Home / Journals / CMC / Vol.84, No.1, 2025
Special Issues
Table of Content
  • Open AccessOpen Access

    REVIEW

    A Comprehensive Review of Face Detection/Recognition Algorithms and Competitive Datasets to Optimize Machine Vision

    Mahmood Ul Haq1, Muhammad Athar Javed Sethi1, Sadique Ahmad2, Naveed Ahmad3, Muhammad Shahid Anwar4,*, Alpamis Kutlimuratov5
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1-24, 2025, DOI:10.32604/cmc.2025.063341 - 09 June 2025
    Abstract Face recognition has emerged as one of the most prominent applications of image analysis and understanding, gaining considerable attention in recent years. This growing interest is driven by two key factors: its extensive applications in law enforcement and the commercial domain, and the rapid advancement of practical technologies. Despite the significant advancements, modern recognition algorithms still struggle in real-world conditions such as varying lighting conditions, occlusion, and diverse facial postures. In such scenarios, human perception is still well above the capabilities of present technology. Using the systematic mapping study, this paper presents an in-depth review More >

  • Open AccessOpen Access

    REVIEW

    Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions

    Seo Yeon Moon1, Byung Hyun Jo1, Abir El Azzaoui1, Sushil Kumar Singh2, Jong Hyuk Park1,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 25-55, 2025, DOI:10.32604/cmc.2025.062966 - 09 June 2025
    (This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)
    Abstract With the rapid advancement of ICT and IoT technologies, the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency. However, these technologies face critical security challenges, exacerbated by the emergence of quantum computing, which threatens traditional encryption methods. The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust, quantum-resistant security solutions. To address these challenges, researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography, which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality More >

  • Open AccessOpen Access

    REVIEW

    A Systematic Review of Deep Learning-Based Object Detection in Agriculture: Methods, Challenges, and Future Directions

    Mukesh Dalal1,*, Payal Mittal2
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 57-91, 2025, DOI:10.32604/cmc.2025.066056 - 09 June 2025
    Abstract Deep learning-based object detection has revolutionized various fields, including agriculture. This paper presents a systematic review based on the PRISMA 2020 approach for object detection techniques in agriculture by exploring the evolution of different methods and applications over the past three years, highlighting the shift from conventional computer vision to deep learning-based methodologies owing to their enhanced efficacy in real time. The review emphasizes the integration of advanced models, such as You Only Look Once (YOLO) v9, v10, EfficientDet, Transformer-based models, and hybrid frameworks that improve the precision, accuracy, and scalability for crop monitoring and More >

  • Open AccessOpen Access

    REVIEW

    Monocular 3D Human Pose Estimation for REBA Ergonomics: A Critical Review of Recent Advances

    Ahmad Mwfaq Bataineh1,2,*, Ahmad Sufril Azlan Mohamed1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 93-124, 2025, DOI:10.32604/cmc.2025.064250 - 09 June 2025
    Abstract Advancements in deep learning have considerably enhanced techniques for Rapid Entire Body Assessment (REBA) pose estimation by leveraging progress in three-dimensional human modeling. This survey provides an extensive overview of recent advancements, particularly emphasizing monocular image-based methodologies and their incorporation into ergonomic risk assessment frameworks. By reviewing literature from 2016 to 2024, this study offers a current and comprehensive analysis of techniques, existing challenges, and emerging trends in three-dimensional human pose estimation. In contrast to traditional reviews organized by learning paradigms, this survey examines how three-dimensional pose estimation is effectively utilized within musculoskeletal disorder (MSD)… More >

  • Open AccessOpen Access

    REVIEW

    A Review of Object Detection Techniques in IoT-Based Intelligent Transportation Systems

    Jiaqi Wang, Jian Su*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 125-152, 2025, DOI:10.32604/cmc.2025.064309 - 09 June 2025
    Abstract The Intelligent Transportation System (ITS), as a vital means to alleviate traffic congestion and reduce traffic accidents, demonstrates immense potential in improving traffic safety and efficiency through the integration of Internet of Things (IoT) technologies. The enhancement of its performance largely depends on breakthrough advancements in object detection technology. However, current object detection technology still faces numerous challenges, such as accuracy, robustness, and data privacy issues. These challenges are particularly critical in the application of ITS and require in-depth analysis and exploration of future improvement directions. This study provides a comprehensive review of the development… More >

  • Open AccessOpen Access

    REVIEW

    A Contemporary and Comprehensive Bibliometric Exposition on Deepfake Research and Trends

    Akanbi Bolakale AbdulQudus1, Oluwatosin Ahmed Amodu2,3,*, Umar Ali Bukar4, Raja Azlina Raja Mahmood2, Anies Faziehan Zakaria5, Saki-Ogah Queen6, Zurina Mohd Hanapi2
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 153-236, 2025, DOI:10.32604/cmc.2025.061427 - 09 June 2025
    Abstract This paper provides a comprehensive bibliometric exposition on deepfake research, exploring the intersection of artificial intelligence and deepfakes as well as international collaborations, prominent researchers, organizations, institutions, publications, and key themes. We performed a search on the Web of Science (WoS) database, focusing on Artificial Intelligence and Deepfakes, and filtered the results across 21 research areas, yielding 1412 articles. Using VOSviewer visualization tool, we analyzed this WoS data through keyword co-occurrence graphs, emphasizing on four prominent research themes. Compared with existing bibliometric papers on deepfakes, this paper proceeds to identify and discuss some of the… More >

  • Open AccessOpen Access

    EDITORIAL

    Guest Editorial Special Issue on the Next-Generation Deep Learning Approaches to Emerging Real-World Applications

