
Computers, Materials & Continua is a peer-reviewed Open Access journal that publishes all types of academic papers in the areas of computer networks, artificial intelligence, big data, software engineering, multimedia, cyber security, internet of things, materials genome, integrated materials science, and data analysis, modeling, designing and manufacturing of modern functional and multifunctional materials. This journal is published monthly by Tech Science Press.
SCI: 2024 Impact Factor 1.7; Scopus CiteScore (Impact per Publication 2024): 6.1; SNIP (Source Normalized Impact per Paper 2024): 0.675; Ei Compendex; Cambridge Scientific Abstracts; INSPEC Databases; Science Navigator; EBSCOhost; ProQuest Central; Zentralblatt für Mathematik; Portico, etc.
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077091 - 09 April 2026
Abstract This paper provides a comprehensive review of recent advances in multi-scale modeling for simulating dynamic damage and fracture in metallic materials, a critical area due to the widespread application of metals and their susceptibility to complex failure in engineering practice. The paper first outlines the mechanisms of damage evolution and crack propagation across different spatial and temporal scales. It then introduces commonly used simulation approaches spanning micro- to macro-scales for studying damage and fracture in metals, analyzing the evolution of mechanical properties from defect initiation to ultimate failure, and elucidating the underlying damage mechanisms at More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076492 - 09 April 2026
(This article belongs to the Special Issue: Machine Learning Methods in Materials Science)
Abstract This paper reviews the research progress and application prospects of machine learning technologies in the field of polymer materials. Currently, machine learning methods are developing rapidly in polymer material research; although they have significantly accelerated material prediction and design, their complexity has also caused difficulties in understanding and application for researchers in traditional fields. In response to the above issues, this paper first analyzes the inherent challenges in the research and development of polymer materials, including structural complexity and the limitations of traditional trial-and-error methods. To address these problems, it focuses on introducing key basic… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078842 - 09 April 2026
Abstract Image super-resolution is a significant area in the field of image processing, with broad applications across multiple domains. In recent years, advancements in Generative Adversarial Networks (GANs) have led to an increased adoption of GAN-based methods in image super-resolution, yielding remarkable results. However, there is still a limited amount of research that systematically and comprehensively summarizes the various GAN-based techniques for image super-resolution. This paper provides a comparative study that elucidates the application differences of GANs in this field. We begin by reviewing the development of GANs and introducing their popular variants used in image… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076652 - 09 April 2026
(This article belongs to the Special Issue: Advances in Video Object Tracking: Methods, Challenges, and Applications)
Abstract 3D single object tracking (SOT) based on point clouds is a fundamental task for environmental perception in autonomous driving and dynamic scene understanding in robotics. Recent technological advancements in this field have significantly bolstered the environmental interaction capabilities of intelligent systems. This field faces persistent challenges, including feature degradation induced by point cloud sparsity, representation drift caused by non-rigid deformation, and occlusion in complex scenarios. Traditional appearance matching methods, particularly those relying on Siamese networks, are severely constrained by point cloud characteristics, often failing under rapid motions or structural ambiguities among similar objects. In response,… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077060 - 09 April 2026
Abstract Multi-Robot Task Allocation (MRTA) has proven its importance in the current and near-future era, wherein in every aspect of life, there will be robots to handle tasks effectively and efficiently. While there has been a growing interest in MRTA problems in the robotics industry, the question arises of how to make robots more decentralized and intelligent through rational decision-makers rather than ones that are centralized and filled with black boxes. This survey aims to address that question by examining recent MRTA literature and exploring topics including MRTA taxonomy, centralized and decentralized controls, static and dynamic… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078545 - 09 April 2026
(This article belongs to the Special Issue: Advanced Technologies and Intelligent Applications for Autonomous Vehicles)
Abstract The rapid advancement of unmanned aerial vehicle (UAV) technologies has increased demand for flexible autopilot platforms suitable for both research and education. Among available options, the open-source Pixhawk/PX4 autopilot has emerged as a leading solution due to its modular architecture and robust software ecosystem. This survey examines the adoption of the Pixhawk/PX4 platform in research and education. The survey covers the analysis of the Pixhawk/PX4 autopilot software development APIs, its compatibility with ROS middleware and MATLAB/Simulink environments, and environments for software/hardware-in-the-loop simulations. Additionally, it explores the integration of Cutting-Edge technologies to enhance UAVs performance. By More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074207 - 09 April 2026
Abstract Industrial intelligent systems increasingly require efficient, robust, and deployable optimization methods for resource-constrained hardware. The Sparrow Search Algorithm (SSA) has gained traction in machine learning optimization; however, existing reviews emphasize algorithmic variants and generic benchmarks while paying limited attention to industrial requirements such as real-time operation, noise tolerance, and hardware awareness. This review advances the field by developing an industrial taxonomy that aligns SSA and its hybrids with six application clusters—fault diagnosis, production scheduling, edge-intelligent control, renewable/microgrid optimization, battery prognostics, and industrial cybersecurity—characterizing task types, data regimes, latency and safety constraints, and typical failure modes;… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076726 - 09 April 2026
Abstract This review examines current approaches to real-time decision-making and task optimization in Internet of Things systems through the application of machine learning models deployed at the network edge. Existing literature shows that edge-based distributed intelligence reduces cloud dependency. It addresses transmission latency, device energy use, and bandwidth limits. Recent optimization strategies employ dynamic task offloading mechanisms to determine optimal workload placement across local devices and edge servers without centralized coordination. Empirical findings from the literature indicate performance improvements with latency reductions of approximately 32.8% and energy efficiency gains of 27.4% compared to conventional cloud-centric models.… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077367 - 09 April 2026
Abstract Large Language Models (LLMs) are becoming integral components of modern cybersecurity ecosystems, simultaneously strengthening defensive capabilities while giving rise to a new class of Artificial Intelligence–Generated Content (AIGC)-driven threats. This PRISMA-guided systematic review synthesises 167 peer-reviewed studies published between 2022 and 2025 and proposes a unified threat–defence–evaluation taxonomy as a central analytical framework to consolidate a previously fragmented body of research. Guided by this taxonomy, the review first examines AIGC-enabled threats, including automated and highly personalised phishing, polymorphic malware and exploit generation, jailbreak and adversarial prompting, prompt-injection attack vectors, multimodal deception, persona-steering attacks, and large-scale… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077332 - 09 April 2026
Abstract Blockchain technology, characterized by decentralization, transparency, and immutability, has been widely applied in areas such as supply chain tracking, medical data management, and the Internet of Things. However, single blockchain systems suffer from limitations in performance, scalability, and cross-chain interoperability, giving rise to the issue of “blockchain silos.” To address the challenges of data and asset circulation among heterogeneous blockchain networks, both academia and industry have proposed multi-blockchain architectures. In this paper, we categorize current multi-blockchain systems from a network topology perspective into four types: parallel architecture, hierarchical architecture, hybrid architecture, and multi-blockchain networks. We… More >
Open Access
REVIEW
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.071029 - 09 April 2026
Abstract Generative Artificial Intelligence (AI) is reshaping digital marketing by creating automated content, personalizing campaigns, and offering new ways to engage consumers. This systematic review examines research on generative AI, highlighting both its technological progress and the ethical, technical, and organizational hurdles that could limit its use. We used a PRISMA-based method to search major databases (ACM Digital Library, IEEE Xplore, and Scopus) for peer-reviewed studies published from 2018 to 2025. Our findings reveal major gains in text creation, image generation, and multimodal campaigns, which can lower costs and spark creative thinking. Still, data privacy, bias More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077139 - 09 April 2026
Abstract Software security bugs present significant security risks to modern systems, leading to unauthorized access, data breaches, and severe operational and financial consequences. Early prediction of such vulnerabilities is therefore essential for strengthening software reliability and reducing remediation costs. This study investigates the extent to which static software quality metrics can identify vulnerable code and evaluates the effectiveness of machine learning models for large-scale security-bug prediction. We analyze a dataset of 338,442 source files, including 33,294 buggy files, collected from seven major open-source ecosystems. These ecosystems include GitHub Security Advisories (GHSA), Python Package Index (PyPI), OSS-Fuzz… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076236 - 09 April 2026
(This article belongs to the Special Issue: Bridging the Gap: AutoML and Explainable AI for Industrial and Healthcare Innovations)
Abstract In facial landmark detection, shape deviations induced by large poses and exaggerated expressions often prevent existing algorithms from simultaneously achieving fine-grained local accuracy and holistic global shape constraints. To address this, we propose a Transformer-Conv Attention-based Method (TCAM). Built upon a hybrid coordinate-heatmap regression backbone, TCAM integrates the long-range dependency modeling of Transformers with the local feature extraction advantages of Depthwise Convolution (DWConv). Specifically, by partitioning feature maps into sub-regions and applying Transformer modeling, the module enforces sparse linear constraints on global information, effectively mitigating the issues caused by discontinuous landmark distributions. Experimental results on More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076731 - 09 April 2026
