Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    REVIEW

    Survey on Video Security: Examining Threats, Challenges, and Future Trends

    Ali Asghar1,#, Amna Shifa2,#, Mamoona Naveed Asghar2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3591-3635, 2024, DOI:10.32604/cmc.2024.054654 - 12 September 2024

    Abstract Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it… More >

  • Open Access

    ARTICLE

    A Path Planning Algorithm Based on Improved RRT Sampling Region

    Xiangkui Jiang*, Zihao Wang, Chao Dong

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4303-4323, 2024, DOI:10.32604/cmc.2024.054640 - 12 September 2024

    Abstract

    For the problem of slow search and tortuous paths in the Rapidly Exploring Random Tree (RRT) algorithm, a feedback-biased sampling RRT, called FS-RRT, is proposed based on RRT. Firstly, to improve the sampling efficiency of RRT to shorten the search time, the search area of the random tree is restricted to improve the sampling efficiency. Secondly, to obtain better information about obstacles to shorten the path length, a feedback-biased sampling strategy is used instead of the traditional random sampling, the collision of the expanding node with an obstacle generates feedback information so that the next

    More >

  • Open Access

    ARTICLE

    Anomaly Detection Using Data Rate of Change on Medical Data

    Kwang-Cheol Rim1, Young-Min Yoon2, Sung-Uk Kim3, Jeong-In Kim4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3903-3916, 2024, DOI:10.32604/cmc.2024.054620 - 12 September 2024

    Abstract The identification and mitigation of anomaly data, characterized by deviations from normal patterns or singularities, stand as critical endeavors in modern technological landscapes, spanning domains such as Non-Fungible Tokens (NFTs), cyber-security, and the burgeoning metaverse. This paper presents a novel proposal aimed at refining anomaly detection methodologies, with a particular focus on continuous data streams. The essence of the proposed approach lies in analyzing the rate of change within such data streams, leveraging this dynamic aspect to discern anomalies with heightened precision and efficacy. Through empirical evaluation, our method demonstrates a marked improvement over existing More >

  • Open Access

    ARTICLE

    Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System

    Abdullah Alabdulatif1, Navod Neranjan Thilakarathne2,*, Mohamed Aashiq3,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3655-3683, 2024, DOI:10.32604/cmc.2024.054610 - 12 September 2024

    Abstract The increasing prevalence of Internet of Things (IoT) devices has introduced a new phase of connectivity in recent years and, concurrently, has opened the floodgates for growing cyber threats. Among the myriad of potential attacks, Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic. As IoT devices often lack the inherent security measures found in more mature computing platforms, the need for robust DoS/DDoS detection systems tailored to IoT is paramount for… More >

  • Open Access

    ARTICLE

    Heart-Net: A Multi-Modal Deep Learning Approach for Diagnosing Cardiovascular Diseases

    Deema Mohammed Alsekait1, Ahmed Younes Shdefat2, Ayman Nabil3, Asif Nawaz4,*, Muhammad Rizwan Rashid Rana4, Zohair Ahmed5, Hanaa Fathi6, Diaa Salama AbdElminaam6,7,8

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3967-3990, 2024, DOI:10.32604/cmc.2024.054591 - 12 September 2024

    Abstract Heart disease remains a leading cause of morbidity and mortality worldwide, highlighting the need for improved diagnostic methods. Traditional diagnostics face limitations such as reliance on single-modality data and vulnerability to apparatus faults, which can reduce accuracy, especially with poor-quality images. Additionally, these methods often require significant time and expertise, making them less accessible in resource-limited settings. Emerging technologies like artificial intelligence and machine learning offer promising solutions by integrating multi-modality data and enhancing diagnostic precision, ultimately improving patient outcomes and reducing healthcare costs. This study introduces Heart-Net, a multi-modal deep learning framework designed to… More >

  • Open Access

    ARTICLE

    Leveraging Uncertainty for Depth-Aware Hierarchical Text Classification

    Zixuan Wu1, Ye Wang1,*, Lifeng Shen2, Feng Hu1, Hong Yu1,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4111-4127, 2024, DOI:10.32604/cmc.2024.054581 - 12 September 2024

    Abstract Hierarchical Text Classification (HTC) aims to match text to hierarchical labels. Existing methods overlook two critical issues: first, some texts cannot be fully matched to leaf node labels and need to be classified to the correct parent node instead of treating leaf nodes as the final classification target. Second, error propagation occurs when a misclassification at a parent node propagates down the hierarchy, ultimately leading to inaccurate predictions at the leaf nodes. To address these limitations, we propose an uncertainty-guided HTC depth-aware model called DepthMatch. Specifically, we design an early stopping strategy with uncertainty to More >

  • Open Access

    ARTICLE

    Rail-PillarNet: A 3D Detection Network for Railway Foreign Object Based on LiDAR

    Fan Li1,2, Shuyao Zhang3, Jie Yang1,2,*, Zhicheng Feng1,2, Zhichao Chen1,2

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3819-3833, 2024, DOI:10.32604/cmc.2024.054525 - 12 September 2024

    Abstract Aiming at the limitations of the existing railway foreign object detection methods based on two-dimensional (2D) images, such as short detection distance, strong influence of environment and lack of distance information, we propose Rail-PillarNet, a three-dimensional (3D) LIDAR (Light Detection and Ranging) railway foreign object detection method based on the improvement of PointPillars. Firstly, the parallel attention pillar encoder (PAPE) is designed to fully extract the features of the pillars and alleviate the problem of local fine-grained information loss in PointPillars pillars encoder. Secondly, a fine backbone network is designed to improve the feature extraction… More >

  • Open Access

    ARTICLE

    Cost-Sensitive Dual-Stream Residual Networks for Imbalanced Classification

    Congcong Ma1,2, Jiaqi Mi1, Wanlin Gao1,2, Sha Tao1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4243-4261, 2024, DOI:10.32604/cmc.2024.054506 - 12 September 2024

    Abstract Imbalanced data classification is the task of classifying datasets where there is a significant disparity in the number of samples between different classes. This task is prevalent in practical scenarios such as industrial fault diagnosis, network intrusion detection, cancer detection, etc. In imbalanced classification tasks, the focus is typically on achieving high recognition accuracy for the minority class. However, due to the challenges presented by imbalanced multi-class datasets, such as the scarcity of samples in minority classes and complex inter-class relationships with overlapping boundaries, existing methods often do not perform well in multi-class imbalanced data… More >

  • Open Access

    ARTICLE

    Metaheuristic-Driven Two-Stage Ensemble Deep Learning for Lung/Colon Cancer Classification

    Pouyan Razmjouei1, Elaheh Moharamkhani2, Mohamad Hasanvand3, Maryam Daneshfar4, Mohammad Shokouhifar5,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3855-3880, 2024, DOI:10.32604/cmc.2024.054460 - 12 September 2024

    Abstract This study investigates the application of deep learning, ensemble learning, metaheuristic optimization, and image processing techniques for detecting lung and colon cancers, aiming to enhance treatment efficacy and improve survival rates. We introduce a metaheuristic-driven two-stage ensemble deep learning model for efficient lung/colon cancer classification. The diagnosis of lung and colon cancers is attempted using several unique indicators by different versions of deep Convolutional Neural Networks (CNNs) in feature extraction and model constructions, and utilizing the power of various Machine Learning (ML) algorithms for final classification. Specifically, we consider different scenarios consisting of two-class colon… More >

  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

Displaying 1521-1530 on page 153 of 7234. Per Page