    Yu Zhou1, Eneko Osaba2, Xiao Zhang3,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 237-242, 2025, DOI:10.32604/cmc.2025.066663 - 09 June 2025
    (This article belongs to the Special Issue: The Next-generation Deep Learning Approaches to Emerging Real-world Applications)
    Abstract This article has no abstract. More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Framework for Structural Analysis: Integrating Topology Optimization, Adjacent Element Temperature-Driven Pre-Stress, and Greedy Algorithms

    Ibrahim T. Teke1,2, Ahmet H. Ertas2,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 243-264, 2025, DOI:10.32604/cmc.2025.066086 - 09 June 2025
    Abstract This study presents a novel hybrid topology optimization and mold design framework that integrates process fitting, runner system optimization, and structural analysis to significantly enhance the performance of injection-molded parts. At its core, the framework employs a greedy algorithm that generates runner systems based on adjacency and shortest path principles, leading to improvements in both mechanical strength and material efficiency. The design optimization is validated through a series of rigorous experimental tests, including three-point bending and torsion tests performed on key-socket frames, ensuring that the optimized designs meet practical performance requirements. A critical innovation of… More >

  • Open AccessOpen Access

    ARTICLE

    Microscopic Modeling and Failure Mechanism Study of Fiber Reinforced Composites Embedded with Optical Fibers

    Lei Yang1,*, Jianfeng Wang1, Minjing Liu1, Chunyu Chen2, Zhanjun Wu3,4
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 265-279, 2025, DOI:10.32604/cmc.2025.065676 - 09 June 2025
    (This article belongs to the Special Issue: Computational Modeling of Mechanical Behavior of Advanced Materials)
    Abstract Embedding optical fiber sensors into composite materials offers the advantage of real-time structural monitoring. However, there is an order-of-magnitude difference in diameter between optical fibers and reinforcing fibers, and the detailed mechanism of how embedded optical fibers affect the micromechanical behavior and damage failure processes within composite materials remains unclear. This paper presents a micromechanical simulation analysis of composite materials embedded with optical fibers. By constructing representative volume elements (RVEs) with randomly distributed reinforcing fibers, the optical fiber, the matrix, and the interface phase, the micromechanical behavior and damage evolution under transverse tensile and compressive… More >

  • Open AccessOpen Access

    ARTICLE

    Harnessing Machine Learning for Superior Prediction of Uniaxial Compressive Strength in Reinforced Soilcrete

    Ala’a R. Al-Shamasneh1, Faten Khalid Karim2, Arsalan Mahmoodzadeh3,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 281-303, 2025, DOI:10.32604/cmc.2025.065748 - 09 June 2025
    Abstract Soilcrete is a composite material of soil and cement that is highly valued in the construction industry. Accurate measurement of its mechanical properties is essential, but laboratory testing methods are expensive, time-consuming, and include inaccuracies. Machine learning (ML) algorithms provide a more efficient alternative for this purpose, so after assessment with a statistical extraction method, ML algorithms including back-propagation neural network (BPNN), K-nearest neighbor (KNN), radial basis function (RBF), feed-forward neural networks (FFNN), and support vector regression (SVR) for predicting the uniaxial compressive strength (UCS) of soilcrete, were proposed in this study. The developed models… More >

  • Open AccessOpen Access

    ARTICLE

    Dual-Perspective Evaluation of Knowledge Graphs for Graph-to-Text Generation

    Haotong Wang#,*, Liyan Wang#, Yves Lepage
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 305-324, 2025, DOI:10.32604/cmc.2025.066351 - 09 June 2025
    Abstract Data curation is vital for selecting effective demonstration examples in graph-to-text generation. However, evaluating the quality of Knowledge Graphs (KGs) remains challenging. Prior research exhibits a narrow focus on structural statistics, such as the shortest path length, while the correctness of graphs in representing the associated text is rarely explored. To address this gap, we introduce a dual-perspective evaluation framework for KG-text data, based on the computation of structural adequacy and semantic alignment. From a structural perspective, we propose the Weighted Incremental Edge Method (WIEM) to quantify graph completeness by leveraging agreement between relation models… More >

  • Open AccessOpen Access

    ARTICLE

    CerfeVPR: Cross-Environment Robust Feature Enhancement for Visual Place Recognition

    Lingyun Xiang1, Hang Fu1, Chunfang Yang2,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 325-345, 2025, DOI:10.32604/cmc.2025.062834 - 09 June 2025
    Abstract In the Visual Place Recognition (VPR) task, existing research has leveraged large-scale pre-trained models to improve the performance of place recognition. However, when there are significant environmental differences between query images and reference images, a large number of ineffective local features will interfere with the extraction of key landmark features, leading to the retrieval of visually similar but geographically different images. To address this perceptual aliasing problem caused by environmental condition changes, we propose a novel Visual Place Recognition method with Cross-Environment Robust Feature Enhancement (CerfeVPR). This method uses the GAN network to generate similar… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Label Machine Learning Classification of Cardiovascular Diseases

    Chih-Ta Yen1,*, Jung-Ren Wong2, Chia-Hsang Chang2
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 347-363, 2025, DOI:10.32604/cmc.2025.063389 - 09 June 2025
    (This article belongs to the Special Issue: Selected Papers from the International Multi-Conference on Engineering and Technology Innovation 2024 (IMETI2024))
    Abstract In its 2023 global health statistics, the World Health Organization noted that noncommunicable diseases (NCDs) remain the leading cause of disease burden worldwide, with cardiovascular diseases (CVDs) resulting in more deaths than the three other major NCDs combined. In this study, we developed a method that can comprehensively detect which CVDs are present in a patient. Specifically, we propose a multi-label classification method that utilizes photoplethysmography (PPG) signals and physiological characteristics from public datasets to classify four types of CVDs and related conditions: hypertension, diabetes, cerebral infarction, and cerebrovascular disease. Our approach to multi-disease classification… More >

