Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20,911)
  • Open Access

    ARTICLE

    YOLO-AB: A Fusion Algorithm for the Elders’ Falling and Smoking Behavior Detection Based on Improved YOLOv8

    Xianghong Cao, Chenxu Li*, Haoting Zhai

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5487-5515, 2025, DOI:10.32604/cmc.2025.061823 - 19 May 2025

    Abstract The behavior safety testing of more and more elderly people living alone has become a hot research topic along with the arrival of an aging society. A YOLO-Abnormal Behaviour (YOLO-AB) algorithm for fusion detection of falling and smoking behaviors of elderly people living alone has been proposed in this paper, which can fully utilize the potential of the YOLOv8 algorithm on object detection and deeply explore the characteristics of different types of behaviors among the elderly, to solve the problems of single detection type, low fusion detection accuracy, and high missed detection rate. Firstly, datasets… More >

  • Open Access

    ARTICLE

    Dual-Classifier Label Correction Network for Carotid Plaque Classification on Multi-Center Ultrasound Images

    Louyi Jiang1,#, Sulei Wang1,#, Jiang Xie1, Haiya Wang2, Wei Shao3,*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5445-5460, 2025, DOI:10.32604/cmc.2025.061759 - 19 May 2025

    Abstract Carotid artery plaques represent a major contributor to the morbidity and mortality associated with cerebrovascular disease, and their clinical significance is largely determined by the risk linked to plaque vulnerability. Therefore, classifying plaque risk constitutes one of the most critical tasks in the clinical management of this condition. While classification models derived from individual medical centers have been extensively investigated, these single-center models often fail to generalize well to multi-center data due to variations in ultrasound images caused by differences in physician expertise and equipment. To address this limitation, a Dual-Classifier Label Correction Network model… More >

  • Open Access

    ARTICLE

    Double Self-Attention Based Fully Connected Feature Pyramid Network for Field Crop Pest Detection

    Zijun Gao*, Zheyi Li, Chunqi Zhang, Ying Wang, Jingwen Su

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4353-4371, 2025, DOI:10.32604/cmc.2025.061743 - 19 May 2025

    Abstract Pest detection techniques are helpful in reducing the frequency and scale of pest outbreaks; however, their application in the actual agricultural production process is still challenging owing to the problems of inter-species similarity, multi-scale, and background complexity of pests. To address these problems, this study proposes an FD-YOLO pest target detection model. The FD-YOLO model uses a Fully Connected Feature Pyramid Network (FC-FPN) instead of a PANet in the neck, which can adaptively fuse multi-scale information so that the model can retain small-scale target features in the deep layer, enhance large-scale target features in the… More >

  • Open Access

    ARTICLE

    Multi-Label Movie Genre Classification with Attention Mechanism on Movie Plots

    Faheem Shaukat1, Naveed Ejaz1,2, Rashid Kamal3,4, Tamim Alkhalifah5,*, Sheraz Aslam6,7,*, Mu Mu4

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5595-5622, 2025, DOI:10.32604/cmc.2025.061702 - 19 May 2025

    Abstract Automated and accurate movie genre classification is crucial for content organization, recommendation systems, and audience targeting in the film industry. Although most existing approaches focus on audiovisual features such as trailers and posters, the text-based classification remains underexplored despite its accessibility and semantic richness. This paper introduces the Genre Attention Model (GAM), a deep learning architecture that integrates transformer models with a hierarchical attention mechanism to extract and leverage contextual information from movie plots for multi-label genre classification. In order to assess its effectiveness, we assess multiple transformer-based models, including Bidirectional Encoder Representations from Transformers… More >

  • Open Access

    ARTICLE

    Enhanced Kinship Verification through Ear Images: A Comparative Study of CNNs, Attention Mechanisms, and MLP Mixer Models

    Thien-Tan Cao, Huu-Thanh Duong, Viet-Tuan Le, Hau Nguyen Trung, Vinh Truong Hoang, Kiet Tran-Trung*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4373-4391, 2025, DOI:10.32604/cmc.2025.061583 - 19 May 2025

    Abstract Kinship verification is a key biometric recognition task that determines biological relationships based on physical features. Traditional methods predominantly use facial recognition, leveraging established techniques and extensive datasets. However, recent research has highlighted ear recognition as a promising alternative, offering advantages in robustness against variations in facial expressions, aging, and occlusions. Despite its potential, a significant challenge in ear-based kinship verification is the lack of large-scale datasets necessary for training deep learning models effectively. To address this challenge, we introduce the EarKinshipVN dataset, a novel and extensive collection of ear images designed specifically for kinship… More >

