Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (123)
  • Open Access

    ARTICLE

    Active Defense Method for Network Hopping Based on Dynamic Random Graph

    Zhu Fang1,2,*, Zhengquan Xu1,2, Weizhen He3, Bohao Xu3

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076043 - 09 April 2026

    Abstract In view of the problem that the IP address jump law is easy to predict in the current mobile target defense, this paper proposes a network address jump active defense method based on a dynamic random graph, designed to improve the unpredictability of IP address translation. Firstly, in order to make IP address transformation unpredictable in space and time, a random graph model is designed to generate a pseudo-random sequence of IP address randomization; these pseudo-random can meet the unpredictability of IP address translation in both space and time. Then, based on these pseudo-random sequences… More >

  • Open Access

    ARTICLE

    Enhancing Underwater Optical Wireless Communication with a High Efficiency Image Encryption System

    Somia A. Abd El-Mottaleb1, Amira G. Mohamed2, Mehtab Singh3, Hassan Yousif Ahmed4, Medien Zeghid4, Abu Sufian A. Osman5,*, Sami Mourou5

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.075669 - 12 March 2026

    Abstract This paper presents an image encryption scheme for underwater optical wireless communication (UOWC) systems based on dynamically generated hyperchaotic S-boxes, aiming to enhance both data security and transmission performance in underwater environments. The proposed encryption approach provides strong confusion and diffusion properties and is evaluated over five Jerlov water types with different optical attenuation characteristics. Security analysis demonstrates that the encrypted images achieve information entropy values close to the ideal value of 8 (7.9925–7.9993), with very low correlation coefficients in horizontal, vertical, and diagonal directions, as well as the system achieves high values in key… More >

  • Open Access

    ARTICLE

    Multilevel Military Image Encryption Based on Tri-Independent Keying Approach

    Shereen S. Jumaa1, Mohsin H. Challoob2, Amjad J. Humaidi2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074752 - 10 February 2026

    Abstract Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access. This paper proposes a new Tri-independent keying method for encrypting military images. The proposed encryption method is based on multilevel security stages of pixel-level scrambling, bit-level manipulation, and block-level shuffling operations. For having a vast key space, the input password is hashed by the Secure Hash Algorithm 256-bit (SHA-256) for generating independently deterministic keys used in the multilevel stages. A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive… More >

  • Open Access

    ARTICLE

    Improved Cuckoo Search Algorithm for Engineering Optimization Problems

    Shao-Qiang Ye*, Azlan Mohd Zain, Yusliza Yusoff

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073411 - 10 February 2026

    Abstract Engineering optimization problems are often characterized by high dimensionality, constraints, and complex, multimodal landscapes. Traditional deterministic methods frequently struggle under such conditions, prompting increased interest in swarm intelligence algorithms. Among these, the Cuckoo Search (CS) algorithm stands out for its promising global search capabilities. However, it often suffers from premature convergence when tackling complex problems. To address this limitation, this paper proposes a Grouped Dynamic Adaptive CS (GDACS) algorithm. The enhancements incorporated into GDACS can be summarized into two key aspects. Firstly, a chaotic map is employed to generate initial solutions, leveraging the inherent randomness… More >

  • Open Access

    ARTICLE

    A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix

    Hongyu Zhao1,2, Shengsheng Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.068426 - 10 November 2025

    Abstract Driven by advancements in mobile internet technology, images have become a crucial data medium. Ensuring the security of image information during transmission has thus emerged as an urgent challenge. This study proposes a novel image encryption algorithm specifically designed for grayscale image security. This research introduces a new Cantor diagonal matrix permutation method. The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix, where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice (CML). The high initial value sensitivity of the… More >

  • Open Access

    ARTICLE

    CEOE-Net: Chaotic Evolution Algorithm-Based Optimized Ensemble Framework Enhanced with Dual-Attention for Alzheimer’s Diagnosis

    Huihui Yang1, Saif Ur Rehman Khan2,*, Omair Bilal2, Chao Chen1,*, Ming Zhao2

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2401-2434, 2025, DOI:10.32604/cmes.2025.072148 - 26 November 2025