  • Open AccessOpen Access

    ARTICLE

    ONTDAS: An Optimized Noise-Based Traffic Data Augmentation System for Generalizability Improvement of Traffic Classifiers

    Rongwei Yu1, Jie Yin1,*, Jingyi Xiang1, Qiyun Shao2, Lina Wang1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 365-391, 2025, DOI:10.32604/cmc.2025.064438 - 09 June 2025
    Abstract With the emergence of new attack techniques, traffic classifiers usually fail to maintain the expected performance in real-world network environments. In order to have sufficient generalizability to deal with unknown malicious samples, they require a large number of new samples for retraining. Considering the cost of data collection and labeling, data augmentation is an ideal solution. We propose an optimized noise-based traffic data augmentation system, ONTDAS. The system uses a gradient-based searching algorithm and an improved Bayesian optimizer to obtain optimized noise. The noise is injected into the original samples for data augmentation. Then, an More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Hierarchical Task Network Planning through Ant Colony Optimization in Refinement Process

    Mohamed Elkawkagy1, Ibrahim A. Elgendy2,*, Ammar Muthanna3,4, Reem Ibrahim Alkanhel5, Heba Elbeh1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 393-415, 2025, DOI:10.32604/cmc.2025.063766 - 09 June 2025
    Abstract Hierarchical Task Network (HTN) planning is a powerful technique in artificial intelligence for handling complex problems by decomposing them into hierarchical task structures. However, achieving optimal solutions in HTN planning remains a challenge, especially in scenarios where traditional search algorithms struggle to navigate the vast solution space efficiently. This research proposes a novel technique to enhance HTN planning by integrating the Ant Colony Optimization (ACO) algorithm into the refinement process. The Ant System algorithm, inspired by the foraging behavior of ants, is well-suited for addressing optimization problems by efficiently exploring solution spaces. By incorporating ACO… More >

  • Open AccessOpen Access

    ARTICLE

    A Lane Coordinate Generation Model Utilizing Spatial Axis Attention and Multi-Scale Convolution

    Duo Cui*, Qiusheng Wang
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 417-431, 2025, DOI:10.32604/cmc.2025.063507 - 09 June 2025
    Abstract In the field of autonomous driving, the task of reliably and accurately detecting lane markings poses a significant and complex challenge. This study presents a lane recognition model that employs an encoder-decoder architecture. In the encoder section, we develop a feature extraction framework that operates concurrently with attention mechanisms and convolutional layers. We propose a spatial axis attention framework that integrates spatial information transfer regulated by gating units. This architecture places a strong emphasis on long-range dependencies and the spatial distribution of images. Furthermore, we incorporate multi-scale convolutional layers to extract intricate features from the More >

  • Open AccessOpen Access

    ARTICLE

    AI-Driven Sentiment-Enhanced Secure IoT Communication Model Using Resilience Behavior Analysis

    Menwa Alshammeri1, Mamoona Humayun2,*, Khalid Haseeb3, Ghadah Naif Alwakid1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 433-446, 2025, DOI:10.32604/cmc.2025.065660 - 09 June 2025
    (This article belongs to the Special Issue: Advancements and Challenges in Artificial Intelligence, Data Analysis and Big Data)
    Abstract Wireless technologies and the Internet of Things (IoT) are being extensively utilized for advanced development in traditional communication systems. This evolution lowers the cost of the extensive use of sensors, changing the way devices interact and communicate in dynamic and uncertain situations. Such a constantly evolving environment presents enormous challenges to preserving a secure and lightweight IoT system. Therefore, it leads to the design of effective and trusted routing to support sustainable smart cities. This research study proposed a Genetic Algorithm sentiment-enhanced secured optimization model, which combines big data analytics and analysis rules to evaluate… More >

  • Open AccessOpen Access

    ARTICLE

    Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control

    Ammar Odeh*, Anas Abu Taleb
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 447-461, 2025, DOI:10.32604/cmc.2025.065426 - 09 June 2025
    (This article belongs to the Special Issue: Intelligence and Security Enhancement for Internet of Things)
    Abstract The increasing deployment of Internet of Things (IoT) devices has introduced significant security challenges, including identity spoofing, unauthorized access, and data integrity breaches. Traditional security mechanisms rely on centralized frameworks that suffer from single points of failure, scalability issues, and inefficiencies in real-time security enforcement. To address these limitations, this study proposes the Blockchain-Enhanced Trust and Access Control for IoT Security (BETAC-IoT) model, which integrates blockchain technology, smart contracts, federated learning, and Merkle tree-based integrity verification to enhance IoT security. The proposed model eliminates reliance on centralized authentication by employing decentralized identity management, ensuring tamper-proof… More >

  • Open AccessOpen Access

    ARTICLE

    TGI-FPR: An Improved Multi-Label Password Guessing Model

    Wei Ou1,2,3, Shuai Liu1,*, Mengxue Pang1, Jianqiang Ma1, Qiuling Yue1, Wenbao Han1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 463-490, 2025, DOI:10.32604/cmc.2025.063862 - 09 June 2025
    Abstract TarGuess-I is a leading model utilizing Personally Identifiable Information for online targeted password guessing. Due to its remarkable guessing performance, the model has drawn considerable attention in password security research. However, through an analysis of the vulnerable behavior of users when constructing passwords by combining popular passwords with their Personally Identifiable Information, we identified that the model fails to consider popular passwords and frequent substrings, and it uses overly broad personal information categories, with extensive duplicate statistics. To address these issues, we propose an improved password guessing model, TGI-FPR, which incorporates three semantic methods: (1) More >

  • Open AccessOpen Access

    ARTICLE

    Image Watermarking Algorithm Base on the Second Order Derivative and Discrete Wavelet Transform