  • Open Access

    ARTICLE

    An Ultralytics YOLOv8-Based Approach for Road Detection in Snowy Environments in the Arctic Region of Norway

    Aqsa Rahim*, Fuqing Yuan, Javad Barabady

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4411-4428, 2025, DOI:10.32604/cmc.2025.061575 - 19 May 2025

    Abstract In recent years, advancements in autonomous vehicle technology have accelerated, promising safer and more efficient transportation systems. However, achieving fully autonomous driving in challenging weather conditions, particularly in snowy environments, remains a challenge. Snow-covered roads introduce unpredictable surface conditions, occlusions, and reduced visibility, that require robust and adaptive path detection algorithms. This paper presents an enhanced road detection framework for snowy environments, leveraging Simple Framework for Contrastive Learning of Visual Representations (SimCLR) for Self-Supervised pretraining, hyperparameter optimization, and uncertainty-aware object detection to improve the performance of You Only Look Once version 8 (YOLOv8). The model… More >

  • Open Access

    ARTICLE

    A Holistic Anti-Counterfeiting Platform Using NFC and Blockchain Technologies

    Rajendren Subramaniam1, Saaidal Razalli Azzuhri2,*, Teh Ying Wah1, Atif Mahmood3, Vimala Balakrishnan1

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4257-4280, 2025, DOI:10.32604/cmc.2025.061560 - 19 May 2025

    Abstract Counterfeiting is still a pervasive global issue, affecting multiple industries and hindering industrial innovation, while causing substantial financial losses, reputational damage, and risks to consumer safety. From luxury goods and pharmaceuticals to electronics and automotive parts, counterfeit products infiltrate supply chains, leading to a loss of revenue for legitimate businesses and undermining consumer trust. Traditional anti-counterfeiting measures, such as holograms, serial numbers, and barcodes, have proven to be insufficient as counterfeiters continuously develop more sophisticated replication techniques. As a result, there is a growing need for more advanced, secure, and reliable methods to prevent counterfeiting.… More >

  • Open Access

    ARTICLE

    A Feature Selection Method for Software Defect Prediction Based on Improved Beluga Whale Optimization Algorithm

    Shaoming Qiu, Jingjie He, Yan Wang*, Bicong E

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4879-4898, 2025, DOI:10.32604/cmc.2025.061532 - 19 May 2025

    Abstract Software defect prediction (SDP) aims to find a reliable method to predict defects in specific software projects and help software engineers allocate limited resources to release high-quality software products. Software defect prediction can be effectively performed using traditional features, but there are some redundant or irrelevant features in them (the presence or absence of this feature has little effect on the prediction results). These problems can be solved using feature selection. However, existing feature selection methods have shortcomings such as insignificant dimensionality reduction effect and low classification accuracy of the selected optimal feature subset. In… More >

  • Open Access

    ARTICLE

    A Hierarchical Security Situation Assessment Approach for Train Control System under Cyber Attacks

    Qichang Li1,2,*, Bing Bu1, Junyi Zhao1

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4281-4313, 2025, DOI:10.32604/cmc.2025.061525 - 19 May 2025

    Abstract With the integration of informatization and intelligence into the Communication-Based Train Control (CBTC) systems, the system is facing an increasing number of information security threats. As an important method of characterizing the system security status, the security situation assessment is used to analyze the system security situation. However, existing situation assessment methods fail to integrate the coupling relationship between the physical layer and the information layer of the CBTC systems, and cannot dynamically characterize the real-time security situation changes under cyber attacks. In this paper, a hierarchical security situation assessment approach is proposed to address… More >

  • Open Access

    ARTICLE

    Enhancing Medical Data Sharing: A Cooperative Game Incentive Approach Based on Blockchain

    Xiaohui Yang, Shuo Huang*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5071-5089, 2025, DOI:10.32604/cmc.2025.061507 - 19 May 2025

    Abstract With the rapid development of medical data sharing, issues of privacy and ownership have become prominent, which have limited the scale of data sharing. To address the above challenges, we propose a blockchain-based data-sharing framework to ensure data security and encourage data owners to actively participate in sharing. We introduce a reliable attribute-based searchable encryption scheme that enables fine-grained access control of encrypted data and ensures secure and efficient data sharing. The revenue distribution model is constructed based on Shapley value to motivate participants. Additionally, by integrating the smart contract technology of blockchain, the search More >

Displaying 61-70 on page 7 of 20911. Per Page