Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (111)
  • Open Access

    REVIEW

    AI Agents in Finance and Fintech: A Scientific Review of Agent-Based Systems, Applications, and Future Horizons

    Maryan Rizinski1,2,*, Dimitar Trajanov1,2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-34, 2026, DOI:10.32604/cmc.2025.069678 - 10 November 2025

    Abstract Artificial intelligence (AI) is reshaping financial systems and services, as intelligent AI agents increasingly form the foundation of autonomous, goal-driven systems capable of reasoning, learning, and action. This review synthesizes recent research and developments in the application of AI agents across core financial domains. Specifically, it covers the deployment of agent-based AI in algorithmic trading, fraud detection, credit risk assessment, robo-advisory, and regulatory compliance (RegTech). The review focuses on advanced agent-based methodologies, including reinforcement learning, multi-agent systems, and autonomous decision-making frameworks, particularly those leveraging large language models (LLMs), contrasting these with traditional AI or purely… More >

  • Open Access

    ARTICLE

    Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning

    Misbah Anwer1,*, Ghufran Ahmed1, Maha Abdelhaq2, Raed Alsaqour3, Shahid Hussain4, Adnan Akhunzada5,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068673 - 10 November 2025

    Abstract The exponential growth of the Internet of Things (IoT) has introduced significant security challenges, with zero-day attacks emerging as one of the most critical and challenging threats. Traditional Machine Learning (ML) and Deep Learning (DL) techniques have demonstrated promising early detection capabilities. However, their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints, high computational costs, and the costly time-intensive process of data labeling. To address these challenges, this study proposes a Federated Learning (FL) framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in… More >

  • Open Access

    ARTICLE

    An Intelligent Zero Trust Architecture Model for Mitigating Authentication Threats and Vulnerabilities in Cloud-Based Services

    Victor Otieno Mony*, Anselemo Peters Ikoha, Roselida O. Maroko

    Journal of Cyber Security, Vol.7, pp. 395-415, 2025, DOI:10.32604/jcs.2025.070952 - 30 September 2025

    Abstract The widespread adoption of Cloud-Based Services has significantly increased the surface area for cyber threats, particularly targeting authentication mechanisms, which remain among the most vulnerable components of cloud security. This study aimed to address these challenges by developing and evaluating an Intelligent Zero Trust Architecture model tailored to mitigate authentication-related threats in Cloud-Based Services environments. Data was sourced from public repositories, including Kaggle and the National Institute for Standards and Technology MITRE Corporation’s Adversarial Tactics, Techniques, & Common Knowledge (ATT&CK) framework. The study utilized two trust signals: Behavioral targeting system users and Contextual targeting system… More >

  • Open Access

    ARTICLE

    Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications

    Reza Nadimi1,*, Maryam Hashemi2, Koji Tokimatsu3

    Journal on Internet of Things, Vol.7, pp. 49-69, 2025, DOI:10.32604/jiot.2025.070822 - 30 September 2025

    Abstract Existing Internet of Things (IoT) systems that rely on Amazon Web Services (AWS) often encounter inefficiencies in data retrieval and high operational costs, especially when using DynamoDB for large-scale sensor data. These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems. This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services. The proposed method employs AWS Lambda functions with Amazon Relational Database Service (RDS) to facilitate the transmission of data collected from temperature and humidity sensors to the… More >

  • Open Access

    ARTICLE

    An Efficient Content Caching Strategy for Fog-Enabled Road Side Units in Vehicular Networks

    Faareh Ahmed1, Babar Mansoor2, Muhammad Awais Javed3, Abdul Khader Jilani Saudagar4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3783-3804, 2025, DOI:10.32604/cmes.2025.069430 - 30 September 2025

    Abstract Vehicular networks enable seamless connectivity for exchanging emergency and infotainment content. However, retrieving infotainment data from remote servers often introduces high delays, degrading the Quality of Service (QoS). To overcome this, caching frequently requested content at fog-enabled Road Side Units (RSUs) reduces communication latency. Yet, the limited caching capacity of RSUs makes it impractical to store all contents with varying sizes and popularity. This research proposes an efficient content caching algorithm that adapts to dynamic vehicular demands on highways to maximize request satisfaction. The scheme is evaluated against Intelligent Content Caching (ICC) and Random Caching More >

  • Open Access

    ARTICLE

    PAV-A-kNN: A Novel Approachable kNN Query Method in Road Network Environments

    Kailai Zhou*, Weikang Xia, Jiatai Wang

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3217-3240, 2025, DOI:10.32604/cmc.2025.065334 - 03 July 2025

