly, the reference image is disentangled by a content and an attribute encoder to obtain content features… More >

  • Open AccessOpen Access

    ARTICLE

    MVLA-Net: A Multi-View Lesion Attention Network for Advanced Diagnosis and Grading of Diabetic Retinopathy

    Tariq Mahmood1,2, Tanzila Saba1, Faten S. Alamri3,*, Alishba Tahir4, Noor Ayesha5
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1173-1193, 2025, DOI:10.32604/cmc.2025.061150 - 26 March 2025
    Abstract Innovation in learning algorithms has made retinal vessel segmentation and automatic grading techniques crucial for clinical diagnosis and prevention of diabetic retinopathy. The traditional methods struggle with accuracy and reliability due to multi-scale variations in retinal blood vessels and the complex pathological relationship in fundus images associated with diabetic retinopathy. While the single-modal diabetic retinopathy grading network addresses class imbalance challenges and lesion representation in fundus image data, dual-modal diabetic retinopathy grading methods offer superior performance. However, the scarcity of dual-modal data and the lack of effective feature fusion methods limit their potential due to… More >

  • Open AccessOpen Access

    ARTICLE

    A Method for Fast Feature Selection Utilizing Cross-Similarity within the Context of Fuzzy Relations

    Wenchang Yu1, Xiaoqin Ma1,2, Zheqing Zhang1, Qinli Zhang1,2,*
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1195-1218, 2025, DOI:10.32604/cmc.2025.060833 - 26 March 2025
    (This article belongs to the Special Issue: Advanced Algorithms for Feature Selection in Machine Learning)
    Abstract Feature selection methods rooted in rough sets confront two notable limitations: their high computational complexity and sensitivity to noise, rendering them impractical for managing large-scale and noisy datasets. The primary issue stems from these methods’ undue reliance on all samples. To overcome these challenges, we introduce the concept of cross-similarity grounded in a robust fuzzy relation and design a rapid and robust feature selection algorithm. Firstly, we construct a robust fuzzy relation by introducing a truncation parameter. Then, based on this fuzzy relation, we propose the concept of cross-similarity, which emphasizes the sample-to-sample similarity relations… More >

  • Open AccessOpen Access

    ARTICLE

    Target Detection-Oriented RGCN Inference Enhancement Method

    Lijuan Zhang1,2, Xiaoyu Wang1,2, Songtao Zhang3, Yutong Jiang4,*, Dongming Li1, Weichen Sun4
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1219-1237, 2025, DOI:10.32604/cmc.2025.059856 - 26 March 2025
    (This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
    Abstract In this paper, a reasoning enhancement method based on RGCN (Relational Graph Convolutional Network) is proposed to improve the detection capability of UAV (Unmanned Aerial Vehicle) on fast-moving military targets in urban battlefield environments. By combining military images with the publicly available VisDrone2019 dataset, a new dataset called VisMilitary was built and multiple YOLO (You Only Look Once) models were tested on it. Due to the low confidence problem caused by fuzzy targets, the performance of traditional YOLO models on real battlefield images decreases significantly. Therefore, we propose an improved RGCN inference model, which improves More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain-Enabled Edge Computing Techniques for Advanced Video Surveillance in Autonomous Vehicles

    Mohammad Tabrez Quasim*, Khair Ul Nisa
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1239-1255, 2025, DOI:10.32604/cmc.2025.061541 - 26 March 2025
    Abstract The blockchain-based audiovisual transmission systems were built to create a distributed and flexible smart transport system (STS). This system lets customers, video creators, and service providers directly connect with each other. Blockchain-based STS devices need a lot of computer power to change different video feed quality and forms into different versions and structures that meet the needs of different users. On the other hand, existing blockchains can’t support live streaming because they take too long to process and don’t have enough computer power. Large amounts of video data being sent and analyzed put too much… More >

  • Open AccessOpen Access

    ARTICLE

    A Low-Collision and Efficient Grasping Method for Manipulator Based on Safe Reinforcement Learning

