Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,499)
  • Open Access

    ARTICLE

    ADCP-YOLO: A High-Precision and Lightweight Model for Violation Behavior Detection in Smart Factory Workshops

    Changjun Zhou1, Dongfang Chen1, Chenyang Shi1, Taiyong Li2,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073662 - 12 January 2026

    Abstract With the rapid development of smart manufacturing, intelligent safety monitoring in industrial workshops has become increasingly important. To address the challenges of complex backgrounds, target scale variation, and excessive model parameters in worker violation detection, this study proposes ADCP-YOLO, an enhanced lightweight model based on YOLOv8. Here, “ADCP” represents four key improvements: Alterable Kernel Convolution (AKConv), Dilated-Wise Residual (DWR) module, Channel Reconstruction Global Attention Mechanism (CRGAM), and Powerful-IoU loss. These components collaboratively enhance feature extraction, multi-scale perception, and localization accuracy while effectively reducing model complexity and computational cost. Experimental results show that ADCP-YOLO achieves a More >

  • Open Access

    ARTICLE

    LUAR: Lightweight and Universal Attribute Revocation Mechanism with SGX Assistance towards Applicable ABE Systems

    Fei Tang1,*, Ping Wang1, Jiang Yu1, Huihui Zhu1, Mengxue Qin1, Ling Yang2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073423 - 12 January 2026

    Abstract Attribute-Based Encryption (ABE) has emerged as a fundamental access control mechanism in data sharing, enabling data owners to define flexible access policies. A critical aspect of ABE is key revocation, which plays a pivotal role in maintaining security. However, existing key revocation mechanisms face two major challenges: (1) High overhead due to ciphertext and key updates, primarily stemming from the reliance on revocation lists during attribute revocation, which increases computation and communication costs. (2) Limited universality, as many attribute revocation mechanisms are tailored to specific ABE constructions, restricting their broader applicability. To address these challenges,… More >

  • Open Access

    ARTICLE

    A TimeXer-Based Numerical Forecast Correction Model Optimized by an Exogenous-Variable Attention Mechanism

    Yongmei Zhang*, Tianxin Zhang, Linghua Tian

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073159 - 12 January 2026

    Abstract Marine forecasting is critical for navigation safety and disaster prevention. However, traditional ocean numerical forecasting models are often limited by substantial errors and inadequate capture of temporal-spatial features. To address the limitations, the paper proposes a TimeXer-based numerical forecast correction model optimized by an exogenous-variable attention mechanism. The model treats target forecast values as internal variables, and incorporates historical temporal-spatial data and seven-day numerical forecast results from traditional models as external variables based on the embedding strategy of TimeXer. Using a self-attention structure, the model captures correlations between exogenous variables and target sequences, explores intrinsic More >

  • Open Access

    ARTICLE

    Advanced Video Processing and Data Transmission Technology for Unmanned Ground Vehicles in the Internet of Battlefield Things (loBT)

    Tai Liu1,2, Mao Ye2,*, Feng Wu3, Chao Zhu2, Bo Chen2, Guoyan Zhang1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072692 - 12 January 2026

    Abstract With the continuous advancement of unmanned technology in various application domains, the development and deployment of blind-spot-free panoramic video systems have gained increasing importance. Such systems are particularly critical in battlefield environments, where advanced panoramic video processing and wireless communication technologies are essential to enable remote control and autonomous operation of unmanned ground vehicles (UGVs). However, conventional video surveillance systems suffer from several limitations, including limited field of view, high processing latency, low reliability, excessive resource consumption, and significant transmission delays. These shortcomings impede the widespread adoption of UGVs in battlefield settings. To overcome these… More >

  • Open Access

    ARTICLE

    Research on Deformation Mechanism of Rolled AZ31B Magnesium Alloy during Tension by VPSC Model Computational Simulation

    Xun Chen1, Jinbao Lin1,2,*, Zai Wang1

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072495 - 12 January 2026

    Abstract This work investigates the effects of deformation mechanisms on the mechanical properties and anisotropy of rolled AZ31B magnesium alloy under uniaxial tension, combining experimental characterization with Visco-Plastic Self Consistent (VPSC) modeling. The research focuses particularly on anisotropic mechanical responses along transverse direction (TD) and rolling direction (RD). Experimental measurements and computational simulations consistently demonstrate that prismatic <a> slip activation significantly reduces the strain hardening rate during the initial stage of tensile deformation. By suppressing the activation of specific deformation mechanisms along RD and TD, the tensile mechanical behavior of the magnesium alloy was further investigated. More >