Abstract Non-negative Matrix Factorization (NMF) is a computationally intensive matrix operation that resource-constrained clients struggle to complete locally. Privacy-preserving outsourcing allows clients to offload heavy computing tasks to powerful servers, effectively solving the problem of local computing difficulties. However, the existing privacy-preserving NMF outsourcing schemes only allow one server to perform outsourcing computation, resulting in low efficiency on the server side. In order to improve the efficiency of outsourcing computation, we propose a privacy-preserving parallel NMF outsourcing scheme with multiple edge servers. We adopt the matrix blocking technique to divide the computation task into multiple subtasks, More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.073584 - 09 April 2026
(This article belongs to the Special Issue: Towards Privacy-preserving, Secure and Trustworthy AI-enabled Systems)
Abstract Real-time threat detection in Internet of Things (IoT) networks requires scalable, privacy-preserving, and interpretable models capable of operating under strict latency constraints. This paper presents EdgeTrustX, a privacy-aware federated transformer framework that addresses these challenges by combining transformer-based representation learning with federated optimisation, differential privacy, and homomorphic encryption. The framework enables collaborative model training across heterogeneous IoT devices without exposing sensitive local data while maintaining computational feasibility for edge deployment. A multi-head attention mechanism integrated with a secure aggregation protocol supports adaptive feature weighting and privacy-protected parameter exchange. To enhance transparency, an explainability module that… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076104 - 09 April 2026
(This article belongs to the Special Issue: Complex Network Approaches for Resilient and Efficient Urban Transportation Systems)
Abstract Collision avoidance is recognized as a critical challenge in Vehicular Ad-Hoc Networks (VANETs), which demand real-time decision-making. It plays a vital role in ensuring road safety and traffic efficiency. Traditional approaches like rule-based systems and heuristic methods fail to provide optimal solutions in dynamic and unpredictable traffic scenarios. They cannot balance multiple objectives like minimizing collision risk, ensuring passenger comfort, and optimizing fuel efficiency, leading to suboptimal performance in real-world conditions. To tackle collision avoidance, this paper introduces a novel approach by defining the issue as an optimal control problem and solving it using the… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076608 - 09 April 2026
(This article belongs to the Special Issue: Bridging the Gap: AutoML and Explainable AI for Industrial and Healthcare Innovations)
Abstract Machine Learning (ML) intrusion detection systems (IDS) are vulnerable to manipulations: small, protocol-valid manipulations can push samples across brittle decision boundaries. We study two complementary remedies that reshape the learner in distinct ways. Adversarial Training (AT) exposes the model to worst-case, in-threat perturbations during learning to thicken local margins; Counterfactual Augmentation (CF-Aug) adds near-boundary exemplars that are explicitly constrained to be feasible, causally consistent, and operationally meaningful for defenders. The main goal of this work is to investigate and compare how AT and CF-Aug can reshape the decision surface of the IDS. eXplainable Artificial Intelligence More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076986 - 09 April 2026
(This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
Abstract The semantic complexity of large-scale malicious payloads in modern network traffic severely limits the robustness and generalization of existing Intrusion Detection Systems (IDS). This limitation presents a major challenge to network security. This paper proposes a dual-branch intrusion detection method called CPS-IDS. This method fuses deep semantic features with statistical features. The first branch uses the DeBERTav2 module. It performs deep semantic modeling on the session payload. This branch also incorporates a Time Encoder. The Time Encoder models the temporal behavior of the packet arrival interval time series. A Cross-Attention mechanism achieves the joint modeling… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076623 - 09 April 2026
(This article belongs to the Special Issue: Deep Learning: Emerging Trends, Applications and Research Challenges for Image Recognition)
Abstract This paper introduces MobiIris, a lightweight deep network for mobile iris recognition that enhances attention and specifically addresses the balance between accuracy and efficiency on devices with limited resources. The proposed model is based on the large version of MobileNetV3 and adds more spatial attention blocks and an embedding-based head that was trained using margin-based triplet learning, enabling fine-grained modeling of iris textures in a compact representation. To further improve discriminability, we design a training pipeline that combines dynamic-margin triplet loss, a staged hard/semi-hard negative mining strategy, and feature-level knowledge distillation from a ResNet-50 teacher.… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077579 - 09 April 2026
(This article belongs to the Special Issue: Bridging the Gap: AutoML and Explainable AI for Industrial and Healthcare Innovations)
Abstract Despite remarkable advances in medical large language models (LLMs), their deployment in real clinical settings remains impractical due to prohibitive computational requirements and privacy regulations that restrict cloud-based solutions. Small LLMs (sLLMs) offer a promising alternative for on-premise deployment, yet they require domain-specific fine-tuning that still exceeds the hardware capacity of most healthcare institutions. Furthermore, the impact of multilingual data composition on medical sLLM performance remains poorly understood. We present a resource-efficient fine-tuning pipeline that integrates Quantized Low-Rank Adaptation (QLoRA), Fully Sharded Data Parallelism (FSDP), and Sequence Packing, validated across two model scales: MedGemma 4B… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077222 - 09 April 2026
(This article belongs to the Special Issue: Cloud Computing Security and Privacy: Advanced Technologies and Practical Applications)
Abstract Cloud computing now supports large-scale maritime analytics, yet offloading rich Automatic Identification System (AIS) data to the cloud exposes sensitive operational patterns and complicates compliance with cross-border privacy regulations. This work addresses the gap between growing demand for AI-driven vessel intelligence and the limited availability of practical, privacy-preserving cloud solutions. We introduce a privacy-by-design edge-cloud framework in which ports and vessels serve as federated clients, training vessel-type classifiers on local AIS trajectories while transmitting only clipped, Gaussian-perturbed updates to a zero-trust cloud coordinator employing secure and robust aggregation. Using a public AIS corpus with realistic… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076137 - 09 April 2026
Abstract Multi-behavior recommendation methods leverage various types of user interaction behaviors to make personalized recommendations. Behavior paths formed by diverse user interactions reveal distinctive patterns between users and items. Modeling these behavioral paths captures multidimensional behavioral features, which enables accurate learning of user preferences and improves recommendation accuracy. However, existing methods share two critical limitations: (1) Lack of modeling for the diversity of behavior paths; (2) Ignoring the impact of item attribute information on user behavior paths. To address these issues, we propose a Directed Behavior path graph-based Multi-behavior Recommendation method (DBMR). Specifically, we first construct… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077237 - 09 April 2026
(This article belongs to the Special Issue: Advances in Video Object Tracking: Methods, Challenges, and Applications)
Abstract In the realm of unmanned surface vehicle (USV) operations, leveraging environmental factors to enhance situational awareness has garnered significant academic attention. Developing vision systems for USVs presents considerable challenges, mainly due to variable observational conditions and angular vibrations caused by hydrodynamic forces. The paper proposed a novel MDGAN-DIFI network for end-to-end multi-object tracking (MOT), specifically designed for camera systems mounted on USVs. Beyond enhancing traditional MOT models, the proposed MDGAN-DIFI includes preprocessing modules designed to enhance the efficiency of processing input signal quality. Initially, a Deep Iterative Frame Interpolation (DIFI) module is used to stabilize… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077062 - 09 April 2026
(This article belongs to the Special Issue: Machine Learning in the Mechanics of Materials and Structures)
Abstract This article presents an approach to predicting the hysteresis behavior of shape memory alloys (SMAs) using a Temporal Convolutional Network (TCN) deep learning model, followed by the interpretation of the results using Explainable Artificial Intelligence (XAI) methods. The experimental dataset was prepared based on cyclic loading tests of nickel-titanium wire at loading frequencies of 0.3, 0.5, 1, 3, and 5 Hz. For training, validation, and testing, 100–250 loading-unloading cycles were used. The input features of the models were stress σ (MPa), cycle number (Cycle parameter), and loading-unloading stage indicator, while the output variable was strain… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076418 - 09 April 2026
Abstract Investigating the deformation behavior of graphene-reinforced composite structures holds significant engineering implications, while the rapid advancement of machine learning has introduced new technical approaches to structural bending analysis. In this study, we investigate the mechanical bending behavior of graphene origami (GOri)-enabled auxetic metamaterial beams using a physics-informed neural network (PINN). GOri-enabled auxetic metamaterials represent an innovative composite system characterized by a negative Poisson’s ratio (NPR) and superior mechanical performance. Here, we propose a composite beam model incorporating the modified coupled stress theory (MCST) and employing the PINN method to solve higher-order bending governing equations. Compared More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076622 - 09 April 2026
