Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,090)
  • Open Access

    ARTICLE

    Multi-Constraint Generative Adversarial Network-Driven Optimization Method for Super-Resolution Reconstruction of Remote Sensing Images

    Binghong Zhang, Jialing Zhou, Xinye Zhou, Jia Zhao, Jinchun Zhu, Guangpeng Fan*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068309 - 10 November 2025

    Abstract Remote sensing image super-resolution technology is pivotal for enhancing image quality in critical applications including environmental monitoring, urban planning, and disaster assessment. However, traditional methods exhibit deficiencies in detail recovery and noise suppression, particularly when processing complex landscapes (e.g., forests, farmlands), leading to artifacts and spectral distortions that limit practical utility. To address this, we propose an enhanced Super-Resolution Generative Adversarial Network (SRGAN) framework featuring three key innovations: (1) Replacement of L1/L2 loss with a robust Charbonnier loss to suppress noise while preserving edge details via adaptive gradient balancing; (2) A multi-loss joint optimization strategy… More >

  • Open Access

    ARTICLE

    LinguTimeX a Framework for Multilingual CTC Detection Using Explainable AI and Natural Language Processing

    Omar Darwish1, Shorouq Al-Eidi2, Abdallah Al-Shorman1, Majdi Maabreh3, Anas Alsobeh4, Plamen Zahariev5, Yahya Tashtoush6,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.068266 - 10 November 2025

    Abstract Covert timing channels (CTC) exploit network resources to establish hidden communication pathways, posing significant risks to data security and policy compliance. Therefore, detecting such hidden and dangerous threats remains one of the security challenges. This paper proposes LinguTimeX, a new framework that combines natural language processing with artificial intelligence, along with explainable Artificial Intelligence (AI) not only to detect CTC but also to provide insights into the decision process. LinguTimeX performs multidimensional feature extraction by fusing linguistic attributes with temporal network patterns to identify covert channels precisely. LinguTimeX demonstrates strong effectiveness in detecting CTC across… More >

  • Open Access

    ARTICLE

    Motion In-Betweening via Frequency-Domain Diffusion Model

    Qiang Zhang1, Shuo Feng1, Shanxiong Chen2, Teng Wan1, Ying Qi1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.068247 - 10 November 2025

    Abstract Human motion modeling is a core technology in computer animation, game development, and human-computer interaction. In particular, generating natural and coherent in-between motion using only the initial and terminal frames remains a fundamental yet unresolved challenge. Existing methods typically rely on dense keyframe inputs or complex prior structures, making it difficult to balance motion quality and plausibility under conditions such as sparse constraints, long-term dependencies, and diverse motion styles. To address this, we propose a motion generation framework based on a frequency-domain diffusion model, which aims to better model complex motion distributions and enhance generation… More >

  • Open Access

    ARTICLE

    Federated Multi-Label Feature Selection via Dual-Layer Hybrid Breeding Cooperative Particle Swarm Optimization with Manifold and Sparsity Regularization

    Songsong Zhang1, Huazhong Jin1,2,*, Zhiwei Ye1,2, Jia Yang1,2, Jixin Zhang1,2, Dongfang Wu1,2, Xiao Zheng1,2, Dingfeng Song1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.068044 - 10 November 2025

    Abstract Multi-label feature selection (MFS) is a crucial dimensionality reduction technique aimed at identifying informative features associated with multiple labels. However, traditional centralized methods face significant challenges in privacy-sensitive and distributed settings, often neglecting label dependencies and suffering from low computational efficiency. To address these issues, we introduce a novel framework, Fed-MFSDHBCPSO—federated MFS via dual-layer hybrid breeding cooperative particle swarm optimization algorithm with manifold and sparsity regularization (DHBCPSO-MSR). Leveraging the federated learning paradigm, Fed-MFSDHBCPSO allows clients to perform local feature selection (FS) using DHBCPSO-MSR. Locally selected feature subsets are encrypted with differential privacy (DP) and transmitted… More >

  • Open Access

    ARTICLE

    Securing IoT Ecosystems: Experimental Evaluation of Modern Lightweight Cryptographic Algorithms and Their Performance

    Mircea Ţălu1,2,*

    Journal of Cyber Security, Vol.7, pp. 565-587, 2025, DOI:10.32604/jcs.2025.073690 - 11 December 2025

    Abstract The rapid proliferation of Internet of Things (IoT) devices has intensified the demand for cryptographic solutions that balance security, performance, and resource efficiency. However, existing studies often focus on isolated algorithmic families, lacking a comprehensive structural and experimental comparison across diverse lightweight cryptographic designs. This study addresses that gap by providing an integrated analysis of modern lightweight cryptographic algorithms spanning six structural classes—Substitution–Permutation Network (SPN), Feistel Network (FN), Generalized Feistel Network (GFN), Addition–Rotation–XOR (ARX), Nonlinear Feedback Shift Register (NLFSR), and Hybrid models—evaluated on resource-constrained IoT platforms. The key contributions include: (i) establishing a unified benchmarking… More >

