Home / Journals / CMC / Vol.84, No.2, 2025
Special Issues
Table of Content
cover

On the Cover

Anonymizing Adversarial Perturbation (AAP) for wearable sensor data hides identity signatures while preserving utility across multiple tasks. By injecting minimal, targeted noise in both time and frequency domains, AAP, F-AAP and MF-AAP reduce person-identification accuracy to chance yet retain or improve activity, gender and position recognition, enabling on-device, real-time privacy protection.
The cover image was created with AI-generated content via Canva, and it contains no copyrighted elements or misleading representations.

View this paper

  • Open AccessOpen Access

    REVIEW

    Large Language Model-Driven Knowledge Discovery for Designing Advanced Micro/Nano Electrocatalyst Materials

    Ying Shen1, Shichao Zhao1, Yanfei Lv1, Fei Chen1, Li Fu1,*, Hassan Karimi-Maleh2,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 1921-1950, 2025, DOI:10.32604/cmc.2025.067427 - 03 July 2025
    (This article belongs to the Special Issue: Computational Analysis of Micro-Nano Material Mechanics and Manufacturing)
    Abstract This review presents a comprehensive and forward-looking analysis of how Large Language Models (LLMs) are transforming knowledge discovery in the rational design of advanced micro/nano electrocatalyst materials. Electrocatalysis is central to sustainable energy and environmental technologies, but traditional catalyst discovery is often hindered by high complexity, fragmented knowledge, and inefficiencies. LLMs, particularly those based on Transformer architectures, offer unprecedented capabilities in extracting, synthesizing, and generating scientific knowledge from vast unstructured textual corpora. This work provides the first structured synthesis of how LLMs have been leveraged across various electrocatalysis tasks, including automated information extraction from literature,… More >

  • Open AccessOpen Access

    REVIEW

    3D Printing of Plant Fiber-Based Materials and Quality Evaluation of Their Products: A Review

    Weili Liu1, Fayi Hao1, Jiangping Yuan1,2,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 1951-1979, 2025, DOI:10.32604/cmc.2025.065836 - 03 July 2025
    (This article belongs to the Special Issue: Next-Generation 3D Printing: Material Innovation and Computational Methodologies)
    Abstract Additive manufacturing (AM) and Three-dimensional (3D) printing build complex structures layer by layer, greatly expanding design possibilities. Traditional thermoplastics like Polylactic Acid (PLA), Acrylonitrile Butadiene Styrene (ABS), and Polyethylene Terephthalate Glycol (PETG) are widely used in 3D printing, but their non-renewable nature and limited biodegradability have driven research into plant fiber-based materials. These materials, mainly cellulose and lignin, come from sources like wood and agricultural waste, offering renewability, biodegradability, and biocompatibility. This paper reviews recent advances in plant fiber-based materials for 3D printing, covering their development from raw materials to applications. It highlights the sources,… More >

  • Open AccessOpen Access

    REVIEW

    A Survey on Artificial Intelligence and Blockchain Clustering for Enhanced Security in 6G Wireless Networks

    A. F. M. Shahen Shah1,*, Muhammet Ali Karabulut2, Abu Kamruzzaman3, Dalal Alharthi4, Phillip G. Bradford5
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 1981-2013, 2025, DOI:10.32604/cmc.2025.064028 - 03 July 2025
    Abstract The advent of 6G wireless technology, which offers previously unattainable data rates, very low latency, and compatibility with a wide range of communication devices, promises to transform the networking environment completely. The 6G wireless proposals aim to expand wireless communication’s capabilities well beyond current levels. This technology is expected to revolutionize how we communicate, connect, and use the power of the digital world. However, maintaining secure and efficient data management becomes crucial as 6G networks grow in size and complexity. This study investigates blockchain clustering and artificial intelligence (AI) approaches to ensure a reliable and… More >

  • Open AccessOpen Access

    REVIEW

    Generative Artificial Intelligence (GAI) in Breast Cancer Diagnosis and Treatment: A Systematic Review

    Xiao Jian Tan1,2,3,*, Wai Loon Cheor2, Ee Meng Cheng4,5, Chee Chin Lim3,4, Khairul Shakir Ab Rahman6
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2015-2060, 2025, DOI:10.32604/cmc.2025.063407 - 03 July 2025
    (This article belongs to the Special Issue: Advances in Artificial Intelligence and Generative AI: Impacts on Multidisciplinary Applications)
    Abstract This study systematically reviews the applications of generative artificial intelligence (GAI) in breast cancer research, focusing on its role in diagnosis and therapeutic development. While GAI has gained significant attention across various domains, its utility in breast cancer research has yet to be comprehensively reviewed. This study aims to fill that gap by synthesizing existing research into a unified document. A comprehensive search was conducted following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines, resulting in the retrieval of 3827 articles, of which 31 were deemed eligible for analysis. The included studies were… More >

  • Open AccessOpen Access

    REVIEW

    Navigating the Blockchain Trilemma: A Review of Recent Advances and Emerging Solutions in Decentralization, Security, and Scalability Optimization

    Saha Reno1,#,*, Koushik Roy2,#
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2061-2119, 2025, DOI:10.32604/cmc.2025.066366 - 03 July 2025
    Abstract The blockchain trilemma—balancing decentralization, security, and scalability—remains a critical challenge in distributed ledger technology. Despite significant advancements, achieving all three attributes simultaneously continues to elude most blockchain systems, often forcing trade-offs that limit their real-world applicability. This review paper synthesizes current research efforts aimed at resolving the trilemma, focusing on innovative consensus mechanisms, sharding techniques, layer-2 protocols, and hybrid architectural models. We critically analyze recent breakthroughs, including Directed Acyclic Graph (DAG)-based structures, cross-chain interoperability frameworks, and zero-knowledge proof (ZKP) enhancements, which aim to reconcile scalability with robust security and decentralization. Furthermore, we evaluate the trade-offs More >