    Maazen Alsabaan1, Zaid Bin Faheem2, Yuanyuan Zhu2, Jehad Ali3,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 491-512, 2025, DOI:10.32604/cmc.2025.064971 - 09 June 2025
    Abstract Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms. Image watermarking can be used to protect the copyright of digital media by embedding a unique identifier that identifies the owner of the content. Image watermarking can also be used to verify the authenticity of digital media, such as images or videos, by ascertaining the watermark information. In this paper, a mathematical chaos-based image watermarking technique is proposed using discrete wavelet transform (DWT), chaotic map, and Laplacian operator. The DWT can be used to decompose… More >

  • Open AccessOpen Access

    ARTICLE

    A Pneumonia Recognition Model Based on Multiscale Attention Improved EfficientNetV2

    Zhigao Zeng1, Jun Liu1, Bing Zheng2, Shengqiu Yi1, Xinpan Yuan1, Qiang Liu1,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 513-536, 2025, DOI:10.32604/cmc.2025.063257 - 09 June 2025
    Abstract To solve the problems of complex lesion region morphology, blurred edges, and limited hardware resources for deploying the recognition model in pneumonia image recognition, an improved EfficientNetV2 pneumonia recognition model based on multiscale attention is proposed. First, the number of main module stacks of the model is reduced to avoid overfitting, while the dilated convolution is introduced in the first convolutional layer to expand the receptive field of the model; second, a redesigned improved mobile inverted bottleneck convolution (IMBConv) module is proposed, in which GSConv is introduced to enhance the model’s attention to inter-channel information,… More >

  • Open AccessOpen Access

    ARTICLE

    Void Formation Analysis in the Molded Underfill Process for Flip-Chip Packaging

    Ian Hu1,*, Tzu-Chun Hung1, Mu-Heng Zhou1, Heng-Sheng Lin1, Dao-Long Chen2
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 537-551, 2025, DOI:10.32604/cmc.2025.065330 - 09 June 2025
    (This article belongs to the Special Issue: Selected Papers from the International Multi-Conference on Engineering and Technology Innovation 2024 (IMETI2024))
    Abstract Flip-chip technology is widely used in integrated circuit (IC) packaging. Molded underfill transfer molding is the most common process for these products, as the chip and solder bumps must be protected by the encapsulating material to ensure good reliability. Flow-front merging usually occurs during the molding process, and air is then trapped under the chip, which can form voids in the molded product. The void under the chip may cause stability and reliability problems. However, the flow process is unobservable during the transfer molding process. The engineer can only check for voids in the molded… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Logic Based Evaluation of Hybrid Termination Criteria in the Genetic Algorithms for the Wind Farm Layout Design Problem

    Salman A. Khan1,*, Mohamed Mohandes2,3, Shafiqur Rehman3, Ali Al-Shaikhi2,4, Kashif Iqbal1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 553-581, 2025, DOI:10.32604/cmc.2025.064560 - 09 June 2025
    Abstract Wind energy has emerged as a potential replacement for fossil fuel-based energy sources. To harness maximum wind energy, a crucial decision in the development of an efficient wind farm is the optimal layout design. This layout defines the specific locations of the turbines within the wind farm. The process of finding the optimal locations of turbines, in the presence of various technical and technological constraints, makes the wind farm layout design problem a complex optimization problem. This problem has traditionally been solved with nature-inspired algorithms with promising results. The performance and convergence of nature-inspired algorithms… More >

  • Open AccessOpen Access

    ARTICLE

    Schweizer-Sklar T-Norm Operators for Picture Fuzzy Hypersoft Sets: Advancing Suistainable Technology in Social Healthy Environments

    Xingsi Xue1, Himanshu Dhumras2,*, Garima Thakur3, Rakesh Kumar Bajaj4, Varun Shukla5
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 583-606, 2025, DOI:10.32604/cmc.2025.066310 - 09 June 2025
    Abstract Ensuring a sustainable and eco-friendly environment is essential for promoting a healthy and balanced social life. However, decision-making in such contexts often involves handling vague, imprecise, and uncertain information. To address this challenge, this study presents a novel multi-criteria decision-making (MCDM) approach based on picture fuzzy hypersoft sets (PFHSS), integrating the flexibility of Schweizer-Sklar triangular norm-based aggregation operators. The proposed aggregation mechanisms—weighted average and weighted geometric operators—are formulated using newly defined operational laws under the PFHSS framework and are proven to satisfy essential mathematical properties, such as idempotency, monotonicity, and boundedness. The decision-making model systematically… More >

  • Open AccessOpen Access

    ARTICLE

    URLLC Service in UAV Rate-Splitting Multiple Access: Adapting Deep Learning Techniques for Wireless Network

    Reem Alkanhel1,#, Abuzar B. M. Adam2,#, Samia Allaoua Chelloug1, Dina S. M. Hassan1,*, Mohammed Saleh Ali Muthanna3, Ammar Muthanna4
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 607-624, 2025, DOI:10.32604/cmc.2025.063206 - 09 June 2025
    Abstract The 3GPP standard defines the requirements for next-generation wireless networks, with particular attention to Ultra-Reliable Low-Latency Communications (URLLC), critical for applications such as Unmanned Aerial Vehicles (UAVs). In this context, Non-Orthogonal Multiple Access (NOMA) has emerged as a promising technique to improve spectrum efficiency and user fairness by allowing multiple users to share the same frequency resources. However, optimizing key parameters–such as beamforming, rate allocation, and UAV trajectory–presents significant challenges due to the nonconvex nature of the problem, especially under stringent URLLC constraints. This paper proposes an advanced deep learning-driven approach to address the resulting… More >

