Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,833)
  • Open Access

    ARTICLE

    Comparative Flood Hazard Assessment in Assam’s Belsiri River Basin Using AHP and MaxEnt Models

    Nilotpal Kalita1,*, Ashok Kumar Bora2, Rana Sarmah3, Dhrubajyoti Sahariah2, Manash Jyoti Nath2,*

    Revue Internationale de Géomatique, Vol.34, pp. 37-51, 2025, DOI:10.32604/rig.2024.058265 - 13 January 2025

    Abstract Flooding is a natural event often associated with floodplain areas, characterised by large, sudden and significant rises in river water levels that drastically alters the surrounding landscape. The research employs ArcGIS tools, multi-criteria evaluation techniques and the Maximum Entropy (MaxEnt) model to assess flood hazard zones. The key physical elements of slope, elevation, rainfall, drainage density, land use, and soil types have been integrated to identify areas vulnerable to flooding. Overlay analysis has been used to construct zones specifically designated for flood hazards. Additionally, pairwise comparison using Saaty’s scale was employed to calculate the Eigenvector More > Graphic Abstract

    Comparative Flood Hazard Assessment in Assam’s Belsiri River Basin Using AHP and MaxEnt Models

  • Open Access

    ARTICLE

    Pothole Detection Based on UAV Photogrammetry

    Muhammad Aliff Haiqal Darmawan1, Shahrul Nizan Abd Mukti2, Khairul Nizam Tahar1,*

    Revue Internationale de Géomatique, Vol.34, pp. 21-35, 2025, DOI:10.32604/rig.2024.057266 - 13 January 2025

    Abstract Potholes are the most prevalent type of structural defect found on roads, caused by aging infrastructure, heavy rains, heavy traffic, thin or weak substructures, and other factors. Regular assessment of road conditions is essential for maintaining and improving road networks. Current techniques for identifying potholes on urban roadways primarily rely on public reporting, such as hotlines or social networking websites, which are both time-consuming and inefficient. This study aims to detect potholes using Unmanned Aerial Vehicles (UAVs) images, enabling accurate analysis of their size, shape, and location, thereby enhancing detection efficiency compared to conventional methods.… More >

  • Open Access

    ARTICLE

    Internet of Things Software Engineering Model Validation Using Knowledge-Based Semantic Learning

    Mahmood Alsaadi, Mohammed E. Seno*, Mohammed I. Khalaf

    Intelligent Automation & Soft Computing, Vol.40, pp. 29-52, 2025, DOI:10.32604/iasc.2024.060390 - 10 January 2025

    Abstract The agility of Internet of Things (IoT) software engineering is benchmarked based on its systematic insights for wide application support infrastructure developments. Such developments are focused on reducing the interfacing complexity with heterogeneous devices through applications. To handle the interfacing complexity problem, this article introduces a Semantic Interfacing Obscuration Model (SIOM) for IoT software-engineered platforms. The interfacing obscuration between heterogeneous devices and application interfaces from the testing to real-time validations is accounted for in this model. Based on the level of obscuration between the infrastructure hardware to the end-user software, the modifications through device replacement, More >

  • Open Access

    ARTICLE

    Toward Analytical Homogenized Relaxation Modulus for Fibrous Composite Material with Reduced Order Homogenization Method

    Huilin Jia1, Shanqiao Huang1, Zifeng Yuan1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 193-222, 2025, DOI:10.32604/cmc.2024.059950 - 03 January 2025

    Abstract In this manuscript, we propose an analytical equivalent linear viscoelastic constitutive model for fiber-reinforced composites, bypassing general computational homogenization. The method is based on the reduced-order homogenization (ROH) approach. The ROH method typically involves solving multiple finite element problems under periodic conditions to evaluate elastic strain and eigenstrain influence functions in an ‘off-line’ stage, which offers substantial cost savings compared to direct computational homogenization methods. Due to the unique structure of the fibrous unit cell, “off-line” stage calculation can be eliminated by influence functions obtained analytically. Introducing the standard solid model to the ROH method More >

  • Open Access

    ARTICLE

    Intrumer: A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment

    Nazreen Banu A*, S.K.B. Sangeetha

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 579-607, 2025, DOI:10.32604/cmc.2024.059805 - 03 January 2025