    Qinglei Zhang, Bai Hu*, Jiyun Qin, Jianguo Duan, Ying Zhou
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1257-1273, 2025, DOI:10.32604/cmc.2025.059955 - 26 March 2025
    Abstract Grasping is one of the most fundamental operations in modern robotics applications. While deep reinforcement learning (DRL) has demonstrated strong potential in robotics, there is too much emphasis on maximizing the cumulative reward in executing tasks, and the potential safety risks are often ignored. In this paper, an optimization method based on safe reinforcement learning (Safe RL) is proposed to address the robotic grasping problem under safety constraints. Specifically, considering the obstacle avoidance constraints of the system, the grasping problem of the manipulator is modeled as a Constrained Markov Decision Process (CMDP). The Lagrange multiplier… More >

  • Open AccessOpen Access

    ARTICLE

    Classifying Multi-Lingual Reviews Sentiment Analysis in Arabic and English Languages Using the Stochastic Gradient Descent Model

    Yasser Alharbi1, Sarwar Shah Khan2,*
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1275-1290, 2025, DOI:10.32604/cmc.2025.061490 - 26 March 2025
    Abstract Sentiment analysis plays an important role in distilling and clarifying content from movie reviews, aiding the audience in understanding universal views towards the movie. However, the abundance of reviews and the risk of encountering spoilers pose challenges for efficient sentiment analysis, particularly in Arabic content. This study proposed a Stochastic Gradient Descent (SGD) machine learning (ML) model tailored for sentiment analysis in Arabic and English movie reviews. SGD allows for flexible model complexity adjustments, which can adapt well to the Involvement of Arabic language data. This adaptability ensures that the model can capture the nuances… More >

  • Open AccessOpen Access

    ARTICLE

    LogDA: Dual Attention-Based Log Anomaly Detection Addressing Data Imbalance

    Chexiaole Zhang, Haiyan Fu*
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1291-1306, 2025, DOI:10.32604/cmc.2025.060740 - 26 March 2025
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract As computer data grows exponentially, detecting anomalies within system logs has become increasingly important. Current research on log anomaly detection largely depends on log templates derived from log parsing. Word embedding is utilized to extract information from these templates. However, this method neglects a portion of the content within the logs and confronts the challenge of data imbalance among various log template types after parsing. Currently, specialized research on data imbalance across log template categories remains scarce. A dual-attention-based log anomaly detection model (LogDA), which leveraged data imbalance, was proposed to address these issues in More >

  • Open AccessOpen Access

    ARTICLE

    Root Security Parameter Generation Mechanism Based on SRAM PUF for Smart Terminals in Power IoT

    Xiao Feng1,2,3,*, Xiao Liao1,3, Xiaokang Lin1,3, Yonggui Wang1,3
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1307-1325, 2025, DOI:10.32604/cmc.2025.061069 - 26 March 2025
    Abstract In the context of the diversity of smart terminals, the unity of the root of trust becomes complicated, which not only affects the efficiency of trust propagation, but also poses a challenge to the security of the whole system. In particular, the solidification of the root of trust in non-volatile memory (NVM) restricts the system’s dynamic updating capability, which is an obvious disadvantage in a rapidly changing security environment. To address this issue, this study proposes a novel approach to generate root security parameters using static random access memory (SRAM) physical unclonable functions (PUFs). SRAM… More >

  • Open AccessOpen Access

    ARTICLE

    SESDP: A Sentiment Analysis-Driven Approach for Enhancing Software Product Security by Identifying Defects through Social Media Reviews

    Farah Mohammad1,2,*, Saad Al-Ahmadi3, Jalal Al-Muhtadi1,3
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1327-1345, 2025, DOI:10.32604/cmc.2025.060228 - 26 March 2025
    Abstract Software defect prediction is a critical component in maintaining software quality, enabling early identification and resolution of issues that could lead to system failures and significant financial losses. With the increasing reliance on user-generated content, social media reviews have emerged as a valuable source of real-time feedback, offering insights into potential software defects that traditional testing methods may overlook. However, existing models face challenges like handling imbalanced data, high computational complexity, and insufficient integration of contextual information from these reviews. To overcome these limitations, this paper introduces the SESDP (Sentiment Analysis-Based Early Software Defect Prediction)… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Bidirectional JPS Algorithm for Mobile Robot Path Planning in Complex Environments