  • Open Access

    ARTICLE

    HI-XDR: Hybrid Intelligent Framework for Adversarial-Resilient Anomaly Detection and Adaptive Cyber Response

    Abd Rahman Wahid*

    Journal of Cyber Security, Vol.7, pp. 589-614, 2025, DOI:10.32604/jcs.2025.071622 - 11 December 2025

    Abstract The rapid increase in cyber attacks requires accurate, adaptive, and interpretable detection and response mechanisms. Conventional security solutions remain fragmented, leaving gaps that attackers can exploit. This study introduces the HI-XDR (Hybrid Intelligent Extended Detection and Response) framework, which combines network-based Suricata rules and endpoint-based Wazuh rules into a unified dataset containing 45,705 entries encoded into 1058 features. A semantic-aware autoencoder-based anomaly detection module is trained and strengthened through adversarial learning using Projected Gradient Descent, achieving a minimum mean squared error of 0.0015 and detecting 458 anomaly rules at the 99th percentile threshold. A comparative… More >

  • Open Access

    ARTICLE

    Integrating Temporal Change Detection and Advanced Hybrid Modeling to Predict Urban Expansion in Jaipur, a UNESCO World Heritage City

    Saurabh Singh1,2, Sudip Pandey3,*, Ankush Kumar Jain1

    Revue Internationale de Géomatique, Vol.34, pp. 899-914, 2025, DOI:10.32604/rig.2025.071156 - 09 December 2025

    Abstract Urban expansion in semi-arid regions poses critical challenges for sustainable land management, ecological resilience, and heritage conservation. Jaipur, India—a United Nations Educational, Scientific and Cultural Organization (UNESCO) World Heritage City located in a semi-arid environment—faces rapid urbanization that threatens agricultural productivity, fragile ecosystems, and cultural assets. This study quantifies past and projects future land use/land cover (LULC) dynamics in Jaipur to support evidence-based planning. Using the Dynamic World dataset, we generated annual 10-m LULC maps from 2016 to 2025 within the municipal boundary. Temporal change detection was conducted through empirical transition probability analysis, and future… More >

  • Open Access

    ARTICLE

    La dilution urbaine au prisme de l’espace proxémique ; de la discontinuité au continuum des formes urbaines
    Urban Dilution through the Prism of Proxemic Space; from Discontinuity to the Continuum of Urban Forms

    Cyril Enault*

    Revue Internationale de Géomatique, Vol.34, pp. 881-897, 2025, DOI:10.32604/rig.2025.065740 - 09 December 2025

    Abstract Considérée souvent en France comme discontinue, la transition du bâti urbain-rural est largement envisagé comme continue au niveau international. Si la question de la forme urbaine n’est donc, aujourd’hui, plus en suspens du fait des très nombreuses études à l’échelle internationale, la limite urbain périurbain et rural isolé convient d’être néanmoins encore réinterrogée. La notion de proxémique développée dans les années 1970, pourrait permettre une résolution du problème. Utiliser cette notion pour revoir la métrique géographique pourrait permettre de réviser la limite urbain-campagne et raisonner alors sur un espace continu au-delà même des limites du More >

  • Open Access

    ARTICLE

    State-Space Reduction Techniques Exploiting Specific Constraints for Quantum Search Initialization, Application to an Outage Planning Problem

    Rodolphe Griset1,#,*, Ioannis Lavdas2,§, Jiří Guth Jarkovský3

    Journal of Quantum Computing, Vol.7, pp. 81-105, 2025, DOI:10.32604/jqc.2025.066064 - 08 December 2025

    Abstract Quantum search has emerged as one of the most promising fields in quantum computing. State-of-the-art quantum search algorithms enable the search for specific elements in a distribution by monotonically increasing the density of these elements relative to the rest of the distribution. These kinds of algorithms demonstrate a theoretical quadratic speed-up on the number of queries compared to classical search algorithms in unstructured spaces. Unfortunately, the major part of the existing literature applies quantum search to problems whose size grows exponentially with the input size without exploiting any specific problem structure, rendering this kind of… More >

  • Open Access

    ARTICLE

    Attribute-Based Encryption for Secure Access Control in Personal Health Records

    Dakshnamoorthy Manivannan*

    Computer Systems Science and Engineering, Vol.49, pp. 533-555, 2025, DOI:10.32604/csse.2025.072267 - 08 December 2025

    Abstract Attribute-based Encryption (ABE) enhances the confidentiality of Electronic Health Records (EHR) (also known as Personal Health Records (PHR)) by binding access rights not to individual identities, but to user attribute sets such as roles, specialties, or certifications. This data-centric cryptographic paradigm enables highly fine-grained, policy-driven access control, minimizing the need for identity management and supporting scalable multi-user scenarios. This paper presents a comprehensive and critical survey of ABE schemes developed specifically for EHR/PHR systems over the past decade. It explores the evolution of these schemes, analyzing their design principles, strengths, limitations, and the level of More >

Displaying 51-60 on page 6 of 5090. Per Page