Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    FishTracker: An Efficient Multi-Object Tracking Algorithm for Fish Monitoring in a RAS Environment

    Yuqiang Wu1,2, Zhao Ji1, Guanqi You1, Zihan Zhang1, Chaoping Lu3, Huanliang Xu1, Zhaoyu Zhai1,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-22, 2026, DOI:10.32604/cmc.2025.070414 - 09 December 2025

    Abstract Understanding fish movement trajectories in aquaculture is essential for practical applications, such as disease warning, feeding optimization, and breeding management. These trajectories reveal key information about the fish’s behavior, health, and environmental adaptability. However, when multi-object tracking (MOT) algorithms are applied to the high-density aquaculture environment, occlusion and overlapping among fish may result in missed detections, false detections, and identity switching problems, which limit the tracking accuracy. To address these issues, this paper proposes FishTracker, a MOT algorithm, by utilizing a Tracking-by-Detection framework. First, the neck part of the YOLOv8 model is enhanced by introducing… More >

  • Open Access

    ARTICLE

    E-AAPIV: Merkle Tree-Based Real-Time Android Manifest Integrity Verification for Mobile Payment Security

    Mostafa Mohamed Ahmed Mohamed Alsaedy1,*, Atef Zaki Ghalwash1, Aliaa Abd Elhalim Yousif2, Safaa Magdy Azzam1

    Journal of Cyber Security, Vol.7, pp. 653-674, 2025, DOI:10.32604/jcs.2025.073547 - 24 December 2025

    Abstract Mobile financial applications and payment systems face significant security challenges from reverse engineering attacks. Attackers can decompile Android Package Kit (APK) files, modify permissions, and repackage applications with malicious capabilities. This work introduces E-AAPIV (Enhanced Android Apps Permissions Integrity Verifier), an advanced framework that uses Merkle Tree technology for real-time manifest integrity verification. The proposed system constructs cryptographic Merkle Tree from AndroidManifest.xml permission structures. It establishes secure client-server connections using Elliptic Curve Diffie-Hellman Protocol (ECDH-P384) key exchange. Root hashes are encrypted with Advanced Encryption Standard-256-Galois/Counter Mode (AES-256-GCM), integrated with hardware-backed Android Keystore for enhanced security. More >

  • Open Access

    ARTICLE

    Attitude Estimation Using an Enhanced Error-State Kalman Filter with Multi-Sensor Fusion

    Yu Tao1, Tian Yin2, Yang Jie1,*

    Journal on Artificial Intelligence, Vol.7, pp. 549-570, 2025, DOI:10.32604/jai.2025.072727 - 01 December 2025

    Abstract To address the issue of insufficient accuracy in attitude estimation using Inertial Measurement Units (IMU), this paper proposes a multi-sensor fusion attitude estimation method based on an improved Error-State Kalman Filter (ESKF). Several adaptive mechanisms are introduced within the standard ESKF framework: first, the process noise covariance is dynamically adjusted based on gyroscope angular velocity to enhance the algorithm’s adaptability under both static and dynamic conditions; second, the Sage-Husa algorithm is employed to estimate the measurement noise covariance of the accelerometer and magnetometer in real-time, mitigating disturbances caused by external accelerations and magnetic fields. Additionally,… More >

  • Open Access

    ARTICLE

    The Kalman Filter Design for MJS in Power System Based on Derandomization Technique

    Quan Li1,*, Ziheng Zhou2

    Energy Engineering, Vol.122, No.12, pp. 5001-5020, 2025, DOI:10.32604/ee.2025.068866 - 27 November 2025

    Abstract This study considers the state estimation problem of the circuit breakers (CBs), solving for random abrupt changes that occurred in power systems. With the abrupt changes randomly occurring, it is represented in a Markov chain, and then the CBs can be considered as a Markov jump system (MJS). In these MJSs, the transition probabilities are obtained from historical statistical data of the random abrupt changes when the faults occurred. Considering that the traditional Kalman filter (KF) frameworks based on MJS only depend on the subsystem of MJS, but neglect the stochastic jump between different subsystems.… More > Graphic Abstract

    The Kalman Filter Design for MJS in Power System Based on Derandomization Technique

  • Open Access

    PROCEEDINGS

    GelMA/HAMA-CS/PCL Composite Hydrogel-Scaffold System Promote Wound Healing

    Kaidi Luo1, Weihuang Cai2, Huazhen Liu1, Yi Zhang2, Kailei Pan2, Xiaoyi Wang1, Yuanyuan Liu1,2*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.33, No.2, pp. 1-1, 2025, DOI:10.32604/icces.2025.011866

    Abstract As the global prevalence of diabetes continues to rise, chronic diabetic wounds have become an important cause of amputation and death due to their protracted nature. In order to break through the limitations of traditional dressings, this study innovatively constructed a GelMA/HAMA-CS/PCL composite hydrogel-scaffold system containing chitosan based on biomaterials engineering and 3D printing technology. The system provides biomimetic ECM microenvironment through: photocrosslinked hydrogel layer (GelMA/HAMA-CS); Electrostatic spinning PCL film achieves mechanical strengthening and barrier protection. The chitosan component imparts long-term antibacterial activity, and the multi-materials cooperate to promote wound healing. In vitro antibacterial and… More >

