Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24,971)
  • Open Access

    ARTICLE

    Pothole Detection Based on UAV Photogrammetry

    Muhammad Aliff Haiqal Darmawan1, Shahrul Nizan Abd Mukti2, Khairul Nizam Tahar1,*

    Revue Internationale de Géomatique, Vol.34, pp. 21-35, 2025, DOI:10.32604/rig.2024.057266 - 13 January 2025

    Abstract Potholes are the most prevalent type of structural defect found on roads, caused by aging infrastructure, heavy rains, heavy traffic, thin or weak substructures, and other factors. Regular assessment of road conditions is essential for maintaining and improving road networks. Current techniques for identifying potholes on urban roadways primarily rely on public reporting, such as hotlines or social networking websites, which are both time-consuming and inefficient. This study aims to detect potholes using Unmanned Aerial Vehicles (UAVs) images, enabling accurate analysis of their size, shape, and location, thereby enhancing detection efficiency compared to conventional methods.… More >

  • Open Access

    ARTICLE

    Cartographier les communes à risque inondation en combinant trois procédures administratives en France hexagonale : apports et limites

    Auriane Chelle1,*, Johnny Douvinet1,2

    Revue Internationale de Géomatique, Vol.34, pp. 1-20, 2025, DOI:10.32604/rig.2024.054737 - 13 January 2025

    Abstract Cet article propose une analyse séparée puis combinée de trois procédures administratives qui servent de référence pour cartographier les communes à risque inondation en France hexagonale (i.e., les arrêtés de catastrophes naturelles (CatNat), les Dossiers Départementaux des Risques Majeurs (DDRM) et les Plans de Prévention du Risque Inondation (PPRi)). Deux questions sont posées : quels enseignements peut-on tirer de l’analyse de la couverture spatiale de chacune des procédures, et en les combinant, peut-on voir des effets de seuils ou des jeux d’échelle ? Si les arrêtés CatNat sont révélateurs d’une saisonnalité des inondations et d’une More > Graphic Abstract

    Cartographier les communes à risque inondation en combinant trois procédures administratives en France hexagonale : apports et limites

  • Open Access

    ARTICLE

    Internet of Things Software Engineering Model Validation Using Knowledge-Based Semantic Learning

    Mahmood Alsaadi, Mohammed E. Seno*, Mohammed I. Khalaf

    Intelligent Automation & Soft Computing, Vol.40, pp. 29-52, 2025, DOI:10.32604/iasc.2024.060390 - 10 January 2025

    Abstract The agility of Internet of Things (IoT) software engineering is benchmarked based on its systematic insights for wide application support infrastructure developments. Such developments are focused on reducing the interfacing complexity with heterogeneous devices through applications. To handle the interfacing complexity problem, this article introduces a Semantic Interfacing Obscuration Model (SIOM) for IoT software-engineered platforms. The interfacing obscuration between heterogeneous devices and application interfaces from the testing to real-time validations is accounted for in this model. Based on the level of obscuration between the infrastructure hardware to the end-user software, the modifications through device replacement, More >

  • Open Access

    ARTICLE

    Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission

    Haider H. Al-Mahmood1,*, Saad N. Alsaad2

    Intelligent Automation & Soft Computing, Vol.40, pp. 53-74, 2025, DOI:10.32604/iasc.2024.059691 - 10 January 2025

    Abstract In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism… More >

  • Open Access

    ARTICLE

    Enhancing Network Security: Leveraging Machine Learning for Integrated Protection and Intrusion Detection

    Nada Mohammed Murad1, Adnan Yousif Dawod2, Saadaldeen Rashid Ahmed3,4,*, Ravi Sekhar5, Pritesh Shah5

    Intelligent Automation & Soft Computing, Vol.40, pp. 1-27, 2025, DOI:10.32604/iasc.2024.058624 - 10 January 2025

    Abstract This study introduces an innovative hybrid approach that integrates deep learning with blockchain technology to improve cybersecurity, focusing on network intrusion detection systems (NIDS). The main goal is to overcome the shortcomings of conventional intrusion detection techniques by developing a more flexible and robust security architecture. We use seven unique machine learning models to improve detection skills, emphasizing data quality, traceability, and transparency, facilitated by a blockchain layer that safeguards against data modification and ensures auditability. Our technique employs the Synthetic Minority Oversampling Technique (SMOTE) to equilibrate the dataset, therefore mitigating prevalent class imbalance difficulties… More >

