CMC Open Access

Computers, Materials & Continua

ISSN:1546-2218 (print)
ISSN:1546-2226 (online)
Publication Frequency:Monthly

  • Online
    Articles

    7334

  • on board
    editors

    188

Special Issues
Table of Content


About the Journal

Computers, Materials & Continua is a peer-reviewed Open Access journal that publishes all types of academic papers in the areas of computer networks, artificial intelligence, big data, software engineering, multimedia, cyber security, internet of things, materials genome, integrated materials science, and data analysis, modeling, designing and manufacturing of modern functional and multifunctional materials. This journal is published monthly by Tech Science Press.

Indexing and Abstracting

SCI: 2024 Impact Factor 1.7; Scopus CiteScore (Impact per Publication 2024): 6.1; SNIP (Source Normalized Impact per Paper 2024): 0.675; Ei Compendex; Cambridge Scientific Abstracts; INSPEC Databases; Science Navigator; EBSCOhost; ProQuest Central; Zentralblatt für Mathematik; Portico, etc.

  • Open Access

    REVIEW

    Quantum Secure Multiparty Computation: Bridging Privacy, Security, and Scalability in the Post-Quantum Era

    Sghaier Guizani1,*, Tehseen Mazhar2,3,*, Habib Hamam4,5,6,7

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073883 - 10 February 2026
    (This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
    Abstract The advent of quantum computing poses a significant challenge to traditional cryptographic protocols, particularly those used in Secure Multiparty Computation (MPC), a fundamental cryptographic primitive for privacy-preserving computation. Classical MPC relies on cryptographic techniques such as homomorphic encryption, secret sharing, and oblivious transfer, which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries. This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI, IEEE Explore, Springer, and Elsevier, examining the applications, types, and security issues with the solution of… More >

  • Open Access

    REVIEW

    A State-of-the-Art Survey of Adversarial Reinforcement Learning for IoT Intrusion Detection

    Qasem Abu Al-Haija1,*, Shahad Al Tamimi2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073540 - 10 February 2026
    (This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
    Abstract Adversarial Reinforcement Learning (ARL) models for intelligent devices and Network Intrusion Detection Systems (NIDS) improve system resilience against sophisticated cyber-attacks. As a core component of ARL, Adversarial Training (AT) enables NIDS agents to discover and prevent new attack paths by exposing them to competing examples, thereby increasing detection accuracy, reducing False Positives (FPs), and enhancing network security. To develop robust decision-making capabilities for real-world network disruptions and hostile activity, NIDS agents are trained in adversarial scenarios to monitor the current state and notify management of any abnormal or malicious activity. The accuracy and timeliness of… More >

  • Open Access

    REVIEW

    Recent Advances in Deep-Learning Side-Channel Attacks on AES Implementations

    Junnian Wang1, Xiaoxia Wang1, Zexin Luo1, Qixiang Ouyang1, Chao Zhou1, Huanyu Wang2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074473 - 10 February 2026
    Abstract Internet of Things (IoTs) devices are bringing about a revolutionary change our society by enabling connectivity regardless of time and location. However, The extensive deployment of these devices also makes them attractive victims for the malicious actions of adversaries. Within the spectrum of existing threats, Side-Channel Attacks (SCAs) have established themselves as an effective way to compromise cryptographic implementations. These attacks exploit unintended, unintended physical leakage that occurs during the cryptographic execution of devices, bypassing the theoretical strength of the crypto design. In recent times, the advancement of deep learning has provided SCAs with a… More >

  • Open Access

    REVIEW

    Prompt Injection Attacks on Large Language Models: A Survey of Attack Methods, Root Causes, and Defense Strategies

    Tongcheng Geng1,#, Zhiyuan Xu2,#, Yubin Qu3,*, W. Eric Wong4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074081 - 10 February 2026
    (This article belongs to the Special Issue: Large Language Models in Password Authentication Security: Challenges, Solutions and Future Directions)
    Abstract Large language models (LLMs) have revolutionized AI applications across diverse domains. However, their widespread deployment has introduced critical security vulnerabilities, particularly prompt injection attacks that manipulate model behavior through malicious instructions. Following Kitchenham’s guidelines, this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape. Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks, achieving over 90% success rates against unprotected systems. In response, defense mechanisms show varying effectiveness: input preprocessing achieves 60%–80% detection rates and advanced architectural defenses More >

  • Open Access

    REVIEW

    Pigeon-Inspired Optimization Algorithm: Definition, Variants, and Its Applications in Unmanned Aerial Vehicles

    Yu-Xuan Zhou1, Kai-Qing Zhou1,*, Wei-Lin Chen1, Zhou-Hua Liao1, Di-Wen Kang1,2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.075099 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Bio-Inspired Optimization Algorithms: Theory, Algorithms, and Applications)
    Abstract The Pigeon-Inspired Optimization (PIO) algorithm constitutes a metaheuristic method derived from the homing behaviour of pigeons. Initially formulated for three-dimensional path planning in unmanned aerial vehicles (UAVs), the algorithm has attracted considerable academic and industrial interest owing to its effective balance between exploration and exploitation, coupled with advantages in real-time performance and robustness. Nevertheless, as applications have diversified, limitations in convergence precision and a tendency toward premature convergence have become increasingly evident, highlighting a need for improvement. This review systematically outlines the developmental trajectory of the PIO algorithm, with a particular focus on its core… More >

  • Open Access

    REVIEW

    Sensor Fusion Models in Autonomous Systems: A Review

    Sangeeta Mittal1, Chetna Gupta1, Varun Gupta2,3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.071599 - 10 February 2026
    Abstract This survey presents a comprehensive examination of sensor fusion research spanning four decades, tracing the methodological evolution, application domains, and alignment with classical hierarchical models. Building on this long-term trajectory, the foundational approaches such as probabilistic inference, early neural networks, rule-based methods, and feature-level fusion established the principles of uncertainty handling and multi-sensor integration in the 1990s. The fusion methods of 2000s marked the consolidation of these ideas through advanced Kalman and particle filtering, Bayesian–Dempster–Shafer hybrids, distributed consensus algorithms, and machine learning ensembles for more robust and domain-specific implementations. From 2011 to 2020, the widespread… More >

  • Open Access

    REVIEW

    A Comprehensive Literature Review on YOLO-Based Small Object Detection: Methods, Challenges, and Future Trends

    Hui Yu1, Jun Liu1,*, Mingwei Lin2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074191 - 10 February 2026
    Abstract Small object detection has been a focus of attention since the emergence of deep learning-based object detection. Although classical object detection frameworks have made significant contributions to the development of object detection, there are still many issues to be resolved in detecting small objects due to the inherent complexity and diversity of real-world visual scenes. In particular, the YOLO (You Only Look Once) series of detection models, renowned for their real-time performance, have undergone numerous adaptations aimed at improving the detection of small targets. In this survey, we summarize the state-of-the-art YOLO-based small object detection More >

  • Open Access

    ARTICLE

    A Comprehensive Evaluation of Distributed Learning Frameworks in AI-Driven Network Intrusion Detection

    Sooyong Jeong1,#, Cheolhee Park2,#, Dowon Hong3,*, Changho Seo4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072561 - 10 February 2026
    (This article belongs to the Special Issue: AI-Driven Intrusion Detection and Threat Analysis in Cybersecurity)
    Abstract With the growing complexity and decentralization of network systems, the attack surface has expanded, which has led to greater concerns over network threats. In this context, artificial intelligence (AI)-based network intrusion detection systems (NIDS) have been extensively studied, and recent efforts have shifted toward integrating distributed learning to enable intelligent and scalable detection mechanisms. However, most existing works focus on individual distributed learning frameworks, and there is a lack of systematic evaluations that compare different algorithms under consistent conditions. In this paper, we present a comprehensive evaluation of representative distributed learning frameworks—Federated Learning (FL), Split… More >

  • Open Access

    ARTICLE

    Keyword Spotting Based on Dual-Branch Broadcast Residual and Time-Frequency Coordinate Attention

    Zeyu Wang1, Jian-Hong Wang1,*, Kuo-Chun Hsu2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072881 - 10 February 2026
    Abstract In daily life, keyword spotting plays an important role in human-computer interaction. However, noise often interferes with the extraction of time-frequency information, and achieving both computational efficiency and recognition accuracy on resource-constrained devices such as mobile terminals remains a major challenge. To address this, we propose a novel time-frequency dual-branch parallel residual network, which integrates a Dual-Branch Broadcast Residual module and a Time-Frequency Coordinate Attention module. The time-domain and frequency-domain branches are designed in parallel to independently extract temporal and spectral features, effectively avoiding the potential information loss caused by serial stacking, while enhancing information… More >

  • Open Access

    ARTICLE

    Detection of Maliciously Disseminated Hate Speech in Spanish Using Fine-Tuning and In-Context Learning Techniques with Large Language Models

    Tomás Bernal-Beltrán1, Ronghao Pan1, José Antonio García-Díaz1, María del Pilar Salas-Zárate2, Mario Andrés Paredes-Valverde2, Rafael Valencia-García1,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073629 - 10 February 2026
    Abstract The malicious dissemination of hate speech via compromised accounts, automated bot networks and malware-driven social media campaigns has become a growing cybersecurity concern. Automatically detecting such content in Spanish is challenging due to linguistic complexity and the scarcity of annotated resources. In this paper, we compare two predominant AI-based approaches for the forensic detection of malicious hate speech: (1) fine-tuning encoder-only models that have been trained in Spanish and (2) In-Context Learning techniques (Zero- and Few-Shot Learning) with large-scale language models. Our approach goes beyond binary classification, proposing a comprehensive, multidimensional evaluation that labels each… More >

  • Open Access

    ARTICLE

    A Robust Image Encryption Method Based on the Randomness Properties of DNA Nucleotides

    Bassam Al-Shargabi1,*, Mohammed Abbas Fadhil Al-Husainy2, Abdelrahman Abuarqoub1, Omar Albahbouh Aldabbas3

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074550 - 10 February 2026
    Abstract The advent of 5G technology has significantly enhanced the transmission of images over networks, expanding data accessibility and exposure across various applications in digital technology and social media. Consequently, the protection of sensitive data has become increasingly critical. Regardless of the complexity of the encryption algorithm used, a robust and highly secure encryption key is essential, with randomness and key space being crucial factors. This paper proposes a new Robust Deoxyribonucleic Acid (RDNA) nucleotide-based encryption method. The RDNA encryption method leverages the unique properties of DNA nucleotides, including their inherent randomness and extensive key space,… More >

  • Open Access

    ARTICLE

    Lexical-Prior-Free Planning: A Symbol-Agnostic Pipeline that Enables LLMs and LRMs to Plan under Obfuscated Interfaces

    Zhendong Du*, Hanliu Wang, Kenji Hashimoto

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074520 - 10 February 2026
    Abstract Planning in lexical-prior-free environments presents a fundamental challenge for evaluating whether large language models (LLMs) possess genuine structural reasoning capabilities beyond lexical memorization. When predicates and action names are replaced with semantically irrelevant random symbols while preserving logical structures, existing direct generation approaches exhibit severe performance degradation. This paper proposes a symbol-agnostic closed-loop planning pipeline that enables models to construct executable plans through systematic validation and iterative refinement. The system implements a complete generate-verify-repair cycle through six core processing components: semantic comprehension extracts structural constraints, language planner generates text plans, symbol translator performs structure-preserving mapping,… More >