  • Open AccessOpen Access

    REVIEW

    Utility of Graph Neural Networks in Short-to Medium-Range Weather Forecasting

    Xiaoni Sun1, Jiming Li2, Zhiqiang Zhao2, Guodong Jing2, Baojun Chen2, Jinrong Hu3, Fei Wang2, Yong Zhang1,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2121-2149, 2025, DOI:10.32604/cmc.2025.063373 - 03 July 2025
    (This article belongs to the Special Issue: Graph Neural Networks: Methods and Applications in Graph-related Problems)
    Abstract Weather forecasting is crucial for agriculture, transportation, and industry. Deep Learning (DL) has greatly improved the prediction accuracy. Among them, Graph Neural Networks (GNNs) excel at processing weather data by establishing connections between regions. This allows them to understand complex patterns that traditional methods might miss. As a result, achieving more accurate predictions becomes possible. The paper reviews the role of GNNs in short-to medium-range weather forecasting. The methods are classified into three categories based on dataset differences. The paper also further identifies five promising research frontiers. These areas aim to boost forecasting precision and More >

  • Open AccessOpen Access

    REVIEW

    Research Trends and Networks in Self-Explaining Autonomous Systems: A Bibliometric Study

    Oscar Peña-Cáceres1,2,*, Elvis Garay-Silupu3, Darwin Aguilar-Chuquizuta4, Henry Silva-Marchan4
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2151-2188, 2025, DOI:10.32604/cmc.2025.065149 - 03 July 2025
    Abstract Self-Explaining Autonomous Systems (SEAS) have emerged as a strategic frontier within Artificial Intelligence (AI), responding to growing demands for transparency and interpretability in autonomous decision-making. This study presents a comprehensive bibliometric analysis of SEAS research published between 2020 and February 2025, drawing upon 1380 documents indexed in Scopus. The analysis applies co-citation mapping, keyword co-occurrence, and author collaboration networks using VOSviewer, MASHA, and Python to examine scientific production, intellectual structure, and global collaboration patterns. The results indicate a sustained annual growth rate of 41.38%, with an h-index of 57 and an average of 21.97 citations… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning and Explainable AI-Guided Design and Optimization of High-Entropy Alloys as Binder Phases for WC-Based Cemented Carbides

    Jianping Li, Wan Xiong, Tenghang Zhang, Hao Cheng, Kun Shen, Miaojin He, Yu Zhang, Junxin Song, Ying Deng*, Qiaowang Chen*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2189-2216, 2025, DOI:10.32604/cmc.2025.066128 - 03 July 2025
    (This article belongs to the Special Issue: Advances in Computational Materials Science: Focusing on Atomic-Scale Simulations and AI-Driven Innovations)
    Abstract Tungsten carbide-based (WC-based) cemented carbides are widely recognized as high-performance tool materials. Traditionally, single metals such as cobalt (Co) or nickel (Ni) serve as the binder phase, providing toughness and structural integrity. Replacing this phase with high-entropy alloys (HEAs) offers a promising approach to enhancing mechanical properties and addressing sustainability challenges. However, the complex multi-element composition of HEAs complicates conventional experimental design, making it difficult to explore the vast compositional space efficiently. Traditional trial-and-error methods are time-consuming, resource-intensive, and often ineffective in identifying optimal compositions. In contrast, artificial intelligence (AI)-driven approaches enable rapid screening and… More >

  • Open AccessOpen Access

    ARTICLE

    Comprehensive Black-Box Fuzzing of Electric Vehicle Charging Firmware via a Vehicle to Grid Network Protocol Based on State Machine Path

    Yu-Bin Kim, Dong-Hyuk Shin, Ieck-Chae Euom*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2217-2243, 2025, DOI:10.32604/cmc.2025.063289 - 03 July 2025
    Abstract The global surge in electric vehicle (EV) adoption is proportionally expanding the EV charging station (EVCS) infrastructure, thereby increasing the attack surface and potential impact of security breaches within this critical ecosystem. While ISO 15118 standardizes EV-EVCS communication, its underspecified security guidelines and the variability in manufacturers’ implementations frequently result in vulnerabilities that can disrupt charging services, compromise user data, or affect power grid stability. This research introduces a systematic black-box fuzzing methodology, accompanied by an open-source tool, to proactively identify and mitigate such security flaws in EVCS firmware operating under ISO 15118. The proposed… More >

  • Open AccessOpen Access

    ARTICLE

    Graph-Embedded Neural Architecture Search: A Variational Approach for Optimized Model Design

    Kazuki Hemmi1,2,*, Yuki Tanigaki3, Kaisei Hara4, Masaki Onishi1,2
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2245-2271, 2025, DOI:10.32604/cmc.2025.064969 - 03 July 2025
    (This article belongs to the Special Issue: Neural Architecture Search: Optimization, Efficiency and Application)
    Abstract Neural architecture search (NAS) optimizes neural network architectures to align with specific data and objectives, thereby enabling the design of high-performance models without specialized expertise. However, a significant limitation of NAS is that it requires extensive computational resources and time. Consequently, performing a comprehensive architectural search for each new dataset is inefficient. Given the continuous expansion of available datasets, there is an urgent need to predict the optimal architecture for the previously unknown datasets. This study proposes a novel framework that generates architectures tailored to unknown datasets by mapping architectures that have demonstrated effectiveness on… More >

  • Open AccessOpen Access

    ARTICLE

    Design and Application of a New Distributed Dynamic Spatio-Temporal Privacy Preserving Mechanisms

    Jiacheng Xiong1, Xingshu Chen1,2,3,*, Xiao Lan2,3, Liangguo Chen1,2
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2273-2303, 2025, DOI:10.32604/cmc.2025.063984 - 03 July 2025
    Abstract In the era of big data, the growing number of real-time data streams often contains a lot of sensitive privacy information. Releasing or sharing this data directly without processing will lead to serious privacy information leakage. This poses a great challenge to conventional privacy protection mechanisms (CPPM). The existing data partitioning methods ignore the number of data replications and information exchanges, resulting in complex distance calculations and inefficient indexing for high-dimensional data. Therefore, CPPM often fails to meet the stringent requirements of efficiency and reliability, especially in dynamic spatiotemporal environments. Addressing this concern, we proposed… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Level Subpopulation-Based Particle Swarm Optimization Algorithm for Hybrid Flow Shop Scheduling Problem with Limited Buffers