    Abstract The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network traffic. Cloud environments pose significant challenges in maintaining privacy and security. Global approaches, such as IDS, have been developed to tackle these issues. However, most conventional Intrusion Detection System (IDS) models struggle with unseen cyberattacks and complex high-dimensional data. In fact, this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system, named INTRUMER, which offers balanced accuracy, reliability, and security in cloud settings by multiple modules working together within it. The traffic captured… More >

  • Open Access

    ARTICLE

    CSRWA: Covert and Severe Attacks Resistant Watermarking Algorithm

    Balsam Dhyia Majeed1,2, Amir Hossein Taherinia1,*, Hadi Sadoghi Yazdi1, Ahad Harati1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1027-1047, 2025, DOI:10.32604/cmc.2024.059789 - 03 January 2025

    Abstract Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright. The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification. Some of these features are important perceptual features according to the human visual system (HVS), which means that the embedded watermark should be imperceptible in these features. Therefore, both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions. The two roles will be considered in this paper… More >

  • Open Access

    ARTICLE

    A Support Vector Machine (SVM) Model for Privacy Recommending Data Processing Model (PRDPM) in Internet of Vehicles

    Ali Alqarni*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 389-406, 2025, DOI:10.32604/cmc.2024.059238 - 03 January 2025

    Abstract Open networks and heterogeneous services in the Internet of Vehicles (IoV) can lead to security and privacy challenges. One key requirement for such systems is the preservation of user privacy, ensuring a seamless experience in driving, navigation, and communication. These privacy needs are influenced by various factors, such as data collected at different intervals, trip durations, and user interactions. To address this, the paper proposes a Support Vector Machine (SVM) model designed to process large amounts of aggregated data and recommend privacy-preserving measures. The model analyzes data based on user demands and interactions with service More >

  • Open Access

    ARTICLE

    A Decentralized and TCAM-Aware Failure Recovery Model in Software Defined Data Center Networks

    Suheib Alhiyari, Siti Hafizah AB Hamid*, Nur Nasuha Daud

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1087-1107, 2025, DOI:10.32604/cmc.2024.058953 - 03 January 2025

    Abstract Link failure is a critical issue in large networks and must be effectively addressed. In software-defined networks (SDN), link failure recovery schemes can be categorized into proactive and reactive approaches. Reactive schemes have longer recovery times while proactive schemes provide faster recovery but overwhelm the memory of switches by flow entries. As SDN adoption grows, ensuring efficient recovery from link failures in the data plane becomes crucial. In particular, data center networks (DCNs) demand rapid recovery times and efficient resource utilization to meet carrier-grade requirements. This paper proposes an efficient Decentralized Failure Recovery (DFR) model… More >

  • Open Access

    ARTICLE

    PD-YOLO: Colon Polyp Detection Model Based on Enhanced Small-Target Feature Extraction

    Yicong Yu1,2, Kaixin Lin1, Jiajun Hong1, Rong-Guei Tsai3,*, Yuanzhi Huang1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 913-928, 2025, DOI:10.32604/cmc.2024.058467 - 03 January 2025

    Abstract In recent years, the number of patients with colon disease has increased significantly. Colon polyps are the precursor lesions of colon cancer. If not diagnosed in time, they can easily develop into colon cancer, posing a serious threat to patients’ lives and health. A colonoscopy is an important means of detecting colon polyps. However, in polyp imaging, due to the large differences and diverse types of polyps in size, shape, color, etc., traditional detection methods face the problem of high false positive rates, which creates problems for doctors during the diagnosis process. In order to… More >

  • Open Access

    ARTICLE

    Collaborative Trajectory Planning for Stereoscopic Agricultural Multi-UAVs Driven by the Aquila Optimizer

    Xinyu Liu#, Longfei Wang#, Yuxin Ma, Peng Shao*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1349-1376, 2025, DOI:10.32604/cmc.2024.058294 - 03 January 2025

    Abstract Stereoscopic agriculture, as an advanced method of agricultural production, poses new challenges for multi-task trajectory planning of unmanned aerial vehicles (UAVs). To address the need for UAVs to perform multi-task trajectory planning in stereoscopic agriculture, a multi-task trajectory planning model and algorithm (IEP-AO) that synthesizes flight safety and flight efficiency is proposed. Based on the requirements of stereoscopic agricultural geomorphological features and operational characteristics, the multi-task trajectory planning model is ensured by constructing targeted constraints at five aspects, including the path, slope, altitude, corner, energy and obstacle threat, to improve the effectiveness of the trajectory… More >

Displaying 1-10 on page 1 of 4833. Per Page