  • Open Access

    ARTICLE

    Dragonfang: An Open-Source Embedded Flight Controller with IMU-Based Stabilization for Quadcopter Applications

    Cosmin Dumitru, Emanuel Pantelimon, Alexandru Guzu, Georgian Nicolae*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072749 - 10 February 2026
    Abstract Unmanned aerial vehicles (UAVs), especially quadcopters, have become indispensable in numerous industrial and scientific applications due to their flexibility, low cost, and capability to operate in dynamic environments. This paper presents a complete design and implementation of a compact autonomous quadcopter capable of trajectory tracking, object detection, precision landing, and real-time telemetry via long-range communication protocols. The system integrates an onboard flight controller running real-time sensor fusion algorithms, a vision-based detection system on a companion single-board computer, and a telemetry unit using Long Range (LoRa) communication. Extensive flight tests were conducted to validate the system’s More >

  • Open Access

    ARTICLE

    Simulation Analysis of the Extrusion Process for Complex Cross-Sectional Profiles of Ultra-High Strength Aluminum Alloy

    Tianxia Zou1,*, Yilin Sun2, Fuhao Fan1, Zhen Zheng1, Yanjin Xu2, Baoshuai Han2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074121 - 10 February 2026
    Abstract Ultra-high-strength aluminum alloy profile is an ideal choice for aerospace structural materials due to its excellent specific strength and corrosion resistance. However, issues such as uneven metal flow, stress concentration, and forming defects are prone to occur during their extrusion. This study focuses on an Al-Zn-Mg-Cu ultra-high-strength aluminum alloy profile with a double-U, multi-cavity thin-walled structure. Firstly, hot compression experiments were conducted at temperatures of 350°C, 400°C, and 450°C, with strain rates of 0.01 and 1.0 s−1, to investigate the plastic deformation behavior of the material. Subsequently, a 3D coupled thermo-mechanical extrusion simulation model was established… More >

  • Open Access

    ARTICLE

    Computational Analysis of Fracture and Surface Deformation Mechanisms in Pre-Cracked Materials under Various Indentation Conditions

    Thi-Xuyen Bui1,2, Yu-Sheng Lu1, Yu-Sheng Liao1, Te-Hua Fang1,3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074862 - 10 February 2026
    (This article belongs to the Special Issue: Computational Approaches for Tribological Materials and Surface Engineering)
    Abstract The mechanical performance of exceedingly soft materials such as Ag is significantly influenced by various working conditions. Therefore, this study systematically investigates the effects of crack geometry, substrate crystal orientation, and indenter shape on crack propagation. The mechanical response of Ag is analyzed using the quasi-continuum (QC) method. A pre-crack with a predefined depth and angle was introduced to initiate fracture behavior. The results show that when the pre-crack height is 50 Å, the crack propagates rapidly as the imprint depth increases from 0 to 7 Å, grows steadily up to 15 Å, and then… More >

  • Open Access

    ARTICLE

    DFT Insights into the Detection of NH3, AsH3, PH3, CO2, and CH4 Gases with Pristine and Monovacancy Phosphorene Sheets

    Naresh Kumar1, Anuj Kumar1,*, Abhishek K. Mishra2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074430 - 10 February 2026
    Abstract Density functional theory (DFT) calculations were employed to investigate the adsorption behavior of NH3, AsH3, PH3, CO2, and CH4 molecules on both pristine and mono-vacancy phosphorene sheets. The pristine phosphorene surface shows weak physisorption with all the gas molecules, inducing only minor changes in its structural and electronic properties. However, the introduction of mono-vacancies significantly enhances the interaction strength with NH3, PH3, CO2, and CH4. These variations are attributed to substantial charge redistribution and orbital hybridization in the presence of defects. The defective phosphorene sheet also exhibits enhanced adsorption energies, along with favorable sensitivity and recovery characteristics, highlighting its potential More >

  • Open Access

    ARTICLE

    Machine Learning-Driven Prediction of the Glass Transition Temperature of Styrene-Butadiene Rubber

    Zhanglei Wang1,2, Shuo Yan1,2, Jingyu Gao1,2, Haoyu Wu1,2, Baili Wang1,2, Xiuying Zhao1,2,*, Shikai Hu1,2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.075667 - 10 February 2026
    (This article belongs to the Special Issue: Machine Learning Methods in Materials Science)
    Abstract The glass transition temperature (Tg) of styrene-butadiene rubber (SBR) is a key parameter determining its low-temperature flexibility and processing performance. Accurate prediction of Tg is crucial for material design and application optimisation. Addressing the limitations of traditional experimental measurements and theoretical models in terms of efficiency, cost, and accuracy, this study proposes a machine learning prediction framework that integrates multi-model ensemble and Bayesian optimization by constructing a multi-component feature dataset and algorithm optimization strategy. Based on the constructed high-quality dataset containing 96 SBR samples, nine machine learning models were employed to predict the Tg of SBR and… More >

  • Open Access

    ARTICLE

    Anisotropy of Phase Transformation in Aluminum and Copper under Shock Compression: Atomistic Simulations and Neural Network Model

    Evgenii V. Fomin1,2, Ilya A. Bryukhanov1, Natalya A. Grachyova2, Alexander E. Mayer2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.071952 - 10 February 2026
    Abstract It is well known that aluminum and copper exhibit structural phase transformations in quasi-static and dynamic measurements, including shock wave loading. However, the dependence of phase transformations in a wide range of crystallographic directions of shock loading has not been revealed. In this work, we calculated the shock Hugoniot for aluminum and copper in different crystallographic directions ([100], [110], [111], [112], [102], [114], [123], [134], [221] and [401]) of shock compression using molecular dynamics (MD) simulations. The results showed a high pressure (>160 GPa for Cu and >40 GPa for Al) of the FCC-to-BCC transition.… More >

  • Open Access

    ARTICLE

    Computer Simulation and Experimental Approach in the Investigation of Deformation and Fracture of TPMS Structures Manufactured by 3D Printing

    Nataliya Kazantseva1,2,*, Nikolai Saharov1, Denis Davydov1,2, Nikolai Popov2, Maxim Il’inikh1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.073078 - 10 February 2026
    (This article belongs to the Special Issue: Perspective Materials for Science and Industrial: Modeling and Simulation)
    Abstract Because of the developed surface of the Triply Periodic Minimum Surface (TPMS) structures, polylactide (PLA) products with a TPMS structure are thought to be promising bio soluble implants with the potential for targeted drug delivery. For implants, mechanical properties are key performance characteristics, so understanding the deformation and failure mechanisms is essential for selecting the appropriate implant structure. The deformation and fracture processes in PLA samples with different interior architectures have been studied through computer simulation and experimental research. Two TPMS topologies, the Schwarz Diamond and Gyroid architectures, were used for the sample construction by… More >

  • Open Access

    ARTICLE

    Semi-Supervised Segmentation Framework for Quantitative Analysis of Material Microstructure Images

    Yingli Liu1,2, Weiyong Tang1,2, Xiao Yang1,2, Jiancheng Yin3,*, Haihe Zhou1,2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.074681 - 10 February 2026
    Abstract Quantitative analysis of aluminum-silicon (Al-Si) alloy microstructure is crucial for evaluating and controlling alloy performance. Conventional analysis methods rely on manual segmentation, which is inefficient and subjective, while fully supervised deep learning approaches require extensive and expensive pixel-level annotated data. Furthermore, existing semi-supervised methods still face challenges in handling the adhesion of adjacent primary silicon particles and effectively utilizing consistency in unlabeled data. To address these issues, this paper proposes a novel semi-supervised framework for Al-Si alloy microstructure image segmentation. First, we introduce a Rotational Uncertainty Correction Strategy (RUCS). This strategy employs multi-angle rotational perturbations… More >

  • Open Access

    ARTICLE

    Multi-Algorithm Machine Learning Framework for Predicting Crystal Structures of Lithium Manganese Silicate Cathodes Using DFT Data

    Muhammad Ishtiaq1, Yeon-Ju Lee2, Annabathini Geetha Bhavani3, Sung-Gyu Kang1,*, Nagireddy Gari Subba Reddy2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.075957 - 10 February 2026
    (This article belongs to the Special Issue: M5S: Multiphysics Modelling of Multiscale and Multifunctional Materials and Structures)
    Abstract Lithium manganese silicate (Li-Mn-Si-O) cathodes are key components of lithium-ion batteries, and their physical and mechanical properties are strongly influenced by their underlying crystal structures. In this study, a range of machine learning (ML) algorithms were developed and compared to predict the crystal systems of Li-Mn-Si-O cathode materials using density functional theory (DFT) data obtained from the Materials Project database. The dataset comprised 211 compositions characterized by key descriptors, including formation energy, energy above the hull, bandgap, atomic site number, density, and unit cell volume. These features were utilized to classify the materials into monoclinic… More >

  • Open Access

    ARTICLE

    Optimal Structure Determination for Composite Laminates Using Particle Swarm Optimization and Machine Learning

    Viorel Mînzu1,*, Iulian Arama2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.075619 - 10 February 2026
    (This article belongs to the Special Issue: Machine Learning in the Mechanics of Materials and Structures)
    Abstract This work addresses optimality aspects related to composite laminates having layers with different orientations. Regression Neural Networks can model the mechanical behavior of these laminates, specifically the stress-strain relationship. If this model has strong generalization ability, it can be coupled with a metaheuristic algorithm–the PSO algorithm used in this article–to address an optimization problem (OP) related to the orientations of composite laminates. To solve OPs, this paper proposes an optimization framework (OFW) that connects the two components, the optimal solution search mechanism and the RNN model. The OFW has two modules: the search mechanism (Adaptive… More >

  • Open Access

    ARTICLE

    Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment

    Huihui Zhu1, Fei Tang2,*, Chunhua Jin3, Ping Wang1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073550 - 10 February 2026
    (This article belongs to the Special Issue: Privacy-Enhancing Technologies for Secure Data Cooperation and Circulation)
    Abstract The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication. Although various authentication and key agreement protocols have been developed, current approaches are constrained by homogeneous cryptosystem frameworks, namely public key infrastructure (PKI), identity-based cryptography (IBC), or certificateless cryptography (CLC), each presenting limitations in client-server architectures. Specifically, PKI incurs certificate management overhead, IBC introduces key escrow risks, and CLC encounters cross-system interoperability challenges. To overcome these shortcomings, this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client More >

  • Open Access

    ARTICLE

    Effective Deep Learning Models for the Semantic Segmentation of 3D Human MRI Kidney Images

    Roshni Khedgaonkar1, Pravinkumar Sonsare2, Kavita Singh1, Ayman Altameem3, Hameed R. Farhan4, Salil Bharany5, Ateeq Ur Rehman6,*, Ahmad Almogren7,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072651 - 10 February 2026
    (This article belongs to the Special Issue: Artificial Intelligence and Machine Learning in Healthcare Applications)
    Abstract Recent studies indicate that millions of individuals suffer from renal diseases, with renal carcinoma, a type of kidney cancer, emerging as both a chronic illness and a significant cause of mortality. Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) have become essential tools for diagnosing and assessing kidney disorders. However, accurate analysis of these medical images is critical for detecting and evaluating tumor severity. This study introduces an integrated hybrid framework that combines three complementary deep learning models for kidney tumor segmentation from MRI images. The proposed framework fuses a customized U-Net and Mask R-CNN… More >