    Yuan Zou1, Chao Lu1,*, Lvjiang Yin2, Xiaoyu Wen3
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2305-2330, 2025, DOI:10.32604/cmc.2025.065972 - 03 July 2025
    (This article belongs to the Special Issue: Applications of Artificial Intelligence in Smart Manufacturing)
    Abstract The shop scheduling problem with limited buffers has broad applications in real-world production scenarios, so this research direction is of great practical significance. However, there is currently little research on the hybrid flow shop scheduling problem with limited buffers (LBHFSP). This paper deeply investigates the LBHFSP to optimize the goal of the total completion time. To better solve the LBHFSP, a multi-level subpopulation-based particle swarm optimization algorithm (MLPSO) is proposed, which is founded on the attributes of the LBHFSP and the shortcomings of the basic PSO (particle swarm optimization) algorithm. In MLPSO, firstly, considering the… More >

  • Open AccessOpen Access

    ARTICLE

    DMGNN: A Dual Multi-Relational GNN Model for Enhanced Recommendation

    Siyue Li1,#,*, Tian Jin2,#, Erfan Wang3, Ranting Tao4, Jiaxin Lu5, Kai Xi6
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2331-2353, 2025, DOI:10.32604/cmc.2025.066382 - 03 July 2025
    Abstract In the era of exponential growth of digital information, recommender algorithms are vital for helping users navigate vast data to find relevant items. Traditional approaches such as collaborative filtering and content-based methods have limitations in capturing complex, multi-faceted relationships in large-scale, sparse datasets. Recent advances in Graph Neural Networks (GNNs) have significantly improved recommendation performance by modeling high-order connection patterns within user-item interaction networks. However, existing GNN-based models like LightGCN and NGCF focus primarily on single-type interactions and often overlook diverse semantic relationships, leading to reduced recommendation diversity and limited generalization. To address these challenges,… More >

  • Open AccessOpen Access

    ARTICLE

    A Multi-Objective Joint Task Offloading Scheme for Vehicular Edge Computing

    Yiwei Zhang, Xin Cui*, Qinghui Zhao
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2355-2373, 2025, DOI:10.32604/cmc.2025.065430 - 03 July 2025
    Abstract The rapid advance of Connected-Automated Vehicles (CAVs) has led to the emergence of diverse delay-sensitive and energy-constrained vehicular applications. Given the high dynamics of vehicular networks, unmanned aerial vehicles-assisted mobile edge computing (UAV-MEC) has gained attention in providing computing resources to vehicles and optimizing system costs. We model the computing offloading problem as a multi-objective optimization challenge aimed at minimizing both task processing delay and energy consumption. We propose a three-stage hybrid offloading scheme called Dynamic Vehicle Clustering Game-based Multi-objective Whale Optimization Algorithm (DVCG-MWOA) to address this problem. A novel dynamic clustering algorithm is designed… More >

  • Open AccessOpen Access

    ARTICLE

    Linguistic Steganography Based on Sentence Attribute Encoding

    Lingyun Xiang*, Xu He, Xi Zhang, Chengfu Ou
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2375-2389, 2025, DOI:10.32604/cmc.2025.065804 - 03 July 2025
    Abstract Linguistic steganography (LS) aims to embed secret information into normal natural text for covert communication. It includes modification-based (MLS) and generation-based (GLS) methods. MLS often relies on limited manual rules, resulting in low embedding capacity, while GLS achieves higher embedding capacity through automatic text generation but typically ignores extraction efficiency. To address this, we propose a sentence attribute encoding-based MLS method that enhances extraction efficiency while maintaining strong performance. The proposed method designs a lightweight semantic attribute analyzer to encode sentence attributes for embedding secret information. When the attribute values of the cover sentence differ… More >

  • Open AccessOpen Access

    ARTICLE

    Addressing Modern Cybersecurity Challenges: A Hybrid Machine Learning and Deep Learning Approach for Network Intrusion Detection

    Khadija Bouzaachane1,*, El Mahdi El Guarmah2, Abdullah M. Alnajim3, Sheroz Khan4
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2391-2410, 2025, DOI:10.32604/cmc.2025.065031 - 03 July 2025
    Abstract The rapid increase in the number of Internet of Things (IoT) devices, coupled with a rise in sophisticated cyberattacks, demands robust intrusion detection systems. This study presents a holistic, intelligent intrusion detection system. It uses a combined method that integrates machine learning (ML) and deep learning (DL) techniques to improve the protection of contemporary information technology (IT) systems. Unlike traditional signature-based or single-model methods, this system integrates the strengths of ensemble learning for binary classification and deep learning for multi-class classification. This combination provides a more nuanced and adaptable defense. The research utilizes the NF-UQ-NIDS-v2… More >

  • Open AccessOpen Access

    ARTICLE

    DeblurTomo: Self-Supervised Computed Tomography Reconstruction from Blurry Images

    Qingyang Zhou1, Guofeng Lu2, Yunfan Ye3,*, Zhiping Cai1
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2411-2427, 2025, DOI:10.32604/cmc.2025.066810 - 03 July 2025
    Abstract Computed Tomography (CT) reconstruction is essential in medical imaging and other engineering fields. However, blurring of the projection during CT imaging can lead to artifacts in the reconstructed images. Projection blur combines factors such as larger ray sources, scattering and imaging system vibration. To address the problem, we propose DeblurTomo, a novel self-supervised learning-based deblurring and reconstruction algorithm that efficiently reconstructs sharp CT images from blurry input without needing external data and blur measurement. Specifically, we constructed a coordinate-based implicit neural representation reconstruction network, which can map the coordinates to the attenuation coefficient in the… More >

  • Open AccessOpen Access

    ARTICLE

    Adversarial Perturbation for Sensor Data Anonymization: Balancing Privacy and Utility

