Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26,300)
  • Open Access

    REVIEW

    Blockchain Integration in IoT: Applications, Opportunities, and Challenges

    Mozhgan Gholami1, Ali Ghaffari1,2,3,*, Nahideh Derakhshanfard1, Nadir iBRAHIMOĞLU4, Ali Asghar Pourhaji Kazem2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1561-1605, 2025, DOI:10.32604/cmc.2025.063304 - 16 April 2025

    Abstract The Internet has been enhanced recently by blockchain and Internet of Things (IoT) networks. The Internet of Things is a network of various sensor-equipped devices. It gradually integrates the Internet, sensors, and cloud computing. Blockchain is based on encryption algorithms, which are shared database technologies on the Internet. Blockchain technology has grown significantly because of its features, such as flexibility, support for integration, anonymity, decentralization, and independent control. Computational nodes in the blockchain network are used to verify online transactions. However, this integration creates scalability, interoperability, and security challenges. Over the last decade, several advancements… More >

  • Open Access

    ARTICLE

    TransSSA: Invariant Cue Perceptual Feature Focused Learning for Dynamic Fruit Target Detection

    Jianyin Tang, Zhenglin Yu*, Changshun Shao

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2829-2850, 2025, DOI:10.32604/cmc.2025.063287 - 16 April 2025

    Abstract In the field of automated fruit harvesting, precise and efficient fruit target recognition and localization play a pivotal role in enhancing the efficiency of harvesting robots. However, this domain faces two core challenges: firstly, the dynamic nature of the automatic picking process requires fruit target detection algorithms to adapt to multi-view characteristics, ensuring effective recognition of the same fruit from different perspectives. Secondly, fruits in natural environments often suffer from interference factors such as overlapping, occlusion, and illumination fluctuations, which increase the difficulty of image capture and recognition. To address these challenges, this study conducted… More >

  • Open Access

    ARTICLE

    Improving Hornet Detection with the YOLOv7-Tiny Model: A Case Study on Asian Hornets

    Yung-Hsiang Hung, Chuen-Kai Fan, Wen-Pai Wang*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2323-2349, 2025, DOI:10.32604/cmc.2025.063270 - 16 April 2025

    Abstract Bees play a crucial role in the global food chain, pollinating over 75% of food and producing valuable products such as bee pollen, propolis, and royal jelly. However, the Asian hornet poses a serious threat to bee populations by preying on them and disrupting agricultural ecosystems. To address this issue, this study developed a modified YOLOv7tiny (You Only Look Once) model for efficient hornet detection. The model incorporated space-to-depth (SPD) and squeeze-and-excitation (SE) attention mechanisms and involved detailed annotation of the hornet’s head and full body, significantly enhancing the detection of small objects. The Taguchi… More >

  • Open Access

    ARTICLE

    A Novel Approach to Enhanced Cancelable Multi-Biometrics Personal Identification Based on Incremental Deep Learning

    Ali Batouche1, Souham Meshoul2,*, Hadil Shaiba3, Mohamed Batouche2,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1727-1752, 2025, DOI:10.32604/cmc.2025.063227 - 16 April 2025

    Abstract The field of biometric identification has seen significant advancements over the years, with research focusing on enhancing the accuracy and security of these systems. One of the key developments is the integration of deep learning techniques in biometric systems. However, despite these advancements, certain challenges persist. One of the most significant challenges is scalability over growing complexity. Traditional methods either require maintaining and securing a growing database, introducing serious security challenges, or relying on retraining the entire model when new data is introduced—a process that can be computationally expensive and complex. This challenge underscores the… More >

  • Open Access

    ARTICLE

    Optimizing Forecast Accuracy in Cryptocurrency Markets: Evaluating Feature Selection Techniques for Technical Indicators

    Ahmed El Youssefi1, Abdelaaziz Hessane1,2, Imad Zeroual1, Yousef Farhaoui1,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3411-3433, 2025, DOI:10.32604/cmc.2025.063218 - 16 April 2025

    Abstract This study provides a systematic investigation into the influence of feature selection methods on cryptocurrency price forecasting models employing technical indicators. In this work, over 130 technical indicators—covering momentum, volatility, volume, and trend-related technical indicators—are subjected to three distinct feature selection approaches. Specifically, mutual information (MI), recursive feature elimination (RFE), and random forest importance (RFI). By extracting an optimal set of 20 predictors, the proposed framework aims to mitigate redundancy and overfitting while enhancing interpretability. These feature subsets are integrated into support vector regression (SVR), Huber regressors, and k-nearest neighbors (KNN) models to forecast the… More >