  • Open Access

    ARTICLE

    ISTIRDA: An Efficient Data Availability Sampling Scheme for Lightweight Nodes in Blockchain

    Jiaxi Wang1, Wenbo Sun2, Ziyuan Zhou1, Shihua Wu1, Jiang Xu1, Shan Ji3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073237 - 10 February 2026
    (This article belongs to the Special Issue: Recent Advances in Blockchain Technology and Applications)
    Abstract Lightweight nodes are crucial for blockchain scalability, but verifying the availability of complete block data puts significant strain on bandwidth and latency. Existing data availability sampling (DAS) schemes either require trusted setups or suffer from high communication overhead and low verification efficiency. This paper presents ISTIRDA, a DAS scheme that lets light clients certify availability by sampling small random codeword symbols. Built on ISTIR, an improved Reed–Solomon interactive oracle proof of proximity, ISTIRDA combines adaptive folding with dynamic code rate adjustment to preserve soundness while lowering communication. This paper formalizes opening consistency and prove security… More >

  • Open Access

    ARTICLE

    HMA-DER: A Hierarchical Attention and Expert Routing Framework for Accurate Gastrointestinal Disease Diagnosis

    Sara Tehsin1, Inzamam Mashood Nasir1,*, Wiem Abdelbaki2, Fadwa Alrowais3, Khalid A. Alattas4, Sultan Almutairi5, Radwa Marzouk6

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074416 - 10 February 2026
    Abstract Objective: Deep learning is employed increasingly in Gastroenterology (GI) endoscopy computer-aided diagnostics for polyp segmentation and multi-class disease detection. In the real world, implementation requires high accuracy, therapeutically relevant explanations, strong calibration, domain generalization, and efficiency. Current Convolutional Neural Network (CNN) and transformer models compromise border precision and global context, generate attention maps that fail to align with expert reasoning, deteriorate during cross-center changes, and exhibit inadequate calibration, hence diminishing clinical trust. Methods: HMA-DER is a hierarchical multi-attention architecture that uses dilation-enhanced residual blocks and an explainability-aware Cognitive Alignment Score (CAS) regularizer to directly align… More >

  • Open Access

    ARTICLE

    Advancing Android Ransomware Detection with Hybrid AutoML and Ensemble Learning Approaches

    Kirubavathi Ganapathiyappan1, Chahana Ravikumar1, Raghul Alagunachimuthu Ranganayaki1, Ayman Altameem2, Ateeq Ur Rehman3,*, Ahmad Almogren4,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072840 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract Android smartphones have become an integral part of our daily lives, becoming targets for ransomware attacks. Such attacks encrypt user information and ask for payment to recover it. Conventional detection mechanisms, such as signature-based and heuristic techniques, often fail to detect new and polymorphic ransomware samples. To address this challenge, we employed various ensemble classifiers, such as Random Forest, Gradient Boosting, Bagging, and AutoML models. We aimed to showcase how AutoML can automate processes such as model selection, feature engineering, and hyperparameter optimization, to minimize manual effort while ensuring or enhancing performance compared to traditional… More >

  • Open Access

    ARTICLE

    AdvYOLO: An Improved Cross-Conv-Block Feature Fusion-Based YOLO Network for Transferable Adversarial Attacks on ORSIs Object Detection

    Leyu Dai1,2,3, Jindong Wang1,2,3, Ming Zhou1,2,3, Song Guo1,2,3, Hengwei Zhang1,2,3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072449 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Object Detection: Methods and Applications)
    Abstract In recent years, with the rapid advancement of artificial intelligence, object detection algorithms have made significant strides in accuracy and computational efficiency. Notably, research and applications of Anchor-Free models have opened new avenues for real-time target detection in optical remote sensing images (ORSIs). However, in the realm of adversarial attacks, developing adversarial techniques tailored to Anchor-Free models remains challenging. Adversarial examples generated based on Anchor-Based models often exhibit poor transferability to these new model architectures. Furthermore, the growing diversity of Anchor-Free models poses additional hurdles to achieving robust transferability of adversarial attacks. This study presents… More >

  • Open Access

    ARTICLE

    Big Data-Driven Federated Learning Model for Scalable and Privacy-Preserving Cyber Threat Detection in IoT-Enabled Healthcare Systems

    Noura Mohammed Alaskar1, Muzammil Hussain2, Saif Jasim Almheiri1, Atta-ur-Rahman3, Adnan Khan4,5,6, Khan M. Adnan7,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074041 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats. The early detection of threats is both necessary and complex, yet these interconnected healthcare settings generate enormous amounts of heterogeneous data. Traditional Intrusion Detection Systems (IDS), which are generally centralized and machine learning-based, often fail to address the rapidly changing nature of cyberattacks and are challenged by ethical concerns related to patient data privacy. Moreover, traditional AI-driven IDS usually face challenges in handling large-scale, heterogeneous healthcare data while ensuring data… More >

  • Open Access

    ARTICLE

    FDEFusion: End-to-End Infrared and Visible Image Fusion Method Based on Frequency Decomposition and Enhancement

    Ming Chen1,*, Guoqiang Ma2, Ping Qi1, Fucheng Wang1, Lin Shen3, Xiaoya Pi1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072623 - 10 February 2026
    Abstract In the image fusion field, fusing infrared images (IRIs) and visible images (VIs) excelled is a key area. The differences between IRIs and VIs make it challenging to fuse both types into a high-quality image. Accordingly, efficiently combining the advantages of both images while overcoming their shortcomings is necessary. To handle this challenge, we developed an end-to-end IRI and VI fusion method based on frequency decomposition and enhancement. By applying concepts from frequency domain analysis, we used the layering mechanism to better capture the salient thermal targets from the IRIs and the rich textural information… More >

  • Open Access

    ARTICLE

    Robust Recommendation Adversarial Training Based on Self-Purification Data Sanitization

    Haiyan Long1, Gang Chen2,*, Hai Chen3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073243 - 10 February 2026
    Abstract The performance of deep recommendation models degrades significantly under data poisoning attacks. While adversarial training methods such as Vulnerability-Aware Training (VAT) enhance robustness by injecting perturbations into embeddings, they remain limited by coarse-grained noise and a static defense strategy, leaving models susceptible to adaptive attacks. This study proposes a novel framework, Self-Purification Data Sanitization (SPD), which integrates vulnerability-aware adversarial training with dynamic label correction. Specifically, SPD first identifies high-risk users through a fragility scoring mechanism, then applies self-purification by replacing suspicious interactions with model-predicted high-confidence labels during training. This closed-loop process continuously sanitizes the training More >

  • Open Access

    ARTICLE

    Mitigating Adversarial Obfuscation in Named Entity Recognition with Robust SecureBERT Finetuning

    Nouman Ahmad1,*, Changsheng Zhang1, Uroosa Sehar2,3,4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073029 - 10 February 2026
    (This article belongs to the Special Issue: Utilizing and Securing Large Language Models for Cybersecurity and Beyond)
    Abstract Although Named Entity Recognition (NER) in cybersecurity has historically concentrated on threat intelligence, vital security data can be found in a variety of sources, such as open-source intelligence and unprocessed tool outputs. When dealing with technical language, the coexistence of structured and unstructured data poses serious issues for traditional BERT-based techniques. We introduce a three-phase approach for improved NER in multi-source cybersecurity data that makes use of large language models (LLMs). To ensure thorough entity coverage, our method starts with an identification module that uses dynamic prompting techniques. To lessen hallucinations, the extraction module uses… More >

  • Open Access

    ARTICLE

    Enhancing Detection of AI-Generated Text: A Retrieval-Augmented Dual-Driven Defense Mechanism

    Xiaoyu Li1,2, Jie Zhang3, Wen Shi1,2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074005 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Large Models and Domain-specific Applications)
    Abstract The emergence of large language models (LLMs) has brought about revolutionary social value. However, concerns have arisen regarding the generation of deceptive content by LLMs and their potential for misuse. Consequently, a crucial research question arises: How can we differentiate between AI-generated and human-authored text? Existing detectors face some challenges, such as operating as black boxes, relying on supervised training, and being vulnerable to manipulation and misinformation. To tackle these challenges, we propose an innovative unsupervised white-box detection method that utilizes a “dual-driven verification mechanism” to achieve high-performance detection, even in the presence of obfuscated… More >

  • Open Access

    ARTICLE

    Structure-Based Virtual Sample Generation Using Average-Linkage Clustering for Small Dataset Problems

    Chih-Chieh Chang*, Khairul Izyan Bin Anuar, Yu-Hwa Liu

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073177 - 10 February 2026
    Abstract Small datasets are often challenging due to their limited sample size. This research introduces a novel solution to these problems: average linkage virtual sample generation (ALVSG). ALVSG leverages the underlying data structure to create virtual samples, which can be used to augment the original dataset. The ALVSG process consists of two steps. First, an average-linkage clustering technique is applied to the dataset to create a dendrogram. The dendrogram represents the hierarchical structure of the dataset, with each merging operation regarded as a linkage. Next, the linkages are combined into an average-based dataset, which serves as… More >

  • Open Access

    ARTICLE

    IPKE-MoE: Mixture-of-Experts with Iterative Prompts and Knowledge-Enhanced LLM for Chinese Sensitive Words Detection

    Longcang Wang, Yongbing Gao*, Xinguang Wang, Xin Liu

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072889 - 10 February 2026
    (This article belongs to the Special Issue: Sentiment Analysis for Social Media Data: Lexicon-Based and Large Language Model Approaches)
    Abstract Aiming at the problem of insufficient recognition of implicit variants by existing Chinese sensitive text detection methods, this paper proposes the IPKE-MoE framework, which consists of three parts, namely, a sensitive word variant extraction framework, a sensitive word variant knowledge enhancement layer and a mixture-of-experts (MoE) classification layer. First, sensitive word variants are precisely extracted through dynamic iterative prompt templates and the context-aware capabilities of Large Language Models (LLMs). Next, the extracted variants are used to construct a knowledge enhancement layer for sensitive word variants based on RoCBert models. Specifically, after locating variants via n-gram… More >

  • Open Access

    ARTICLE

    Effective Token Masking Augmentation Using Term-Document Frequency for Language Model-Based Legal Case Classification

    Ye-Chan Park1, Mohd Asyraf Zulkifley2, Bong-Soo Sohn3, Jaesung Lee4,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074141 - 10 February 2026
    Abstract Legal case classification involves the categorization of legal documents into predefined categories, which facilitates legal information retrieval and case management. However, real-world legal datasets often suffer from class imbalances due to the uneven distribution of case types across legal domains. This leads to biased model performance, in the form of high accuracy for overrepresented categories and underperformance for minority classes. To address this issue, in this study, we propose a data augmentation method that masks unimportant terms within a document selectively while preserving key terms from the perspective of the legal domain. This approach enhances More >

  • Open Access

    ARTICLE

    A Fine-Grained Recognition Model based on Discriminative Region Localization and Efficient Second-Order Feature Encoding