  • Open Access

    ARTICLE

    3D Reconstruction for Early Detection of Liver Cancer

    Rana Mohamed1,2,*, Mostafa Elgendy1, Mohamed Taha1

    Computer Systems Science and Engineering, Vol.49, pp. 213-238, 2025, DOI:10.32604/csse.2024.059491 - 10 January 2025

    Abstract Globally, liver cancer ranks as the sixth most frequent malignancy cancer. The importance of early detection is undeniable, as liver cancer is the fifth most common disease in men and the ninth most common cancer in women. Recent advances in imaging, biomarker discovery, and genetic profiling have greatly enhanced the ability to diagnose liver cancer. Early identification is vital since liver cancer is often asymptomatic, making diagnosis difficult. Imaging techniques such as Magnetic Resonance Imaging (MRI), Computed Tomography (CT), and ultrasonography can be used to identify liver cancer once a sample of liver tissue is… More >

  • Open Access

    ARTICLE

    Enhancing Vehicle Overtaking System via LoRa-Enabled Vehicular Communication Approach

    Kwang Chee Seng, Siti Fatimah Abdul Razak*, Sumendra Yogarayan

    Computer Systems Science and Engineering, Vol.49, pp. 239-258, 2025, DOI:10.32604/csse.2024.056582 - 10 January 2025

    Abstract Vehicle overtaking poses significant risks and leads to injuries and losses on Malaysia’s roads. In most scenarios, insufficient and untimely information available to drivers for accessing road conditions and their surrounding environment is the primary factor that causes these incidents. To address these issues, a comprehensive system is required to provide real-time assistance to drivers. Building upon our previous research on a LoRa-based lane change decision-aid system, this study proposes an enhanced Vehicle Overtaking System (VOS). This system utilizes long-range (LoRa) communication for reliable real-time data exchange between vehicles (V2V) and the cloud (V2C). By More >

  • Open Access

    ARTICLE

    Energy-Efficient Internet of Things-Based Wireless Sensor Network for Autonomous Data Validation for Environmental Monitoring

    Tabassum Kanwal1, Saif Ur Rehman1,*, Azhar Imran2, Haitham A. Mahmoud3

    Computer Systems Science and Engineering, Vol.49, pp. 185-212, 2025, DOI:10.32604/csse.2024.056535 - 10 January 2025

    Abstract This study presents an energy-efficient Internet of Things (IoT)-based wireless sensor network (WSN) framework for autonomous data validation in remote environmental monitoring. We address two critical challenges in WSNs: ensuring data reliability and optimizing energy consumption. Our novel approach integrates an artificial neural network (ANN)-based multi-fault detection algorithm with an energy-efficient IoT-WSN architecture. The proposed ANN model is designed to simultaneously detect multiple fault types, including spike faults, stuck-at faults, outliers, and out-of-range faults. We collected sensor data at 5-minute intervals over three months, using temperature and humidity sensors. The ANN was trained on 70%… More >

  • Open Access

    CORRECTION

    Correction: Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space

    Mudassir Khalil1, Muhammad Imran Sharif2,*, Ahmed Naeem3, Muhammad Umar Chaudhry1, Hafiz Tayyab Rauf4,*, Adham E. Ragab5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1461-1461, 2025, DOI:10.32604/cmc.2024.061589 - 03 January 2025

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: A Lightweight Approach for Skin Lesion Detection through Optimal Features Fusion

    Khadija Manzoor1, Fiaz Majeed2, Ansar Siddique2, Talha Meraj3, Hafiz Tayyab Rauf4,*, Mohammed A. El-Meligy5, Mohamed Sharaf6, Abd Elatty E.Abd Elgawad6

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1459-1459, 2025, DOI:10.32604/cmc.2024.061588 - 03 January 2025

    Abstract This article has no abstract. More >

Displaying 31-40 on page 4 of 24971. Per Page