Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,379)
  • Open Access

    REVIEW

    Internet of Things Authentication Protocols: Comparative Study

    Souhayla Dargaoui1, Mourade Azrour1,*, Ahmad El Allaoui1, Azidine Guezzaz2, Abdulatif Alabdulatif3, Abdullah Alnajim4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 65-91, 2024, DOI:10.32604/cmc.2024.047625

    Abstract Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according… More >

  • Open Access

    ARTICLE

    Enhancing Skin Cancer Diagnosis with Deep Learning: A Hybrid CNN-RNN Approach

    Syeda Shamaila Zareen1,*, Guangmin Sun1,*, Mahwish Kundi2, Syed Furqan Qadri3, Salman Qadri4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1497-1519, 2024, DOI:10.32604/cmc.2024.047418

    Abstract Skin cancer diagnosis is difficult due to lesion presentation variability. Conventional methods struggle to manually extract features and capture lesions spatial and temporal variations. This study introduces a deep learning-based Convolutional and Recurrent Neural Network (CNN-RNN) model with a ResNet-50 architecture which used as the feature extractor to enhance skin cancer classification. Leveraging synergistic spatial feature extraction and temporal sequence learning, the model demonstrates robust performance on a dataset of 9000 skin lesion photos from nine cancer types. Using pre-trained ResNet-50 for spatial data extraction and Long Short-Term Memory (LSTM) for temporal dependencies, the model achieves a high average recognition… More >

  • Open Access

    ARTICLE

    Spinal Vertebral Fracture Detection and Fracture Level Assessment Based on Deep Learning

    Yuhang Wang1,*, Zhiqin He1, Qinmu Wu1, Tingsheng Lu2, Yu Tang1, Maoyun Zhu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1377-1398, 2024, DOI:10.32604/cmc.2024.047379

    Abstract This paper addresses the common orthopedic trauma of spinal vertebral fractures and aims to enhance doctors’ diagnostic efficiency. Therefore, a deep-learning-based automated diagnostic system with multi-label segmentation is proposed to recognize the condition of vertebral fractures. The whole spine Computed Tomography (CT) image is segmented into the fracture, normal, and background using U-Net, and the fracture degree of each vertebra is evaluated (Genant semi-qualitative evaluation). The main work of this paper includes: First, based on the spatial configuration network (SCN) structure, U-Net is used instead of the SCN feature extraction network. The attention mechanism and the residual connection between the… More >

  • Open Access

    ARTICLE

    Coal/Gangue Volume Estimation with Convolutional Neural Network and Separation Based on Predicted Volume and Weight

    Zenglun Guan1,2, Murad S. Alfarzaeai1,3,*, Eryi Hu1,3,*, Taqiaden Alshmeri4, Wang Peng3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 279-306, 2024, DOI:10.32604/cmc.2024.047159

    Abstract In the coal mining industry, the gangue separation phase imposes a key challenge due to the high visual similarity between coal and gangue. Recently, separation methods have become more intelligent and efficient, using new technologies and applying different features for recognition. One such method exploits the difference in substance density, leading to excellent coal/gangue recognition. Therefore, this study uses density differences to distinguish coal from gangue by performing volume prediction on the samples. Our training samples maintain a record of 3-side images as input, volume, and weight as the ground truth for the classification. The prediction process relies on a… More >

  • Open Access

    ARTICLE

    Analyze the Performance of Electroactive Anticorrosion Coating of Medical Magnesium Alloy Using Deep Learning

    Yashan Feng1, Yafang Tian1, Yongxin Yang1, Yufang Zhang1, Haiwei Guo1, Jing’an Li2,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 263-278, 2024, DOI:10.32604/cmc.2024.047004

    Abstract Electroactive anticorrosion coatings are specialized surface treatments that prevent or minimize corrosion. The study employs strategic thermodynamic equilibrium calculations to pioneer a novel factor in corrosion protection. A first-time proposal, the total acidity (TA) potential of the hydrogen (pH) concept significantly shapes medical magnesium alloys. These coatings are meticulously designed for robust corrosion resistance, blending theoretical insights and practical applications to enhance our grasp of corrosion prevention mechanisms and establish a systematic approach to coating design. The groundbreaking significance of this study lies in its innovative integration of the TA/pH concept, which encompasses the TA/pH ratio of the chemical environment.… More >