    Xiaorui Zhang1,2,*, Yingying Wang2, Wei Sun3, Shiyu Zhou2, Haoming Zhang4, Pengpai Wang1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072626 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Image Recognition: Innovations, Applications, and Future Directions)
    Abstract Discriminative region localization and efficient feature encoding are crucial for fine-grained object recognition. However, existing data augmentation methods struggle to accurately locate discriminative regions in complex backgrounds, small target objects, and limited training data, leading to poor recognition. Fine-grained images exhibit “small inter-class differences,” and while second-order feature encoding enhances discrimination, it often requires dual Convolutional Neural Networks (CNN), increasing training time and complexity. This study proposes a model integrating discriminative region localization and efficient second-order feature encoding. By ranking feature map channels via a fully connected layer, it selects high-importance channels to generate an More >

  • Open Access

    ARTICLE

    An Integrated Attention-BiLSTM Approach for Probabilistic Remaining Useful Life Prediction

    Bo Zhu#, Enzhi Dong#, Zhonghua Cheng*, Kexin Jiang, Chiming Guo, Shuai Yue

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074009 - 10 February 2026
    Abstract Accurate prediction of remaining useful life serves as a reliable basis for maintenance strategies, effectively reducing both the frequency of failures and associated costs. As a core component of PHM, RUL prediction plays a crucial role in preventing equipment failures and optimizing maintenance decision-making. However, deep learning models often falter when processing raw, noisy temporal signals, fail to quantify prediction uncertainty, and face challenges in effectively capturing the nonlinear dynamics of equipment degradation. To address these issues, this study proposes a novel deep learning framework. First, a new bidirectional long short-term memory network integrated with More >

  • Open Access

    ARTICLE

    An Intelligent Multi-Stage GA–SVM Hybrid Optimization Framework for Feature Engineering and Intrusion Detection in Internet of Things Networks

    Isam Bahaa Aldallal1, Abdullahi Abdu Ibrahim1,*, Saadaldeen Rashid Ahmed2,3

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.075212 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract The rapid growth of IoT networks necessitates efficient Intrusion Detection Systems (IDS) capable of addressing dynamic security threats under constrained resource environments. This paper proposes a hybrid IDS for IoT networks, integrating Support Vector Machine (SVM) and Genetic Algorithm (GA) for feature selection and parameter optimization. The GA reduces the feature set from 41 to 7, achieving a 30% reduction in overhead while maintaining an attack detection rate of 98.79%. Evaluated on the NSL-KDD dataset, the system demonstrates an accuracy of 97.36%, a recall of 98.42%, and an F1-score of 96.67%, with a low false More >

  • Open Access

    ARTICLE

    Virtual QPU: A Novel Implementation of Quantum Computing

    Danyang Zheng*, Jinchen Xv, Xin Zhou, Zheng Shan

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073860 - 10 February 2026
    Abstract The increasing popularity of quantum computing has resulted in a considerable rise in demand for cloud quantum computing usage in recent years. Nevertheless, the rapid surge in demand for cloud-based quantum computing resources has led to a scarcity. In order to meet the needs of an increasing number of researchers, it is imperative to facilitate efficient and flexible access to computing resources in a cloud environment. In this paper, we propose a novel quantum computing paradigm, Virtual QPU (VQPU), which addresses this issue and enhances quantum cloud throughput with guaranteed circuit fidelity. The proposal introduces More >

  • Open Access

    ARTICLE

    A Distributed Anonymous Reputation System for V2X Communication

    Shahidatul Sadiah1,#, Toru Nakanishi2,#,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073774 - 10 February 2026
    (This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
    Abstract V2X communication enables vehicles to share real-time traffic and road-condition data, but binding messages to persistent identifiers enables location tracking. Furthermore, since forged reports from malicious vehicles can distort trust decisions and threaten road safety, privacy-preserving trust management is essential. Lu et al. previously presented BARS, an anonymous reputation mechanism founded on blockchain technology to establish a privacy-preserving trust architecture for V2X communication. In this system, reputation certificates without a vehicle identifier ensure anonymity, while two authorities jointly manage certificate issuance and reputation updates. However, the centralized certificate updates introduce scalability limitations, and the authorities… More >

  • Open Access

    ARTICLE

    Robust and Efficient Federated Learning for Machinery Fault Diagnosis in Internet of Things

    Zhen Wu1,2, Hao Liu3, Linlin Zhang4, Zehui Zhang5,*, Jie Wu1, Haibin He1, Bin Zhou6

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.075156 - 10 February 2026
    (This article belongs to the Special Issue: Integrating Split Learning with Tiny Models for Advanced Edge Computing Applications in the Internet of Vehicles)
    Abstract Recently, Internet of Things (IoT) has been increasingly integrated into the automotive sector, enabling the development of diverse applications such as the Internet of Vehicles (IoV) and intelligent connected vehicles. Leveraging IoV technologies, operational data from core vehicle components can be collected and analyzed to construct fault diagnosis models, thereby enhancing vehicle safety. However, automakers often struggle to acquire sufficient fault data to support effective model training. To address this challenge, a robust and efficient federated learning method (REFL) is constructed for machinery fault diagnosis in collaborative IoV, which can organize multiple companies to collaboratively More >

  • Open Access

    ARTICLE

    A Comparative Benchmark of Machine and Deep Learning for Cyberattack Detection in IoT Networks

    Enzo Hoummady*, Fehmi Jaafar

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074897 - 10 February 2026
    (This article belongs to the Special Issue: Intelligence and Security Enhancement for Internet of Things)
    Abstract With the proliferation of Internet of Things (IoT) devices, securing these interconnected systems against cyberattacks has become a critical challenge. Traditional security paradigms often fail to cope with the scale and diversity of IoT network traffic. This paper presents a comparative benchmark of classic machine learning (ML) and state-of-the-art deep learning (DL) algorithms for IoT intrusion detection. Our methodology employs a two-phased approach: a preliminary pilot study using a custom-generated dataset to establish baselines, followed by a comprehensive evaluation on the large-scale CICIoTDataset2023. We benchmarked algorithms including Random Forest, XGBoost, CNN, and Stacked LSTM. The… More >

  • Open Access

    ARTICLE

    Multi-Area Path Planning for Multiple Unmanned Surface Vessels

    Jianing Wu1, Yufeng Chen1,*, Li Yin1, Huajun He2, Panshuan Jin2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072937 - 10 February 2026
    (This article belongs to the Special Issue: Intelligent Perception, Decision-making and Security Control for Unmanned Systems in Complex Environments)
    Abstract To conduct marine surveys, multiple unmanned surface vessels (Multi-USV) with different capabilities perform collaborative mapping in multiple designated areas. This paper proposes a task allocation algorithm based on integer linear programming (ILP) with flow balance constraints, ensuring the fair and efficient distribution of sub-areas among USVs and maintaining strong connectivity of assigned regions. In the established grid map, a search-based path planning algorithm is performed on the sub-areas according to the allocation scheme. It uses the greedy algorithm and the A* algorithm to achieve complete coverage of the barrier-free area and obtain an efficient trajectory More >

  • Open Access

    ARTICLE

    The Missing Data Recovery Method Based on Improved GAN

    Su Zhang1, Song Deng1,*, Qingsheng Liu2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072777 - 10 February 2026
    Abstract Accurate and reliable power system data are fundamental for critical operations such as grid monitoring, fault diagnosis, and load forecasting, underpinned by increasing intelligentization and digitalization. However, data loss and anomalies frequently compromise data integrity in practical settings, significantly impacting system operational efficiency and security. Most existing data recovery methods require complete datasets for training, leading to substantial data and computational demands and limited generalization. To address these limitations, this study proposes a missing data imputation model based on an improved Generative Adversarial Network (BAC-GAN). Within the BAC-GAN framework, the generator utilizes Bidirectional Long Short-Term… More >

  • Open Access

    ARTICLE

    A Hybrid Vision Transformer with Attention Architecture for Efficient Lung Cancer Diagnosis

    Abdu Salam1, Fahd M. Aldosari2, Donia Y. Badawood3, Farhan Amin4,*, Isabel de la Torre5,*, Gerardo Mendez Mezquita6, Henry Fabian Gongora6

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073342 - 10 February 2026
    (This article belongs to the Special Issue: Advancements in Machine Learning and Artificial Intelligence for Pattern Detection and Predictive Analytics in Healthcare)
    Abstract Lung cancer remains a major global health challenge, with early diagnosis crucial for improved patient survival. Traditional diagnostic techniques, including manual histopathology and radiological assessments, are prone to errors and variability. Deep learning methods, particularly Vision Transformers (ViT), have shown promise for improving diagnostic accuracy by effectively extracting global features. However, ViT-based approaches face challenges related to computational complexity and limited generalizability. This research proposes the DualSet ViT-PSO-SVM framework, integrating a ViT with dual attention mechanisms, Particle Swarm Optimization (PSO), and Support Vector Machines (SVM), aiming for efficient and robust lung cancer classification across multiple… More >

  • Open Access

    ARTICLE

    Leveraging Opposition-Based Learning in Particle Swarm Optimization for Effective Feature Selection

    Fei Yu1,2,3,*, Zhenya Diao1,2, Hongrun Wu1,2,*, Yingpin Chen1,3, Xuewen Xia1,2, Yuanxiang Li2,3,4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072593 - 10 February 2026
    Abstract Feature selection serves as a critical preprocessing step in machine learning, focusing on identifying and preserving the most relevant features to improve the efficiency and performance of classification algorithms. Particle Swarm Optimization has demonstrated significant potential in addressing feature selection challenges. However, there are inherent limitations in Particle Swarm Optimization, such as the delicate balance between exploration and exploitation, susceptibility to local optima, and suboptimal convergence rates, hinder its performance. To tackle these issues, this study introduces a novel Leveraged Opposition-Based Learning method within Fitness Landscape Particle Swarm Optimization, tailored for wrapper-based feature selection. The… More >

  • Open Access

    ARTICLE

    A Quantum-Inspired Algorithm for Clustering and Intrusion Detection

    Gang Xu1,2, Lefeng Wang1, Yuwei Huang2, Yong Lu3, Xin Liu4, Weijie Tan5, Zongpeng Li6, Xiu-Bo Chen2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074256 - 10 February 2026
    Abstract The Intrusion Detection System (IDS) is a security mechanism developed to observe network traffic and recognize suspicious or malicious activities. Clustering algorithms are often incorporated into IDS; however, conventional clustering-based methods face notable drawbacks, including poor scalability in handling high-dimensional datasets and a strong dependence of outcomes on initial conditions. To overcome the performance limitations of existing methods, this study proposes a novel quantum-inspired clustering algorithm that relies on a similarity coefficient-based quantum genetic algorithm (SC-QGA) and an improved quantum artificial bee colony algorithm hybrid K-means (IQABC-K). First, the SC-QGA algorithm is constructed based on… More >

  • Open Access

    ARTICLE

    A Multi-Scale Graph Neural Networks Ensemble Approach for Enhanced DDoS Detection

    Noor Mueen Mohammed Ali Hayder1,2, Seyed Amin Hosseini Seno2,*, Hamid Noori2, Davood Zabihzadeh3, Mehdi Ebady Manaa4,5