    Tatsuhito Hasegawa#,*, Kyosuke Fujino#
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2429-2454, 2025, DOI:10.32604/cmc.2025.066270 - 03 July 2025
    (This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
    Abstract Recent advances in wearable devices have enabled large-scale collection of sensor data across healthcare, sports, and other domains but this has also raised critical privacy concerns, especially under tightening regulations such as the General Data Protection Regulation (GDPR), which explicitly restrict the processing of data that can re-identify individuals. Although existing anonymization approaches such as the Anonymizing AutoEncoder (AAE) can reduce the risk of re-identification, they often introduce substantial waveform distortions and fail to preserve information beyond a single classification task (e.g., human activity recognition). This study proposes a novel sensor data anonymization method based… More >

  • Open AccessOpen Access

    ARTICLE

    Real-Time Larval Stage Classification of Black Soldier Fly Using an Enhanced YOLO11-DSConv Model

    An-Chao Tsai*, Chayanon Pookunngern
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2455-2471, 2025, DOI:10.32604/cmc.2025.067413 - 03 July 2025
    Abstract Food waste presents a major global environmental challenge, contributing to resource depletion, greenhouse gas emissions, and climate change. Black Soldier Fly Larvae (BSFL) offer an eco-friendly solution due to their exceptional ability to decompose organic matter. However, accurately identifying larval instars is critical for optimizing feeding efficiency and downstream applications, as different stages exhibit only subtle visual differences. This study proposes a real-time mobile application for automatic classification of BSFL larval stages. The system distinguishes between early instars (Stages 1–4), suitable for food waste processing and animal feed, and late instars (Stages 5–6), optimal for… More >

  • Open AccessOpen Access

    ARTICLE

    Handling Stagnation in Differential Evolution Using Elitism Centroid-Based Operations

    Li Ming Zheng, Jun Ting Luo*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2473-2494, 2025, DOI:10.32604/cmc.2025.063347 - 03 July 2025
    Abstract Differential evolution (DE) algorithms are simple and efficient evolutionary algorithms that perform well in various optimization problems. Unfortunately, they inevitably stagnate when differential evolutionary algorithms are used to solve complex problems (e.g., real-world artificial neural network (ANN) training problems). To resolve this issue, this paper proposes a framework based on an efficient elite centroid operator. It continuously monitors the current state of the population. Once stagnation is detected, two dedicated operators, centroid-based mutation (CM) and centroid-based crossover (CX), are executed to replace the classical mutation and binomial crossover operations in DE. CM and CX are… More >

  • Open AccessOpen Access

    ARTICLE

    An Integrated Perception Model for Predicting and Analyzing Urban Rail Transit Emergencies Based on Unstructured Data

    Liang Mu1, Yurui Kang1, Zixu Yan1, Guangyu Zhu2,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2495-2512, 2025, DOI:10.32604/cmc.2025.063208 - 03 July 2025
    Abstract The accurate prediction and analysis of emergencies in Urban Rail Transit Systems (URTS) are essential for the development of effective early warning and prevention mechanisms. This study presents an integrated perception model designed to predict emergencies and analyze their causes based on historical unstructured emergency data. To address issues related to data structuredness and missing values, we employed label encoding and an Elastic Net Regularization-based Generative Adversarial Interpolation Network (ER-GAIN) for data structuring and imputation. Additionally, to mitigate the impact of imbalanced data on the predictive performance of emergencies, we introduced an Adaptive Boosting Ensemble… More >

  • Open AccessOpen Access

    ARTICLE

    IoT-Based Real-Time Medical-Related Human Activity Recognition Using Skeletons and Multi-Stage Deep Learning for Healthcare

    Subrata Kumer Paul1,2, Abu Saleh Musa Miah3,4, Rakhi Rani Paul1,2, Md. Ekramul Hamid2, Jungpil Shin4,*, Md Abdur Rahim5
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2513-2530, 2025, DOI:10.32604/cmc.2025.063563 - 03 July 2025
    (This article belongs to the Special Issue: Next-Generation Activity Recognition: Methods, Challenges, and Solutions)
    Abstract The Internet of Things (IoT) and mobile technology have significantly transformed healthcare by enabling real-time monitoring and diagnosis of patients. Recognizing Medical-Related Human Activities (MRHA) is pivotal for healthcare systems, particularly for identifying actions critical to patient well-being. However, challenges such as high computational demands, low accuracy, and limited adaptability persist in Human Motion Recognition (HMR). While some studies have integrated HMR with IoT for real-time healthcare applications, limited research has focused on recognizing MRHA as essential for effective patient monitoring. This study proposes a novel HMR method tailored for MRHA detection, leveraging multi-stage deep… More >

  • Open AccessOpen Access

    ARTICLE

    SFC_DeepLabv3+: A Lightweight Grape Image Segmentation Method Based on Content-Guided Attention Fusion

    Yuchao Xia, Jing Qiu*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2531-2547, 2025, DOI:10.32604/cmc.2025.064635 - 03 July 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract In recent years, fungal diseases affecting grape crops have attracted significant attention. Currently, the assessment of black rot severity mainly depends on the ratio of lesion area to leaf surface area. However, effectively and accurately segmenting leaf lesions presents considerable challenges. Existing grape leaf lesion segmentation models have several limitations, such as a large number of parameters, long training durations, and limited precision in extracting small lesions and boundary details. To address these issues, we propose an enhanced DeepLabv3+ model incorporating Strip Pooling, Content-Guided Fusion, and Convolutional Block Attention Module (SFC_DeepLabv3+), an enhanced lesion segmentation method based… More >

  • Open AccessOpen Access

    ARTICLE

    A Metamodeling Approach to Enforcing the No-Cloning Theorem in Quantum Software Engineering

    Dae-Kyoo Kim*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2549-2572, 2025, DOI:10.32604/cmc.2025.066190 - 03 July 2025
    Abstract Quantum software development utilizes quantum phenomena such as superposition and entanglement to address problems that are challenging for classical systems. However, it must also adhere to critical quantum constraints, notably the no-cloning theorem, which prohibits the exact duplication of unknown quantum states and has profound implications for cryptography, secure communication, and error correction. While existing quantum circuit representations implicitly honor such constraints, they lack formal mechanisms for early-stage verification in software design. Addressing this constraint at the design phase is essential to ensure the correctness and reliability of quantum software. This paper presents a formal… More >