Abstract A data-driven optimization framework that integrates machine learning surrogate models, finite element analysis (FEA), and a multi-objective optimization algorithm is used in this study for developing thermoplastic elastomer (TPE) parts for aerospace applications. By using FEA simulations and experiments, a database of input design parameters (e.g., geometry and structural shape modifier) is generated. Afterwards, we train surrogate models (e.g., Gaussian Process Regression, neural networks) to approximate mappings from design space to performance space. Finally, we propose Pareto-optimal TPE designs using the surrogate embedded in a multi-objective optimization loop (such as NSGA-II or gradient-based methods). The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077155 - 09 April 2026
(This article belongs to the Special Issue: Computational Approaches for Tribological Materials and Surface Engineering)
Abstract UV-curable acrylic polymers are promising for advanced coating applications; however, they suffer from low mechanical strength and wear resistance. This study investigated the effects of zinc oxide (ZnO) nanoparticle incorporation (0, 1, 3, and 5 wt.%) on mechanical, surface, and tribological properties of UV-curable acrylic polymer nanocomposites. The elastic modulus increased from 9.41 MPa (bare polymer) to 22.39 MPa (5 wt.% ZnO), a 138% improvement. X-ray diffraction (XRD) analysis confirmed the formation of a crystalline region at the polymer-ZnO interface, with crystallite sizes reaching 121.94 nm compared to 7.95 nm for the bare-polymer. Surface roughness More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077864 - 09 April 2026
(This article belongs to the Special Issue: Advances in Computational Materials Science: Focusing on Atomic-Scale Simulations and AI-Driven Innovations)
Abstract The intermetallic compounds with modulated electronic structure can provide more catalytically active sites and enhance electrocatalytic performance. In this study, the first-principles calculation method has been employed to investigate the potential of L10-NiM (M = Mn, Fe, Co, Cu, Zn, Mo) intermetallic compounds for electrocatalytic hydrogen evolution reaction (HER). Firstly, the L10-NiM present a homogenized charge transfer environment, where the Bader charge difference on the catalyst surface is below 0.13 e, significantly mitigating the locally strong adsorption of adsorbates in Ni. Additionally, the L10-NiM also fine-tunes the antibonding orbital interactions with adsorbates, facilitating both water dissociation and More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078225 - 09 April 2026
(This article belongs to the Special Issue: Computational Modeling and Simulation of Energy and Environmental Materials)
Abstract MAB phases are a class of layered ternary transition-metal borides, characterized by hard M-B slabs interleaved with softer A-element layers, and thus hold promise for wear-resistant and high-temperature structural applications. However, their compositional space and structural diversity remain insufficiently explored, limiting guidance for synthesis and property optimization. In this work, we perform a comprehensive exploration and screening of the MAB family using high-throughput first-principles calculations. We systematically identify 855 candidate MAB compounds with orthorhombic and hexagonal structures across multiple transition-metal families, which form the starting pool for subsequent stability and property evaluation. The workflow evaluates… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077143 - 09 April 2026
(This article belongs to the Special Issue: Computational Approaches for Tribological Materials and Surface Engineering)
Abstract Epoxy resins are widely used as protective coatings due to their excellent adhesion and chemical resistance; however, their inherent brittleness and susceptibility to shear stress-induced crack propagation limit their tribological performance. This study investigates the stress distribution mechanisms governing the wear resistance of solvent-textured epoxy coatings using finite element analysis (FEA) and experimental validation. Three solvents with distinct volatilities—acetone, methyl ethyl ketone (MEK), and ethyl acetate (EA)—generated characteristic surface morphologies through Marangoni convection, with roughness ranging from Ra = 0.17 μm (EA) to 0.66 μm (acetone). X-ray diffraction (XRD) and Fourier-transform infrared (FT-IR) spectroscopy confirmed… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076464 - 09 April 2026
(This article belongs to the Special Issue: AI and Multiscale Modeling in the Development of Optoelectronic and Thermoelectric Materials)
Abstract The direct conversion of solid-state heat to electricity using thermoelectric materials has attracted attention; however, their effective application is limited because of the challenge of ensuring a balance between the microstructural features at the quantum, mesoscale, and continuum scales. Current computational and machine-learning methods have a small design space, wherein few to no interactions between the electronic structure, phonon transport, and device-level are considered. This makes it difficult to discover stable high-figure of merit (ZT) settings that are manufacturable and strong in the actual working environment. This study presents a multiscale hybrid optimization framework that… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077868 - 09 April 2026
Abstract Tungsten-copper laminated composites are promising materials for high heat-flux applications, but their performance is often limited by interfacial instability caused by the thermal-mechanical mismatch between tungsten and copper. In this study, W/W-30Cu/CuCrZr three-layer composites are fabricated by high-pressure torsion (HPT) processing. Experimental characterization and molecular dynamics (MD) simulations are used to systematically investigate the influence of HPT process parameters and intermediate-layer composition on the evolution of microstructure and mechanical properties. HPT processing significantly refines the grains of the W-xCu composites and enhances their homogeneity. After applying 15 revolutions of HPT on W-30Cu composites, the crystallite… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078574 - 09 April 2026
(This article belongs to the Special Issue: Advanced Computational Modeling and Simulations for Engineering Structures and Multifunctional Materials: Bridging Theory and Practice)
Abstract Glass fiber-reinforced polymer composites (GFRPCs) are extensively utilized in the aerospace, automotive, and structural sectors; nevertheless, their heterogeneous and abrasive characteristics result in rapid tool wear during drilling. Drill flank wear among various wear mechanisms notably influences hole quality and dimensional accuracy. This research investigates the impact of spindle speed, feed rate, and drill diameter on flank wear during dry drilling of GFRPC laminates with high-speed steel (HSS) twist drills. A full-factorial design with 81 experiments is used to create a comprehensive dataset. ANOVA indicates that spindle speed is the dominant factor affecting wear changes,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077416 - 09 April 2026
(This article belongs to the Special Issue: Machine Learning Methods in Materials Science)
Abstract The long-term reliability of 1.25Cr-0.5Mo steels in high-temperature service critically depends on their creep rupture behavior, which is strongly influenced by alloy composition, microstructural characteristics, and testing conditions. In this study, an advanced Artificial Neural Network (ANN) model was developed to accurately predict the creep-rupture life of 1.25Cr-0.5Mo steels, offering a data-driven framework for alloy design and service-life assessment. The model incorporated eleven compositional variables (C, Si, Mn, P, S, Ni, Cr, Mo, Cu, Al, N), average grain size, non-metallic inclusions (NMI), steel properties including hardness measured on the Rockwell B scale (HRB) yield strength… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078722 - 09 April 2026
Abstract This study examines the phase-dependent structural, electronic, optical, and thermodynamic characteristics of the cubic, tetragonal, and orthorhombic phases of BaTiO3 using DFT simulations. Lattice parameters and bulk moduli computed through structural optimizations within the GGA-PBE framework are in good agreement with existing experimental and theoretical studies. All phases exhibit negative formation energies, indicating thermodynamic stability, with the orthorhombic phase being the most stable. Electronic structure calculations reveal indirect band gaps of 2.86, 2.96, and 3.43 eV for the cubic, tetragonal, and orthorhombic phases, respectively. The density of states analysis indicates that O-p states dominate the valence… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077966 - 09 April 2026
Abstract The batch-to-batch variability in low-pressure die casting (LPDC), caused by inherent process parameter fluctuations, poses a significant challenge to consistent quality. However, traditional single-point optimization methods ignore parameter fluctuations. This study presents a robust design framework to overcome this limitation. First, an integrated simulation workflow was established by coupling ProCAST casting simulation with Abaqus finite element analysis to predict shrinkage pore volume and load-bearing capacity (LBC). Subsequently, a dataset was constructed from the integrated simulations, and then served to develop a surrogate model using the Extreme Gradient Boosting algorithm. Finally, robust process windows were derived… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.079045 - 09 April 2026
Abstract Fluoride materials are renowned for their exceptional optical transparency, ionic conductivity, and chemical stability, making them indispensable in a wide range of technological applications. Despite the previous extensive research on simple metal fluorides, the complex metal fluoride family—particularly compounds with AB2F8 stoichiometry—remains largely unexplored. In this work, we present the first comprehensive density functional theory (DFT) investigation of the rare and formerly unreported MgAu2F8 complex metal fluoride, systematically revealing its electronic, optical, and thermoelectric properties under varying hydrostatic pressures. Our results reveal that MgAu2F8 undergoes a remarkable transformation from a wide-bandgap semiconductor at ambient conditions to a More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.075197 - 09 April 2026
(This article belongs to the Special Issue: Design, Optimisation and Applications of Additive Manufacturing Technologies)
Abstract This study aims to develop a digital twin framework for fabricating automotive components through additive manufacturing (AM) technology. The framework comprises topology optimization (TO), finite element analysis (FEA), and fabrication analysis using Simufact Additive, which ensures the first-time-right fabrication of the component. Using TO-FEA, the component is designed with reduced overall weight without compromising the structural and functional performance. After the successful design of the component, it is analyzed for fabrication feasibility before undergoing the actual fabrication process. In the present study, an automotive flange fork is designed and fabricated through AM laser powder-bed fusion… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078760 - 09 April 2026