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073236 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract Distributed Denial of Service (DDoS) attacks are one of the severe threats to network infrastructure, sometimes bypassing traditional diagnosis algorithms because of their evolving complexity. Present Machine Learning (ML) techniques for DDoS attack diagnosis normally apply network traffic statistical features such as packet sizes and inter-arrival times. However, such techniques sometimes fail to capture complicated relations among various traffic flows. In this paper, we present a new multi-scale ensemble strategy given the Graph Neural Networks (GNNs) for improving DDoS detection. Our technique divides traffic into macro- and micro-level elements, letting various GNN models to get… More >

  • Open Access

    ARTICLE

    Detecting and Mitigating Cyberattacks on Load Frequency Control with Battery Energy Storage System

    Yunhao Yu1, Fuhua Luo1, Zhenyong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074277 - 10 February 2026
    Abstract This paper investigates the detection and mitigation of coordinated cyberattacks on Load Frequency Control (LFC) systems integrated with Battery Energy Storage Systems (BESS). As renewable energy sources gain greater penetration, power grids are becoming increasingly vulnerable to cyber threats, potentially leading to frequency instability and widespread disruptions. We model two significant attack vectors: load-altering attacks (LAAs) and false data injection attacks (FDIAs) that corrupt frequency measurements. These are analyzed for their impact on grid frequency stability in both linear and nonlinear LFC models, incorporating generation rate constraints and nonlinear loads. A coordinated attack strategy is… More >

  • Open Access

    ARTICLE

    A Unified Feature Selection Framework Combining Mutual Information and Regression Optimization for Multi-Label Learning

    Hyunki Lim*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074138 - 10 February 2026
    Abstract High-dimensional data causes difficulties in machine learning due to high time consumption and large memory requirements. In particular, in a multi-label environment, higher complexity is required as much as the number of labels. Moreover, an optimization problem that fully considers all dependencies between features and labels is difficult to solve. In this study, we propose a novel regression-based multi-label feature selection method that integrates mutual information to better exploit the underlying data structure. By incorporating mutual information into the regression formulation, the model captures not only linear relationships but also complex non-linear dependencies. The proposed… More >

  • Open Access

    ARTICLE

    A Robot Grasp Detection Method Based on Neural Architecture Search and Its Interpretability Analysis

    Lu Rong1,#, Manyu Xu2,3,#, Wenbo Zhu2,*, Zhihao Yang2,3, Chao Dong1,4,5, Yunzhi Zhang2,3, Kai Wang1,2, Bing Zheng1,4,5

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073442 - 10 February 2026
    Abstract Deep learning has become integral to robotics, particularly in tasks such as robotic grasping, where objects often exhibit diverse shapes, textures, and physical properties. In robotic grasping tasks, due to the diverse characteristics of the targets, frequent adjustments to the network architecture and parameters are required to avoid a decrease in model accuracy, which presents a significant challenge for non-experts. Neural Architecture Search (NAS) provides a compelling method through the automated generation of network architectures, enabling the discovery of models that achieve high accuracy through efficient search algorithms. Compared to manually designed networks, NAS methods… More >

  • Open Access

    ARTICLE

    Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things

    Maha Abdelhaq1, Ahmad Sami Al-Shamayleh2, Adnan Akhunzada3,*, Nikola Ivković4, Toobah Hasan5

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073577 - 10 February 2026
    (This article belongs to the Special Issue: Malware Analysis, Forensics, and Detection Using Artificial Intelligence)
    Abstract The rapid expansion of the Internet of Things (IoT) and Edge Artificial Intelligence (AI) has redefined automation and connectivity across modern networks. However, the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistent malware attacks. These adaptive and stealthy threats can evade conventional detection, establish remote control, propagate across devices, exfiltrate sensitive data, and compromise network integrity. This study presents a Software-Defined Internet of Things (SD-IoT) control-plane-based, AI-driven framework that integrates Gated Recurrent Units (GRU) and Long Short-Term Memory (LSTM) networks for efficient detection of evolving multi-vector, malware-driven botnet attacks.… More >

  • Open Access

    ARTICLE

    Semantic-Guided Stereo Matching Network Based on Parallax Attention Mechanism and SegFormer

    Zeyuan Chen, Yafei Xie, Jinkun Li, Song Wang, Yingqiang Ding*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073846 - 10 February 2026
    Abstract Stereo matching is a pivotal task in computer vision, enabling precise depth estimation from stereo image pairs, yet it encounters challenges in regions with reflections, repetitive textures, or fine structures. In this paper, we propose a Semantic-Guided Parallax Attention Stereo Matching Network (SGPASMnet) that can be trained in unsupervised manner, building upon the Parallax Attention Stereo Matching Network (PASMnet). Our approach leverages unsupervised learning to address the scarcity of ground truth disparity in stereo matching datasets, facilitating robust training across diverse scene-specific datasets and enhancing generalization. SGPASMnet incorporates two novel components: a Cross-Scale Feature Interaction… More >

  • Open Access

    ARTICLE

    Lane Line Detection Method for Complex Road Scenes Based on DeepLabv3+ and MobilenetV4

    Yingkai Ge, Jiasheng Zhang, Jiale Zhang, Zhenguo Ma, Yu Liu, Lihua Wang*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072799 - 10 February 2026
    Abstract With the continuous development of artificial intelligence and computer vision technology, numerous deep learning-based lane line detection methods have emerged. DeepLabv3+, as a classic semantic segmentation model, has found widespread application in the field of lane line detection. However, the accuracy of lane line segmentation is often compromised by factors such as changes in lighting conditions, occlusions, and wear and tear on the lane lines. Additionally, DeepLabv3+ suffers from high memory consumption and challenges in deployment on embedded platforms. To address these issues, this paper proposes a lane line detection method for complex road scenes… More >

  • Open Access

    ARTICLE

    Transformer-Driven Multimodal for Human-Object Detection and Recognition for Intelligent Robotic Surveillance

    Aman Aman Ullah1,2,#, Yanfeng Wu1,#, Shaheryar Najam3, Nouf Abdullah Almujally4, Ahmad Jalal5,6,*, Hui Liu1,7,8,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072508 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Object Detection and Recognition)
    Abstract Human object detection and recognition is essential for elderly monitoring and assisted living however, models relying solely on pose or scene context often struggle in cluttered or visually ambiguous settings. To address this, we present SCENET-3D, a transformer-driven multimodal framework that unifies human-centric skeleton features with scene-object semantics for intelligent robotic vision through a three-stage pipeline. In the first stage, scene analysis, rich geometric and texture descriptors are extracted from RGB frames, including surface-normal histograms, angles between neighboring normals, Zernike moments, directional standard deviation, and Gabor-filter responses. In the second stage, scene-object analysis, non-human objects… More >

  • Open Access

    ARTICLE

    Real-Time 3D Scene Perception in Dynamic Urban Environments via Street Detection Gaussians

    Yu Du1, Runwei Guan2, Ho-Pun Lam1, Jeremy Smith3, Yutao Yue4,5, Ka Lok Man1, Yan Li6,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072544 - 10 February 2026
    Abstract As a cornerstone for applications such as autonomous driving, 3D urban perception is a burgeoning field of study. Enhancing the performance and robustness of these perception systems is crucial for ensuring the safety of next-generation autonomous vehicles. In this work, we introduce a novel neural scene representation called Street Detection Gaussians (SDGs), which redefines urban 3D perception through an integrated architecture unifying reconstruction and detection. At its core lies the dynamic Gaussian representation, where time-conditioned parameterization enables simultaneous modeling of static environments and dynamic objects through physically constrained Gaussian evolution. The framework’s radar-enhanced perception module… More >

  • Open Access

    ARTICLE

    OPOR-Bench: Evaluating Large Language Models on Online Public Opinion Report Generation

    Jinzheng Yu1, Yang Xu2, Haozhen Li2, Junqi Li3, Ligu Zhu1, Hao Shen1,*, Lei Shi1,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073771 - 10 February 2026
    (This article belongs to the Special Issue: Big Data and Artificial Intelligence in Control and Information System)
    Abstract Online Public Opinion Reports consolidate news and social media for timely crisis management by governments and enterprises. While large language models (LLMs) enable automated report generation, this specific domain lacks formal task definitions and corresponding benchmarks. To bridge this gap, we define the Automated Online Public Opinion Report Generation (OPOR-Gen) task and construct OPOR-Bench, an event-centric dataset with 463 crisis events across 108 countries (comprising 8.8 K news articles and 185 K tweets). To evaluate report quality, we propose OPOR-Eval, a novel agent-based framework that simulates human expert evaluation. Validation experiments show OPOR-Eval achieves a More >

  • Open Access

    ARTICLE

    Framework for Secure Substitution Box Construction and Its Application in Image Encryption

    Umar Hayat1,2,*, Ikram Ullah2, Muhammad Bilal2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073097 - 10 February 2026
    Abstract Elliptic curve (EC) based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems. A substitution box (S-box) plays a vital role in securing modern symmetric key cryptosystems. However, the recently developed EC based algorithms usually trade off between computational efficiency and security, necessitating the design of a new algorithm with the desired cryptographic strength. To address these shortcomings, this paper proposes a new scheme based on Mordell elliptic curve (MEC) over the complex field for generating distinct, dynamic, and highly uncorrelated S-boxes. Furthermore, we count the exact number of the… More >

  • Open Access

    ARTICLE

    VIF-YOLO: A Visible-Infrared Fusion YOLO Model for Real-Time Human Detection in Dense Smoke Environments

    Wenhe Chen1, Yue Wang1, Shuonan Shen1, Leer Hua1, Caixia Zheng2, Qi Pu1,*, Xundiao Ma3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074682 - 10 February 2026
    Abstract In fire rescue scenarios, traditional manual operations are highly dangerous, as dense smoke, low visibility, extreme heat, and toxic gases not only hinder rescue efficiency but also endanger firefighters’ safety. Although intelligent rescue robots can enter hazardous environments in place of humans, smoke poses major challenges for human detection algorithms. These challenges include the attenuation of visible and infrared signals, complex thermal fields, and interference from background objects, all of which make it difficult to accurately identify trapped individuals. To address this problem, we propose VIF-YOLO, a visible–infrared fusion model for real-time human detection in… More >

  • Open Access

    ARTICLE

    Engine Failure Prediction on Large-Scale CMAPSS Data Using Hybrid Feature Selection and Imbalance-Aware Learning

    Ahmad Junaid1, Abid Iqbal2,*, Abuzar Khan1, Ghassan Husnain1,*, Abdul-Rahim Ahmad3, Mohammed Al-Naeem4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073189 - 10 February 2026
    (This article belongs to the Special Issue: AI for Industry 4.0 and 5.0: Intelligent Robotics, Cyber-Physical Systems, and Resilient Automation)
    Abstract Most predictive maintenance studies have emphasized accuracy but provide very little focus on Interpretability or deployment readiness. This study improves on prior methods by developing a small yet robust system that can predict when turbofan engines will fail. It uses the NASA CMAPSS dataset, which has over 200,000 engine cycles from 260 engines. The process begins with systematic preprocessing, which includes imputation, outlier removal, scaling, and labelling of the remaining useful life. Dimensionality is reduced using a hybrid selection method that combines variance filtering, recursive elimination, and gradient-boosted importance scores, yielding a stable set of… More >

