Computers, Materials & Continua Open Access Editors-in-Chief: Prof. Ankit Agrawal, Prof. Timon Rabczuk, Prof. Guoren Wang
Volume 84 Issue 3, July 2025
PP. 3961-6034
|
74 articles
|
Next Issue
Review
Review | Open Access
A Review of AI-Driven Automation Technologies: Latest Taxonomies, Existing Challenges, and Future Prospects
Published: 30 July 2025
2025, 84(3): 3961-4018
Review | Open Access
Single Sign-On Security and Privacy: A Systematic Literature Review
Published: 30 July 2025
2025, 84(3): 4019-4054
Review | Open Access
Intrusion Detection in Internet of Medical Things Using Digital Twins—A Review
Published: 30 July 2025
2025, 84(3): 4055-4104
Review | Open Access
Exploring the Effectiveness of Machine Learning and Deep Learning Algorithms for Sentiment Analysis: A Systematic Literature Review
Published: 30 July 2025
2025, 84(3): 4105-4153
Review | Open Access
A Comprehensive Review of Multimodal Deep Learning for Enhanced Medical Diagnostics
Published: 30 July 2025
2025, 84(3): 4155-4193
Review | Open Access
A Survey of Image Forensics: Exploring Forgery Detection in Image Colorization
Published: 30 July 2025
2025, 84(3): 4195-4221
Review | Open Access
Towards Secure APIs: A Survey on RESTful API Vulnerability Detection
Published: 30 July 2025
2025, 84(3): 4223-4257
Article
Article | Open Access
Investigation of TWIP/TRIP Effects in the CrCoNiFe System Using a High-Throughput CALPHAD Approach
Published: 30 July 2025
2025, 84(3): 4299-4311
Article | Open Access
Efficient Prediction of Quasi-Phase Equilibrium in KKS Phase Field Model via Grey Wolf-Optimized Neural Network
Published: 30 July 2025
2025, 84(3): 4313-4340
Article | Open Access
Application of Various Optimisation Methods in the Multi-Optimisation for Tribological Properties of Al–B4C Composites
Published: 30 July 2025
2025, 84(3): 4341-4361
Article | Open Access
A Novel Malware Detection Framework for Internet of Things Applications
Published: 30 July 2025
2025, 84(3): 4363-4380
Article | Open Access
Mitigating Adversarial Attack through Randomization Techniques and Image Smoothing
Published: 30 July 2025
2025, 84(3): 4381-4397
Article | Open Access
Expert System Based on Ontology and Interpretable Machine Learning to Assist in the Discovery of Railway Accident Scenarios
Published: 30 July 2025
2025, 84(3): 4399-4430
Article | Open Access
SA-WGAN Based Data Enhancement Method for Industrial Internet Intrusion Detection
Published: 30 July 2025
2025, 84(3): 4431-4449
Article | Open Access
Improving Fashion Sentiment Detection on X through Hybrid Transformers and RNNs
Published: 30 July 2025
2025, 84(3): 4451-4467
Article | Open Access
SAMI-FGSM: Towards Transferable Attacks with Stochastic Gradient Accumulation
Published: 30 July 2025
2025, 84(3): 4469-4490
Article | Open Access
Remote Sensing Imagery for Multi-Stage Vehicle Detection and Classification via YOLOv9 and Deep Learner
Published: 30 July 2025
2025, 84(3): 4491-4509
Article | Open Access
A Generative Neuro-Cognitive Architecture Using Quantum Algorithms for the Autonomous Behavior of a Smart Agent in a Simulation Environment
Published: 30 July 2025
2025, 84(3): 4511-4537
Article | Open Access
Optimized Attack and Detection on Multi-Sensor Cyber-Physical System
Published: 30 July 2025
2025, 84(3): 4539-4561
Article | Open Access
An Optimization of Weak Key Attacks Based on the BGF Decoding Algorithm
Published: 30 July 2025
2025, 84(3): 4583-4599
Article | Open Access
RBZZER: A Directed Fuzzing Technique for Efficient Detection of Memory Leaks via Risk Area Analysis
Published: 30 July 2025
2025, 84(3): 4601-4625
Article | Open Access
Attention Shift-Invariant Cross-Evolutionary Feature Fusion Network for Infrared Small Target Detection
Published: 30 July 2025
2025, 84(3): 4655-4676
Article | Open Access
Classification of Cyber Threat Detection Techniques for Next-Generation Cyber Defense via Hesitant Bipolar Fuzzy Frank Information
Published: 30 July 2025
2025, 84(3): 4699-4727
Article | Open Access
Optimizing Microgrid Energy Management via DE-HHO Hybrid Metaheuristics
Published: 30 July 2025
2025, 84(3): 4729-4754
Article | Open Access
