Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (453)
  • Open Access

    ARTICLE

    Validity, Reliability, and Measurement Invariance of the Thai Smartphone Application-Based Addiction Scale and Bergen Social Media Addiction Scale

    Kamolthip Ruckwongpatr1,#, Chirawat Paratthakonkun2,#, Usanut Sangtongdee3,4,*, Iqbal Pramukti5, Ira Nurmala6, Kanokwan Angkasith7, Weena Thanachaisakul7, Jatuphum Ketchatturat8, Mark D. Griffiths9, Yi-Kai Kao10,*, Chung-Ying Lin1,5,11,12

    International Journal of Mental Health Promotion, Vol.26, No.4, pp. 293-302, 2024, DOI:10.32604/ijmhp.2024.047023

    Abstract Background: In recent years, there has been increased research interest in both smartphone addiction and social media addiction as well as the development of psychometric instruments to assess these constructs. However, there is a lack of psychometric evaluation for instruments assessing smartphone addiction and social media addiction in Thailand. The present study evaluated the psychometric properties and gender measurement invariance of the Thai version of the Smartphone Application-Based Addiction Scale (SABAS) and Bergen Social Media Addiction Scale (BSMAS). Method: A total of 801 Thai university students participated in an online survey from January 2022 to July 2022 which included demographic… More >

  • Open Access

    ARTICLE

    E2E-MFERC: A Multi-Face Expression Recognition Model for Group Emotion Assessment

    Lin Wang1, Juan Zhao2, Hu Song3, Xiaolong Xu4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1105-1135, 2024, DOI:10.32604/cmc.2024.048688

    Abstract In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assess students’ group emotions can provide educators with more comprehensive and intuitive classroom effect analysis, thereby continuously promoting the improvement of teaching quality. However, most existing multi-face expression recognition methods adopt a multi-stage approach, with an overall complex process, poor real-time performance, and insufficient generalization ability. In addition, the existing facial expression datasets are mostly single face images, which are of low quality and lack specificity, also restricting the development of this research. This paper aims to propose an end-to-end high-performance multi-face expression recognition algorithm model suitable… More >

  • Open Access

    ARTICLE

    Combined CNN-LSTM Deep Learning Algorithms for Recognizing Human Physical Activities in Large and Distributed Manners: A Recommendation System

    Ameni Ellouze1, Nesrine Kadri2, Alaa Alaerjan3,*, Mohamed Ksantini1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 351-372, 2024, DOI:10.32604/cmc.2024.048061

    Abstract Recognizing human activity (HAR) from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases. Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not. Typically, smartphones and their associated sensing devices operate in distributed and unstable environments. Therefore, collecting their data and extracting useful information is a significant challenge. In this context, the aim of this paper is twofold: The first is to analyze human behavior based on the recognition of physical activities. Using the results of physical activity detection… More >

  • Open Access

    ARTICLE

    Blockchain-Based Key Management Scheme Using Rational Secret Sharing

    Xingfan Zhao1, Changgen Peng1,2,*, Weijie Tan2, Kun Niu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 307-328, 2024, DOI:10.32604/cmc.2024.047975

    Abstract Traditional blockchain key management schemes store private keys in the same location, which can easily lead to security issues such as a single point of failure. Therefore, decentralized threshold key management schemes have become a research focus for blockchain private key protection. The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security. The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress, but these schemes do not consider participants’ self-interested behavior, and require trusted nodes to keep private key fragments, resulting in a narrow… More >

  • Open Access

    ARTICLE

    An Enhanced Multiview Transformer for Population Density Estimation Using Cellular Mobility Data in Smart City

    Yu Zhou1, Bosong Lin1, Siqi Hu2, Dandan Yu3,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 161-182, 2024, DOI:10.32604/cmc.2024.047836

    Abstract This paper addresses the problem of predicting population density leveraging cellular station data. As wireless communication devices are commonly used, cellular station data has become integral for estimating population figures and studying their movement, thereby implying significant contributions to urban planning. However, existing research grapples with issues pertinent to preprocessing base station data and the modeling of population prediction. To address this, we propose methodologies for preprocessing cellular station data to eliminate any irregular or redundant data. The preprocessing reveals a distinct cyclical characteristic and high-frequency variation in population shift. Further, we devise a multi-view enhancement model grounded on the… More >

  • Open Access

    ARTICLE

    Smartphone-Based Wi-Fi Analysis for Bus Passenger Counting

    Mohammed Alatiyyah*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 875-907, 2024, DOI:10.32604/cmc.2024.047790

    Abstract In the contemporary era of technological advancement, smartphones have become an indispensable part of individuals’ daily lives, exerting a pervasive influence. This paper presents an innovative approach to passenger counting on buses through the analysis of Wi-Fi signals emanating from passengers’ mobile devices. The study seeks to scrutinize the reliability of digital Wi-Fi environments in predicting bus occupancy levels, thereby addressing a crucial aspect of public transportation. The proposed system comprises three crucial elements: Signal capture, data filtration, and the calculation and estimation of passenger numbers. The pivotal findings reveal that the system demonstrates commendable accuracy in estimating passenger counts… More >

  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This means that while attempting to… More >

  • Open Access

    REVIEW

    A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts

    Huaiguang Wu, Yibo Peng, Yaqiong He*, Jinlin Fan

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 77-108, 2024, DOI:10.32604/cmes.2024.046758

    Abstract In recent years, the number of smart contracts deployed on blockchain has exploded. However, the issue of vulnerability has caused incalculable losses. Due to the irreversible and immutability of smart contracts, vulnerability detection has become particularly important. With the popular use of neural network model, there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts. This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts. Subsequently, it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection. These… More > Graphic Abstract

    A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts

  • Open Access

    ARTICLE

    Improving Thyroid Disorder Diagnosis via Ensemble Stacking and Bidirectional Feature Selection

    Muhammad Armghan Latif1, Zohaib Mushtaq2, Saad Arif3, Sara Rehman4, Muhammad Farrukh Qureshi5, Nagwan Abdel Samee6, Maali Alabdulhafith6,*, Yeong Hyeon Gu7, Mohammed A. Al-masni7

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4225-4241, 2024, DOI:10.32604/cmc.2024.047621

    Abstract Thyroid disorders represent a significant global health challenge with hypothyroidism and hyperthyroidism as two common conditions arising from dysfunction in the thyroid gland. Accurate and timely diagnosis of these disorders is crucial for effective treatment and patient care. This research introduces a comprehensive approach to improve the accuracy of thyroid disorder diagnosis through the integration of ensemble stacking and advanced feature selection techniques. Sequential forward feature selection, sequential backward feature elimination, and bidirectional feature elimination are investigated in this study. In ensemble learning, random forest, adaptive boosting, and bagging classifiers are employed. The effectiveness of these techniques is evaluated using… More >

  • Open Access

    ARTICLE

    A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices

    Muhammad Saad1, Muhammad Raheel Bhutta2, Jongik Kim3,*, Tae-Sun Chung1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4263-4282, 2024, DOI:10.32604/cmc.2024.047132

    Abstract With the increase in IoT (Internet of Things) devices comes an inherent challenge of security. In the world today, privacy is the prime concern of every individual. Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage. The challenge is keeping confidentiality and continuing to make the person innominate throughout the system. To address this, we present our proposed architecture where we manage IoT devices using blockchain technology. Our proposed architecture works on and off blockchain integrated with… More >

Displaying 1-10 on page 1 of 453. Per Page