  • Open Access

    ARTICLE

    Toward Secure and Auditable Data Sharing: A Cross-Chain CP-ABE Framework

    Ye Tian1,*, Zhuokun Fan1, Yifeng Zhang2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073935 - 10 February 2026
    Abstract Amid the increasing demand for data sharing, the need for flexible, secure, and auditable access control mechanisms has garnered significant attention in the academic community. However, blockchain-based ciphertext-policy attribute-based encryption (CP-ABE) schemes still face cumbersome ciphertext re-encryption and insufficient oversight when handling dynamic attribute changes and cross-chain collaboration. To address these issues, we propose a dynamic permission attribute-encryption scheme for multi-chain collaboration. This scheme incorporates a multi-authority architecture for distributed attribute management and integrates an attribute revocation and granting mechanism that eliminates the need for ciphertext re-encryption, effectively reducing both computational and communication overhead. It More >

  • Open Access

    ARTICLE

    A Chinese Abbreviation Prediction Framework Based on Chain-of-Thought Prompting and Semantic Preservation Dynamic Adjustment

    Jingru Lv1, Jianpeng Hu1,*, Jin Zhao2, Yonghao Luo1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073212 - 10 February 2026
    Abstract Chinese abbreviations improve communicative efficiency by extracting key components from longer expressions. They are widely used in both daily communication and professional domains. However, existing abbreviation generation methods still face two major challenges. First, sequence-labeling-based approaches often neglect contextual meaning by making binary decisions at the character level, leading to abbreviations that fail to capture semantic completeness. Second, generation-based methods rely heavily on a single decoding process, which frequently produces correct abbreviations but ranks them lower due to inadequate semantic evaluation. To address these limitations, we propose a novel two-stage framework with Generation–Iterative Optimization for More >

  • Open Access

    ARTICLE

    Multilevel Military Image Encryption Based on Tri-Independent Keying Approach

    Shereen S. Jumaa1, Mohsin H. Challoob2, Amjad J. Humaidi2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074752 - 10 February 2026
    Abstract Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access. This paper proposes a new Tri-independent keying method for encrypting military images. The proposed encryption method is based on multilevel security stages of pixel-level scrambling, bit-level manipulation, and block-level shuffling operations. For having a vast key space, the input password is hashed by the Secure Hash Algorithm 256-bit (SHA-256) for generating independently deterministic keys used in the multilevel stages. A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive… More >

  • Open Access

    ARTICLE

    Evolve and Revoke: A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution

    Han-Yu Lin, Tung-Tso Tsai*, Yi-Jia Ye

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073553 - 10 February 2026
    (This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
    Abstract Cloud data sharing is an important issue in modern times. To maintain the privacy and confidentiality of data stored in the cloud, encryption is an inevitable process before uploading the data. However, the centralized management and transmission latency of the cloud makes it difficult to support real-time processing and distributed access structures. As a result, fog computing and the Internet of Things (IoT) have emerged as crucial applications. Fog-assisted proxy re-encryption is a commonly adopted technique for sharing cloud ciphertexts. It allows a semi-trusted proxy to transform a data owner’s ciphertext into another re-encrypted ciphertext… More >

  • Open Access

    ARTICLE

    Unlocking Edge Fine-Tuning: A Sample-Efficient Language-Empowered Split Fine-Tuning Framework

    Zuyi Huang1, Yue Wang1, Jia Liu2, Haodong Yi1, Lejun Ai1, Min Chen1,3,*, Salman A. AlQahtani4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074034 - 10 February 2026
    (This article belongs to the Special Issue: Advancing Network Intelligence: Communication, Sensing and Computation)
    Abstract The personalized fine-tuning of large language models (LLMs) on edge devices is severely constrained by limited computation resources. Although split federated learning alleviates on-device burdens, its effectiveness diminishes in few-shot reasoning scenarios due to the low data efficiency of conventional supervised fine-tuning, which leads to excessive communication overhead. To address this, we propose Language-Empowered Split Fine-Tuning (LESFT), a framework that integrates split architectures with a contrastive-inspired fine-tuning paradigm. LESFT simultaneously learns from multiple logically equivalent but linguistically diverse reasoning chains, providing richer supervisory signals and improving data efficiency. This process-oriented training allows more effective reasoning More >

  • Open Access

    ARTICLE

    Improved Cuckoo Search Algorithm for Engineering Optimization Problems

    Shao-Qiang Ye*, Azlan Mohd Zain, Yusliza Yusoff

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073411 - 10 February 2026
    Abstract Engineering optimization problems are often characterized by high dimensionality, constraints, and complex, multimodal landscapes. Traditional deterministic methods frequently struggle under such conditions, prompting increased interest in swarm intelligence algorithms. Among these, the Cuckoo Search (CS) algorithm stands out for its promising global search capabilities. However, it often suffers from premature convergence when tackling complex problems. To address this limitation, this paper proposes a Grouped Dynamic Adaptive CS (GDACS) algorithm. The enhancements incorporated into GDACS can be summarized into two key aspects. Firstly, a chaotic map is employed to generate initial solutions, leveraging the inherent randomness… More >

  • Open Access

    ARTICLE

    Intelligent Human Interaction Recognition with Multi-Modal Feature Extraction and Bidirectional LSTM

    Muhammad Hamdan Azhar1,2,#, Yanfeng Wu1,#, Nouf Abdullah Almujally3, Shuaa S. Alharbi4, Asaad Algarni5, Ahmad Jalal2,6, Hui Liu1,7,8,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.071988 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Image Recognition: Innovations, Applications, and Future Directions)
    Abstract Recognizing human interactions in RGB videos is a critical task in computer vision, with applications in video surveillance. Existing deep learning-based architectures have achieved strong results, but are computationally intensive, sensitive to video resolution changes and often fail in crowded scenes. We propose a novel hybrid system that is computationally efficient, robust to degraded video quality and able to filter out irrelevant individuals, making it suitable for real-life use. The system leverages multi-modal handcrafted features for interaction representation and a deep learning classifier for capturing complex dependencies. Using Mask R-CNN and YOLO11-Pose, we extract grayscale… More >

  • Open Access

    ARTICLE

    Design, Realization, and Evaluation of Faster End-to-End Data Transmission over Voice Channels

    Jian Huang1, Mingwei Li1, Yulong Tian1, Yi Yao2, Hao Han1,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073201 - 10 February 2026
    Abstract With the popularization of new technologies, telephone fraud has become the main means of stealing money and personal identity information. Taking inspiration from the website authentication mechanism, we propose an end-to-end data modem scheme that transmits the caller’s digital certificates through a voice channel for the recipient to verify the caller’s identity. Encoding useful information through voice channels is very difficult without the assistance of telecommunications providers. For example, speech activity detection may quickly classify encoded signals as non-speech signals and reject input waveforms. To address this issue, we propose a novel modulation method based… More >

  • Open Access

    ARTICLE

    Research on Camouflage Target Detection Method Based on Edge Guidance and Multi-Scale Feature Fusion

    Tianze Yu, Jianxun Zhang*, Hongji Chen

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.073119 - 10 February 2026
    Abstract Camouflaged Object Detection (COD) aims to identify objects that share highly similar patterns—such as texture, intensity, and color—with their surrounding environment. Due to their intrinsic resemblance to the background, camouflaged objects often exhibit vague boundaries and varying scales, making it challenging to accurately locate targets and delineate their indistinct edges. To address this, we propose a novel camouflaged object detection network called Edge-Guided and Multi-scale Fusion Network (EGMFNet), which leverages edge-guided multi-scale integration for enhanced performance. The model incorporates two innovative components: a Multi-scale Fusion Module (MSFM) and an Edge-Guided Attention Module (EGA). These designs… More >

  • Open Access

    ARTICLE

    TeachSecure-CTI: Adaptive Cybersecurity Curriculum Generation Using Threat Dynamics and AI

    Alaa Tolah*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074997 - 10 February 2026
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications, 2nd Edition)
    Abstract The rapidly evolving cybersecurity threat landscape exposes a critical flaw in traditional educational programs where static curricula cannot adapt swiftly to novel attack vectors. This creates a significant gap between theoretical knowledge and the practical defensive capabilities needed in the field. To address this, we propose TeachSecure-CTI, a novel framework for adaptive cybersecurity curriculum generation that integrates real-time Cyber Threat Intelligence (CTI) with AI-driven personalization. Our framework employs a layered architecture featuring a CTI ingestion and clustering module, natural language processing for semantic concept extraction, and a reinforcement learning agent for adaptive content sequencing. By… More >

  • Open Access

    ARTICLE

    Design of a Patrol and Security Robot with Semantic Mapping and Obstacle Avoidance System Using RGB-D Camera and LiDAR

    Shu-Yin Chiang*, Shin-En Huang

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074528 - 10 February 2026
    Abstract This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping (SLAM), real-time object recognition, and dynamic obstacle avoidance. The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping, fusing geometric and visual data to build a high-fidelity 2D semantic map. This map enables the robot to identify and project object information for improved situational awareness. Experimental results show that object recognition reached 95.4% mAP@0.5. Semantic completeness increased from 68.7% (single view) to 94.1% (multi-view) with an More >

  • Open Access

    ARTICLE

    SIM-Net: A Multi-Scale Attention-Guided Deep Learning Framework for High-Precision PCB Defect Detection

    Ping Fang, Mengjun Tong*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073272 - 10 February 2026
    Abstract Defect detection in printed circuit boards (PCB) remains challenging due to the difficulty of identifying small-scale defects, the inefficiency of conventional approaches, and the interference from complex backgrounds. To address these issues, this paper proposes SIM-Net, an enhanced detection framework derived from YOLOv11. The model integrates SPDConv to preserve fine-grained features for small object detection, introduces a novel convolutional partial attention module (C2PAM) to suppress redundant background information and highlight salient regions, and employs a multi-scale fusion network (MFN) with a multi-grain contextual module (MGCT) to strengthen contextual representation and accelerate inference. Experimental evaluations demonstrate More >

  • Open Access

    ARTICLE

    Non-Euclidean Models for Fraud Detection in Irregular Temporal Data Environments

    Boram Kim, Guebin Choi*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073500 - 10 February 2026
    Abstract Traditional anomaly detection methods often assume that data points are independent or exhibit regularly structured relationships, as in Euclidean data such as time series or image grids. However, real-world data frequently involve irregular, interconnected structures, requiring a shift toward non-Euclidean approaches. This study introduces a novel anomaly detection framework designed to handle non-Euclidean data by modeling transactions as graph signals. By leveraging graph convolution filters, we extract meaningful connection strengths that capture relational dependencies often overlooked in traditional methods. Utilizing the Graph Convolutional Networks (GCN) framework, we integrate graph-based embeddings with conventional anomaly detection models, More >

  • Open Access

    ARTICLE

    An Efficient Certificateless Authentication Scheme with Enhanced Security for NDN-IoT Environments

