Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (27)
  • Open Access

    REVIEW

    A Comprehensive Systematic Review: Advancements in Skin Cancer Classification and Segmentation Using the ISIC Dataset

    Madiha Hameed1,3, Aneela Zameer1,*, Muhammad Asif Zahoor Raja2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2131-2164, 2024, DOI:10.32604/cmes.2024.050124

    Abstract The International Skin Imaging Collaboration (ISIC) datasets are pivotal resources for researchers in machine learning for medical image analysis, especially in skin cancer detection. These datasets contain tens of thousands of dermoscopic photographs, each accompanied by gold-standard lesion diagnosis metadata. Annual challenges associated with ISIC datasets have spurred significant advancements, with research papers reporting metrics surpassing those of human experts. Skin cancers are categorized into melanoma and non-melanoma types, with melanoma posing a greater threat due to its rapid potential for metastasis if left untreated. This paper aims to address challenges in skin cancer detection… More >

  • Open Access

    ARTICLE

    A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain

    Chunhui Li1,*, Hua Jiang2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4491-4512, 2024, DOI:10.32604/cmc.2024.048431

    Abstract In the context of enterprise systems, intrusion detection (ID) emerges as a critical element driving the digital transformation of enterprises. With systems spanning various sectors of enterprises geographically dispersed, the necessity for seamless information exchange has surged significantly. The existing cross-domain solutions are challenged by such issues as insufficient security, high communication overhead, and a lack of effective update mechanisms, rendering them less feasible for prolonged application on resource-limited devices. This study proposes a new cross-domain collaboration scheme based on federated chains to streamline the server-side workload. Within this framework, individual nodes solely engage in… More >

  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu1,2, Xiao Zhang1,2,3,*, Jinjiang Wang1,2, Yuchen Zhang1,2, Yulong Shi1,2, Linxuan Su1,2, Leijie Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2159-2179, 2024, DOI:10.32604/cmc.2024.047340

    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage… More >

  • Open Access

    ARTICLE

    Multi-Stream Temporally Enhanced Network for Video Salient Object Detection

    Dan Xu*, Jiale Ru, Jinlong Shi

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 85-104, 2024, DOI:10.32604/cmc.2023.045258

    Abstract Video salient object detection (VSOD) aims at locating the most attractive objects in a video by exploring the spatial and temporal features. VSOD poses a challenging task in computer vision, as it involves processing complex spatial data that is also influenced by temporal dynamics. Despite the progress made in existing VSOD models, they still struggle in scenes of great background diversity within and between frames. Additionally, they encounter difficulties related to accumulated noise and high time consumption during the extraction of temporal features over a long-term duration. We propose a multi-stream temporal enhanced network (MSTENet)… More >

  • Open Access

    ARTICLE

    BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks

    Fengting Luo, Ruwei Huang*, Yuyue Chen

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1815-1835, 2023, DOI:10.32604/cmc.2023.041676

    Abstract Smart parks serve as integral components of smart cities, where they play a pivotal role in the process of urban modernization. The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase. To ensure secure communication, device identities must undergo authentication. The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices, making it impractical for resource-constrained devices. This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks, which simplifies the authentication interaction and requires every device to More >

  • Open Access

    ARTICLE

    Satellite-Air-Terrestrial Cloud Edge Collaborative Networks: Architecture, Multi-Node Task Processing and Computation

    Sai Liu1, Zhenjiang Zhang1,*, Guangjie Han2, Bo Shen1

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2651-2668, 2023, DOI:10.32604/iasc.2023.038477

    Abstract Integrated satellite-terrestrial network (ISTN) has been considered a novel network architecture to achieve global three-dimensional coverage and ultra-wide area broadband access anytime and anywhere. Being a promising paradigm, cloud computing and mobile edge computing (MEC) have been identified as key technology enablers for ISTN to further improve quality of service and business continuity. However, most of the existing ISTN studies based on cloud computing and MEC regard satellite networks as relay networks, ignoring the feasibility of directly deploying cloud computing nodes and edge computing nodes on satellites. In addition, most computing tasks are transferred to… More >

  • Open Access

    ARTICLE

    Pedestrian and Vehicle Detection Based on Pruning YOLOv4 with Cloud-Edge Collaboration

    Huabin Wang1, Ruichao Mo2, Yuping Chen3, Weiwei Lin2,4,*, Minxian Xu5, Bo Liu3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 2025-2047, 2023, DOI:10.32604/cmes.2023.026910

    Abstract Nowadays, the rapid development of edge computing has driven an increasing number of deep learning applications deployed at the edge of the network, such as pedestrian and vehicle detection, to provide efficient intelligent services to mobile users. However, as the accuracy requirements continue to increase, the components of deep learning models for pedestrian and vehicle detection, such as YOLOv4, become more sophisticated and the computing resources required for model training are increasing dramatically, which in turn leads to significant challenges in achieving effective deployment on resource-constrained edge devices while ensuring the high accuracy performance. For… More >

  • Open Access

    ARTICLE

    Anomaly Detection and Access Control for Cloud-Edge Collaboration Networks

    Bingcheng Jiang, Qian He*, Zhongyi Zhai, Hang Su

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2335-2353, 2023, DOI:10.32604/iasc.2023.039989

    Abstract Software-defined networking (SDN) enables the separation of control and data planes, allowing for centralized control and management of the network. Without adequate access control methods, the risk of unauthorized access to the network and its resources increases significantly. This can result in various security breaches. In addition, if authorized devices are attacked or controlled by hackers, they may turn into malicious devices, which can cause severe damage to the network if their abnormal behaviour goes undetected and their access privileges are not promptly restricted. To solve those problems, an anomaly detection and access control mechanism… More >

  • Open Access

    ARTICLE

    Spatial Multi-Presence System to Increase Security Awareness for Remote Collaboration in an Extended Reality Environment

    Jun Lee1, Hyun Kwon2,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 369-384, 2023, DOI:10.32604/iasc.2023.036052

    Abstract Enhancing the sense of presence of participants is an important issue in terms of security awareness for remote collaboration in extended reality. However, conventional methods are insufficient to be aware of remote situations and to search for and control remote workspaces. This study proposes a spatial multi-presence system that simultaneously provides multiple spaces while rapidly exploring these spaces as users perform collaborative work in an extended reality environment. The proposed system provides methods for arranging and manipulating remote and personal spaces by creating an annular screen that is invisible to the user. The user can… More >

  • Open Access

    ARTICLE

    A Whale Optimization Algorithm with Distributed Collaboration and Reverse Learning Ability

    Zhedong Xu*, Yongbo Su, Fang Yang, Ming Zhang

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5965-5986, 2023, DOI:10.32604/cmc.2023.037611

    Abstract Due to the development of digital transformation, intelligent algorithms are getting more and more attention. The whale optimization algorithm (WOA) is one of swarm intelligence optimization algorithms and is widely used to solve practical engineering optimization problems. However, with the increased dimensions, higher requirements are put forward for algorithm performance. The double population whale optimization algorithm with distributed collaboration and reverse learning ability (DCRWOA) is proposed to solve the slow convergence speed and unstable search accuracy of the WOA algorithm in optimization problems. In the DCRWOA algorithm, the novel double population search strategy is constructed. More >

Displaying 1-10 on page 1 of 27. Per Page