Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    FMCSNet: Mobile Devices-Oriented Lightweight Multi-Scale Object Detection via Fast Multi-Scale Channel Shuffling Network Model

    Lijuan Huang1, Xianyi Liu2, Jinping Liu2,*, Pengfei Xu2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068818 - 10 November 2025

    Abstract The ubiquity of mobile devices has driven advancements in mobile object detection. However, challenges in multi-scale object detection in open, complex environments persist due to limited computational resources. Traditional approaches like network compression, quantization, and lightweight design often sacrifice accuracy or feature representation robustness. This article introduces the Fast Multi-scale Channel Shuffling Network (FMCSNet), a novel lightweight detection model optimized for mobile devices. FMCSNet integrates a fully convolutional Multilayer Perceptron (MLP) module, offering global perception without significantly increasing parameters, effectively bridging the gap between CNNs and Vision Transformers. FMCSNet achieves a delicate balance between computation… More >

  • Open Access

    ARTICLE

    Leveraging Edge Optimize Vision Transformer for Monkeypox Lesion Diagnosis on Mobile Devices

    Poonam Sharma1, Bhisham Sharma2,*, Dhirendra Prasad Yadav3, Surbhi Bhatia Khan4,5,6,*, Ahlam Almusharraf7

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3227-3245, 2025, DOI:10.32604/cmc.2025.062376 - 16 April 2025

    Abstract Rapid and precise diagnostic tools for Monkeypox (Mpox) lesions are crucial for effective treatment because their symptoms are similar to those of other pox-related illnesses, like smallpox and chickenpox. The morphological similarities between smallpox, chickenpox, and monkeypox, particularly in how they appear as rashes and skin lesions, which can sometimes make diagnosis challenging. Chickenpox lesions appear in many simultaneous phases and are more diffuse, often beginning on the trunk. In contrast, monkeypox lesions emerge progressively and are typically centralized on the face, palms, and soles. To provide accessible diagnostics, this study introduces a novel method… More >

  • Open Access

    ARTICLE

    Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images

    Roseline Oluwaseun Ogundokun1,2, Joseph Bamidele Awotunde3, Hakeem Babalola Akande4, Cheng-Chi Lee5,6,*, Agbotiname Lucky Imoize7,8

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 139-161, 2024, DOI:10.32604/cmc.2024.052153 - 18 July 2024

    Abstract Mobile technology is developing significantly. Mobile phone technologies have been integrated into the healthcare industry to help medical practitioners. Typically, computer vision models focus on image detection and classification issues. MobileNetV2 is a computer vision model that performs well on mobile devices, but it requires cloud services to process biometric image information and provide predictions to users. This leads to increased latency. Processing biometrics image datasets on mobile devices will make the prediction faster, but mobiles are resource-restricted devices in terms of storage, power, and computational speed. Hence, a model that is small in size,… More >

  • Open Access

    REVIEW

    Biometric Authentication System on Mobile Environment: A Review

    Qasem Abu Al-Haija1,*, Sara Othman Al-Salameen2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 897-914, 2024, DOI:10.32604/csse.2024.050846 - 17 July 2024

    Abstract The paper discusses the importance of biometric verification systems in mobile environments and highlights the challenges and strategies used to overcome them in order to ensure the security of mobile devices. Emphasis is placed on evaluating the impact of illumination on the performance of biometric verification techniques and how to address this challenge using image processing techniques. The importance of accurate and reliable data collection to ensure the accuracy of verification processes is also discussed. The paper also highlights the importance of improving biometric verification techniques and directing research toward developing models aimed at reducing More >

  • Open Access

    ARTICLE

    Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications

    Li-Woei Chen1, Kun-Lin Tsai2,*, Fang-Yie Leu3, Wen-Cheng Jiang2, Shih-Ting Tseng2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2779-2794, 2024, DOI:10.32604/cmes.2024.052124 - 08 July 2024