    Zhaohui An, Changyong Li*, Yong Han, Mengru Niu
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1347-1366, 2025, DOI:10.32604/cmc.2025.059037 - 26 March 2025
    Abstract This paper introduces an Improved Bidirectional Jump Point Search (I-BJPS) algorithm to address the challenges of the traditional Jump Point Search (JPS) in mobile robot path planning. These challenges include excessive node expansions, frequent path inflexion points, slower search times, and a high number of jump points in complex environments with large areas and dense obstacles. Firstly, we improve the heuristic functions in both forward and reverse directions to minimize expansion nodes and search time. We also introduce a node optimization strategy to reduce non-essential nodes so that the path length is optimized. Secondly, we… More >

  • Open AccessOpen Access

    ARTICLE

    xCViT: Improved Vision Transformer Network with Fusion of CNN and Xception for Skin Disease Recognition with Explainable AI

    Armughan Ali1,2, Hooria Shahbaz2, Robertas Damaševičius3,*
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1367-1398, 2025, DOI:10.32604/cmc.2025.059301 - 26 March 2025
    Abstract Skin cancer is the most prevalent cancer globally, primarily due to extensive exposure to Ultraviolet (UV) radiation. Early identification of skin cancer enhances the likelihood of effective treatment, as delays may lead to severe tumor advancement. This study proposes a novel hybrid deep learning strategy to address the complex issue of skin cancer diagnosis, with an architecture that integrates a Vision Transformer, a bespoke convolutional neural network (CNN), and an Xception module. They were evaluated using two benchmark datasets, HAM10000 and Skin Cancer ISIC. On the HAM10000, the model achieves a precision of 95.46%, an… More >

  • Open AccessOpen Access

    ARTICLE

    Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud

    Xixi Yan1, Jing Zhang2,*, Pengyu Cheng2
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1399-1414, 2025, DOI:10.32604/cmc.2025.059969 - 26 March 2025
    (This article belongs to the Special Issue: Challenges and Innovations in Multimedia Encryption and Information Security)
    Abstract Conditional proxy re-encryption (CPRE) is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular, but most of the attribute-based conditional proxy re-encryption (AB-CPRE) schemes proposed so far do not take into account the importance of user attributes. A weighted attribute-based conditional proxy re-encryption (WAB-CPRE) scheme is thus designed to provide more precise decryption rights delegation. By introducing the concept of weight attributes, the quantity of system attributes managed by the server is reduced greatly. At the same time, a weighted tree structure is constructed… More >

  • Open AccessOpen Access

    ARTICLE

    Topology Optimization of Orthotropic Materials Using the Improved Element-Free Galerkin (IEFG) Method

    Wenna He, Yichen Yang, Dongqiong Liang, Heng Cheng*
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1415-1414, 2025, DOI:10.32604/cmc.2025.059839 - 26 March 2025
    (This article belongs to the Special Issue: Optimization Design for Material Microstructures)
    Abstract In this paper, we develop an advanced computational framework for the topology optimization of orthotropic materials using meshless methods. The approximation function is established based on the improved moving least squares (IMLS) method, which enhances the efficiency and stability of the numerical solution. The numerical solution formulas are derived using the improved element-free Galerkin (IEFG) method. We introduce the solid isotropic microstructures with penalization (SIMP) model to formulate a mathematical model for topology optimization, which effectively penalizes intermediate densities. The optimization problem is defined with the numerical solution formula and volume fraction as constraints. The… More >

  • Open AccessOpen Access

    ARTICLE

    An Uncertainty Quantization-Based Method for Anti-UAV Detection in Infrared Images

    Can Wu1,2, Wenyi Tang2, Yunbo Rao1,2,*, Yinjie Chen1, Hui Ding2, Shuzhen Zhu3, Yuanyuan Wang3
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1415-1434, 2025, DOI:10.32604/cmc.2025.059797 - 26 March 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Infrared unmanned aerial vehicle (UAV) target detection presents significant challenges due to the interplay between small targets and complex backgrounds. Traditional methods, while effective in controlled environments, often fail in scenarios involving long-range targets, high noise levels, or intricate backgrounds, highlighting the need for more robust approaches. To address these challenges, we propose a novel three-stage UAV segmentation framework that leverages uncertainty quantification to enhance target saliency. This framework incorporates a Bayesian convolutional neural network capable of generating both segmentation maps and probabilistic uncertainty maps. By utilizing uncertainty predictions, our method refines segmentation outcomes, achieving… More >

