Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24,943)
  • Open Access

    CORRECTION

    Correction: Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space

    Mudassir Khalil1, Muhammad Imran Sharif2,*, Ahmed Naeem3, Muhammad Umar Chaudhry1, Hafiz Tayyab Rauf4,*, Adham E. Ragab5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1461-1461, 2025, DOI:10.32604/cmc.2024.061589 - 03 January 2025

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: A Lightweight Approach for Skin Lesion Detection through Optimal Features Fusion

    Khadija Manzoor1, Fiaz Majeed2, Ansar Siddique2, Talha Meraj3, Hafiz Tayyab Rauf4,*, Mohammed A. El-Meligy5, Mohamed Sharaf6, Abd Elatty E.Abd Elgawad6

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1459-1459, 2025, DOI:10.32604/cmc.2024.061588 - 03 January 2025

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Evolutionary Particle Swarm Optimization Algorithm Based on Collective Prediction for Deployment of Base Stations

    Jiaying Shen1, Donglin Zhu1, Yujia Liu2, Leyi Wang1, Jialing Hu1, Zhaolong Ouyang1, Changjun Zhou1, Taiyong Li3,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 345-369, 2025, DOI:10.32604/cmc.2024.060335 - 03 January 2025

    Abstract The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life. The development of the Internet of Things (IoT) relies on the support of base stations, which provide a solid foundation for achieving a more intelligent way of living. In a specific area, achieving higher signal coverage with fewer base stations has become an urgent problem. Therefore, this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization (EPSO)… More >

  • Open Access

    ARTICLE

    5DGWO-GAN: A Novel Five-Dimensional Gray Wolf Optimizer for Generative Adversarial Network-Enabled Intrusion Detection in IoT Systems

    Sarvenaz Sadat Khatami1, Mehrdad Shoeibi2, Anita Ershadi Oskouei3, Diego Martín4,*, Maral Keramat Dashliboroun5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 881-911, 2025, DOI:10.32604/cmc.2024.059999 - 03 January 2025

    Abstract The Internet of Things (IoT) is integral to modern infrastructure, enabling connectivity among a wide range of devices from home automation to industrial control systems. With the exponential increase in data generated by these interconnected devices, robust anomaly detection mechanisms are essential. Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns. This paper presents a novel approach utilizing generative adversarial networks (GANs) for anomaly detection in IoT systems. However, optimizing GANs involves tuning hyper-parameters such as learning rate, batch size, and optimization algorithms,… More >

  • Open Access

    ARTICLE

    Toward Analytical Homogenized Relaxation Modulus for Fibrous Composite Material with Reduced Order Homogenization Method

    Huilin Jia1, Shanqiao Huang1, Zifeng Yuan1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 193-222, 2025, DOI:10.32604/cmc.2024.059950 - 03 January 2025

    Abstract In this manuscript, we propose an analytical equivalent linear viscoelastic constitutive model for fiber-reinforced composites, bypassing general computational homogenization. The method is based on the reduced-order homogenization (ROH) approach. The ROH method typically involves solving multiple finite element problems under periodic conditions to evaluate elastic strain and eigenstrain influence functions in an ‘off-line’ stage, which offers substantial cost savings compared to direct computational homogenization methods. Due to the unique structure of the fibrous unit cell, “off-line” stage calculation can be eliminated by influence functions obtained analytically. Introducing the standard solid model to the ROH method More >

  • Open Access

    ARTICLE

    Intrumer: A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment

    Nazreen Banu A*, S.K.B. Sangeetha

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 579-607, 2025, DOI:10.32604/cmc.2024.059805 - 03 January 2025

    Abstract The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network traffic. Cloud environments pose significant challenges in maintaining privacy and security. Global approaches, such as IDS, have been developed to tackle these issues. However, most conventional Intrusion Detection System (IDS) models struggle with unseen cyberattacks and complex high-dimensional data. In fact, this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system, named INTRUMER, which offers balanced accuracy, reliability, and security in cloud settings by multiple modules working together within it. The traffic captured… More >

  • Open Access

    ARTICLE

    CSRWA: Covert and Severe Attacks Resistant Watermarking Algorithm

    Balsam Dhyia Majeed1,2, Amir Hossein Taherinia1,*, Hadi Sadoghi Yazdi1, Ahad Harati1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1027-1047, 2025, DOI:10.32604/cmc.2024.059789 - 03 January 2025

    Abstract Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright. The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification. Some of these features are important perceptual features according to the human visual system (HVS), which means that the embedded watermark should be imperceptible in these features. Therefore, both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions. The two roles will be considered in this paper… More >

  • Open Access

    ARTICLE

    Analysis of Linear and Nonlinear Vibrations of Composite Rectangular Sandwich Plates with Lattice Cores

    Alireza Moradi, Alireza Shaterzadeh*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 223-257, 2025, DOI:10.32604/cmc.2024.059441 - 03 January 2025

    Abstract For the first time, the linear and nonlinear vibrations of composite rectangular sandwich plates with various geometric patterns of lattice core have been analytically examined in this work. The plate comprises a lattice core located in the middle and several homogeneous orthotropic layers that are symmetrical relative to it. For this purpose, the partial differential equations of motion have been derived based on the first-order shear deformation theory, employing Hamilton’s principle and Von Kármán’s nonlinear displacement-strain relations. Then, the nonlinear partial differential equations of the plate are converted into a time-dependent nonlinear ordinary differential equation… More >

  • Open Access

    REVIEW

    Enhancing Deepfake Detection: Proactive Forensics Techniques Using Digital Watermarking

    Zhimao Lai1,2, Saad Arif3, Cong Feng4, Guangjun Liao5, Chuntao Wang6,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 73-102, 2025, DOI:10.32604/cmc.2024.059370 - 03 January 2025

    Abstract With the rapid advancement of visual generative models such as Generative Adversarial Networks (GANs) and stable Diffusion, the creation of highly realistic Deepfake through automated forgery has significantly progressed. This paper examines the advancements in Deepfake detection and defense technologies, emphasizing the shift from passive detection methods to proactive digital watermarking techniques. Passive detection methods, which involve extracting features from images or videos to identify forgeries, encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics. In contrast, proactive digital watermarking techniques embed specific markers into images or videos, facilitating More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Approach for Automating App Review Classification: Advancing Usability Metrics Classification with an Aspect-Based Sentiment Analysis Framework

    Nahed Alsaleh1,2, Reem Alnanih1,*, Nahed Alowidi1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 949-976, 2025, DOI:10.32604/cmc.2024.059351 - 03 January 2025

    Abstract App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their products. Automating the analysis of these reviews is vital for efficient review management. While traditional machine learning (ML) models rely on basic word-based feature extraction, deep learning (DL) methods, enhanced with advanced word embeddings, have shown superior performance. This research introduces a novel aspect-based sentiment analysis (ABSA) framework to classify app reviews based on key non-functional requirements, focusing on usability factors: effectiveness, efficiency, and satisfaction. We propose a hybrid DL model, combining BERT (Bidirectional Encoder Representations from Transformers) More >

Displaying 11-20 on page 2 of 24943. Per Page