  • Open AccessOpen Access

    ARTICLE

    Directional Explosion of Finite Volume Water Confined in a Single-End-Opened CNT

    Jiahao Liu1,#, Yuanyuan Kang2,#, Kun Cai2,*, Haiyan Duan1, Jiao Shi3,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2573-2586, 2025, DOI:10.32604/cmc.2025.066249 - 03 July 2025
    (This article belongs to the Special Issue: Computational Analysis of Micro-Nano Material Mechanics and Manufacturing)
    Abstract The directional explosion behavior of finite volume water confined within nanochannels holds considerable potential for applications in precision nanofabrication and bioengineering. However, precise control of nanoscale mass transfer remains challenging in nanofluidics. This study examined the dynamic evolution of water clusters confined within a single-end-opened carbon nanotube (CNT) under pulsed electric field (EF) excitation, with a particular focus on the structural reorganization of hydrogen bond (H-bond) networks and dipole orientation realignment. Molecular dynamics simulations reveal that under the influence of pulsed EF, the confined water molecules undergo cooperative restructuring to maximize hydrogen bond formation through… More >

    Graphic Abstract

    Directional Explosion of Finite Volume Water Confined in a Single-End-Opened CNT

  • Open AccessOpen Access

    ARTICLE

    Physics-Informed Gaussian Process Regression with Bayesian Optimization for Laser Welding Quality Control in Coaxial Laser Diodes

    Ziyang Wang1, Lian Duan1,2,*, Lei Kuang1, Haibo Zhou1, Ji’an Duan1
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2587-2604, 2025, DOI:10.32604/cmc.2025.065648 - 03 July 2025
    (This article belongs to the Special Issue: Computing Technology in the Design and Manufacturing of Advanced Materials)
    Abstract The packaging quality of coaxial laser diodes (CLDs) plays a pivotal role in determining their optical performance and long-term reliability. As the core packaging process, high-precision laser welding requires precise control of process parameters to suppress optical power loss. However, the complex nonlinear relationship between welding parameters and optical power loss renders traditional trial-and-error methods inefficient and imprecise. To address this challenge, a physics-informed (PI) and data-driven collaboration approach for welding parameter optimization is proposed. First, thermal-fluid-solid coupling finite element method (FEM) was employed to quantify the sensitivity of welding parameters to physical characteristics, including… More >

  • Open AccessOpen Access

    ARTICLE

    Upholding Academic Integrity amidst Advanced Language Models: Evaluating BiLSTM Networks with GloVe Embeddings for Detecting AI-Generated Scientific Abstracts

    Lilia-Eliana Popescu-Apreutesei, Mihai-Sorin Iosupescu, Sabina Cristiana Necula, Vasile-Daniel Păvăloaia*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2605-2644, 2025, DOI:10.32604/cmc.2025.064747 - 03 July 2025
    (This article belongs to the Special Issue: Enhancing AI Applications through NLP and LLM Integration)
    Abstract The increasing fluency of advanced language models, such as GPT-3.5, GPT-4, and the recently introduced DeepSeek, challenges the ability to distinguish between human-authored and AI-generated academic writing. This situation is raising significant concerns regarding the integrity and authenticity of academic work. In light of the above, the current research evaluates the effectiveness of Bidirectional Long Short-Term Memory (BiLSTM) networks enhanced with pre-trained GloVe (Global Vectors for Word Representation) embeddings to detect AI-generated scientific abstracts drawn from the AI-GA (Artificial Intelligence Generated Abstracts) dataset. Two core BiLSTM variants were assessed: a single-layer approach and a dual-layer… More >

  • Open AccessOpen Access

    ARTICLE

    Explainable Diabetic Retinopathy Detection Using a Distributed CNN and LightGBM Framework

    Pooja Bidwai1,2, Shilpa Gite1,3, Biswajeet Pradhan4,*, Abdullah Almari5
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2645-2676, 2025, DOI:10.32604/cmc.2025.061018 - 03 July 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Diabetic Retinopathy (DR) is a critical disorder that affects the retina due to the constant rise in diabetics and remains the major cause of blindness across the world. Early detection and timely treatment are essential to mitigate the effects of DR, such as retinal damage and vision impairment. Several conventional approaches have been proposed to detect DR early and accurately, but they are limited by data imbalance, interpretability, overfitting, convergence time, and other issues. To address these drawbacks and improve DR detection accurately, a distributed Explainable Convolutional Neural network-enabled Light Gradient Boosting Machine (DE-ExLNN) is… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Aluminum Surface Defect Detection Algorithm Based on YOLOv8n

    Hao Qiu, Shoudong Ni*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2677-2697, 2025, DOI:10.32604/cmc.2025.064629 - 03 July 2025
    Abstract In response to the missed and false detections that are easily caused by the large variety of and significant differences among aluminum surface defects, a detection algorithm based on an improved You Only Look Once (YOLO)v8n network is proposed. First, a C2f_DWR_DRB module is constructed by introducing a dilation-wise residual (DWR) module and a dilated reparameterization block (DRB) to replace the C2f module at the high level of the backbone network, enriching the gradient flow information and increasing the effective receptive field (ERF). Second, an efficient local attention (ELA) mechanism is fused with the high-level… More >

  • Open AccessOpen Access

    ARTICLE

    A Lightweight Super-Resolution Network for Infrared Images Based on an Adaptive Attention Mechanism

    Mengke Tang1, Yong Gan2,*, Yifan Zhang1, Xinxin Gan3
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2699-2716, 2025, DOI:10.32604/cmc.2025.064541 - 03 July 2025
    Abstract Infrared imaging technology has been widely adopted in various fields, such as military reconnaissance, medical diagnosis, and security monitoring, due to its excellent ability to penetrate smoke and fog. However, the prevalent low resolution of infrared images severely limits the accurate interpretation of their contents. In addition, deploying super-resolution models on resource-constrained devices faces significant challenges. To address these issues, this study proposes a lightweight super-resolution network for infrared images based on an adaptive attention mechanism. The network’s dynamic weighting module automatically adjusts the weights of the attention and non-attention branch outputs based on the… More >