    Abstract Detecting Alzheimer’s disease is essential for patient care, as an accurate diagnosis influences treatment options. Classifying dementia from non-dementia in brain MRIs is challenging due to features such as hippocampal atrophy, while manual diagnosis is susceptible to error. Optimal computer-aided diagnosis (CAD) systems are essential for improving accuracy and reducing misclassification risks. This study proposes an optimized ensemble method (CEOE-Net) that initiates with the selection of pre-trained models, including DenseNet121, ResNet50V2, and ResNet152V2 for unique feature extraction. Each selected model is enhanced with the inclusion of a channel attention (CA) block to improve the feature… More >

  • Open Access

    ARTICLE

    Secure and Invisible Dual Watermarking for Digital Content Based on Optimized Octonion Moments and Chaotic Metaheuristics

    Ahmed El Maloufy, Mohamed Amine Tahiri, Ahmed Bencherqui, Hicham Karmouni, Mhamed Sayyouri*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5789-5822, 2025, DOI:10.32604/cmc.2025.068885 - 23 October 2025

    Abstract In the current digital context, safeguarding copyright is a major issue, particularly for architectural drawings produced by students. These works are frequently the result of innovative academic thinking combining creativity and technical precision. They are particularly vulnerable to the risk of illegal reproduction when disseminated in digital format. This research suggests, for the first time, an innovative approach to copyright protection by embedding a double digital watermark to address this challenge. The solution relies on a synergistic fusion of several sophisticated methods: Krawtchouk Optimized Octonion Moments (OKOM), Quaternion Singular Value Decomposition (QSVD), and Discrete Waveform… More >

  • Open Access

    ARTICLE

    Sine-Polynomial Chaotic Map (SPCM): A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks

    David S. Bhatti1,*, Annas W. Malik2, Haeung Choi1, Ki-Il Kim3,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2157-2177, 2025, DOI:10.32604/cmc.2025.068360 - 29 August 2025

    Abstract Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies, limiting their use for lightweight, secure image encryption in resource-constrained Wireless Sensor Networks (WSNs). We propose the SPCM, a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions, leveraging a piecewise function to achieve a broad chaotic range () and a high Lyapunov exponent (5.04). Validated through nine benchmarks, including standard randomness tests, Diehard tests, and Shannon entropy (3.883), SPCM demonstrates superior randomness and high sensitivity to initial conditions. Applied to image encryption, SPCM achieves 0.152582 s (39% faster than some techniques) and 433.42 More >

  • Open Access

    ARTICLE

    Adaptive Multi-Learning Cooperation Search Algorithm for Photovoltaic Model Parameter Identification

    Xu Chen1,*, Shuai Wang1, Kaixun He2

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1779-1806, 2025, DOI:10.32604/cmc.2025.066543 - 29 August 2025

    Abstract Accurate and reliable photovoltaic (PV) modeling is crucial for the performance evaluation, control, and optimization of PV systems. However, existing methods for PV parameter identification often suffer from limitations in accuracy and efficiency. To address these challenges, we propose an adaptive multi-learning cooperation search algorithm (AMLCSA) for efficient identification of unknown parameters in PV models. AMLCSA is a novel algorithm inspired by teamwork behaviors in modern enterprises. It enhances the original cooperation search algorithm in two key aspects: (i) an adaptive multi-learning strategy that dynamically adjusts search ranges using adaptive weights, allowing better individuals to More >

  • Open Access

    ARTICLE

    Wave Propagation and Chaotic Behavior in Conservative and Dissipative Sawada–Kotera Models

    Nikolai A. Magnitskii*

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.7, pp. 1529-1544, 2025, DOI:10.32604/fdmp.2025.067021 - 31 July 2025

    Abstract This paper presents both analytical and numerical studies of the conservative Sawada–Kotera equation and its dissipative generalization, equations known for their soliton solutions and rich chaotic dynamics. These models offer valuable insights into nonlinear wave propagation, with applications in fluid dynamics and materials science, including systems such as liquid crystals and ferrofluids. It is shown that the conservative Sawada–Kotera equation supports traveling wave solutions corresponding to elliptic limit cycles, as well as two- and three-dimensional invariant tori surrounding these cycles in the associated ordinary differential equation (ODE) system. For the dissipative generalized Sawada–Kotera equation, chaotic More >

Displaying 1-10 on page 1 of 123. Per Page