    Feihong Xu1, Jianbo Wu1,*, Qing An1,*, Fei Zhu1,2, Zhaoyang Han3, Saru Kumari4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073441 - 10 February 2026
    (This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)
    Abstract The large-scale deployment of Internet of Things (IoT) technology across various aspects of daily life has significantly propelled the intelligent development of society. Among them, the integration of IoT and named data networks (NDNs) reduces network complexity and provides practical directions for content-oriented network design. However, ensuring data integrity in NDN-IoT applications remains a challenging issue. Very recently, Wang et al. (Entropy, 27(5), 471(2025)) designed a certificateless aggregate signature (CLAS) scheme for NDN-IoT environments. Wang et al. stated that their construction was provably secure under various types of security attacks. Using theoretical analysis methods, in… More >

  • Open Access

    ARTICLE

    Dynamic Malware Detection Method Based on API Multiple Subsequences

    Jinhuo Liang, Jinan Shen*, Pengfei Wang, Fang Liang, Xuejian Deng

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073076 - 10 February 2026
    Abstract The method for malware detection based on Application Programming Interface (API) call sequences, as a primary research focus within dynamic detection technologies, currently lacks attention to subsequences of API calls, the variety of API call types, and the length of sequences. This oversight leads to overly complex call sequences. To address this issue, a dynamic malware detection approach based on multiple subsequences is proposed. Initially, APIs are remapped and encoded, with the introduction of percentile lengths to process sequences. Subsequently, a combination of One-Dimensional Convolutional Neural Network (1D-CNN) and Bidirectional Long Short-Term Memory (Bi-LSTM) networks, More >

  • Open Access

    ARTICLE

    LLM-Powered Multimodal Reasoning for Fake News Detection

    Md. Ahsan Habib1, Md. Anwar Hussen Wadud2, M. F. Mridha3,*, Md. Jakir Hossen4,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.070235 - 10 February 2026
    (This article belongs to the Special Issue: Visual and Large Language Models for Generalized Applications)
    Abstract The problem of fake news detection (FND) is becoming increasingly important in the field of natural language processing (NLP) because of the rapid dissemination of misleading information on the web. Large language models (LLMs) such as GPT-4. Zero excels in natural language understanding tasks but can still struggle to distinguish between fact and fiction, particularly when applied in the wild. However, a key challenge of existing FND methods is that they only consider unimodal data (e.g., images), while more detailed multimodal data (e.g., user behaviour, temporal dynamics) is neglected, and the latter is crucial for… More >

  • Open Access

    ARTICLE

    Layered Feature Engineering for E-Commerce Purchase Prediction: A Hierarchical Evaluation on Taobao User Behavior Datasets

    Liqiu Suo1, Lin Xia1, Yoona Chung1, Eunchan Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.076329 - 10 February 2026
    (This article belongs to the Special Issue: Big Data Technologies and Applications for a Data-Driven World)
    Abstract Accurate purchase prediction in e-commerce critically depends on the quality of behavioral features. This paper proposes a layered and interpretable feature engineering framework that organizes user signals into three layers: Basic, Conversion & Stability (efficiency and volatility across actions), and Advanced Interactions & Activity (cross-behavior synergies and intensity). Using real Taobao (Alibaba’s primary e-commerce platform) logs (57,976 records for 10,203 users; 25 November–03 December 2017), we conducted a hierarchical, layer-wise evaluation that holds data splits and hyperparameters fixed while varying only the feature set to quantify each layer’s marginal contribution. Across logistic regression (LR), decision… More >

  • Open Access

    ARTICLE

    AFI: Blackbox Backdoor Detection Method Based on Adaptive Feature Injection

    Simin Tang1,2,3,4, Zhiyong Zhang1,2,3,4,*, Junyan Pan1,2,3,4, Gaoyuan Quan1,2,3,4, Weiguo Wang5, Junchang Jing6

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073798 - 10 February 2026
    (This article belongs to the Special Issue: Artificial Intelligence Methods and Techniques to Cybersecurity)
    Abstract At inference time, deep neural networks are susceptible to backdoor attacks, which can produce attacker-controlled outputs when inputs contain carefully crafted triggers. Existing defense methods often focus on specific attack types or incur high costs, such as data cleaning or model fine-tuning. In contrast, we argue that it is possible to achieve effective and generalizable defense without removing triggers or incurring high model-cleaning costs. From the attacker’s perspective and based on characteristics of vulnerable neuron activation anomalies, we propose an Adaptive Feature Injection (AFI) method for black-box backdoor detection. AFI employs a pre-trained image encoder… More >

  • Open Access

    ARTICLE

    Metacognition Inspired Reflective Chain-of-Thought for Knowledge-Based VQA

    Zhongfan Sun, Kan Guo, Yongli Hu*, Yong Zhang

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072903 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Large Models and Domain-specific Applications)
    Abstract Knowledge-based Visual Question Answering (VQA) requires the integration of visual information with external knowledge reasoning. Existing approaches typically retrieve information from external corpora and rely on pretrained language models for reasoning. However, their performance is often hindered by the limited capabilities of retrievers and the constrained size of knowledge bases. Moreover, relying on image captions to bridge the modal gap between visual and language modalities can lead to the omission of critical visual details. To address these limitations, we propose the Reflective Chain-of-Thought (ReCoT) method, a simple yet effective framework inspired by metacognition theory. ReCoT effectively activates… More >

  • Open Access

    ARTICLE

    An Overall Optimization Model Using Metaheuristic Algorithms for the CNN-Based IoT Attack Detection Problem

    Le Thi Hong Van1,*, Le Duc Thuan1, Pham Van Huong1, Nguyen Hieu Minh2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.075027 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract Optimizing convolutional neural networks (CNNs) for IoT attack detection remains a critical yet challenging task due to the need to balance multiple performance metrics beyond mere accuracy. This study proposes a unified and flexible optimization framework that leverages metaheuristic algorithms to automatically optimize CNN configurations for IoT attack detection. Unlike conventional single-objective approaches, the proposed method formulates a global multi-objective fitness function that integrates accuracy, precision, recall, and model size (speed/model complexity penalty) with adjustable weights. This design enables both single-objective and weighted-sum multi-objective optimization, allowing adaptive selection of optimal CNN configurations for diverse deployment… More >

  • Open Access

    ARTICLE

    VitSeg-Det & TransTra-Count: Networks for Robust Crack Detection and Measurement in Dynamic Video Scenes

    Langyue Zhao1,2, Yubin Yuan3,*, Yiquan Wu2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.070563 - 10 February 2026
    Abstract Regular detection of pavement cracks is essential for infrastructure maintenance. However, existing methods often ignore the challenges such as the continuous evolution of crack features between video frames and the difficulty of defect quantification. To this end, this paper proposes an integrated framework for pavement crack detection, segmentation, tracking and counting based on Transformer. Firstly, we design the VitSeg-Det network, which is an integrated detection and segmentation network that can accurately locate and segment tiny cracks in complex scenes. Second, the TransTra-Count system is developed to automatically count the number of defects by combining defect More >

  • Open Access

    ARTICLE

    Actor–Critic Trajectory Controller with Optimal Design for Nonlinear Robotic Systems

    Nien-Tsu Hu1,*, Hsiang-Tung Kao1, Chin-Sheng Chen1, Shih-Hao Chang2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074993 - 10 February 2026
    Abstract Trajectory tracking for nonlinear robotic systems remains a fundamental yet challenging problem in control engineering, particularly when both precision and efficiency must be ensured. Conventional control methods are often effective for stabilization but may not directly optimize long-term performance. To address this limitation, this study develops an integrated framework that combines optimal control principles with reinforcement learning for a single-link robotic manipulator. The proposed scheme adopts an actor–critic structure, where the critic network approximates the value function associated with the Hamilton–Jacobi–Bellman equation, and the actor network generates near-optimal control signals in real time. This dual… More >

  • Open Access

    ARTICLE

    Can Domain Knowledge Make Deep Models Smarter? Expert-Guided PointPillar (EG-PointPillar) for Enhanced 3D Object Detection

    Chiwan Ahn1, Daehee Kim2,*, Seongkeun Park3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073330 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Object Detection: Methods and Applications)
    Abstract This paper proposes a deep learning-based 3D LiDAR perception framework designed for applications such as autonomous robots and vehicles. To address the high dependency on large-scale annotated data—an inherent limitation of deep learning models—this study introduces a hybrid perception architecture that incorporates expert-driven LiDAR processing techniques into the deep neural network. Traditional 3D LiDAR processing methods typically remove ground planes and apply distance- or density-based clustering for object detection. In this work, such expert knowledge is encoded as feature-level inputs and fused with the deep network, thereby mitigating the data dependency issue of conventional learning-based… More >

  • Open Access

    ARTICLE

    A Knowledge-Distilled CharacterBERT-BiLSTM-ATT Framework for Lightweight DGA Detection in IoT Devices

    Chengqi Liu1, Yongtao Li2, Weiping Zou3,*, Deyu Lin4,5,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074975 - 10 February 2026
    Abstract With the large-scale deployment of the Internet of Things (IoT) devices, their weak security mechanisms make them prime targets for malware attacks. Attackers often use Domain Generation Algorithm (DGA) to generate random domain names, hiding the real IP of Command and Control (C&C) servers to build botnets. Due to the randomness and dynamics of DGA, traditional methods struggle to detect them accurately, increasing the difficulty of network defense. This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments. Specifically, a teacher model combining CharacterBERT, a bidirectional long short-term memory More >

  • Open Access

    ARTICLE

    SSA*-PDWA: A Hierarchical Path Planning Framework with Enhanced A* Algorithm and Dynamic Window Approach for Mobile Robots

    Lishu Qin*, Yu Gao, Xinyuan Lu

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074739 - 10 February 2026
    Abstract With the rapid development of intelligent navigation technology, efficient and safe path planning for mobile robots has become a core requirement. To address the challenges of complex dynamic environments, this paper proposes an intelligent path planning framework based on grid map modeling. First, an improved Safe and Smooth A* (SSA*) algorithm is employed for global path planning. By incorporating obstacle expansion and corner-point optimization, the proposed SSA* enhances the safety and smoothness of the planned path. Then, a Partitioned Dynamic Window Approach (PDWA) is integrated for local planning, which is triggered when dynamic or sudden… More >

  • Open Access

    ARTICLE

    Optimizing RPL Routing Using Tabu Search to Improve Link Stability and Energy Consumption in IoT Networks

    Mehran Tarif1, Mohammadhossein Homaei2,*, Abbas Mirzaei3, Babak Nouri-Moghaddam3

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.071676 - 10 February 2026
    Abstract The Routing Protocol for Low-power and Lossy Networks (RPL) is widely used in Internet of Things (IoT) systems, where devices usually have very limited resources. However, RPL still faces several problems, such as high energy usage, unstable links, and inefficient routing decisions, which reduce the overall network performance and lifetime. In this work, we introduce TABURPL, an improved routing method that applies Tabu Search (TS) to optimize the parent selection process. The method uses a combined cost function that considers Residual Energy, Transmission Energy, Distance to the Sink, Hop Count, Expected Transmission Count (ETX), and More >