  • Open Access

    ARTICLE

    Machine Learning for Smart Soil Monitoring

    Khaoula Ben Abdellafou1, Kamel Zidi2, Ahamed Aljuhani1, Okba Taouali1,*, Mohamed Faouzi Harkat3

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3007-3023, 2025, DOI:10.32604/cmc.2025.063146 - 16 April 2025

    Abstract Environmental protection requires identifying, investigating, and raising awareness about safeguarding nature from the harmful effects of both anthropogenic and natural events. This process of environmental protection is essential for maintaining human well-being. In this context, it is critical to monitor and safeguard the personal environment, which includes maintaining a healthy diet and ensuring plant safety. Living in a balanced environment and ensuring the safety of plants for green spaces and a healthy diet require controlling the nature and quality of the soil in our environment. To ensure soil quality, it is imperative to monitor and… More >

  • Open Access

    ARTICLE

    Integrating Edge Intelligence with Blockchain-Driven Secured IoT Healthcare Optimization Model

    Khulud Salem Alshudukhi1, Mamoona Humayun2,*, Ghadah Naif Alwakid1

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1973-1986, 2025, DOI:10.32604/cmc.2025.063077 - 16 April 2025

    Abstract The Internet of Things (IoT) and edge computing have substantially contributed to the development and growth of smart cities. It handled time-constrained services and mobile devices to capture the observing environment for surveillance applications. These systems are composed of wireless cameras, digital devices, and tiny sensors to facilitate the operations of crucial healthcare services. Recently, many interactive applications have been proposed, including integrating intelligent systems to handle data processing and enable dynamic communication functionalities for crucial IoT services. Nonetheless, most solutions lack optimizing relaying methods and impose excessive overheads for maintaining devices’ connectivity. Alternatively, data More >

  • Open Access

    ARTICLE

    Chinese Named Entity Recognition Method for Musk Deer Domain Based on Cross-Attention Enhanced Lexicon Features

    Yumei Hao1,2, Haiyan Wang1,2,*, Dong Zhang3

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2989-3005, 2025, DOI:10.32604/cmc.2025.063008 - 16 April 2025

    Abstract Named entity recognition (NER) in musk deer domain is the extraction of specific types of entities from unstructured texts, constituting a fundamental component of the knowledge graph, Q&A system, and text summarization system of musk deer domain. Due to limited annotated data, diverse entity types, and the ambiguity of Chinese word boundaries in musk deer domain NER, we present a novel NER model, CAELF-GP, which is based on cross-attention mechanism enhanced lexical features (CAELF). Specifically, we employ BERT as a character encoder and advocate the integration of external lexical information at the character representation layer.… More >

  • Open Access

    ARTICLE

    Dynamic Spatial Focus in Alzheimer’s Disease Diagnosis via Multiple CNN Architectures and Dynamic GradNet

    Jasem Almotiri*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2109-2142, 2025, DOI:10.32604/cmc.2025.062923 - 16 April 2025

    Abstract The evolving field of Alzheimer’s disease (AD) diagnosis has greatly benefited from deep learning models for analyzing brain magnetic resonance (MR) images. This study introduces Dynamic GradNet, a novel deep learning model designed to increase diagnostic accuracy and interpretability for multiclass AD classification. Initially, four state-of-the-art convolutional neural network (CNN) architectures, the self-regulated network (RegNet), residual network (ResNet), densely connected convolutional network (DenseNet), and efficient network (EfficientNet), were comprehensively compared via a unified preprocessing pipeline to ensure a fair evaluation. Among these models, EfficientNet consistently demonstrated superior performance in terms of accuracy, precision, recall, and… More >

  • Open Access

    ARTICLE

    Deepfake Detection Method Based on Spatio-Temporal Information Fusion

    Xinyi Wang*, Wanru Song, Chuanyan Hao, Feng Liu

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3351-3368, 2025, DOI:10.32604/cmc.2025.062922 - 16 April 2025

    Abstract As Deepfake technology continues to evolve, the distinction between real and fake content becomes increasingly blurred. Most existing Deepfake video detection methods rely on single-frame facial image features, which limits their ability to capture temporal differences between frames. Current methods also exhibit limited generalization capabilities, struggling to detect content generated by unknown forgery algorithms. Moreover, the diversity and complexity of forgery techniques introduced by Artificial Intelligence Generated Content (AIGC) present significant challenges for traditional detection frameworks, which must balance high detection accuracy with robust performance. To address these challenges, we propose a novel Deepfake detection… More >

Displaying 41-50 on page 5 of 26300. Per Page