Abstract Graphene has excellent mechanical, electrical and optical properties, which make it an ideal reinforcement phase for aluminum matrix composites. However, graphene is easy to agglomerate and has poor wettability with the aluminum matrix, resulting in unsatisfactory effects when added to the aluminum matrix. In this paper, the effects of transition metals (Cu, Ni, Co) on the bonding properties at the graphene/aluminum interface were systematically investigated using first-principles calculations. The computational results reveal significant differences in the effects of various metals and their crystal plane orientations on interface stability and bonding strength. Among Cu, Ni, Co… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078775 - 09 April 2026
(This article belongs to the Special Issue: Advanced Computational Modeling and Simulations for Engineering Structures and Multifunctional Materials: Bridging Theory and Practice)
Abstract Crumb rubber concrete (CRC) has emerged as a sustainable solution to the environmental challenges posed by rubber waste. This study introduces an advanced mixed-random-aggregate mesoscale model for CRC based on the Base Force Element Method (BFEM) and the complementary energy principle. The model incorporates different rubber substitution ratios (0%–30%), rubber particle sizes (2 mm and 4 mm), and specimen dimensions (edge lengths of 100, 150, and 300 mm). These parameters are considered to investigate their effects on the mechanical properties and failure mechanisms of CRC. Accordingly, the numerical results include stress–strain responses, elastic modulus, and… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077314 - 09 April 2026
(This article belongs to the Special Issue: Intelligent Transportation System (ITS) Safety and Security)
Abstract The safe operation of railway systems necessitates efficient and automated inspection of tunnel defects. While deep learning offers solutions, a clear pathway for selecting and optimizing the latest object detectors for distinct defects under strict speed constraints is lacking. This paper presents a two-stage, task-specific framework for high-speed tunnel defect detection. First, this study conducts a comprehensive comparative analysis of state-of-the-art YOLO models (YOLOv5s, YOLOv8s, YOLOv10s, YOLOv11s) on self-constructed datasets. This systematic comparison identifies YOLOv5s as the optimal model for crack detection, achieving an mAP@0.5 of 0.939 at 77.5 FPS, sufficient for inspection at 50… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077012 - 09 April 2026
Abstract In a distributed edge computing environment, Internet of Things (IoT) and Vehicular-IoT (V-IoT) devices communicate through Wireless Sensor Networks (WSNs) by collecting and transmitting data from different environments. Although energy efficiency is always a critical challenge in WSN due to limited battery power, along with the demand for fast communication over edge devices in 5G and beyond 5G scenarios. Therefore, to overcome the challenges, an advanced hierarchical agent-based power management scheme is proposed for WSNs that optimizes energy distribution while maintaining reliable communication. The proposed model employs Master Agents (MAs), Coordination Agents (CoAs), and Task More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077997 - 09 April 2026
(This article belongs to the Special Issue: Intelligent Computation and Large Machine Learning Models for Edge Intelligence in industrial Internet of Things)
Abstract The rapid deployment of Industrial Internet of Things (IIoT) systems, such as large-scale photovoltaic (PV) power stations in modern power grids, has created a strong demand for edge-intelligent fault localization methods that can operate reliably under strict computational and memory constraints. In this work, we propose an edge-intelligent photovoltaic fault localization framework that integrates intelligent computation with classical sub-pixel optimization. The framework adopts a modular, edge-oriented design in which a radial basis function (RBF) network is first employed as a lightweight screening module to enable conditional execution, thereby reducing unnecessary computation for non-faulty samples. For… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077392 - 09 April 2026
Abstract With the growing deployment of unmanned aerial vehicles (UAVs), reliable engine health state assessment (HSA) requires methods that are interpretable, auditable, and transferable under noisy data and varying operating conditions. This paper proposes an AHP-enhanced, data-driven HSA framework that builds a unified health vector from four indicators—remaining useful life (RUL) health, absolute state, relative degradation, and condition health. Indicator weights are derived using AHP with consistency checking, and the resulting continuous health index is mapped through nonlinear stretching and four-level thresholds to produce actionable health grades. Experiments on the NASA CMAPSS benchmark (FD001) evaluate conventional More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076800 - 09 April 2026
Abstract Diabetic Retinopathy (DR) is a common microvascular complication of diabetes that progressively damages the retinal blood vessels and, without timely treatment, can lead to irreversible vision loss. In clinical practice, DR is typically diagnosed by ophthalmologists through visual inspection of fundus images, a process that is time-consuming and prone to inter- and intra-observer variability. Recent advances in artificial intelligence, particularly Convolutional Neural Networks (CNNs) and Transformer-based models, have shown strong potential for automated medical image classification and decision support. In this study, we propose a Position-Wise Attention-Enhanced Vision Transformer (PWAE-ViT), which integrates a positional attention… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074554 - 09 April 2026
Abstract Accurate prediction of shoulder joint angles based on surface electromyography (sEMG) signals is critical in human–machine interaction and rehabilitation engineering. However, due to the shoulder joint’s complex degrees of freedom, dynamically varying muscle coordination patterns, and the susceptibility of sEMG signals to cross-talk and noise interference, achieving high-precision prediction remains challenging. In this study, LASENet (BiLSTM–Attention–SE Network) is proposed as an end-to-end deep learning framework that integrates a bidirectional long short-term memory network (BiLSTM), a multi-head self-attention (MHSA) mechanism, and a squeeze-and-excitation (SE) block to predict shoulder joint angles across three degrees of freedom directly More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077252 - 09 April 2026
Abstract Field–road classification, a fine-grained form of agricultural machinery operation-mode identification, aims to use Global Navigation Satellite System (GNSS) trajectory data to assign each trajectory point a semantic label indicating whether the machine is performing field work or travelling on roads. Existing methods struggle with highly imbalanced class distributions, noisy measurements, and intricate spatiotemporal dependencies. This paper presents AgroGeoDB-Net, a unified framework that combines a residual BiLSTM backbone with two tightly coupled innovations: (i) a Density-Aware Local Interpolator (DALI), which balances the minority road class via density-aware interpolation while preserving road-segment structure; and (ii) a geometry-aware… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076413 - 09 April 2026
(This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
Abstract Intrusion Detection Systems (IDS) play a critical role in protecting networked environments from cyberattacks. They have become increasingly important in smart environments such as the Internet of Things (IoT) systems. However, IDS for IoT networks face critical challenges due to hardware constraints, including limited computational resources and storage capacity, which lead to high feature dimensionality, prediction uncertainty, and increased processing cost. These factors make many conventional detection approaches unsuitable for real-time IoT deployment. To address these challenges, this paper proposes an adaptive intrusion detection framework that intelligently balances detection accuracy and computational efficiency. The proposed… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076043 - 09 April 2026
Abstract In view of the problem that the IP address jump law is easy to predict in the current mobile target defense, this paper proposes a network address jump active defense method based on a dynamic random graph, designed to improve the unpredictability of IP address translation. Firstly, in order to make IP address transformation unpredictable in space and time, a random graph model is designed to generate a pseudo-random sequence of IP address randomization; these pseudo-random can meet the unpredictability of IP address translation in both space and time. Then, based on these pseudo-random sequences… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077582 - 09 April 2026
(This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
Abstract The increasing connectivity of modern vehicles exposes the in-vehicle controller area network (CAN) bus to various cyberattacks, including denial-of-service, fuzzy injection, and spoofing attacks. Existing machine learning and deep learning intrusion detection systems (IDS) often rely on labeled data, struggle with class imbalance, lack interpretability, and fail to generalize well across different datasets. This paper proposes a lightweight and interpretable IDS framework based on non-negative matrix factorization (NMF) to address these limitations. Our contributions include: (i) evaluating NMF as both a standalone unsupervised detector and an interpretable feature extractor (NMF-W) for classical, unsupervised, and deep… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077697 - 09 April 2026
(This article belongs to the Special Issue: Artificial Intelligence Methods and Techniques to Cybersecurity)
Abstract The rapid evolution of malware obfuscation and packing techniques significantly undermines the effectiveness of traditional static detection approaches. Transforming malware binaries into grayscale or RGB images enables learning-based classification, yet existing CNN- and ViT-based models depend heavily on fixed-resolution inputs and exhibit poor robustness under cross-resolution distortions. This study proposes a lightweight and sample-adaptive Multi-Scale Vision Transformer (MSA-ViT) for efficient and robust malware image classification. MSA-ViT leverages a fixed set of input scales and integrates them using a Scale-Attention Fusion (SAF) module, where the largest-scale CLS token serves as the query to dynamically aggregate cross-scale More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077824 - 09 April 2026
(This article belongs to the Special Issue: Advanced Networking Technologies for Intelligent Transportation and Connected Vehicles)
Abstract In the unmanned aerial vehicle (UAV) assisted edge computing system, the broadcast characteristics of the UAV signal, the high mobility of the UAV, and the limited airborne energy make the task offloading strategy face challenges such as increased risk of information disclosure, limited computing resources, and the trade-off between energy consumption and flight time. To address these issues, we propose a K-means in-depth reinforcement learning algorithm based on Soft Actor-Critic (SAC). The proposed method first leverages the K-means clustering algorithm to determine the optimal deployment of ground jammers based on the final distribution of mobile… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076767 - 09 April 2026