  • Open AccessOpen Access

    ARTICLE

    Relative-Density-Viewpoint-Based Weighted Kernel Fuzzy Clustering

    Yuhan Xia1, Xu Li1, Ye Liu1, Wenbo Zhou2, Yiming Tang1,3,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 625-651, 2025, DOI:10.32604/cmc.2025.065358 - 09 June 2025
    Abstract Applying domain knowledge in fuzzy clustering algorithms continuously promotes the development of clustering technology. The combination of domain knowledge and fuzzy clustering algorithms has some problems, such as initialization sensitivity and information granule weight optimization. Therefore, we propose a weighted kernel fuzzy clustering algorithm based on a relative density view (RDVWKFC). Compared with the traditional density-based methods, RDVWKFC can capture the intrinsic structure of the data more accurately, thus improving the initial quality of the clustering. By introducing a Relative Density based Knowledge Extraction Method (RDKM) and adaptive weight optimization mechanism, we effectively solve the… More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Feature Selection for Leukemia Diagnosis Using Frog-Snake Optimization and Deep Learning Integration

    Reza Goodarzi1, Ali Jalali1,*, Omid Hashemi Pour Tafreshi1, Jalil Mazloum1, Peyman Beygi2
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 653-679, 2025, DOI:10.32604/cmc.2025.062803 - 09 June 2025
    (This article belongs to the Special Issue: Metaheuristic-Driven Optimization Algorithms: Methods and Applications)
    Abstract Acute lymphoblastic leukemia (ALL) is characterized by overgrowth of immature lymphoid cells in the bone marrow at the expense of normal hematopoiesis. One of the most prioritized tasks is the early and correct diagnosis of this malignancy; however, manual observation of the blood smear is very time-consuming and requires labor and expertise. Transfer learning in deep neural networks is of growing importance to intricate medical tasks such as medical imaging. Our work proposes an application of a novel ensemble architecture that puts together Vision Transformer and EfficientNetV2. This approach fuses deep and spatial features to… More >

  • Open AccessOpen Access

    ARTICLE

    Interpolation-Based Reversible Data Hiding in Encrypted Audio with Scalable Embedding Capacity

    Yuan-Yu Tsai1,*, Alfrindo Lin1, Wen-Ting Jao1, Yi-Hui Chen2,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 681-697, 2025, DOI:10.32604/cmc.2025.064370 - 09 June 2025
    Abstract With the rapid expansion of multimedia data, protecting digital information has become increasingly critical. Reversible data hiding offers an effective solution by allowing sensitive information to be embedded in multimedia files while enabling full recovery of the original data after extraction. Audio, as a vital medium in communication, entertainment, and information sharing, demands the same level of security as images. However, embedding data in encrypted audio poses unique challenges due to the trade-offs between security, data integrity, and embedding capacity. This paper presents a novel interpolation-based reversible data hiding algorithm for encrypted audio that achieves… More >

  • Open AccessOpen Access

    ARTICLE

    A Stacked BWO-NIGP Framework for Robust and Accurate SOH Estimation of Lithium-Ion Batteries under Noisy and Small-Sample Scenarios

    Pu Yang1,*, Wanning Yan1, Rong Li1, Lei Chen2, Lijie Guo2
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 699-725, 2025, DOI:10.32604/cmc.2025.064947 - 09 June 2025
    Abstract Lithium-ion batteries (LIBs) have been widely used in mobile energy storage systems because of their high energy density, long life, and strong environmental adaptability. Accurately estimating the state of health (SOH) for LIBs is promising and has been extensively studied for many years. However, the current prediction methods are susceptible to noise interference, and the estimation accuracy has room for improvement. Motivated by this, this paper proposes a novel battery SOH estimation method, the Beluga Whale Optimization (BWO) and Noise-Input Gaussian Process (NIGP) Stacked Model (BGNSM). This method integrates the BWO-optimized Gaussian Process Regression (GPR)… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Feature Selection by Enhancing Particle Swarm Optimization with Orthogonal Initialization and Crossover Operator

    Indu Bala*, Wathsala Karunarathne, Lewis Mitchell
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 727-744, 2025, DOI:10.32604/cmc.2025.065706 - 09 June 2025
    (This article belongs to the Special Issue: Emerging Machine Learning Methods and Applications)
    Abstract Recent advancements in computational and database technologies have led to the exponential growth of large-scale medical datasets, significantly increasing data complexity and dimensionality in medical diagnostics. Efficient feature selection methods are critical for improving diagnostic accuracy, reducing computational costs, and enhancing the interpretability of predictive models. Particle Swarm Optimization (PSO), a widely used metaheuristic inspired by swarm intelligence, has shown considerable promise in feature selection tasks. However, conventional PSO often suffers from premature convergence and limited exploration capabilities, particularly in high-dimensional spaces. To overcome these limitations, this study proposes an enhanced PSO framework incorporating Orthogonal… More >

  • Open AccessOpen Access

    ARTICLE

    DNEFNET: Denoising and Frequency Domain Feature Enhancement Event Fusion Network for Image Deblurring

    Kangkang Zhao1, Yaojie Chen1,*, Jianbo Li2
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 745-762, 2025, DOI:10.32604/cmc.2025.063906 - 09 June 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Traditional cameras inevitably suffer from motion blur when facing high-speed moving objects. Event cameras, as high temporal resolution bionic cameras, record intensity changes in an asynchronous manner, and their recorded high temporal resolution information can effectively solve the problem of time information loss in motion blur. Existing event-based deblurring methods still face challenges when facing high-speed moving objects. We conducted an in-depth study of the imaging principle of event cameras. We found that the event stream contains excessive noise. The valid information is sparse. Invalid event features hinder the expression of valid features due to… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Firmware Comparison Based on Evolutionary Algorithm and Trusted Base Point