  • Open AccessOpen Access

    ARTICLE

    Chinese DeepSeek: Performance of Various Oversampling Techniques on Public Perceptions Using Natural Language Processing

    Anees Ara1, Muhammad Mujahid1, Amal Al-Rasheed2,*, Shaha Al-Otaibi2, Tanzila Saba1
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2717-2731, 2025, DOI:10.32604/cmc.2025.065566 - 03 July 2025
    (This article belongs to the Special Issue: Advancements and Challenges in Artificial Intelligence, Data Analysis and Big Data)
    Abstract DeepSeek Chinese artificial intelligence (AI) open-source model, has gained a lot of attention due to its economical training and efficient inference. DeepSeek, a model trained on large-scale reinforcement learning without supervised fine-tuning as a preliminary step, demonstrates remarkable reasoning capabilities of performing a wide range of tasks. DeepSeek is a prominent AI-driven chatbot that assists individuals in learning and enhances responses by generating insightful solutions to inquiries. Users possess divergent viewpoints regarding advanced models like DeepSeek, posting both their merits and shortcomings across several social media platforms. This research presents a new framework for predicting… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Adaptive Reward Optimization Method for Robot Navigation in Complex Dynamic Environment

    Jie He, Dongmei Zhao, Tao Liu*, Qingfeng Zou, Jian’an Xie
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2733-2749, 2025, DOI:10.32604/cmc.2025.065205 - 03 July 2025
    Abstract Robot navigation in complex crowd service scenarios, such as medical logistics and commercial guidance, requires a dynamic balance between safety and efficiency, while the traditional fixed reward mechanism lacks environmental adaptability and struggles to adapt to the variability of crowd density and pedestrian motion patterns. This paper proposes a navigation method that integrates spatiotemporal risk field modeling and adaptive reward optimization, aiming to improve the robot’s decision-making ability in diverse crowd scenarios through dynamic risk assessment and nonlinear weight adjustment. We construct a spatiotemporal risk field model based on a Gaussian kernel function by combining… More >

  • Open AccessOpen Access

    ARTICLE

    Leveraging the WFD2020 Dataset for Multi-Class Detection of Wheat Fungal Diseases with YOLOv8 and Faster R-CNN

    Shivani Sood1, Harjeet Singh2,*, Surbhi Bhatia Khan3,4,5,*, Ahlam Almusharraf6
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2751-2787, 2025, DOI:10.32604/cmc.2025.060185 - 03 July 2025
    (This article belongs to the Special Issue: Data and Image Processing in Intelligent Information Systems)
    Abstract Wheat fungal infections pose a danger to the grain quality and crop productivity. Thus, prompt and precise diagnosis is essential for efficient crop management. This study used the WFD2020 image dataset, which is available to everyone, to look into how deep learning models could be used to find powdery mildew, leaf rust, and yellow rust, which are three common fungal diseases in Punjab, India. We changed a few hyperparameters to test TensorFlow-based models, such as SSD and Faster R-CNN with ResNet50, ResNet101, and ResNet152 as backbones. Faster R-CNN with ResNet50 achieved a mean average precision More >

  • Open AccessOpen Access

    ARTICLE

    Efficient One-Way Time Synchronization for VANET with MLE-Based Multi-Stage Update

    Hyeontae Joo, Sangmin Lee, Kiseok Kim, Hwangnam Kim*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2789-2804, 2025, DOI:10.32604/cmc.2025.066304 - 03 July 2025
    (This article belongs to the Special Issue: Advanced Trends in Vehicular Ad hoc Networks (VANETs))
    Abstract As vehicular networks become increasingly pervasive, enhancing connectivity and reliability has emerged as a critical objective. Among the enabling technologies for advanced wireless communication, particularly those targeting low latency and high reliability, time synchronization is critical, especially in vehicular networks. However, due to the inherent mobility of vehicular environments, consistently exchanging synchronization packets with a fixed base station or access point is challenging. This issue is further exacerbated in signal shadowed areas such as urban canyons, tunnels, or large-scale indoor halls where other technologies, such as global navigation satellite system (GNSS), are unavailable. One-way synchronization… More >

  • Open AccessOpen Access

    ARTICLE

    MAMGBR: Group-Buying Recommendation Model Based on Multi-Head Attention Mechanism and Multi-Task Learning

    Zongzhe Xu, Ming Yu*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2805-2826, 2025, DOI:10.32604/cmc.2025.066244 - 03 July 2025
    Abstract As the group-buying model shows significant progress in attracting new users, enhancing user engagement, and increasing platform profitability, providing personalized recommendations for group-buying users has emerged as a new challenge in the field of recommendation systems. This paper introduces a group-buying recommendation model based on multi-head attention mechanisms and multi-task learning, termed the Multi-head Attention Mechanisms and Multi-task Learning Group-Buying Recommendation (MAMGBR) model, specifically designed to optimize group-buying recommendations on e-commerce platforms. The core dataset of this study comes from the Chinese maternal and infant e-commerce platform “Beibei,” encompassing approximately 430,000 successful group-buying actions and… More >

  • Open AccessOpen Access

    ARTICLE

    FSS-YOLO: The Lightweight Drill Pipe Detection Method Based on YOLOv8n-obb

    Mingyang Zhao1,2,*, Xiaojun Li1,3, Miao Li1,2, Bangbang Mu1,2
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2827-2846, 2025, DOI:10.32604/cmc.2025.065251 - 03 July 2025
    Abstract The control of gas extraction in coal mines relies on the effectiveness of gas extraction. The main method of gas extraction is to drive drill pipes into the coal seam through a drilling rig and use technologies such as hydraulic fracturing to pre-extract gas in the drill holes. Therefore, the real-time detection of the drill pipe status is closely related to the effectiveness of gas extraction. To achieve fast and accurate identification of drill pipes, we propose FSS-YOLO, which is a lightweight drill pipe detection method based on YOLOv8n-obb. This method first introduces the FasterBlock… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Respiratory Sound Classification Based on Open-Set Semi-Supervised Learning