(This article belongs to the Special Issue: Secure and Intelligent Intrusion Detection for IoT and Cloud-Integrated Environments)
Abstract The rapid proliferation of the Internet of Things (IoT) has not only reshaped the digital ecosystem but also significantly widened the attack surface, leading to a surge in network traffic and diverse security threats. Deploying effective defense mechanisms in such environments is challenging, as conventional Intrusion Detection Systems (IDS) often struggle to balance computational efficiency with the reliable detection of low-frequency, high-impact threats, particularly within the tight resource constraints of edge devices. To address these limitations, we propose a lightweight, high-efficiency IDS framework specifically optimized for edge-based IoT applications, incorporating Mutual Information (MI)-based feature selection… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074308 - 09 April 2026
Abstract Traffic flow prediction is of great importance in traffic planning, road resource management, and congestion mitigation. However, existing prediction have significant limitations in modeling multi-scale spatial-temporal features, particularly in capturing temporal periodicity and spatial dependency in dynamically evolving traffic networks. This paper proposes a novel framework of traffic flow prediction, referred to as Adaptive Graph Fusion Dual-scale Convolutional Network (AGFDCN), which integrates spatial-temporal dynamic graphs with dual-scale convolutional networks. Specifically, we introduce a Dual-Scale Temporal Network, which combines long- and short-term dilated causal convolutions with a temporal decay-aware attention mechanism to efficiently capture traffic patterns… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076784 - 09 April 2026
(This article belongs to the Special Issue: Advances in Intelligent Video Object Tracking and Scene Understanding)
Abstract Self-supervised monocular depth estimation has attracted considerable attention due to its ability to learn without ground-truth depth annotations and its strong scalability. However, existing approaches still suffer from inaccurate object boundaries and limited inference efficiency. To address these issues, we present a Lightweight Conditional Diffusion Model for Monocular Depth Estimation (LCDM-Mono). The proposed framework integrates an efficient diffusion inference strategy with a knowledge distillation scheme, enabling the model to generate high-quality depth maps with only two sampling steps during inference. This design substantially reduces computational overhead and ensures real-time performance on resource-constrained platforms. In addition, More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077260 - 09 April 2026
(This article belongs to the Special Issue: Development and Application of Deep Learning and Image Processing)
Abstract Unmanned aerial vehicle (UAV) images have high spatial resolution and are cost-effective to acquire. UAV platforms are easy to control, and the prevalence of UAVs has led to an emerging field of remote sensing technologies. However, the details of high-resolution images often lead to fragmented classification results and significant scale differences between objects. Additionally, distinguishing between objects on the basis of shape or textural characteristics can be difficult. Conventional classification methods based on pixels and objects can indeed be ineffective at detecting complex and fine-scale land use and land cover (LULC) features. Therefore, in this More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.075679 - 09 April 2026
(This article belongs to the Special Issue: Control Theory and Application of Multi-Agent Systems)
Abstract This paper studies a sampling-based dynamic event-triggered fixed-time bipartite formation algorithm for a class of continuous-time multi-agent systems with communication constraints. First, a periodic sampling mechanism is designed to reduce the system’s communication frequency. Then, a dynamic event-triggered control algorithm based on auxiliary variables is developed for sampled-data systems to further reduce the system’s triggering frequency. Next, to enhance the convergence speed of the dynamic event-triggered control method, a dynamic event-triggered fixed-time bipartite formation control scheme is investigated. Finally, using Lyapunov stability theory, signed graph theory, and relevant inequalities, a rigorous theoretical proof of the More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076156 - 09 April 2026
(This article belongs to the Special Issue: Fake News Detection in the Era of Social Media and Generative AI)
Abstract The widespread use of social media has made assessing users’ tastes and preferences increasingly complex and important. At the same time, the rapid dissemination of misinformation on these platforms poses a critical challenge, driving significant efforts to develop effective detection methods. This study offers a comprehensive analysis leveraging advanced Machine Learning (ML) techniques to classify news articles as fake or true, contributing to discourse on media integrity and combating misinformation. The suggested method employed a diverse dataset encompassing a wide range of topics. The method evaluates the performance of five ML models: Artificial Neural Networks… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076126 - 09 April 2026
(This article belongs to the Special Issue: Artificial Intelligence Methods and Techniques to Cybersecurity)
Abstract Graph neural networks (GNNs) have demonstrated impressive capabilities in processing graph-structured data, yet their vulnerability to adversarial perturbations poses serious challenges to real-world applications. Existing defense methods often fail to handle diverse types of attacks and adapt to dynamic adversarial strategies because they typically rely on static defense mechanisms or focus narrowly on a single robustness dimension. To address these limitations, we propose an adversarial attention-based robustness strategy (AARS), which is a unified framework designed to enhance the robustness of GNNs against structural and feature perturbations. AARS operates in two stages: the first stage employs More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077087 - 09 April 2026
(This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation, 2nd Edition)
Abstract This study proposes an Adaptive Pooling method based on an alpha (α) parameter to enhance the effectiveness and stability of convolutional neural networks (CNNs) in image classification tasks. Conventional pooling techniques, such as max pooling and average pooling, often exhibit limited adaptability when applied to datasets with heterogeneous distributions and varying levels of complexity. To address this limitation, the proposed approach introduces an α parameter ranging from 0 to 1 that continuously regulates the contribution of maximum-based and average-based pooling operations in a unified and flexible framework. The proposed method is evaluated using two benchmark… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076511 - 09 April 2026
Abstract With the diversification of electricity trading forms driven by distributed energy technologies, the continuous growth of blockchain’s chained data structure poses dual challenges to traditional B+ tree indexes in terms of query efficiency and storage costs. This paper proposes a sliding window-based learned index construction method (SW-LI). The method consists of two key components. First, block timestamp–height samples are selected using a sliding window and used to train a linear regression model that captures the timestamp-to-height mapping. Second, an adaptive window adjustment mechanism is introduced: when the prediction error within a window exceeds a threshold,… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076562 - 09 April 2026
(This article belongs to the Special Issue: Complex Network Approaches for Resilient and Efficient Urban Transportation Systems)
Abstract In recent years, increasing urban mobility and complex traffic dynamics have intensified the need for accurate traffic flow forecasting in intelligent transportation systems. However, existing models often struggle to jointly capture short-term fluctuations and long-term temporal dependencies under noisy and heterogeneous traffic conditions. To address this challenge, this paper proposes a hybrid traffic flow forecasting framework that integrates Density-Based Spatial Clustering of Applications with Noise (DBSCAN), the Mamba state-space model, and the Transformer architecture. The framework first applies DBSCAN to multidimensional traffic features to enhance traffic state representation and reduce noise. The prediction module alternates… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077415 - 09 April 2026
(This article belongs to the Special Issue: Computational Learning Methods for Unmanned Vehicles: Cross-Task Adaptation and Generalization)
Abstract Conventional Low-Rank Adaptation (LoRA) constrains weight updates to a static linear low-rank manifold, which is inherently limited when applied to Reinforcement Learning (RL) tasks for Unmanned Aerial Vehicle (UAV) applications. UAVs operate in highly dynamic and nonstationary environments where rapid variations in sensing and state transitions lead to complex, nonlinear input–output relationships. Such environmental complexity cannot be adequately modeled by a static Low-rank approximation, making conventional LoRA approaches insufficient for the high-dimensional dynamics required in UAV applications. To overcome these limitations, we propose an attention-enhanced LoRA that constructs an input-dependent and intrinsically nonlinear adaptation manifold.… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077651 - 09 April 2026
Abstract To address the need for improving the efficiency of spray painting large and complex curved surfaces, this study investigates the arm–rail coordinated spray painting operation method and proposes a robot workspace calculation method for efficient spray area partitioning. The steps for calculating the workspace under the constraints of the principal normal vector and the conical pose domain are introduced, along with an analysis of the robot’s forward and inverse kinematics. Simulation validation was conducted using a wind turbine blade as the target object. The results show that the workspace based on conical pose domain constraints More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074429 - 09 April 2026
(This article belongs to the Special Issue: Software, Algorithms and Automation for Industrial, Societal and Technological Sustainable Development)
Abstract In the past two decades, Precision Agriculture has received research attention since the development of robotics. Agricultural robotic equipment and drones, which can be operated by farmers, are appearing more frequently and being used to make the process of farming easier and more productive. This paper attempts to develop a modified Q-learning algorithm. A reinforcement learning algorithm called Q-learning has Q-values that are updated in order to find the best routes for the robotic devices to follow while avoiding any obstacles. Different types of terrain and other factors that influence the development of good routes… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074930 - 09 April 2026
