Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,842)
  • Open Access

    ARTICLE

    Enhancing Healthcare Data Privacy in Cloud IoT Networks Using Anomaly Detection and Optimization with Explainable AI (ExAI)

    Jitendra Kumar Samriya1, Virendra Singh2, Gourav Bathla3, Meena Malik4, Varsha Arya5,6, Wadee Alhalabi7, Brij B. Gupta8,9,10,11,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3893-3910, 2025, DOI:10.32604/cmc.2025.063242 - 03 July 2025

    Abstract The integration of the Internet of Things (IoT) into healthcare systems improves patient care, boosts operational efficiency, and contributes to cost-effective healthcare delivery. However, overcoming several associated challenges, such as data security, interoperability, and ethical concerns, is crucial to realizing the full potential of IoT in healthcare. Real-time anomaly detection plays a key role in protecting patient data and maintaining device integrity amidst the additional security risks posed by interconnected systems. In this context, this paper presents a novel method for healthcare data privacy analysis. The technique is based on the identification of anomalies in… More >

  • Open Access

    ARTICLE

    An Integrated Perception Model for Predicting and Analyzing Urban Rail Transit Emergencies Based on Unstructured Data

    Liang Mu1, Yurui Kang1, Zixu Yan1, Guangyu Zhu2,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2495-2512, 2025, DOI:10.32604/cmc.2025.063208 - 03 July 2025

    Abstract The accurate prediction and analysis of emergencies in Urban Rail Transit Systems (URTS) are essential for the development of effective early warning and prevention mechanisms. This study presents an integrated perception model designed to predict emergencies and analyze their causes based on historical unstructured emergency data. To address issues related to data structuredness and missing values, we employed label encoding and an Elastic Net Regularization-based Generative Adversarial Interpolation Network (ER-GAIN) for data structuring and imputation. Additionally, to mitigate the impact of imbalanced data on the predictive performance of emergencies, we introduced an Adaptive Boosting Ensemble… More >

  • Open Access

    ARTICLE

    Explainable Diabetic Retinopathy Detection Using a Distributed CNN and LightGBM Framework

    Pooja Bidwai1,2, Shilpa Gite1,3, Biswajeet Pradhan4,*, Abdullah Almari5

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2645-2676, 2025, DOI:10.32604/cmc.2025.061018 - 03 July 2025

    Abstract Diabetic Retinopathy (DR) is a critical disorder that affects the retina due to the constant rise in diabetics and remains the major cause of blindness across the world. Early detection and timely treatment are essential to mitigate the effects of DR, such as retinal damage and vision impairment. Several conventional approaches have been proposed to detect DR early and accurately, but they are limited by data imbalance, interpretability, overfitting, convergence time, and other issues. To address these drawbacks and improve DR detection accurately, a distributed Explainable Convolutional Neural network-enabled Light Gradient Boosting Machine (DE-ExLNN) is… More >

  • Open Access

    ARTICLE

    Leveraging the WFD2020 Dataset for Multi-Class Detection of Wheat Fungal Diseases with YOLOv8 and Faster R-CNN

    Shivani Sood1, Harjeet Singh2,*, Surbhi Bhatia Khan3,4,5,*, Ahlam Almusharraf6

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2751-2787, 2025, DOI:10.32604/cmc.2025.060185 - 03 July 2025

    Abstract Wheat fungal infections pose a danger to the grain quality and crop productivity. Thus, prompt and precise diagnosis is essential for efficient crop management. This study used the WFD2020 image dataset, which is available to everyone, to look into how deep learning models could be used to find powdery mildew, leaf rust, and yellow rust, which are three common fungal diseases in Punjab, India. We changed a few hyperparameters to test TensorFlow-based models, such as SSD and Faster R-CNN with ResNet50, ResNet101, and ResNet152 as backbones. Faster R-CNN with ResNet50 achieved a mean average precision More >

  • Open Access

    ARTICLE

    Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security

    Sunil K. Singh1, Sudhakar Kumar1,*, Manraj Singh1, Savita Gupta2, Razaz Waheeb Attar3, Varsha Arya4,5, Ahmed Alhomoud6, Brij B. Gupta7,8,9

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3927-3941, 2025, DOI:10.32604/cmc.2025.059643 - 03 July 2025

    Abstract As quantum computing continues to advance, traditional cryptographic methods are increasingly challenged, particularly when it comes to securing critical systems like Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential for monitoring and controlling industrial operations, making their security paramount. A key threat arises from Shor’s algorithm, a powerful quantum computing tool that can compromise current hash functions, leading to significant concerns about data integrity and confidentiality. To tackle these issues, this article introduces a novel Quantum-Resistant Hash Algorithm (QRHA) known as the Modular Hash Learning Algorithm (MHLA). This algorithm is meticulously crafted… More >

  • Open Access

    ARTICLE

    Data-Driven Digital Evidence Analysis for the Forensic Investigation of the Electric Vehicle Charging Infrastructure