    Won-Yang Cho, Sangjun Lee*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2847-2863, 2025, DOI:10.32604/cmc.2025.066373 - 03 July 2025
    Abstract The classification of respiratory sounds is crucial in diagnosing and monitoring respiratory diseases. However, auscultation is highly subjective, making it challenging to analyze respiratory sounds accurately. Although deep learning has been increasingly applied to this task, most existing approaches have primarily relied on supervised learning. Since supervised learning requires large amounts of labeled data, recent studies have explored self-supervised and semi-supervised methods to overcome this limitation. However, these approaches have largely assumed a closed-set setting, where the classes present in the unlabeled data are considered identical to those in the labeled data. In contrast, this… More >

  • Open AccessOpen Access

    ARTICLE

    Semantic Secure Communication Based on the Joint Source-Channel Coding

    Yifeng Lin1,2,#, Yuer Yang1,2,3,#, Jianxiang Xie4, Tong Ji5, Peiya Li2,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2865-2882, 2025, DOI:10.32604/cmc.2025.065362 - 03 July 2025
    (This article belongs to the Special Issue: Privacy in the Digital Age: AI-Driven Image Encryption for Secure Data Transmission)
    Abstract Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission. It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks. This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding, which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security. The traditional and state-of-the-art joint source-channel coding algorithms are selected More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning-Based Algorithm for Robust Object Detection in Flooded and Rainy Environments

    Pengfei Wang1,2,3, Jiwu Sun2, Lu Lu1,4, Hongchen Li1, Hongzhe Liu2, Cheng Xu2, Yongqiang Liu1,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2883-2903, 2025, DOI:10.32604/cmc.2025.065267 - 03 July 2025
    (This article belongs to the Special Issue: Advancements in Pattern Recognition through Machine Learning: Bridging Innovation and Application)
    Abstract Flooding and heavy rainfall under extreme weather conditions pose significant challenges to target detection algorithms. Traditional methods often struggle to address issues such as image blurring, dynamic noise interference, and variations in target scale. Conventional neural network (CNN)-based target detection approaches face notable limitations in such adverse weather scenarios, primarily due to the fixed geometric sampling structures that hinder adaptability to complex backgrounds and dynamically changing object appearances. To address these challenges, this paper proposes an optimized YOLOv9 model incorporating an improved deformable convolutional network (DCN) enhanced with a multi-scale dilated attention (MSDA) mechanism. Specifically,… More >

  • Open AccessOpen Access

    ARTICLE

    Rethinking Chart Understanding Using Multimodal Large Language Models

    Andreea-Maria Tanasă, Simona-Vasilica Oprea*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2905-2933, 2025, DOI:10.32604/cmc.2025.065421 - 03 July 2025
    Abstract Extracting data from visually rich documents and charts using traditional methods that rely on OCR-based parsing poses multiple challenges, including layout complexity in unstructured formats, limitations in recognizing visual elements, and the correlation between different parts of the documents, as well as domain-specific semantics. Simply extracting text is not sufficient; advanced reasoning capabilities are proving to be essential to analyze content and answer questions accurately. This paper aims to evaluate the ability of the Large Language Models (LLMs) to correctly answer questions about various types of charts, comparing their performance when using images as input… More >

  • Open AccessOpen Access

    ARTICLE

    VPAFL: Verifiable Privacy-Preserving Aggregation for Federated Learning Based on Single Server

    Peizheng Lai1, Minqing Zhang1,2,*, Yixin Tang1, Ya Yue1, Fuqiang Di1,2
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2935-2957, 2025, DOI:10.32604/cmc.2025.065887 - 03 July 2025
    (This article belongs to the Special Issue: Advanced Intelligent Technologies for Networking and Collaborative Systems)
    Abstract Federated Learning (FL) has emerged as a promising distributed machine learning paradigm that enables multi-party collaborative training while eliminating the need for raw data sharing. However, its reliance on a server introduces critical security vulnerabilities: malicious servers can infer private information from received local model updates or deliberately manipulate aggregation results. Consequently, achieving verifiable aggregation without compromising client privacy remains a critical challenge. To address these problem, we propose a reversible data hiding in encrypted domains (RDHED) scheme, which designs joint secret message embedding and extraction mechanism. This approach enables clients to embed secret messages… More >

  • Open AccessOpen Access

    ARTICLE

    Image-Based Air Quality Estimation by Few-Shot Learning

    Duc Cuong Pham1, Tien Duc Ngo2, Hoai Nam Vu1,3,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2959-2974, 2025, DOI:10.32604/cmc.2025.064672 - 03 July 2025
    Abstract Air quality estimation assesses the pollution level in the air, supports public health warnings, and is a valuable tool in environmental management. Although air sensors have proven helpful in this task, sensors are often expensive and difficult to install, while cameras are becoming more popular and accessible, from which images can be collected as data for deep learning models to solve the above task. This leads to another problem: several labeled images are needed to achieve high accuracy when deep-learning models predict air quality. In this research, we have three main contributions: (1) Collect and… More >

  • Open AccessOpen Access

    ARTICLE

    Hierarchical Shape Pruning for 3D Sparse Convolution Networks

    Haiyan Long1, Chonghao Zhang2, Xudong Qiu3, Hai Chen2,*, Gang Chen4,*
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2975-2988, 2025, DOI:10.32604/cmc.2025.065047 - 03 July 2025
    Abstract 3D sparse convolution has emerged as a pivotal technique for efficient voxel-based perception in autonomous systems, enabling selective feature extraction from non-empty voxels while suppressing computational waste. Despite its theoretical efficiency advantages, practical implementations face under-explored limitations: the fixed geometric patterns of conventional sparse convolutional kernels inevitably process non-contributory positions during sliding-window operations, particularly in regions with uneven point cloud density. To address this, we propose Hierarchical Shape Pruning for 3D Sparse Convolution (HSP-S), which dynamically eliminates redundant kernel stripes through layer-adaptive thresholding. Unlike static soft pruning methods, HSP-S maintains trainable sparsity patterns by progressively… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Task Allocation for Energy and Execution Time Trade-Off in Edge Computing Using Multi-Objective IPSO