    Abstract Various mobile devices and applications are now used in daily life. These devices require high-speed data processing, low energy consumption, low communication latency, and secure data transmission, especially in 5G and 6G mobile networks. High-security cryptography guarantees that essential data can be transmitted securely; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE) algorithm based on the Advanced Encryption Standard (AES) for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things (IoT) devices. In the proposed LEDE algorithm, the system time More >

  • Open Access

    ARTICLE

    Time and Space Efficient Multi-Model Convolution Vision Transformer for Tomato Disease Detection from Leaf Images with Varied Backgrounds

    Ankita Gangwar1, Vijaypal Singh Dhaka1, Geeta Rani2,*, Shrey Khandelwal1, Ester Zumpano3,4, Eugenio Vocaturo3,4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 117-142, 2024, DOI:10.32604/cmc.2024.048119 - 25 April 2024

    Abstract A consumption of 46.9 million tons of processed tomatoes was reported in 2022 which is merely 20% of the total consumption. An increase of 3.3% in consumption is predicted from 2024 to 2032. Tomatoes are also rich in iron, potassium, antioxidant lycopene, vitamins A, C and K which are important for preventing cancer, and maintaining blood pressure and glucose levels. Thus, tomatoes are globally important due to their widespread usage and nutritional value. To face the high demand for tomatoes, it is mandatory to investigate the causes of crop loss and minimize them. Diseases are… More >

  • Open Access

    ARTICLE

    Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

    Christy James Jose1,*, M. S. Rajasree2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1357-1372, 2023, DOI:10.32604/csse.2023.025672 - 15 June 2022

    Abstract The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’ identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s… More >

  • Open Access

    ARTICLE

    Mobile Devices Interface Adaptivity Using Ontologies

    Muhammad Waseem Iqbal1, Muhammad Raza Naqvi2, Muhammad Adnan Khan3,4, Faheem Khan5, T. Whangbo5,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4767-4784, 2022, DOI:10.32604/cmc.2022.023239 - 14 January 2022

    Abstract Currently, many mobile devices provide various interaction styles and modes which create complexity in the usage of interfaces. The context offers the information base for the development of Adaptive user interface (AUI) frameworks to overcome the heterogeneity. For this purpose, the ontological modeling has been made for specific context and environment. This type of philosophy states to the relationship among elements (e.g., classes, relations, or capacities etc.) with understandable satisfied representation. The context mechanisms can be examined and understood by any machine or computational framework with these formal definitions expressed in Web ontology language (WOL)/Resource… More >

  • Open Access

    ARTICLE

    Integrated Approach to Detect Cyberbullying Text: Mobile Device Forensics Data

    G. Maria Jones1,*, S. Godfrey Winster2, P. Valarmathie3

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 963-978, 2022, DOI:10.32604/csse.2022.019483 - 24 September 2021

    Abstract Mobile devices and social networks provide communication opportunities among the young generation, which increases vulnerability and cybercrimes activities. A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among youngsters. This paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics toolkit. We describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying detection. We use forensics techniques, Machine Learning (ML), and Deep Learning More >

  • Open Access

    ARTICLE

    Multi-Floor Indoor Trajectory Reconstruction Using Mobile Devices

    Sultan Alamri1,*, Kartini Nurfalah2, Kiki Adhinugraha3

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.3, pp. 927-948, 2021, DOI:10.32604/cmes.2021.014852 - 11 August 2021

    Abstract An indoor trajectory is the path of an object moving through corridors and stairs inside a building. There are various types of technologies that can be used to reconstruct the path of a moving object and detect its position. GPS has been used for reconstruction in outdoor environments, but for indoor environments, mobile devices with embedded sensors are used. An accelerometer sensor and a magnetometer sensor are used to detect human movement and reconstruct the trajectory on a single floor. In an indoor environment, there are many activities that will create the trajectory similar to… More >

Displaying 1-10 on page 1 of 13. Per Page