    Abstract Ride-hailing (e.g., DiDi and Uber) has become an important tool for modern urban mobility. To improve the utilization efficiency of ride-hailing vehicles, a novel query method, called Approachable k-nearest neighbor (A-kNN), has recently been proposed in the industry. Unlike traditional kNN queries, A-kNN considers not only the road network distance but also the availability status of vehicles. In this context, even vehicles with passengers can still be considered potential candidates for dispatch if their destinations are near the requester’s location. The V-Tree-based query method, due to its structural characteristics, is capable of efficiently finding k-nearest moving objects within… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Natural Language Processing Model and Optical Character Recognition for Detection of Online Grooming on Social Networking Services

    Sangmin Kim1, Byeongcheon Lee1, Muazzam Maqsood2, Jihoon Moon3,*, Seungmin Rho4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 2079-2108, 2025, DOI:10.32604/cmes.2025.061653 - 30 May 2025

    Abstract The increased accessibility of social networking services (SNSs) has facilitated communication and information sharing among users. However, it has also heightened concerns about digital safety, particularly for children and adolescents who are increasingly exposed to online grooming crimes. Early and accurate identification of grooming conversations is crucial in preventing long-term harm to victims. However, research on grooming detection in South Korea remains limited, as existing models trained primarily on English text and fail to reflect the unique linguistic features of SNS conversations, leading to inaccurate classifications. To address these issues, this study proposes a novel… More >

  • Open Access

    ARTICLE

    Sensitive Target-Guided Directed Fuzzing for IoT Web Services

    Xiongwei Cui, Yunchao Wang, Qiang Wei*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4939-4959, 2025, DOI:10.32604/cmc.2025.063592 - 19 May 2025

    Abstract The development of the Internet of Things (IoT) has brought convenience to people’s lives, but it also introduces significant security risks. Due to the limitations of IoT devices themselves and the challenges of re-hosting technology, existing fuzzing for IoT devices is mainly conducted through black-box methods, which lack effective execution feedback and are blind. Meanwhile, the existing static methods mainly rely on taint analysis, which has high overhead and high false alarm rates. We propose a new directed fuzz testing method for detecting bugs in web service programs of IoT devices, which can test IoT… More >

  • Open Access

    ARTICLE

    The cost and guideline adherence of direct-to-consumer telemedicine companies offering gender-affirming hormone therapy

    Nicholas Sellke1,2,*, Erin Jesse1,2, Justin M. Dubin3, Tomislav D. Medved1,2, Neha S. Basti4, Janvi Ramchandra2, Robert E. Brannigan4, Joshua A. Halpern4, Nannan Thirumavalavan1,2

    Canadian Journal of Urology, Vol.32, No.2, pp. 89-94, 2025, DOI:10.32604/cju.2025.065004 - 30 April 2025

    Abstract Introduction: Direct-to-consumer (DTC) telemedicine has emerged as an option for transgender patients seeking gender affirming hormone therapy (GAHT). We aimed to characterize the healthcare services provided by DTC telemedicine companies offering GAHT and to compare their costs to a tertiary care center. Methods: We identified DTC telemedicine platforms offering GAHT via internet searches and extracted information from their websites related to evaluation, treatment, monitoring, and cost. Cost of the DTC GAHT was compared to cost for comparable services at a tertiary care center. Results: Six DTC companies were identified. All platforms utilized an informed consent model… More >

  • Open Access

    ARTICLE

    Sacrocolpopexy in urology versus gynecology: a contemporary analysis of outcomes and patient profiles

    Yash B. Shah1, Courtney E. Capella1,*, Rishabh K. Simhal2, Maria J. D’Amico1, Whitney Smith1, Alana M. Murphy1

    Canadian Journal of Urology, Vol.32, No.1, pp. 63-70, 2025, DOI:10.32604/cju.2025.064711 - 20 March 2025

    Abstract Introduction: With the aging population, more females will suffer from pelvic organ prolapse. Both urologists and gynecologists perform sacrocolpopexy, but there is no comparative study analyzing differences in provision of care, outcomes, or patient population. We aimed to elucidate potential differences in demographics, outcomes, and minimally invasive surgery utilization for SCP performed by urology and gynecology. Methods: In our retrospective analysis, sacrocolpopexies were identified using the American College of Surgeons National Surgical Quality Improvement Project database from 2006–2020. Pearson’s chi-square test was performed to test trends in the utilization of MIS in five-year blocks. Frailty… More >

Displaying 1-10 on page 1 of 111. Per Page