    Wenbing Wang*, Yongwen Liu
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 763-790, 2025, DOI:10.32604/cmc.2025.065179 - 09 June 2025
    Abstract Multi-firmware comparison techniques can improve efficiency when auditing firmwares in bulk. However, the problem of matching functions between multiple firmwares has not been studied before. This paper proposes a multi-firmware comparison method based on evolutionary algorithms and trusted base points. We first model the multi-firmware comparison as a multi-sequence matching problem. Then, we propose an adaptation function and a population generation method based on trusted base points. Finally, we apply an evolutionary algorithm to find the optimal result. At the same time, we design the similarity of matching results as an evaluation metric to measure More >

  • Open AccessOpen Access

    ARTICLE

    Bird Species Classification Using Image Background Removal for Data Augmentation

    Yu-Xiang Zhao*, Yi Lee
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 791-810, 2025, DOI:10.32604/cmc.2025.065048 - 09 June 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Bird species classification is not only a challenging topic in artificial intelligence but also a domain closely related to environmental protection and ecological research. Additionally, performing edge computing on low-level devices using small neural networks can be an important research direction. In this paper, we use the EfficientNetV2B0 model for bird species classification, applying transfer learning on a dataset of 525 bird species. We also employ the BiRefNet model to remove backgrounds from images in the training set. The generated background-removed images are mixed with the original training set as a form of data augmentation.… More >

  • Open AccessOpen Access

    ARTICLE

    Diabetes Prediction Using ADASYN-Based Data Augmentation and CNN-BiGRU Deep Learning Model

    Tehreem Fatima1, Kewen Xia1,*, Wenbiao Yang2, Qurat Ul Ain1, Poornima Lankani Perera1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 811-826, 2025, DOI:10.32604/cmc.2025.063686 - 09 June 2025
    Abstract The rising prevalence of diabetes in modern society underscores the urgent need for precise and efficient diagnostic tools to support early intervention and treatment. However, the inherent limitations of existing datasets, including significant class imbalances and inadequate sample diversity, pose challenges to the accurate prediction and classification of diabetes. Addressing these issues, this study proposes an innovative diabetes prediction framework that integrates a hybrid Convolutional Neural Network-Bidirectional Gated Recurrent Unit (CNN-BiGRU) model for classification with Adaptive Synthetic Sampling (ADASYN) for data augmentation. ADASYN was employed to generate synthetic yet representative data samples, effectively mitigating class… More >

  • Open AccessOpen Access

    ARTICLE

    Detection and Classification of Fig Plant Leaf Diseases Using Convolution Neural Network

    Rahim Khan1, Ihsan Rabbi1, Umar Farooq1, Jawad Khan2,*, Fahad Alturise3,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 827-842, 2025, DOI:10.32604/cmc.2025.063303 - 09 June 2025
    (This article belongs to the Special Issue: Deep Neural Networks-based Convergence Technology and Applications)
    Abstract Leaf disease identification is one of the most promising applications of convolutional neural networks (CNNs). This method represents a significant step towards revolutionizing agriculture by enabling the quick and accurate assessment of plant health. In this study, a CNN model was specifically designed and tested to detect and categorize diseases on fig tree leaves. The researchers utilized a dataset of 3422 images, divided into four classes: healthy, fig rust, fig mosaic, and anthracnose. These diseases can significantly reduce the yield and quality of fig tree fruit. The objective of this research is to develop a… More >

  • Open AccessOpen Access

    ARTICLE

    Unsupervised Anomaly Detection in Time Series Data via Enhanced VAE-Transformer Framework

    Chunhao Zhang1,2, Bin Xie2,3,*, Zhibin Huo1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 843-860, 2025, DOI:10.32604/cmc.2025.063151 - 09 June 2025
    Abstract Time series anomaly detection is crucial in finance, healthcare, and industrial monitoring. However, traditional methods often face challenges when handling time series data, such as limited feature extraction capability, poor temporal dependency handling, and suboptimal real-time performance, sometimes even neglecting the temporal relationships between data. To address these issues and improve anomaly detection performance by better capturing temporal dependencies, we propose an unsupervised time series anomaly detection method, VLT-Anomaly. First, we enhance the Variational Autoencoder (VAE) module by redesigning its network structure to better suit anomaly detection through data reconstruction. We introduce hyperparameters to control… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Scheduling of Virtual Power Plants Based on Deep Reinforcement Learning

    Shaowei He, Wenchao Cui*, Gang Li, Hairun Xu, Xiang Chen, Yu Tai
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 861-886, 2025, DOI:10.32604/cmc.2025.063979 - 09 June 2025
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications)
    Abstract The Virtual Power Plant (VPP), as an innovative power management architecture, achieves flexible dispatch and resource optimization of power systems by integrating distributed energy resources. However, due to significant differences in operational costs and flexibility of various types of generation resources, as well as the volatility and uncertainty of renewable energy sources (such as wind and solar power) and the complex variability of load demand, the scheduling optimization of virtual power plants has become a critical issue that needs to be addressed. To solve this, this paper proposes an intelligent scheduling method for virtual power… More >

  • Open AccessOpen Access

    ARTICLE

    A Robust Image Watermarking Based on DWT and RDWT Combined with Möbius Transformations

    Atheer Alrammahi1,2, Hedieh Sajedi1,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 887-918, 2025, DOI:10.32604/cmc.2025.063866 - 09 June 2025
    (This article belongs to the Special Issue: Challenges and Innovations in Multimedia Encryption and Information Security)
    Abstract Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution, tampering, and copyright infringement. This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform (DWT), Redundant Discrete Wavelet Transform (RDWT), and Möbius Transformations (MT), with optimization of transformation parameters achieved via a Genetic Algorithm (GA). By combining frequency and spatial domain techniques, the proposed method significantly enhances both the imperceptibility and robustness of watermark embedding. The approach leverages DWT and RDWT for multi-resolution decomposition, enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks. RDWT,… More >