  • Open Access

    ARTICLE

    A Method for Ultrasound Servo Tracking of Puncture Needle

    Shitong Ye1, Bo Yang2,*, Hao Quan3, Shan Liu4, Minyi Tang5, Jiawei Tian6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2287-2306, 2025, DOI:10.32604/cmes.2025.066195 - 31 August 2025

    Abstract Computer-aided surgical navigation technology helps and guides doctors to complete the operation smoothly, which simulates the whole surgical environment with computer technology, and then visualizes the whole operation link in three dimensions. At present, common image-guided surgical techniques such as computed tomography (CT) and X-ray imaging (X-ray) will cause radiation damage to the human body during the imaging process. To address this, we propose a novel Extended Kalman filter-based model that tracks the puncture needle-point using an ultrasound probe. To address the limitations of Kalman filtering methods based on position and velocity, our method of More >

  • Open Access

    ARTICLE

    Multi-Kernel Bandwidth Based Maximum Correntropy Extended Kalman Filter for GPS Navigation

    Amita Biswal, Dah-Jing Jwo*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.1, pp. 927-944, 2025, DOI:10.32604/cmes.2025.067299 - 31 July 2025

    Abstract The extended Kalman filter (EKF) is extensively applied in integrated navigation systems that combine the global navigation satellite system (GNSS) and strap-down inertial navigation system (SINS). However, the performance of the EKF can be severely impacted by non-Gaussian noise and measurement noise uncertainties, making it difficult to achieve optimal GNSS/INS integration. Dealing with non-Gaussian noise remains a significant challenge in filter development today. Therefore, the maximum correntropy criterion (MCC) is utilized in EKFs to manage heavy-tailed measurement noise. However, its capability to handle non-Gaussian process noise and unknown disturbances remains largely unexplored. In this paper,… More >

  • Open Access

    ARTICLE

    Optimized Attack and Detection on Multi-Sensor Cyber-Physical System

    Fangju Zhou1, Hanbo Zhang2, Na Ye1, Jing Huang1, Zhu Ren1,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4539-4561, 2025, DOI:10.32604/cmc.2025.065946 - 30 July 2025

    Abstract This paper explores security risks in state estimation based on multi-sensor systems that implement a Kalman filter and a detector. When measurements are transmitted via wireless networks to a remote estimator, the innovation sequence becomes susceptible to interception and manipulation by adversaries. We consider a class of linear deception attacks, wherein the attacker alters the innovation to degrade estimation accuracy while maintaining stealth against the detector. Given the inherent volatility of the detection function based on the detector, we propose broadening the traditional feasibility constraint to accommodate a certain degree of deviation from the distribution… More >

  • Open Access

    REVIEW

    Dysregulated PI3K/AKT signaling in oral squamous cell carcinoma: The tumor microenvironment and epigenetic modifiers as key drivers

    VINOTHKUMAR VEERASAMY1, VEERAVARMAL VEERAN2, SIDDAVARAM NAGINI1,3,*

    Oncology Research, Vol.33, No.8, pp. 1835-1860, 2025, DOI:10.32604/or.2025.064010 - 18 July 2025

    Abstract The phosphatidylinositol 3-kinase (PI3K)/protein kinase B (AKT) pathway is one of the most frequently dysregulated signaling networks in oral squamous cell carcinoma (OSCC). Although the tumor microenvironment (TME) and epigenetic modifiers are recognized to play a pivotal role in aberrant activation of the PI3K/AKT pathway in OSCC, the available evidence is fragmentary and a comprehensive analysis is warranted. This review evaluates the intricate mechanisms by which various components of the TME facilitate proliferation, apoptosis evasion, invasion, migration, angiogenesis, metastasis, as well as therapy resistance in OSCC through activation of PI3K/AKT signalling. The review has also More >

  • Open Access

    ARTICLE

    Toward Intrusion Detection of Industrial Cyber-Physical System: A Hybrid Approach Based on System State and Network Traffic Abnormality Monitoring

    Junbin He1,2, Wuxia Zhang3, Xianyi Liu1, Jinping Liu2,*, Guangyi Yang4

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1227-1252, 2025, DOI:10.32604/cmc.2025.064402 - 09 June 2025

    Abstract The integration of cloud computing into traditional industrial control systems is accelerating the evolution of Industrial Cyber-Physical System (ICPS), enhancing intelligence and autonomy. However, this transition also expands the attack surface, introducing critical security vulnerabilities. To address these challenges, this article proposes a hybrid intrusion detection scheme for securing ICPSs that combines system state anomaly and network traffic anomaly detection. Specifically, an improved variation-Bayesian-based noise covariance-adaptive nonlinear Kalman filtering (IVB-NCA-NLKF) method is developed to model nonlinear system dynamics, enabling optimal state estimation in multi-sensor ICPS environments. Intrusions within the physical sensing system are identified by More >

Displaying 1-10 on page 1 of 78. Per Page