Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    A Lightweight, Searchable, and Controllable EMR Sharing Scheme

    Xiaohui Yang, Peiyin Zhao*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1521-1538, 2024, DOI:10.32604/cmc.2024.047666

    Abstract Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer from privacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR sharing scheme, which employs a large attribute domain and a linear secret sharing structure (LSSS), the computational overhead of encryption and decryption reaches a lightweight constant level, and supports keyword search and policy hiding, which improves the high efficiency of medical data sharing. The dynamic accumulator technology is utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the data to achieve controllability of… More >

  • Open Access

    REVIEW

    Internet of Things Authentication Protocols: Comparative Study

    Souhayla Dargaoui1, Mourade Azrour1,*, Ahmad El Allaoui1, Azidine Guezzaz2, Abdulatif Alabdulatif3, Abdullah Alnajim4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 65-91, 2024, DOI:10.32604/cmc.2024.047625

    Abstract Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according… More >

  • Open Access

    ARTICLE

    Image Fusion Using Wavelet Transformation and XGboost Algorithm

    Shahid Naseem1, Tariq Mahmood2,3, Amjad Rehman Khan2, Umer Farooq1, Samra Nawazish4, Faten S. Alamri5,*, Tanzila Saba2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 801-817, 2024, DOI:10.32604/cmc.2024.047623

    Abstract Recently, there have been several uses for digital image processing. Image fusion has become a prominent application in the domain of imaging processing. To create one final image that proves more informative and helpful compared to the original input images, image fusion merges two or more initial images of the same item. Image fusion aims to produce, enhance, and transform significant elements of the source images into combined images for the sake of human visual perception. Image fusion is commonly employed for feature extraction in smart robots, clinical imaging, audiovisual camera integration, manufacturing process monitoring, electronic circuit design, advanced device… More >

  • Open Access

    ARTICLE

    An Ingenious IoT Based Crop Prediction System Using ML and EL

    Shabana Ramzan1, Yazeed Yasin Ghadi2, Hanan Aljuaid3, Aqsa Mahmood1,*, Basharat Ali4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 183-199, 2024, DOI:10.32604/cmc.2024.047603

    Abstract Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers have no proper knowledge to select which crop is suitable to grow according to the environmental factors and soil characteristics. This is the main reason for the low yield of crops and the economic crisis in the agricultural sector of the different countries. The use of modern technologies such as the Internet of Things (IoT), machine learning, and ensemble learning can facilitate farmers to observe different factors such as soil electrical conductivity (EC), and environmental factors like temperature to improve crop yield. These parameters play a vital… More >

  • Open Access

    ARTICLE

    MSC-YOLO: Improved YOLOv7 Based on Multi-Scale Spatial Context for Small Object Detection in UAV-View

    Xiangyan Tang1,2, Chengchun Ruan1,2,*, Xiulai Li2,3, Binbin Li1,2, Cebin Fu1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 983-1003, 2024, DOI:10.32604/cmc.2024.047541

    Abstract Accurately identifying small objects in high-resolution aerial images presents a complex and crucial task in the field of small object detection on unmanned aerial vehicles (UAVs). This task is challenging due to variations in UAV flight altitude, differences in object scales, as well as factors like flight speed and motion blur. To enhance the detection efficacy of small targets in drone aerial imagery, we propose an enhanced You Only Look Once version 7 (YOLOv7) algorithm based on multi-scale spatial context. We build the MSC-YOLO model, which incorporates an additional prediction head, denoted as P2, to improve adaptability for small objects.… More >

  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This means that while attempting to… More >

  • Open Access

    ARTICLE

    A Simple and Effective Surface Defect Detection Method of Power Line Insulators for Difficult Small Objects

    Xiao Lu1,*, Chengling Jiang1, Zhoujun Ma1, Haitao Li2, Yuexin Liu2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 373-390, 2024, DOI:10.32604/cmc.2024.047469

    Abstract Insulator defect detection plays a vital role in maintaining the secure operation of power systems. To address the issues of the difficulty of detecting small objects and missing objects due to the small scale, variable scale, and fuzzy edge morphology of insulator defects, we construct an insulator dataset with 1600 samples containing flashovers and breakages. Then a simple and effective surface defect detection method of power line insulators for difficult small objects is proposed. Firstly, a high-resolution feature map is introduced and a small object prediction layer is added so that the model can detect tiny objects. Secondly, a simplified… More >

  • Open Access

    ARTICLE

    RUSAS: Roman Urdu Sentiment Analysis System

    Kazim Jawad1, Muhammad Ahmad2, Majdah Alvi3, Muhammad Bux Alvi3,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1463-1480, 2024, DOI:10.32604/cmc.2024.047466

    Abstract Sentiment analysis, the meta field of Natural Language Processing (NLP), attempts to analyze and identify the sentiments in the opinionated text data. People share their judgments, reactions, and feedback on the internet using various languages. Urdu is one of them, and it is frequently used worldwide. Urdu-speaking people prefer to communicate on social media in Roman Urdu (RU), an English scripting style with the Urdu language dialect. Researchers have developed versatile lexical resources for features-rich comprehensive languages, but limited linguistic resources are available to facilitate the sentiment classification of Roman Urdu. This effort encompasses extracting subjective expressions in Roman Urdu… More >

  • Open Access

    ARTICLE

    Enhancing Skin Cancer Diagnosis with Deep Learning: A Hybrid CNN-RNN Approach

    Syeda Shamaila Zareen1,*, Guangmin Sun1,*, Mahwish Kundi2, Syed Furqan Qadri3, Salman Qadri4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1497-1519, 2024, DOI:10.32604/cmc.2024.047418

    Abstract Skin cancer diagnosis is difficult due to lesion presentation variability. Conventional methods struggle to manually extract features and capture lesions spatial and temporal variations. This study introduces a deep learning-based Convolutional and Recurrent Neural Network (CNN-RNN) model with a ResNet-50 architecture which used as the feature extractor to enhance skin cancer classification. Leveraging synergistic spatial feature extraction and temporal sequence learning, the model demonstrates robust performance on a dataset of 9000 skin lesion photos from nine cancer types. Using pre-trained ResNet-50 for spatial data extraction and Long Short-Term Memory (LSTM) for temporal dependencies, the model achieves a high average recognition… More >

  • Open Access

    ARTICLE

    Spinal Vertebral Fracture Detection and Fracture Level Assessment Based on Deep Learning

    Yuhang Wang1,*, Zhiqin He1, Qinmu Wu1, Tingsheng Lu2, Yu Tang1, Maoyun Zhu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1377-1398, 2024, DOI:10.32604/cmc.2024.047379

    Abstract This paper addresses the common orthopedic trauma of spinal vertebral fractures and aims to enhance doctors’ diagnostic efficiency. Therefore, a deep-learning-based automated diagnostic system with multi-label segmentation is proposed to recognize the condition of vertebral fractures. The whole spine Computed Tomography (CT) image is segmented into the fracture, normal, and background using U-Net, and the fracture degree of each vertebra is evaluated (Genant semi-qualitative evaluation). The main work of this paper includes: First, based on the spatial configuration network (SCN) structure, U-Net is used instead of the SCN feature extraction network. The attention mechanism and the residual connection between the… More >

Displaying 61-70 on page 7 of 5350. Per Page