  • Open Access

    ARTICLE

    ES-YOLO: Edge and Shape Fusion-Based YOLO for Traffic Sign Detection

    Weiguo Pan1, Songjie Du2,*, Bingxin Xu1, Bin Zhang1, Hongzhe Liu1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073599 - 10 February 2026
    Abstract Traffic sign detection is a critical component of driving systems. Single-stage network-based traffic sign detection algorithms, renowned for their fast detection speeds and high accuracy, have become the dominant approach in current practices. However, in complex and dynamic traffic scenes, particularly with smaller traffic sign objects, challenges such as missed and false detections can lead to reduced overall detection accuracy. To address this issue, this paper proposes a detection algorithm that integrates edge and shape information. Recognizing that traffic signs have specific shapes and distinct edge contours, this paper introduces an edge feature extraction branch More >

  • Open Access

    ARTICLE

    Performance Analysis of Bandwidth Aware Hybrid Powered 5G Cloud Radio Access Network

    Md. Al-Hasan1, Mst. Rubina Aktar2, Fahmid Al Farid3,4,*, Md. Shamim Anower5, Abu Saleh Musa Miah1,6, Md. Hezerul Abdul Karim4,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.071280 - 10 February 2026
    Abstract The rapid growth in available network bandwidth has directly contributed to an exponential increase in mobile data traffic, creating significant challenges for network energy consumption. Also, with the extraordinary growth of mobile communications, the data traffic has dramatically expanded, which has led to massive grid power consumption and incurred high operating expenditure (OPEX). However, the majority of current network designs struggle to efficiently manage a massive amount of data using little power, which degrades energy efficiency performance. Thereby, it is necessary to have an efficient mechanism to reduce power consumption when processing large amounts of… More >

  • Open Access

    ARTICLE

    Enhanced BEV Scene Segmentation: De-Noise Channel Attention for Resource-Constrained Environments

    Argho Dey1, Yunfei Yin1,2,*, Zheng Yuan1, Zhiwen Zeng1, Xianjian Bao3, Md Minhazul Islam1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074122 - 10 February 2026
    Abstract Autonomous vehicles rely heavily on accurate and efficient scene segmentation for safe navigation and efficient operations. Traditional Bird’s Eye View (BEV) methods on semantic scene segmentation, which leverage multimodal sensor fusion, often struggle with noisy data and demand high-performance GPUs, leading to sensor misalignment and performance degradation. This paper introduces an Enhanced Channel Attention BEV (ECABEV), a novel approach designed to address the challenges under insufficient GPU memory conditions. ECABEV integrates camera and radar data through a de-noise enhanced channel attention mechanism, which utilizes global average and max pooling to effectively filter out noise while… More >

  • Open Access

    ARTICLE

    Boruta-LSTMAE: Feature-Enhanced Depth Image Denoising for 3D Recognition

    Fawad Salam Khan1,*, Noman Hasany2, Muzammil Ahmad Khan3, Shayan Abbas4, Sajjad Ahmed5, Muhammad Zorain6, Wai Yie Leong7,*, Susama Bagchi8, Sanjoy Kumar Debnath8

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.072893 - 10 February 2026
    Abstract The initial noise present in the depth images obtained with RGB-D sensors is a combination of hardware limitations in addition to the environmental factors, due to the limited capabilities of sensors, which also produce poor computer vision results. The common image denoising techniques tend to remove significant image details and also remove noise, provided they are based on space and frequency filtering. The updated framework presented in this paper is a novel denoising model that makes use of Boruta-driven feature selection using a Long Short-Term Memory Autoencoder (LSTMAE). The Boruta algorithm identifies the most useful… More >

  • Open Access

    ARTICLE

    TSMixerE: Entity Context-Aware Method for Static Knowledge Graph Completion

    Jianzhong Chen, Yunsheng Xu, Zirui Guo, Tianmin Liu, Ying Pan*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.071777 - 10 February 2026
    Abstract The rapid development of information technology and accelerated digitalization have led to an explosive growth of data across various fields. As a key technology for knowledge representation and sharing, knowledge graphs play a crucial role by constructing structured networks of relationships among entities. However, data sparsity and numerous unexplored implicit relations result in the widespread incompleteness of knowledge graphs. In static knowledge graph completion, most existing methods rely on linear operations or simple interaction mechanisms for triple encoding, making it difficult to fully capture the deep semantic associations between entities and relations. Moreover, many methods… More >

  • Open Access

    ARTICLE

    A Hybrid Clique-Based Method with Structural Feature Node Extraction for Community Detection in Overlapping Networks

    Sicheng Ma1, Lixiang Zhang2,*, Guocai Chen3, Zeyu Dai3, Junru Zhu4, Wei Fang1,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073572 - 10 February 2026
    Abstract Community detection is a fundamental problem in network analysis for identifying densely connected node clusters, with successful applications in diverse fields like social networks, recommendation systems, biology, and cyberattack detection. Overlapping community detection refers to the case of a node belonging to multiple communities simultaneously, which is a much more meaningful and challenging task. Graph representation learning with Evolutionary Computation has been studied well in overlapping community detection to deal with complex network structures and characteristics. However, most of them focus on searching the entire solution space, which can be inefficient and lead to inadequate… More >

  • Open Access

    ARTICLE

    Hybrid Quantum Gate Enabled CNN Framework with Optimized Features for Human-Object Detection and Recognition

    Nouf Abdullah Almujally1, Tanvir Fatima Naik Bukht2, Shuaa S. Alharbi3, Asaad Algarni4, Ahmad Jalal2,5, Jeongmin Park6,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.072243 - 10 February 2026
    (This article belongs to the Special Issue: Advances in Object Detection and Recognition)
    Abstract Recognising human-object interactions (HOI) is a challenging task for traditional machine learning models, including convolutional neural networks (CNNs). Existing models show limited transferability across complex datasets such as D3D-HOI and SYSU 3D HOI. The conventional architecture of CNNs restricts their ability to handle HOI scenarios with high complexity. HOI recognition requires improved feature extraction methods to overcome the current limitations in accuracy and scalability. This work proposes a Novel quantum gate-enabled hybrid CNN (QEH-CNN) for effective HOI recognition. The model enhances CNN performance by integrating quantum computing components. The framework begins with bilateral image filtering,… More >

  • Open Access

    ARTICLE

    A Cooperative Hybrid Learning Framework for Automated Dandruff Severity Grading

    Sin-Ye Jhong1, Hui-Che Hsu1,2, Hsin-Hua Huang2, Chih-Hsien Hsia3,4,*, Yulius Harjoseputro2,5, Yung-Yao Chen2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.072633 - 10 February 2026
    Abstract Automated grading of dandruff severity is a clinically significant but challenging task due to the inherent ordinal nature of severity levels and the high prevalence of label noise from subjective expert annotations. Standard classification methods fail to address these dual challenges, limiting their real-world performance. In this paper, a novel, three-phase training framework is proposed that learns a robust ordinal classifier directly from noisy labels. The approach synergistically combines a rank-based ordinal regression backbone with a cooperative, semi-supervised learning strategy to dynamically partition the data into clean and noisy subsets. A hybrid training objective is… More >

  • Open Access

    ARTICLE

    Segment-Conditioned Latent-Intent Framework for Cooperative Multi-UAV Search

    Gang Hou1,#, Aifeng Liu1,#, Tao Zhao1, Wenyuan Wei2, Bo Li1, Jiancheng Liu3,*, Siwen Wei4,5,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.073202 - 10 February 2026
    (This article belongs to the Special Issue: Cooperation and Autonomy in Multi-Agent Systems: Models, Algorithms, and Applications)
    Abstract Cooperative multi-UAV search requires jointly optimizing wide-area coverage, rapid target discovery, and endurance under sensing and motion constraints. Resolving this coupling enables scalable coordination with high data efficiency and mission reliability. We formulate this problem as a discounted Markov decision process on an occupancy grid with a cellwise Bayesian belief update, yielding a Markov state that couples agent poses with a probabilistic target field. On this belief–MDP we introduce a segment-conditioned latent-intent framework, in which a discrete intent head selects a latent skill every K steps and an intra-segment GRU policy generates per-step control conditioned on More >

  • Open Access

    ARTICLE

    Syntactic and Socially Responsible Machine Translation: A POS and DEP Integrated Framework for English–Tamil

    Rama Sugavanam*, Mythili Ramu

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.071469 - 10 February 2026
    Abstract When performing English-to-Tamil Neural Machine Translation (NMT), end users face several challenges due to Tamil’s rich morphology, free word order, and limited annotated corpora. Although available transformer-based models offer strong baselines, they compromise syntactic awareness and the detection and management of offensive content in cluttered, noisy, and informal text. In this paper, we present POSDEP-Offense-Trans, a multi-task NMT framework that combines Part-of-Speech (POS) and Dependency Parsing (DEP) methods with a robust offensive language classification module. Our architecture enriches the Transformer encoder with syntax-aware embeddings and provides syntax-guided attention mechanisms. The architecture incorporates a structure-aware contrastive… More >

  • Open Access

    ARTICLE

    A Ransomware Detection Approach Based on LLM Embedding and Ensemble Learning

    Abdallah Ghourabi1,*, Hassen Chouaib2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.074505 - 10 February 2026
    Abstract In recent years, ransomware attacks have become one of the most common and destructive types of cyberattacks. Their impact is significant on the operations, finances and reputation of affected companies. Despite the efforts of researchers and security experts to protect information systems from these attacks, the threat persists and the proposed solutions are not able to significantly stop the spread of ransomware attacks. The latest remarkable achievements of large language models (LLMs) in NLP tasks have caught the attention of cybersecurity researchers to integrate these models into security threat detection. These models offer high embedding… More >

  • Open Access

    ARTICLE

    A CNN-Transformer Hybrid Model for Real-Time Recognition of Affective Tactile Biosignals

    Chang Xu1,*, Xianbo Yin2, Zhiyong Zhou1, Bomin Liu1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.074417 - 10 February 2026
    Abstract This study presents a hybrid CNN-Transformer model for real-time recognition of affective tactile biosignals. The proposed framework combines convolutional neural networks (CNNs) to extract spatial and local temporal features with the Transformer encoder that captures long-range dependencies in time-series data through multi-head attention. Model performance was evaluated on two widely used tactile biosignal datasets, HAART and CoST, which contain diverse affective touch gestures recorded from pressure sensor arrays. The CNN-Transformer model achieved recognition rates of 93.33% on HAART and 80.89% on CoST, outperforming existing methods on both benchmarks. By incorporating temporal windowing, the model enables More >

  • Open Access

    ARTICLE

    Development of Wave Water Simulator for Path Planning of Autonomous Robots in Constrained Environments

    Hui Chen1, Mohammed A. H. Ali1,*, Bushroa Abd Razak1, Zhenya Wang2, Yusoff Nukman1, Shikai Zhang1, Zhiwei Huang1, Ligang Yao3, Mohammad Alkhedher4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.065539 - 10 February 2026
    Abstract Most existing path planning approaches rely on discrete expansions or localized heuristics that can lead to extended re-planning, inefficient detours, and limited adaptability to complex obstacle distributions. These issues are particularly pronounced when navigating cluttered or large-scale environments that demand both global coverage and smooth trajectory generation. To address these challenges, this paper proposes a Wave Water Simulator (WWS) algorithm, leveraging a physically motivated wave equation to achieve inherently smooth, globally consistent path planning. In WWS, wavefront expansions naturally identify safe corridors while seamlessly avoiding local minima, and selective corridor focusing reduces computational overhead in More >

Copyright © 2026 The Author(s). Published by Tech Science Press.

Share Link