Dynamic Metadata Prefetching and Data Placement Algorithms for High-Performance Wide-Area Applications
Published: 30 July 2025
2025, 84(3): 4773-4804
Article | Open Access
Enhanced Cutaneous Melanoma Segmentation in Dermoscopic Images Using a Dual U-Net Framework with Multi-Path Convolution Block Attention Module and SE-Res-Conv
Published: 30 July 2025
2025, 84(3): 4805-4824
Article | Open Access
Enhancing Phoneme Labeling in Dysarthric Speech with Digital Twin-Driven Multi-Modal Architecture
Published: 30 July 2025
2025, 84(3): 4825-4849
Article | Open Access
Hyper-Chaos and CNN-Based Image Encryption Scheme for Wireless Communication Transmission
Published: 30 July 2025
2025, 84(3): 4851-4868
Article | Open Access
Optimized Deep Feature Learning with Hybrid Ensemble Soft Voting for Early Breast Cancer Histopathological Image Classification
Published: 30 July 2025
2025, 84(3): 4869-4885
Article | Open Access
Active Protection Scheme of DNN Intellectual Property Rights Based on Feature Layer Selection and Hyperchaotic Mapping
Published: 30 July 2025
2025, 84(3): 4887-4906
Article | Open Access
Multi-AP Cooperative Radio Resource Allocation Method for Co-Channel Interference Avoidance in 802.11be WLAN
Published: 30 July 2025
2025, 84(3): 4949-4972
Article | Open Access
Slice-Based 6G Network with Enhanced Manta Ray Deep Reinforcement Learning-Driven Proactive and Robust Resource Management
Published: 30 July 2025
2025, 84(3): 4973-4995
Article | Open Access
Light-Weighted Mutual Authentication and Key Agreement in V2N VANET
Published: 30 July 2025
2025, 84(3): 4997-5019
Article | Open Access
Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence
Published: 30 July 2025
2025, 84(3): 5021-5046
Article | Open Access
YOLOv8s-DroneNet: Small Object Detection Algorithm Based on Feature Selection and ISIoU
Published: 30 July 2025
2025, 84(3): 5047-5061
Article | Open Access
Optimized Metaheuristic Strategies for Addressing the Multi-Picker Robot Routing Problem in 3D Warehouse Operations
Published: 30 July 2025
2025, 84(3): 5063-5076
Article | Open Access
SDVformer: A Resource Prediction Method for Cloud Computing Systems
Published: 30 July 2025
2025, 84(3): 5077-5093
Article | Open Access
You KAN See through the Sand in the Dark: Uncertainty-Aware Meets KAN in Joint Low-Light Image Enhancement and Sand-Dust Removal
Published: 30 July 2025
2025, 84(3): 5095-5109
Article | Open Access
Ultrasonic Welding of Similar/Dissimilar MEX-3D Printed Parts Considering Energy Director Shape, Infill, Welding Time and Amplitude
Published: 30 July 2025
2025, 84(3): 5111-5131
Article | Open Access
Transformer-Based Fusion of Infrared and Visible Imagery for Smoke Recognition in Commercial Areas
Published: 30 July 2025
2025, 84(3): 5157-5176
Article | Open Access
Lightweight and Robust Android Ransomware Detection Using Behavioral Analysis and Feature Reduction
Published: 30 July 2025
2025, 84(3): 5177-5199
Article | Open Access
Software Defect Prediction Based on Semantic Views of Metrics: Clustering Analysis and Model Performance Analysis
Published: 30 July 2025
2025, 84(3): 5201-5221
Article | Open Access
Enhancing Bandwidth Allocation Efficiency in 5G Networks with Artificial Intelligence
Published: 30 July 2025
2025, 84(3): 5223-5238
Article | Open Access
Blockchain Sharding Algorithm Based on Account Degree and Frequency
Published: 30 July 2025
2025, 84(3): 5239-5254
Article | Open Access
Explainable AI Based Multi-Task Learning Method for Stroke Prognosis
Published: 30 July 2025
2025, 84(3): 5299-5315
Article | Open Access
Enhancing Arabic Sentiment Analysis with Pre-Trained CAMeLBERT: A Case Study on Noisy Texts
Published: 30 July 2025
2025, 84(3): 5317-5335
Article | Open Access
An Efficient Clustering Algorithm for Enhancing the Lifetime and Energy Efficiency of Wireless Sensor Networks
Published: 30 July 2025
2025, 84(3): 5337-5360
Article | Open Access
NADSA: A Novel Approach for Detection of Sinkhole Attacks Based on RPL Protocol in 6LowPAN Network
Published: 30 July 2025
2025, 84(3): 5381-5402
Article | Open Access
Resource Allocation in V2X Networks: A Double Deep Q-Network Approach with Graph Neural Networks