(This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
Abstract The rapid evolution of 5G-enabled Software Defined Networks (SDNs) has transformed modern communication systems by enabling ultra-low latency, massive connectivity, and high throughput. However, the increased complexity of traffic flows and the rise of sophisticated cyber-attacks such as Distributed Denial of Service (DDoS), Botnets, Fake Base Stations, and Zero-Day exploits have made intrusion detection a critical challenge. Traditional Intrusion Detection System (IDS) approaches often suffer from poor gen-eralization, high false positives, and lack of interpretability, making them unsuitable for dynamic 5G environments. This paper presents a novel Graph Neural Network (GNN) with Multi-Head Attention (MHA)… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076251 - 09 April 2026
(This article belongs to the Special Issue: Advances in Time Series Analysis, Modelling and Forecasting)
Abstract Electrocardiogram (ECG) is a widely used non-invasive tool for diagnosing cardiovascular diseases. ECG zero-shot classification involves pre-training a model on a large dataset to classify unknown disease categories. However, existing ECG feature extraction networks often neglect key lead signals and spatial topology dependencies during cross-modal alignment. To address these issues, we propose a multimodal channel compression graph attention alignment network (MCCGAA). MCCGAA incorporates a channel attention module (CAM) to effectively integrate key lead features and a graph attention-based alignment network to capture spatial dependencies, enhancing cross-modal alignment. Additionally, MCCGAA employs a log-sum-exp loss function, improving More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.075985 - 09 April 2026
(This article belongs to the Special Issue: Advances in Large Models and Domain-specific Applications)
Abstract How can AI assist doctors in generating clinical reports without compromising patient privacy? This question motivates our development of PrivLLM-Guard, a novel framework for differentially private large language models (LLMs) tailored to real-time confidential medical text generation and summarization. While LLMs have shown promise in automating clinical documentation, the sensitivity of healthcare data demands rigorous privacy protections. PrivLLM-Guard addresses this need by combining advanced—differential privacy techniques with adaptive noise calibration, ensuring robust privacy guarantees without sacrificing utility. The framework integrates bidirectional transformer encoders with autoregressive decoders, further enhanced by privacy-aware attention and gradient perturbation mechanisms. Extensive More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077207 - 09 April 2026
Abstract Accurate and timely detection of rice leaf diseases is critical for ensuring global food security and maximizing agricultural yields. However, existing deep learning methods often struggle to balance the high accuracy required for detecting multi-scale lesions in complex field environments with the computational efficiency necessary for edge device deployment. This paper proposes You Only Look Once for Lightweight Detection (YOLOv11-LD), a lightweight object detection model for multi-scale rice leaf disease detection in real paddy field environments. The model is built on YOLOv11n and integrates a Re-parameterized Vision Transformer (RepViT) backbone, a Bidirectional Feature Pyramid Network… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077329 - 09 April 2026
Abstract In accident scenarios on freeways, traffic congestion, sharp declines in capacity, and the limitations of closed systems where vehicles cannot turn around or exit freely often pose serious challenges. To address these issues, this study develops an improved Markov Decision Process (MDP) framework for dynamic emergency lane opening. Compared with traditional MDP-based traffic control models, the proposed method integrates three enhancements: Firstly, an explicit action decision space transition mechanism that couples variable speed limits with emergency lane opening decisions; Secondly, vehicle-type–differentiated actions to support fine-grained and adaptive opening strategies; and a redesigned reward function incorporating… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077510 - 09 April 2026
Abstract The expeditious proliferation of the smart computing paradigm has a remarkable upsurge towards Artificial Intelligence (AI) assistive reasoning with the incorporation of context-awareness. Context-awareness plays a significant role in fulfilling users’ needs whenever and wherever needed. Context-aware systems acquire contextual information from sensors/embedded sensors using smart gadgets and/or systems, perform reasoning using reinforcement learning (RL) or other reasoning techniques, and then adapt behavior. The core intention of using an RL-based reasoning strategy is to train agents to take the right actions at the right time and in the right place. Generally, agents are rewarded for… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.075616 - 09 April 2026
(This article belongs to the Special Issue: Advancements in Pattern Recognition through Machine Learning: Bridging Innovation and Application)
Abstract Facial Expression Recognition (FER) is an essential endeavor in computer vision, applicable in human-computer interaction, emotion assessment, and mental health surveillance. Although Convolutional Neural Networks (CNNs) have proven effective in Facial Emotion Recognition, they encounter difficulties in capturing long-range connections and global context. To address these constraints, we propose Spatial Quad-Similarity Network (SQSNet), an innovative hybrid framework that integrates the local feature extraction capabilities of CNNs with the global contextual modeling efficacy of Swin Transformers via a cohesive fusion technique. SQSNet introduces the Spatial Quad-Similarity (SQS) module, a feature refinement approach that amplifies discriminative characteristics… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077008 - 09 April 2026
(This article belongs to the Special Issue: Advancements in Mobile Computing for the Internet of Things: Architectures, Applications, and Challenges)
Abstract To realize local production and consumption of Spatio-temporal data (STD), it is essential to address two key challenges: (1) maintaining data locality by retaining and distributing STD close to their generation area, and (2) enabling application execution on heterogeneous and resource-constrained devices through a lightweight and portable execution platform. To address these challenges, we developed a Floating Cyber-Physical System (F-CPS) that retains both STD and the functions required to process and use the STD within a specific area. In the F-CPS, the STD Retention System directly distributes STD from the generation location and maintains the… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076402 - 09 April 2026
Abstract The effective diagnosis and treatment planning require the correct classification of the cerebral neoplasia, such as glioma, meningioma, and pituitary tumors. The recent developments in the deep learning field have made a significant contribution to the field of image analysis in medicine; however, Vision Transformers (ViTs) have achieved good results but are computationally complex. This paper presents NeuroTriad-ViT, a proprietary large-scale Vision Transformer of 235 million parameters, which is represented as a high-performance teacher model to classify brain tumors. Knowledge distillation is applied in an attempt to transfer the representations that the teacher learned to… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074154 - 09 April 2026
Abstract In the Internet of Vehicles (IoV) environment, the growing demand for computational resources from diverse vehicular applications often exceeds the capabilities of intelligent connected vehicles. Traditional approaches, which rely on one or more computational resources within the cloud-edge-device computing model, struggle to ensure overall service quality when handling high-density traffic flows and large-scale tasks. To address this issue, we propose a computational offloading scheme based on a cloud-edge-device collaborative 6G IoV edge computing model, namely, Multi-Agent Deep Reinforcement Learning-based and Server-weighted scoring Selection (MADRLSS), which aims to optimize dynamic offloading decisions and resource allocation. The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077884 - 09 April 2026
Abstract In response to the growing need for adaptive optimization algorithms capable of handling complex, multimodal, and high-dimensional search spaces, this paper introduces the Structured Random Cycle-guided Algorithm (SRCA). SRCA is not presented as a fundamentally new optimization paradigm, but rather as an architectural synthesis and a unified adaptive framework for dynamic operator selection. Based on a cycle-structured architecture, directional and stochastic search behaviors are dynamically selected at the individual level. The algorithm orchestrates well-established structured movements with a diverse pool of stochastic exploration strategies, enabling a coherent and adaptive balance between exploration and exploitation throughout More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077026 - 09 April 2026
Abstract Remaining useful life (RUL) prediction for complex equipment is a critical technology for ensuring the safe and reliable operation of industrial systems. However, existing data-driven models commonly suffer from limitations such as weak cross-operational condition generalization, insufficient physical interpretability, and unstable training on non-stationary time-series data. To address these challenges, this paper proposes a temporal degradation prediction model that integrates context adaptation and physics-consistent constraints, named the Context-Adaptive Physics-informed Time-aware meta-Network (CAPTAIN). The model incorporates four core components: a Context-Aware Meta-Learning (CAML) module that enables lightweight parameter adaptation to diverse scenarios; Physics-Informed Neural Network (PINN)… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078599 - 09 April 2026
(This article belongs to the Special Issue: Next-Generation Recommender Systems: Multimodality, Generative Models, and Trustworthy Personalization)
Abstract Federated recommender systems (FedRS) enable collaborative model training while preserving user privacy, yet they remain vulnerable to adversarial attacks, unreliable client updates, and misaligned incentives in decentralized environments. Existing approaches struggle to jointly preserve personalization, robustness, and trust when user data are highly non-IID and recommendation quality is governed by ranking-oriented objectives. To address these challenges, we propose a Trustworthy Federated Recommender System (T-FedRS) that extends federated neural collaborative filtering by integrating a ranking-aware reputation mechanism and a lightweight blockchain layer for transparent incentive allocation. Personalization is preserved through locally maintained user embeddings, while item parameters… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076202 - 09 April 2026