    Jafar Aminu1,2,*, Rohaya Latip1,*, Zurina Mohd Hanafi1, Shafinah Kamarudin1, Danlami Gabi2
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2989-3011, 2025, DOI:10.32604/cmc.2025.062451 - 03 July 2025
    Abstract As mobile edge computing continues to develop, the demand for resource-intensive applications is steadily increasing, placing a significant strain on edge nodes. These nodes are normally subject to various constraints, for instance, limited processing capability, a few energy sources, and erratic availability being some of the common ones. Correspondingly, these problems require an effective task allocation algorithm to optimize the resources through continued high system performance and dependability in dynamic environments. This paper proposes an improved Particle Swarm Optimization technique, known as IPSO, for multi-objective optimization in edge computing to overcome these issues. To this… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Coverage Path Planning Strategies for UAV Swarms Based on SADQN Algorithm

    Zhuoyan Xie1, Qi Wang1,*, Bin Kong2,*, Shang Gao1
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3013-3027, 2025, DOI:10.32604/cmc.2025.064147 - 03 July 2025
    Abstract In the current era of intelligent technologies, comprehensive and precise regional coverage path planning is critical for tasks such as environmental monitoring, emergency rescue, and agricultural plant protection. Owing to their exceptional flexibility and rapid deployment capabilities, unmanned aerial vehicles (UAVs) have emerged as the ideal platforms for accomplishing these tasks. This study proposes a swarm A*-guided Deep Q-Network (SADQN) algorithm to address the coverage path planning (CPP) problem for UAV swarms in complex environments. Firstly, to overcome the dependency of traditional modeling methods on regular terrain environments, this study proposes an improved cellular decomposition… More >

  • Open AccessOpen Access

    ARTICLE

    Med-ReLU: A Parameter-Free Hybrid Activation Function for Deep Artificial Neural Network Used in Medical Image Segmentation

    Nawaf Waqas1, Muhammad Islam2,*, Muhammad Yahya3, Shabana Habib4, Mohammed Aloraini2, Sheroz Khan5
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3029-3051, 2025, DOI:10.32604/cmc.2025.064660 - 03 July 2025
    Abstract Deep learning (DL), derived from the domain of Artificial Neural Networks (ANN), forms one of the most essential components of modern deep learning algorithms. DL segmentation models rely on layer-by-layer convolution-based feature representation, guided by forward and backward propagation. A critical aspect of this process is the selection of an appropriate activation function (AF) to ensure robust model learning. However, existing activation functions often fail to effectively address the vanishing gradient problem or are complicated by the need for manual parameter tuning. Most current research on activation function design focuses on classification tasks using natural… More >

  • Open AccessOpen Access

    ARTICLE

    AI-Integrated Feature Selection of Intrusion Detection for Both SDN and Traditional Network Architectures Using an Improved Crayfish Optimization Algorithm

    Hui Xu, Wei Huang*, Longtan Bai
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3053-3073, 2025, DOI:10.32604/cmc.2025.064930 - 03 July 2025
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications)
    Abstract With the birth of Software-Defined Networking (SDN), integration of both SDN and traditional architectures becomes the development trend of computer networks. Network intrusion detection faces challenges in dealing with complex attacks in SDN environments, thus to address the network security issues from the viewpoint of Artificial Intelligence (AI), this paper introduces the Crayfish Optimization Algorithm (COA) to the field of intrusion detection for both SDN and traditional network architectures, and based on the characteristics of the original COA, an Improved Crayfish Optimization Algorithm (ICOA) is proposed by integrating strategies of elite reverse learning, Levy flight,… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Crop Image Classification and Recognition Based on Improved HRNet

    Min Ji*, Shucheng Yang
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3075-3103, 2025, DOI:10.32604/cmc.2025.064166 - 03 July 2025
    Abstract In agricultural production, crop images are commonly used for the classification and identification of various crops. However, several challenges arise, including low image clarity, elevated noise levels, low accuracy, and poor robustness of existing classification models. To address these issues, this research proposes an innovative crop image classification model named Lap-FEHRNet, which integrates a Laplacian Pyramid Super Resolution Network (LapSRN) with a feature enhancement high-resolution network based on attention mechanisms (FEHRNet). To mitigate noise interference, this research incorporates the LapSRN network, which utilizes a Laplacian pyramid structure to extract multi-level feature details from low-resolution images… More >

  • Open AccessOpen Access

    ARTICLE

    Preventing IP Spoofing in Kubernetes Using eBPF

    Absar Hussain1, Abdul Aziz1, Hassan Jamil Syed2,*, Shoaib Raza1
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3105-3124, 2025, DOI:10.32604/cmc.2025.062628 - 03 July 2025
    Abstract Kubernetes has become the dominant container orchestration platform, with widespread adoption across industries. However, its default pod-to-pod communication mechanism introduces security vulnerabilities, particularly IP spoofing attacks. Attackers can exploit this weakness to impersonate legitimate pods, enabling unauthorized access, lateral movement, and large-scale Distributed Denial of Service (DDoS) attacks. Existing security mechanisms such as network policies and intrusion detection systems introduce latency and performance overhead, making them less effective in dynamic Kubernetes environments. This research presents PodCA, an eBPF-based security framework designed to detect and prevent IP spoofing in real time while minimizing performance impact. PodCA… More >

  • Open AccessOpen Access

    ARTICLE

    An Energy Optimization Algorithm for WRSN Nodes Based on Regional Partitioning and Inter-Layer Routing

    Cui Zhang1, Lieping Zhang2,*, Huaquan Gan3, Hongyuan Chen3, Zhihao Li3
    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3125-3148, 2025, DOI:10.32604/cmc.2025.064499 - 03 July 2025
    Abstract In large-scale Wireless Rechargeable Sensor Networks (WRSN), traditional forward routing mechanisms often lead to reduced energy efficiency. To address this issue, this paper proposes a WRSN node energy optimization algorithm based on regional partitioning and inter-layer routing. The algorithm employs a dynamic clustering radius method and the K-means clustering algorithm to dynamically partition the WRSN area. Then, the cluster head nodes in the outermost layer select an appropriate layer from the next relay routing region and designate it as the relay layer for data transmission. Relay nodes are selected layer by layer, starting from the… More >

Per Page:

Share Link