Published: 30 July 2025
2025, 84(3): 5427-5443
Article | Open Access
A Semantic Evaluation Framework for Medical Report Generation Using Large Language Models
Published: 30 July 2025
2025, 84(3): 5445-5462
Article | Open Access
A Hybrid Framework Integrating Deterministic Clustering, Neural Networks, and Energy-Aware Routing for Enhanced Efficiency and Longevity in Wireless Sensor Network
Published: 30 July 2025
2025, 84(3): 5463-5485
Article | Open Access
LREGT: Local Relationship Enhanced Gated Transformer for Image Captioning
Published: 30 July 2025
2025, 84(3): 5487-5508
Article | Open Access
C-BIVM: A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities
Published: 30 July 2025
2025, 84(3): 5509-5525
Article | Open Access
Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification
Published: 30 July 2025
2025, 84(3): 5527-5553
Article | Open Access
Three-Level Intrusion Detection Model for Wireless Sensor Networks Based on Dynamic Trust Evaluation
Published: 30 July 2025
2025, 84(3): 5555-5575
Article | Open Access
A Novel Attention-Augmented LSTM (AA-LSTM) Model for Optimized Energy Management in EV Charging Stations
Published: 30 July 2025
2025, 84(3): 5577-5595
Article | Open Access
EEG Scalogram Analysis in Emotion Recognition: A Swin Transformer and TCN-Based Approach
Published: 30 July 2025
2025, 84(3): 5597-5611
Article | Open Access
MGD-YOLO: An Enhanced Road Defect Detection Algorithm Based on Multi-Scale Attention Feature Fusion
Published: 30 July 2025
2025, 84(3): 5613-5635
Article | Open Access
A Quality of Service Analysis of FPGA-Accelerated Conv2D Architectures for Brain Tumor Multi-Classification
Published: 30 July 2025
2025, 84(3): 5637-5663
Article | Open Access
A Hybrid Feature Selection Method for Advanced Persistent Threat Detection
Published: 30 July 2025
2025, 84(3): 5665-5691
Article | Open Access
An Ochotona Curzoniae Object Detection Model Based on Feature Fusion with SCConv Attention Mechanism
Published: 30 July 2025
2025, 84(3): 5693-5712
Article | Open Access
An Improved Chicken Swarm Optimization Techniques Based on Cultural Algorithm Operators for Biometric Access Control
Published: 30 July 2025
2025, 84(3): 5713-5732
Article | Open Access
Fixed Neural Network Image Steganography Based on Secure Diffusion Models
Published: 30 July 2025
2025, 84(3): 5733-5750
Article | Open Access
Switchable Normalization Based Faster RCNN for MRI Brain Tumor Segmentation
Published: 30 July 2025
2025, 84(3): 5751-5772
Article | Open Access
An Improved YOLO-Based Waste Detection Model and Its Integration to Robotic Gripping Systems
Published: 30 July 2025
2025, 84(3): 5773-5790
Article | Open Access
CGMISeg: Context-Guided Multi-Scale Interactive for Efficient Semantic Segmentation
Published: 30 July 2025
2025, 84(3): 5811-5829
Article | Open Access
Renovated Random Attribute-Based Fennec Fox Optimized Deep Learning Framework in Low-Rate DoS Attack Detection in IoT
Published: 30 July 2025
2025, 84(3): 5831-5858
Article | Open Access
Detection of False Data Injection Attacks: A Protected Federated Deep Learning Based on Encryption Mechanism
Published: 30 July 2025
2025, 84(3): 5859-5877
Article | Open Access
A Hybrid Deep Learning Pipeline for Wearable Sensors-Based Human Activity Recognition
Published: 30 July 2025
2025, 84(3): 5879-5896
Article | Open Access
A Federated Learning Approach for Cardiovascular Health Analysis and Detection
Published: 30 July 2025
2025, 84(3): 5897-5914
Article | Open Access
HybridLSTM: An Innovative Method for Road Scene Categorization Employing Hybrid Features
Published: 30 July 2025
2025, 84(3): 5937-5975
Article | Open Access
ADFEmu: Enhancing Firmware Fuzzing with Direct Memory Access (DMA) Input Emulation Using Concolic Execution and Large Language Models (LLMs)
Published: 30 July 2025
2025, 84(3): 5977-5993
Article | Open Access
OMD-RAS: Optimizing Malware Detection through Comprehensive Approach to Real-Time and Adaptive Security
Published: 30 July 2025
2025, 84(3): 5995-6014
Article | Open Access
SP-Sketch: Persistent Flow Detection with Sliding Windows on Programmable Switches
Published: 30 July 2025
2025, 84(3): 6015-6034