  • Open AccessOpen Access

    ARTICLE

    Reinforcement Learning for Solving the Knapsack Problem

    Zhenfu Zhang1, Haiyan Yin2, Liudong Zuo3, Pan Lai1,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 919-936, 2025, DOI:10.32604/cmc.2025.062980 - 09 June 2025
    (This article belongs to the Special Issue: The Next-generation Deep Learning Approaches to Emerging Real-world Applications)
    Abstract The knapsack problem is a classical combinatorial optimization problem widely encountered in areas such as logistics, resource allocation, and portfolio optimization. Traditional methods, including dynamic programming (DP) and greedy algorithms, have been effective in solving small problem instances but often struggle with scalability and efficiency as the problem size increases. DP, for instance, has exponential time complexity and can become computationally prohibitive for large problem instances. On the other hand, greedy algorithms offer faster solutions but may not always yield the optimal results, especially when the problem involves complex constraints or large numbers of items.… More >

  • Open AccessOpen Access

    ARTICLE

    A Fully Homomorphic Encryption Scheme Suitable for Ciphertext Retrieval

    Ronglei Hu1, Chuce He1,2, Sihui Liu1, Dong Yao1, Xiuying Li1, Xiaoyi Duan1,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 937-956, 2025, DOI:10.32604/cmc.2025.062542 - 09 June 2025
    Abstract Ciphertext data retrieval in cloud databases suffers from some critical limitations, such as inadequate security measures, disorganized key management practices, and insufficient retrieval access control capabilities. To address these problems, this paper proposes an enhanced Fully Homomorphic Encryption (FHE) algorithm based on an improved DGHV algorithm, coupled with an optimized ciphertext retrieval scheme. Our specific contributions are outlined as follows: First, we employ an authorization code to verify the user’s retrieval authority and perform hierarchical access control on cloud storage data. Second, a triple-key encryption mechanism, which separates the data encryption key, retrieval authorization key, More >

  • Open AccessOpen Access

    ARTICLE

    Distributed Computing-Based Optimal Route Finding Algorithm for Trusted Devices in the Internet of Things

    Amal Al-Rasheed1, Rahim Khan2,*, Fahad Alturise3, Salem Alkhalaf4
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 957-973, 2025, DOI:10.32604/cmc.2025.064102 - 09 June 2025
    (This article belongs to the Special Issue: Distributed Computing with Applications to IoT and BlockChain)
    Abstract The Internet of Things (IoT) is a smart infrastructure where devices share captured data with the respective server or edge modules. However, secure and reliable communication is among the challenging tasks in these networks, as shared channels are used to transmit packets. In this paper, a decision tree is integrated with other metrics to form a secure distributed communication strategy for IoT. Initially, every device works collaboratively to form a distributed network. In this model, if a device is deployed outside the coverage area of the nearest server, it communicates indirectly through the neighboring devices.… More >

  • Open AccessOpen Access

    ARTICLE

    A Semi-Lightweight Multi-Feature Integration Architecture for Micro-Expression Recognition

    Mengqi Li, Xiaodong Huang*, Lifeng Wu
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 975-995, 2025, DOI:10.32604/cmc.2025.062621 - 09 June 2025
    Abstract Micro-expressions, fleeting involuntary facial cues lasting under half a second, reveal genuine emotions and are valuable in clinical diagnosis and psychotherapy. Real-time recognition on resource-constrained embedded devices remains challenging, as current methods struggle to balance performance and efficiency. This study introduces a semi-lightweight multifunctional network that enhances real-time deployment and accuracy. Unlike prior simplistic feature fusion techniques, our novel multi-feature fusion strategy leverages temporal, spatial, and differential features to better capture dynamic changes. Enhanced by Residual Network (ResNet) architecture with channel and spatial attention mechanisms, the model improves feature representation while maintaining a lightweight design. More >

  • Open AccessOpen Access

    ARTICLE

    A Mask-Guided Latent Low-Rank Representation Method for Infrared and Visible Image Fusion

    Kezhen Xie1,2, Syed Mohd Zahid Syed Zainal Ariffin1,*, Muhammad Izzad Ramli1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 997-1011, 2025, DOI:10.32604/cmc.2025.063469 - 09 June 2025
    (This article belongs to the Special Issue: New Trends in Image Processing)
    Abstract Infrared and visible image fusion technology integrates the thermal radiation information of infrared images with the texture details of visible images to generate more informative fused images. However, existing methods often fail to distinguish salient objects from background regions, leading to detail suppression in salient regions due to global fusion strategies. This study presents a mask-guided latent low-rank representation fusion method to address this issue. First, the GrabCut algorithm is employed to extract a saliency mask, distinguishing salient regions from background regions. Then, latent low-rank representation (LatLRR) is applied to extract deep image features, enhancing More >

  • Open AccessOpen Access

    ARTICLE

    Visible-Infrared Person Re-Identification via Quadratic Graph Matching and Block Reasoning

    Junfeng Lin1, Jialin Ma1,*, Wei Chen1,2, Hao Wang1, Weiguo Ding1, Mingyao Tang1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1013-1029, 2025, DOI:10.32604/cmc.2025.062895 - 09 June 2025
    Abstract The cross-modal person re-identification task aims to match visible and infrared images of the same individual. The main challenges in this field arise from significant modality differences between individuals and the lack of high-quality cross-modal correspondence methods. Existing approaches often attempt to establish modality correspondence by extracting shared features across different modalities. However, these methods tend to focus on local information extraction and fail to fully leverage the global identity information in the cross-modal features, resulting in limited correspondence accuracy and suboptimal matching performance. To address this issue, we propose a quadratic graph matching method… More >