(This article belongs to the Special Issue: Swarm-Based Optimization and its Cross-Disciplinary Applications in Modern Engineering)
Abstract Both flexible jobshop scheduling and parallel batch processing machine scheduling have been extensively considered; however, the flexible jobshop and parallel batch processing machine scheduling problem (FJPBPMSP) is prevalent in real-life manufacturing processes and is seldom investigated. In this study, FJPBPMSP is examined, where flexible processing and batch processing are performed sequentially. An adaptive imperialist competitive algorithm with cooperation (CAICA) is proposed to minimize makespan and total energy consumption simultaneously. In CAICA, a four-string representation is adopted, and initial empires with novel structures are formed by uniformly dividing the population. An adaptive assimilation and revolution are More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076163 - 09 April 2026
Abstract The heterogeneity and dynamic behavior of fog computing environments introduce major challenges to achieving optimal application placement. Limited fog resources and varying workloads often necessitate offloading applications beyond their local clusters, making it difficult to maintain the required level of service quality under varying conditions. In this context, placement methods must ensure a balanced trade-off between multiple objectives, such as time and cost, while maintaining reliable adherence to constraints like application deadlines and limited fog-node memory. Existing solutions, including heuristic, metaheuristic, learning-based, and hybrid optimization approaches, have been proposed to address these challenges. However, many… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076059 - 09 April 2026
Abstract Pipelines play a crucial role in chemical industrial production. However, due to long operating cycles, seal failures, and internal corrosion, hazardous chemical media are prone to leak, potentially leading to serious accidents such as explosions. To address the limitations of existing pipeline leak detection methods—specifically their insufficient recognition accuracy and poor robustness in noisy environments—this paper proposes an Acoustic Emission (AE)-driven leakage state recognition method based on wavelet time-frequency maps and the Inception-V3 deep network. First, a pipeline leak experimental platform was constructed, and AE signals were collected. The signals were denoised through wavelet decomposition More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077513 - 09 April 2026
Abstract Traffic prediction plays a crucial role in the efficient operation of satellite networks. However, due to resource consumption arising from redundant training of multiple individual prediction models, the dynamic and coupled spatial-temporal relationship of traffic, and maintenance of accurate traffic proportions, this problem is non-trivial to solve. Therefore, we consider this problem and makes the following contributions. First, a multi-granularity traffic prediction framework based on a shared feature extraction is designed to jointly predict total network traffic and service-specific traffic of satellite networks. This design ensures that both global and per service predictions benefit from… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076379 - 09 April 2026
Abstract Smart homes enable elderly individuals and people with impairments to live independently through remote monitoring of their activities. Sequences of sensor activations are mapped with their associated labels to recognize different activities. Activity recognition in a multi-resident environment is challenging due to multiple activities performed by different residents in parallel. A novel multi-resident activity recognition approach is proposed to separate the sensor events based on their location. A spatial matrix is generated to capture the spatial and temporal patterns of the activities, and activations of sensors are recorded as binary values. The spatial matrix is More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077084 - 09 April 2026
(This article belongs to the Special Issue: Secure and Intelligent Intrusion Detection for IoT and Cloud-Integrated Environments)
Abstract Rapid expansion of Industrial Internet of Things (IIoT) systems has heightened the vulnerability of critical infrastructure to sophisticated malware attacks. Traditional signature-based detection methods are ineffective against evolving threats, and many machine learning models fail to capture temporal behavior, offer interpretability, or operate efficiently in resource-constrained environments. This study proposes HMF-Net, a Hierarchical Multi-Feature Network, for accurate, interpretable, and efficient IIoT malware detection. HMF-Net combines hierarchical VT-Tag embedding (HVTE) to model semantic behavioral information, temporal detection ratio analysis (TDRA) to capture confidence variations for polymorphic malware, and static structural binary features. These features are fused… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077791 - 09 April 2026
(This article belongs to the Special Issue: Advances in Computational Approaches to Action and Movement Analysis)
Abstract This paper presents a novel dual-stage approach for efficient gait phase recognition and trajectory prediction, tailored for the operation of wearable devices such as exoskeletons. By leveraging dynamic template matching techniques and addressing their computational challenges, we propose an innovative algorithm that significantly enhances both prediction accuracy and computational efficiency. The approach integrates Dynamic Time Warping-KMeans (DTW-KM) template selection in the offline phase and a Soft Constraint Weighted (SCW) template matching technique in the online phase. In the offline stage, the DTW-KM method extracts diverse and generalizable gait patterns from a database, establishing a robust More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076062 - 09 April 2026
(This article belongs to the Special Issue: Artificial Intelligence in Visual and Audio Signal Processing)
Abstract The efficacy of Active Shape Models (ASM) for automated ventricular segmentation was evaluated to address the computational demands of manual segmentation and the interpretability limitations of deep learning. A statistical shape model was constructed using a limited cohort of 19 Coronary Computed Tomography Angiography (CCTA) scans derived from patients with diverse cardiac abnormalities. Principal Component Analysis (PCA) was employed to encapsulate morphological variability, and strict point correspondence was enforced to maintain topological consistency. Validation was conducted via leave-one-out cross-validation, benchmarking automated segmentations against expert-delineated ground truths using the Dice Similarity Coefficient (DSC) and Hausdorff Distance More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.079476 - 09 April 2026
Abstract As artificial intelligence, the Internet of Things, edge computing, and blockchain are increasingly integrated into long-term care (LTC) services, policymakers face complex and often non-compensatory trade-offs among affordability, workforce sustainability, service reliability, and data governance. Conventional compensatory evaluation models tend to mask critical structural weaknesses and limiting their usefulness for Smart LTC policy assessment. This study proposes and applies a Fuzzy Trade-Off-Aware Scoring with Conflicts (Fuzzy TASC) framework to evaluate Smart LTC system performance. Four digital-integration configurations—conventional cloud-based LTC, AI+IoT, AI+Edge, and AI+Blockchain—were compared across 12 OECD countries. A Monte Carlo perturbation procedure was incorporated… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077337 - 09 April 2026
Abstract Malicious domain detection (MDD) from DNS telemetry enables early threat hunting but is constrained by privacy and data-sharing barriers across organizations. We present a deployable federated learning (FL) pipeline that trains a compact deep neural network (DNN; 64-32-16 with ReLU and dropout 0.3) locally at each client and exchanges only masked model updates. Privacy is enforced via secure aggregation (the server observes only an aggregate of masked updates) and optional server-side differential privacy (DP) via clipping and Gaussian noise. Our feature schema combines DNS-specific lexical cues (character
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.075607 - 09 April 2026
(This article belongs to the Special Issue: Cooperation and Autonomy in Multi-Agent Systems: Models, Algorithms, and Applications)
Abstract This paper addresses the challenging problem of multi-agent dynamic target pursuit under stringent communication constraints (including delays and range limits), where the agile targets are non-cooperative and free from such limitations. To tackle this, we propose CRS-DQN, a novel Deep Q-Network algorithm designed for this scenario. CRS-DQN enables agents to learn effective pursuit strategies through deep reinforcement learning despite partial observability and constrained information sharing. Simulation experiments systematically evaluate the impact of key parameters. The results show that pursuit performance degrades monotonically with increased communication delay. In contrast, the communication radius exhibits a non-linear effect: More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077275 - 09 April 2026
Abstract The performance of network traffic detection heavily relies on high-quality annotated data, yet the widespread presence of noisy labels in real-world scenarios severely undermines model reliability and generalization. Existing methods predominantly rely on training dynamics signals and struggle to distinguish between noisy labels and valuable hard samples, leading to diminished model sensitivity to emerging threats. To address this fundamental challenge, this paper proposes a noise-tolerant label recognition and correction framework based on graph-structured neighbor consistency (NCRT). The framework leverages the inherent clustering characteristics of network traffic in feature space, constructs an adaptive K-nearest neighbor graph… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078985 - 09 April 2026
Abstract Quantization has emerged as an important technique for enabling efficient deployment of large language models (LLMs) by reducing their memory and computational requirements. This research conducts an evaluation of INT8 quantization on several state-of-the-art LLMs, GPT-2, LLaMA-2-7B-Chat and Qwen1.5-1.8B-Chat, across two hardware configurations: NVIDIA RTX4070 Laptop GPU and RTX4080 Laptop GPU and two tasks: text and code generation. By comparing quantized INT8 models with their FP16 counterparts and a human-written reference, we quantify the trade-offs between performance and efficiency using standard natural language generation metrics (BLEU, ROUGE-1, ROUGE-L) and semantic analysis via GPT-4o and Gemini… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.075309 - 09 April 2026