  • Open AccessOpen Access

    ARTICLE

    XGBoost-Liver: An Intelligent Integrated Features Approach for Classifying Liver Diseases Using Ensemble XGBoost Training Model

    Sumaiya Noor1, Salman A. AlQahtani2, Salman Khan3,*
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1435-1450, 2025, DOI:10.32604/cmc.2025.061700 - 26 March 2025
    Abstract The liver is a crucial gland and the second-largest organ in the human body and also essential in digestion, metabolism, detoxification, and immunity. Liver diseases result from factors such as viral infections, obesity, alcohol consumption, injuries, or genetic predispositions. Pose significant health risks and demand timely diagnosis and treatment to enhance survival rates. Traditionally, diagnosing liver diseases relied heavily on clinical expertise, often leading to subjective, challenging, and time-intensive processes. However, early detection is essential for effective intervention, and advancements in machine learning (ML) have demonstrated remarkable success in predicting various conditions, including Chronic Obstructive… More >

  • Open AccessOpen Access

    ARTICLE

    Evolution Analysis of Network Attack and Defense Situation Based on Game Theory

    Haiyan Sun1,*, Chenglong Shao1, Jianwei Zhang1, Kun Wang2, Wanwei Huang1
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1451-1470, 2025, DOI:10.32604/cmc.2025.059724 - 26 March 2025
    Abstract To address the problem that existing studies lack analysis of the relationship between attack-defense game behaviors and situation evolution from the game perspective after constructing an attack-defense model, this paper proposes a network attack-defense game model (ADGM). Firstly, based on the assumption of incomplete information between the two sides of the game, the ADGM model is established, and methods of payoff quantification, equilibrium solution, and determination of strategy confrontation results are presented. Then, drawing on infectious disease dynamics, the network attack-defense situation is defined based on the density of nodes in various security states, and… More >

  • Open AccessOpen Access

    ARTICLE

    Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network

    Aodi Liu, Xuehui Du*, Na Wang, Xiangyu Wu
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1471-1489, 2025, DOI:10.32604/cmc.2025.059784 - 26 March 2025
    (This article belongs to the Special Issue: Applications of Artificial Intelligence for Information Security)
    Abstract Security attributes are the premise and foundation for implementing Attribute-Based Access Control (ABAC) mechanisms. However, when dealing with massive volumes of unstructured text big data resources, the current attribute management methods based on manual extraction face several issues, such as high costs for attribute extraction, long processing times, unstable accuracy, and poor scalability. To address these problems, this paper proposes an attribute mining technology for access control institutions based on hybrid capsule networks. This technology leverages transfer learning ideas, utilizing Bidirectional Encoder Representations from Transformers (BERT) pre-trained language models to achieve vectorization of unstructured text… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing AES S-Box Implementation: A SAT-Based Approach with Tower Field Representations

    Jingya Feng1, Ying Zhao2,*, Tao Ye1, Wei Feng3,*
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1491-1507, 2025, DOI:10.32604/cmc.2025.059882 - 26 March 2025
    Abstract The efficient implementation of the Advanced Encryption Standard (AES) is crucial for network data security. This paper presents novel hardware implementations of the AES S-box, a core component, using tower field representations and Boolean Satisfiability (SAT) solvers. Our research makes several significant contributions to the field. Firstly, we have optimized the GF() inversion, achieving a remarkable 31.35% area reduction (15.33 GE) compared to the best known implementations. Secondly, we have enhanced multiplication implementations for transformation matrices using a SAT-method based on local solutions. This approach has yielded notable improvements, such as a 22.22% reduction in More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing

    Yuanhang Zhang1, Xu An Wang1,2,*, Weiwei Jiang3, Mingyu Zhou1, Xiaoxuan Xu1, Hao Liu1
    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1533-1553, 2025, DOI:10.32604/cmc.2025.062910 - 26 March 2025
    Abstract Cloud storage, a core component of cloud computing, plays a vital role in the storage and management of data. Electronic Health Records (EHRs), which document users’ health information, are typically stored on cloud servers. However, users’ sensitive data would then become unregulated. In the event of data loss, cloud storage providers might conceal the fact that data has been compromised to protect their reputation and mitigate losses. Ensuring the integrity of data stored in the cloud remains a pressing issue that urgently needs to be addressed. In this paper, we propose a data auditing scheme… More >

Per Page:

Share Link