  • Open AccessOpen Access

    ARTICLE

    FuzzyStego: An Adaptive Steganographic Scheme Using Fuzzy Logic for Optimizing Embeddable Areas in Spatial Domain Images

    Mardhatillah Shevy Ananti1, Adifa Widyadhani Chanda D’Layla1, Ntivuguruzwa Jean De La Croix1,2, Tohari Ahmad1,*
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1031-1054, 2025, DOI:10.32604/cmc.2025.061246 - 09 June 2025
    Abstract In the evolving landscape of secure communication, steganography has become increasingly vital to secure the transmission of secret data through an insecure public network. Several steganographic algorithms have been proposed using digital images with a common objective of balancing a trade-off between the payload size and the quality of the stego image. In the existing steganographic works, a remarkable distortion of the stego image persists when the payload size is increased, making several existing works impractical to the current world of vast data. This paper introduces FuzzyStego, a novel approach designed to enhance the stego… More >

  • Open AccessOpen Access

    ARTICLE

    A Detection Algorithm for Two-Wheeled Vehicles in Complex Scenarios Based on Semi-Supervised Learning

    Mingen Zhong1, Kaibo Yang1,*, Ziji Xiao1, Jiawei Tan2, Kang Fan2, Zhiying Deng1, Mengli Zhou1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1055-1071, 2025, DOI:10.32604/cmc.2025.063383 - 09 June 2025
    Abstract With the rapid urbanization and exponential population growth in China, two-wheeled vehicles have become a popular mode of transportation, particularly for short-distance travel. However, due to a lack of safety awareness, traffic violations by two-wheeled vehicle riders have become a widespread concern, contributing to urban traffic risks. Currently, significant human and material resources are being allocated to monitor and intercept non-compliant riders to ensure safe driving behavior. To enhance the safety, efficiency, and cost-effectiveness of traffic monitoring, automated detection systems based on image processing algorithms can be employed to identify traffic violations from eye-level video… More >

  • Open AccessOpen Access

    ARTICLE

    The Future of Artificial Intelligence in the Face of Data Scarcity

    Hemn Barzan Abdalla1,*, Yulia Kumar2, Jose Marchena2, Stephany Guzman2, Ardalan Awlla3, Mehdi Gheisari4, Maryam Cheraghy1
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1073-1099, 2025, DOI:10.32604/cmc.2025.063551 - 09 June 2025
    Abstract Dealing with data scarcity is the biggest challenge faced by Artificial Intelligence (AI), and it will be interesting to see how we overcome this obstacle in the future, but for now, “THE SHOW MUST GO ON!!!” As AI spreads and transforms more industries, the lack of data is a significant obstacle: the best methods for teaching machines how real-world processes work. This paper explores the considerable implications of data scarcity for the AI industry, which threatens to restrict its growth and potential, and proposes plausible solutions and perspectives. In addition, this article focuses highly on… More >

  • Open AccessOpen Access

    ARTICLE

    Context Encoding Deep Neural Network Driven Spectral Domain 3D-Optical Coherence Tomography Imaging in Purtscher Retinopathy Diagnosis

    Anand Deva Durai Chelladurai1, Theena Jemima Jebaseeli2, Omar Alqahtani1, Prasanalakshmi Balaji1,*, Jeniffer John Simon Christopher3
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1101-1122, 2025, DOI:10.32604/cmc.2025.062278 - 09 June 2025
    (This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
    Abstract Optical Coherence Tomography (OCT) provides cross-sectional and three-dimensional reconstructions of the target tissue, allowing precise imaging and quantitative analysis of individual retinal layers. These images, based on optical inhomogeneities, reveal intricate cellular structures and are vital for tasks like retinal segmentation. The proposed study uses OCT images to identify significant differences in peripapillary retinal nerve fiber layer thickness. Incorporating spectral-domain analysis of OCT images significantly enhances the evaluation of Purtcher Retinopathy. To streamline this process, the study introduces a Context Encoding Deep Neural Network (CEDNN), which eliminates the time-consuming manual segmentation process while improving the… More >

  • Open AccessOpen Access

    ARTICLE

    Image Style Transfer for Exhibition Hall Design Based on Multimodal Semantic-Enhanced Algorithm

    Qing Xie*, Ruiyun Yu
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1123-1144, 2025, DOI:10.32604/cmc.2025.062712 - 09 June 2025
    Abstract Although existing style transfer techniques have made significant progress in the field of image generation, there are still some challenges in the field of exhibition hall design. The existing style transfer methods mainly focus on the transformation of single dimensional features, but ignore the deep integration of content and style features in exhibition hall design. In addition, existing methods are deficient in detail retention, especially in accurately capturing and reproducing local textures and details while preserving the content image structure. In addition, point-based attention mechanisms tend to ignore the complexity and diversity of image features… More >

  • Open AccessOpen Access

    ARTICLE

    Research on SQL Injection Detection Technology Based on Content Matching and Deep Learning

    Yuqi Chen1,2, Guangjun Liang1,2,3,*, Qun Wang1,2,3
    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1145-1167, 2025, DOI:10.32604/cmc.2025.063319 - 09 June 2025
    Abstract Structured Query Language (SQL) injection attacks have become the most common means of attacking Web applications due to their simple implementation and high degree of harm. Traditional injection attack detection techniques struggle to accurately identify various types of SQL injection attacks. This paper presents an enhanced SQL injection detection method that utilizes content matching technology to improve the accuracy and efficiency of detection. Features are extracted through content matching, effectively avoiding the loss of valid information, and an improved deep learning model is employed to enhance the detection effect of SQL injections. Considering that grammar More >

Per Page:

Share Link