Abstract As the number of electric vehicles continues to rise, pressure on charging infrastructure grows increasingly intense. Mobile charging technology, with its flexibility and deployability, has emerged as an effective solution. Within this technology, charging robots or vehicles must autonomously locate and dock with charging ports. Consequently, precise and stable charging port recognition constitutes both a prerequisite and the core bottleneck for achieving automated operations in mobile charging systems. However, in practical scenarios, charging ports often prove difficult to detect reliably due to factors such as physical obstructions, variations in lighting, and long shooting distances. To… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076433 - 09 April 2026
(This article belongs to the Special Issue: Advances in Object Detection and Recognition)
Abstract Traffic sign detection is a critical task in autonomous driving environmental perception. However, models often suffer from degraded detection performance in complex real-world scenarios due to variable target scales, blurred fine-grained features, and complex background interference. This paper proposes an improved YOLOv8n detection model, MSD-YOLO, to address these challenges. First, a Multi-scale Detail Enhancement Module (MDEM) is designed, which achieves targeted enhancement of edge features through high-frequency residual modulation and multi-scale cooperative attention. Second, an enhanced feature pyramid network termed SG-FPN is constructed. It introduces soft nearest neighbor interpolation (SNI) for semantic-spatial aligned feature fusion… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077388 - 09 April 2026
Abstract Anomaly detection in system logs is a critical technical means for identifying potential faults and security risks. In distributed environments, traditional deep learning-based log anomaly detection methods often suffer from shortcomings in transparency, computational overhead, and data privacy protection. To address these issues, this paper proposes a federated learning-driven lightweight and explainable log anomaly detection framework named FedXLog. The framework adapts to heterogeneous logs through hierarchical feature extraction, introduces the Federated Gradient Trajectory Aggregation algorithm (FedGradTrace) to enhance the explainability of the parameter aggregation process, constructs lightweight models using knowledge distillation, and achieves globally consistent… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.079408 - 09 April 2026
(This article belongs to the Special Issue: Development and Application of Deep Learning and Image Processing)
Abstract This advanced research describes CycleGAN-RRW, a new reversible watermarking system for secure image ownership authentication. It uses Cycle-Consistent Generative Adversarial Networks with adaptive feature encoding. In areas such as law, forensics, and telemedicine, digital images usually contain private info that may be changed or used without authorization. Existing watermarking methods may decrease image quality, may not be reversible, or need outside keys. To address these problems, our model embeds metadata into intermediate feature maps with Adaptive Instance Normalization (AdaIN), based on adversarial and perceptual loss. The dual-generator design permits two-way translation between original and watermarked… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076846 - 09 April 2026
(This article belongs to the Special Issue: Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems-2nd Edition)
Abstract In a real-world industrial system, it is challenging to reduce interference from operating conditions and extract high-quality feature data. To address these issues, this paper proposes a time-domain feature generation and analysis (FGA) scheme, which designs a grouping-aggregation (GA) scheme and an index decomposition (ID) method to extract and analyze high-quality feature data for industrial systems. The FGA represents a designed GA-based hybrid algorithm collaborative architecture, which overcomes the limitations of single algorithms and enables joint feature extraction from multi-condition, multi-scale industrial data. Simultaneously, FGA incorporates a feedback-driven threshold self-calibration mechanism, integrating LSTM-VAE to dynamically… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.079381 - 09 April 2026
(This article belongs to the Special Issue: Nature-Inspired Optimization & Applications in Computer Science: From Particle Swarms to Hybrid Metaheuristics)
Abstract Photovoltaic (PV) equivalent-circuit models are widely used for performance evaluation and diagnostics, but their usefulness relies on both accurate calibration and interpretable understanding of how parameters shape current–voltage (I–V) behavior. For nonlinear and strongly coupled PV models, conventional global sensitivity analysis can be computationally demanding and offer limited insight into effect direction and operating-point dependence. This study presents an method-oriented framework that integrates nature-inspired optimization with surrogate-based explainable global sensitivity analysis under a specified operating condition. The Starfish Optimization Algorithm (SFOA) is first used for parameter identification by searching for the optimal parameter set that… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074811 - 09 April 2026
Abstract Adversarial examples in object detection frequently fail to transfer between different models because attacks overfit to the source model’s architecture and feature space. We propose AugTrans, a framework that addresses this limitation through input-space regularization. Our key innovation is a multi-stage augmentation pipeline that incorporates object-level semantic awareness into transformation design. The pipeline comprises three novel components: dynamic object-centric rotation with adaptive scheduling, multi-box aware resizing based on ground-truth annotations, and composite noise injection. These transformations are integrated within the Expectation over Transformation (EOT) framework. By optimizing perturbations to remain effective across semantically meaningful transformations, our… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077768 - 09 April 2026
Abstract The integrity of perception data transmitted over in-vehicle networks is important for the safety of autonomous driving. However, legacy protocols like the Controller Area Network (CAN) bus which lacks essential security features make In-Vehicle Networks (IVNs) vulnerable to data tampering attacks. Current research typically focuses on detecting the attack itself but ignores the information recovery from the missing data, leading to an unsafe autonomous driving system. To address the issue, we propose a 3D object recovery framework to recover the missing data caused by the tampering attack that occurred in in-vehicle networks. The proposed framework… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077691 - 09 April 2026
Abstract The accelerating transition toward electrified mobility has positioned electric vehicles (EVs) as a primary technology in modern transportation systems. In this context, ensuring the reliability of EV drive motors (EVDMs) becomes increasingly critical, given their central role in propulsion performance and operational safety. Accurate and interpretable fault diagnosis of EVDMs is therefore essential for enabling effective maintenance and supporting the broader sustainability and resilience of EVs. This study presents a novel framework that combines decision tree-based fault classification with a multi-agent large language model (LLM) interpretation architecture to deliver transparent and human-readable diagnostic explanations. The… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.078927 - 09 April 2026
Abstract Term weighting scheme and feature selection are two fundamental components in text classification (TC) systems, particularly in high-dimensional, multi-class, and imbalanced settings. Term weighting schemes aim to improve document representation by emphasizing discriminative terms across classes, while feature selection (FS) seeks to reduce dimensionality, eliminate irrelevant and redundant features, and enhance classification efficiency and effectiveness. However, most existing studies focus on FS independently of the term-weighting strategy used during document representation, thereby limiting the potential benefits of their interaction. This study addresses this gap by pursuing two main objectives. First, it employs an enhanced supervised… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.079808 - 09 April 2026
(This article belongs to the Special Issue: Privacy-Preserving and Secure Federated Learning for IoT, Cyber-Physical, and Maritime Systems)
Abstract The rapid advancement of the Internet of Things (IoT) has transformed edge devices from simple data collectors into intelligent units capable of local processing and collaborative learning. However, the vast amounts of sensitive data generated by these devices face severe constraints from “data silos” and risks of privacy breaches. Federated learning (FL), as a distributed collaborative paradigm that avoids sharing raw data, holds great promise in the IoT domain. Nevertheless, it remains vulnerable to gradient leakage threats. While traditional differential privacy (DP) techniques mitigate privacy risks, they often come at the cost of significantly reduced… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074444 - 09 April 2026
Abstract Consumer electronics, with 62 million tons of electronic waste (e-waste) generated in 2022 and e-waste expected to grow to 82 million tons annually by 2030, pose critical challenges when it comes to national infrastructure and circular economy policies. This paper compares forecasting approaches using sparse panel data for 32 European countries (2005–2018, Eurostat/Waste Electrical and Electronic Equipment (WEEE) Directive), focusing on leakage-safe prospective validation to guarantee true predictive performance. We make one-step-ahead predictions with conservative features (primarily lagged values) to account for temporal autocorrelation but with reduced multicollinearity (Variance Inflation Factor (VIF) ≈ 1.0). Cross-paradigm comparisons… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.076246 - 09 April 2026
Abstract The increasing adoption of 5G cellular networks has introduced significant challenges for network operators. The main challenge lies in the management of seamless handoff (HO), which occurs owing to the rapid expansion of equipment, data, and network complexity. To address this challenge, a model named optimal HO management deep learning neural network (OHMDLNN) is proposed. The model is trained on network activity data, and it uses KPIs (key performance indicators) and system-level parameters to make HO decisions. As demonstrated in the article, OHMDLNN is successful in analyzing the effect and interdependence of KPIs from both… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077501 - 09 April 2026
Abstract The digitization of healthcare has resulted in the production of large amounts of structured and unstructured clinical data, creating the need for accurate and efficient named entity recognition (NER) to support medical procedures. This study evaluates and compares three approaches to NER in the medical domain in Spanish: using Large Language Models (LLMs) with In-Context Learning techniques (Zero-Shot, Few-Shot, and Chain-of-Thought); fine-tuning of LLMs; and fine-tuning of encoder-only models. Experiments were conducted on the Meddocan, Meddoprof, Meddoplace and Symptemist benchmark datasets. Fine-tuned encoder-only models achieve the best performance across all datasets, reaching macro-F1 scores of More >