  • Open Access

    ARTICLE

    Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches

    Jungpil Shin1,*, Md. Al Mehedi Hasan2, Md. Maniruzzaman1, Taiki Watanabe1, Issei Jozume1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1205-1222, 2024, DOI:10.32604/cmc.2024.046954

    Abstract Person identification is one of the most vital tasks for network security. People are more concerned about their security due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprints and faces have been widely used for person identification, which has the risk of information leakage as a result of reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiable pattern, which will not be reproducible falsely by capturing psychological and behavioral information of a person using vision and sensor-based techniques. In existing studies, most of the researchers used very… More >

  • Open Access

    ARTICLE

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    Naglaa F. Soliman1, Fatma E. Fadl-Allah2, Walid El-Shafai3,4,*, Mahmoud I. Aly2, Maali Alabdulhafith1, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 201-241, 2024, DOI:10.32604/cmc.2024.046757

    Abstract The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away from unauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and encryption. This paper is mainly… More >

  • Open Access

    ARTICLE

    Automated Algorithms for Detecting and Classifying X-Ray Images of Spine Fractures

    Fayez Alfayez*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1539-1560, 2024, DOI:10.32604/cmc.2024.046443

    Abstract This paper emphasizes a faster digital processing time while presenting an accurate method for identifying spine fractures in X-ray pictures. The study focuses on efficiency by utilizing many methods that include picture segmentation, feature reduction, and image classification. Two important elements are investigated to reduce the classification time: Using feature reduction software and leveraging the capabilities of sophisticated digital processing hardware. The researchers use different algorithms for picture enhancement, including the Wiener and Kalman filters, and they look into two background correction techniques. The article presents a technique for extracting textural features and evaluates three picture segmentation algorithms and three… More >

  • Open Access

    ARTICLE

    Double DQN Method For Botnet Traffic Detection System

    Yutao Hu1, Yuntao Zhao1,*, Yongxin Feng2, Xiangyu Ma1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 509-530, 2024, DOI:10.32604/cmc.2024.042216

    Abstract In the face of the increasingly severe Botnet problem on the Internet, how to effectively detect Botnet traffic in real-time has become a critical problem. Although the existing deep Q network (DQN) algorithm in Deep reinforcement learning can solve the problem of real-time updating, its prediction results are always higher than the actual results. In Botnet traffic detection, although it performs well in the training set, the accuracy rate of predicting traffic is as high as%; however, in the test set, its accuracy has declined, and it is impossible to adjust its prediction strategy on time based on new data… More >

  • Open Access

    ARTICLE

    Levels of evidence and grades of recommendation supporting European society for medical oncology clinical practice guidelines

    MARKO SKELIN1,2,3,*, BRUNA PERKOV-STIPIČIN1, SANJA VUŠKOVIĆ4, MARINA ŠANDRK PLEHAČEK5, ANE BAŠIĆ6, DAVID ŠARČEVIĆ7, MAJA ILIĆ8, IVAN KREČAK2,3,9

    Oncology Research, Vol.32, No.5, pp. 807-815, 2024, DOI:10.32604/or.2024.048948

    Abstract Background: The European Society for Medical Oncology (ESMO) guidelines are among the most comprehensive and widely used clinical practice guidelines (CPGs) globally. However, the level of scientific evidence supporting ESMO CPG recommendations has not been systematically investigated. This study assessed ESMO CPG levels of evidence (LOE) and grades of recommendations (GOR), as well as their trends over time across various cancer settings. Methods: We manually extracted every recommendation with the Infectious Diseases Society of America (IDSA) classification from each CPG. We examined the distribution of LOE and GOR in all available ESMO CPG guidelines across different topics and cancer types.… More >

Displaying 51-60 on page 6 of 7379. Per Page