    Dong-Hyuk Shin1, Jae-Jun Ha1, Ieck-Chae Euom2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3795-3838, 2025, DOI:10.32604/cmes.2025.066727 - 30 June 2025

    Abstract The accelerated global adoption of electric vehicles (EVs) is driving significant expansion and increasing complexity within the EV charging infrastructure, consequently presenting novel and pressing cybersecurity challenges. While considerable effort has focused on preventative cybersecurity measures, a critical deficiency persists in structured methodologies for digital forensic analysis following security incidents, a gap exacerbated by system heterogeneity, distributed digital evidence, and inconsistent logging practices which hinder effective incident reconstruction and attribution. This paper addresses this critical need by proposing a novel, data-driven forensic framework tailored to the EV charging infrastructure, focusing on the systematic identification, classification,… More >

  • Open Access

    ARTICLE

    Enhancing IoT Resilience at the Edge: A Resource-Efficient Framework for Real-Time Anomaly Detection in Streaming Data

    Kirubavathi G.1,*, Arjun Pulliyasseri1, Aswathi Rajesh1, Amal Ajayan1, Sultan Alfarhood2,*, Mejdl Safran2, Meshal Alfarhood2, Jungpil Shin3

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3005-3031, 2025, DOI:10.32604/cmes.2025.065698 - 30 June 2025

    Abstract The exponential expansion of the Internet of Things (IoT), Industrial Internet of Things (IIoT), and Transportation Management of Things (TMoT) produces vast amounts of real-time streaming data. Ensuring system dependability, operational efficiency, and security depends on the identification of anomalies in these dynamic and resource-constrained systems. Due to their high computational requirements and inability to efficiently process continuous data streams, traditional anomaly detection techniques often fail in IoT systems. This work presents a resource-efficient adaptive anomaly detection model for real-time streaming data in IoT systems. Extensive experiments were carried out on multiple real-world datasets, achieving… More >

  • Open Access

    REVIEW

    A Comprehensive Review of Face Detection Techniques for Occluded Faces: Methods, Datasets, and Open Challenges

    Thaer Thaher1,*, Majdi Mafarja2, Muhammed Saffarini3, Abdul Hakim H. M. Mohamed4, Ayman A. El-Saleh5

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 2615-2673, 2025, DOI:10.32604/cmes.2025.064857 - 30 June 2025

    Abstract Detecting faces under occlusion remains a significant challenge in computer vision due to variations caused by masks, sunglasses, and other obstructions. Addressing this issue is crucial for applications such as surveillance, biometric authentication, and human-computer interaction. This paper provides a comprehensive review of face detection techniques developed to handle occluded faces. Studies are categorized into four main approaches: feature-based, machine learning-based, deep learning-based, and hybrid methods. We analyzed state-of-the-art studies within each category, examining their methodologies, strengths, and limitations based on widely used benchmark datasets, highlighting their adaptability to partial and severe occlusions. The review… More >

  • Open Access

    ARTICLE

    Lightweight Deep Learning Model and Novel Dataset for Restoring Damaged Barcodes and QR Codes in Logistics Applications

    Tarek Muallim1, Haluk Kucuk2,*, Muhammet Bareket1, Metin Kahraman1

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3557-3581, 2025, DOI:10.32604/cmes.2025.064733 - 30 June 2025

    Abstract This study introduces a lightweight deep learning model and a novel synthetic dataset designed to restore damaged one-dimensional (1D) barcodes and Quick Response (QR) codes, addressing critical challenges in logistics operations. The proposed solution leverages an efficient Pix2Pix-based framework, a type of conditional Generative Adversarial Network (GAN) optimized for image-to-image translation tasks, enabling the recovery of degraded barcodes and QR codes with minimal computational overhead. A core contribution of this work is the development of a synthetic dataset that simulates realistic damage scenarios frequently encountered in logistics environments, such as low contrast, misalignment, physical wear,… More >

  • Open Access

    ARTICLE

    Methods for the Segmentation of Reticular Structures Using 3D LiDAR Data: A Comparative Evaluation

    Francisco J. Soler Mora1,*, Adrián Peidró Vidal1, Marc Fabregat-Jaén1, Luis Payá Castelló1,2, Óscar Reinoso García 1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3167-3195, 2025, DOI:10.32604/cmes.2025.064510 - 30 June 2025

    Abstract Reticular structures are the basis of major infrastructure projects, including bridges, electrical pylons and airports. However, inspecting and maintaining these structures is both expensive and hazardous, traditionally requiring human involvement. While some research has been conducted in this field of study, most efforts focus on faults identification through images or the design of robotic platforms, often neglecting the autonomous navigation of robots through the structure. This study addresses this limitation by proposing methods to detect navigable surfaces in truss structures, thereby enhancing the autonomous capabilities of climbing robots to navigate through these environments. The paper… More >

Displaying 11-20 on page 2 of 1842. Per Page