  • Open Access

    ARTICLE

    Secured-FL: Blockchain-Based Defense against Adversarial Attacks on Federated Learning Models

    Bello Musa Yakubu1,*, Nor Shahida Mohd Jamail 2, Rabia Latif 2, Seemab Latif 3

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072426 - 12 January 2026

    Abstract Federated Learning (FL) enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection. This work proposes Secured-FL, a blockchain-based defensive framework that combines smart contract–based authentication, clustering-driven outlier elimination, and dynamic threshold adjustment to defend against adversarial attacks. The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates. Large-scale simulation on the Cyber Data dataset, under up to 50% malicious client settings, demonstrates Secured-FL achieves 6%–12% higher accuracy, More >

  • Open Access

    ARTICLE

    Visual Detection Algorithms for Counter-UAV in Low-Altitude Air Defense

    Minghui Li1, Hongbo Li1,*, Jiaqi Zhu2, Xupeng Zhang1

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072406 - 12 January 2026

    Abstract To address the challenge of real-time detection of unauthorized drone intrusions in complex low-altitude urban environments such as parks and airports, this paper proposes an enhanced MBS-YOLO (Multi-Branch Small Target Detection YOLO) model for anti-drone object detection, based on the YOLOv8 architecture. To overcome the limitations of existing methods in detecting small objects within complex backgrounds, we designed a C2f-Pu module with excellent feature extraction capability and a more compact parameter set, aiming to reduce the model’s computational complexity. To improve multi-scale feature fusion, we construct a Multi-Branch Feature Pyramid Network (MB-FPN) that employs a… More >

  • Open Access

    ARTICLE

    Steel Surface Defect Detection via the Multiscale Edge Enhancement Method

    Yuanyuan Wang1,*, Yemeng Zhu1, Xiuchuan Chen1, Tongtong Yin1, Shiwei Su2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072404 - 12 January 2026

    Abstract To solve the false detection and missed detection problems caused by various types and sizes of defects in the detection of steel surface defects, similar defects and background features, and similarities between different defects, this paper proposes a lightweight detection model named multiscale edge and squeeze-and-excitation attention detection network (MSESE), which is built upon the You Only Look Once version 11 nano (YOLOv11n). To address the difficulty of locating defect edges, we first propose an edge enhancement module (EEM), apply it to the process of multiscale feature extraction, and then propose a multiscale edge enhancement… More >

  • Open Access

    ARTICLE

    Domain-Aware Transformer for Multi-Domain Neural Machine Translation

    Shuangqing Song1, Yuan Chen2, Xuguang Hu1, Juwei Zhang1,3,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072392 - 12 January 2026

    Abstract In multi-domain neural machine translation tasks, the disparity in data distribution between domains poses significant challenges in distinguishing domain features and sharing parameters across domains. This paper proposes a Transformer-based multi-domain-aware mixture of experts model. To address the problem of domain feature differentiation, a mixture of experts (MoE) is introduced into attention to enhance the domain perception ability of the model, thereby improving the domain feature differentiation. To address the trade-off between domain feature distinction and cross-domain parameter sharing, we propose a domain-aware mixture of experts (DMoE). A domain-aware gating mechanism is introduced within the… More >

  • Open Access

    ARTICLE

    From Budget-Aware Preferences to Optimal Composition: A Dual-Stage Framework for Wireless Energy Service Optimization

    Haotian Zhang, Jing Li*, Ming Zhu, Zhiyong Zhao, Hongli Su, Liming Sun

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072381 - 12 January 2026

    Abstract In the wireless energy transmission service composition optimization problem, a key challenge is accurately capturing users’ preferences for service criteria under complex influencing factors, and optimally selecting a composition solution under their budget constraints. Existing studies typically evaluate satisfaction solely based on energy transmission capacity, while overlooking critical factors such as price and trustworthiness of the provider, leading to a mismatch between optimization outcomes and user needs. To address this gap, we construct a user satisfaction evaluation model for multi-user and multi-provider scenarios, systematically incorporating service price, transmission capacity, and trustworthiness into the satisfaction assessment… More >

Displaying 1-10 on page 1 of 3499. Per Page