Home / Journals / CMES / Vol.144, No.2, 2025
Special Issues
Table of Content
cover

On the Cover

Conservative antithrombotic therapy (no stenting) has been proposed for patients with plaque erosion. However, two challenging questions remain: 1) Which patient group would get better outcome from the conservative treatment? 2) Which risk factors and prediction method could be used to predict the treatment outcome? OCT-based fluid-structure interaction models were used to identify the risk factors and predict the treatment outcome. For a detailed discussion, please see the paper.

View this paper

  • Open AccessOpen Access

    ARTICLE

    Computational Modeling to Predict Conservative Treatment Outcome for Patients with Plaque Erosion: An OCT-Based Patient-Specific FSI Modeling Study

    Yanwen Zhu1,#, Chen Zhao2,#, Yishuo Xu2, Zheyang Wu3, Akiko Maehara4, Liang Wang1, Dirui Zhang2, Ming Zeng2, Rui Lv5, Xiaoya Guo6, Mengde Huang1, Minglong Chen7, Gary S. Mintz4, Dalin Tang1,3,*, Haibo Jia2, Bo Yu2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1249-1270, 2025, DOI:10.32604/cmes.2025.067039 - 31 August 2025
    Abstract Image-based computational models have been used for vulnerable plaque progression and rupture predictions, and good results have been reported. However, mechanisms and predictions for plaque erosion are under-investigated. Patient-specific fluid-structure interaction (FSI) models based on optical coherence tomography (OCT) follow-up data from patients with plaque erosion and who received conservative antithrombotic treatment (using medication, no stenting) to identify risk factors that could be used to predict the treatment outcome. OCT and angiography data were obtained from 10 patients who received conservative antithrombotic treatment. Five participants had worse outcomes (WOG, stenosis severity ≥ 70% at one-year… More >

    Graphic Abstract

    Computational Modeling to Predict Conservative Treatment Outcome for Patients with Plaque Erosion: An OCT-Based Patient-Specific FSI Modeling Study

  • Open AccessOpen Access

    REVIEW

    Beyond Classical Elasticity: A Review of Strain Gradient Theories, Emphasizing Computer Modeling, Physical Interpretations, and Multifunctional Applications

    Shubham Desai, Sai Sidhardh*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1271-1334, 2025, DOI:10.32604/cmes.2025.068141 - 31 August 2025
    Abstract The increasing integration of small-scale structures in engineering, particularly in Micro-Electro-Mechanical Systems (MEMS), necessitates advanced modeling approaches to accurately capture their complex mechanical behavior. Classical continuum theories are inadequate at micro- and nanoscales, particularly concerning size effects, singularities, and phenomena like strain softening or phase transitions. This limitation follows from their lack of intrinsic length scale parameters, crucial for representing microstructural features. Theoretical and experimental findings emphasize the critical role of these parameters on small scales. This review thoroughly examines various strain gradient elasticity (SGE) theories commonly employed in literature to capture these size-dependent effects… More >

  • Open AccessOpen Access

    REVIEW

    The Convergence of Computational Fluid Dynamics and Machine Learning in Oncology: A Review

    Wan Mohd Faizal1,2,*, Nurul Musfirah Mazlan1,*, Shazril Imran Shaukat3,4, Chu Yee Khor2, Ab Hadi Mohd Haidiezul2, Abdul Khadir Mohamad Syafiq2
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1335-1369, 2025, DOI:10.32604/cmes.2025.068660 - 31 August 2025
    Abstract Conventional oncology faces challenges such as suboptimal drug delivery, tumor heterogeneity, and therapeutic resistance, indicating a need for more personalized, and mechanistically grounded and predictive treatment strategies. This review explores the convergence of Computational Fluid Dynamics (CFD) and Machine Learning (ML) as an integrated framework to address these issues in modern cancer therapy. The paper discusses recent advancements where CFD models simulate complex tumor microenvironmental conditions, like interstitial fluid pressure (IFP) and drug perfusion, and ML enhances simulation workflows, automates image-based segmentation, and enhances predictive accuracy. The synergy between CFD and ML improves scalability and More >

  • Open AccessOpen Access

    REVIEW

    A Review of Computational Fluid Dynamics Techniques and Methodologies in Vertical Axis Wind Turbine Development

    Ahmad Fazlizan1,*, Wan Khairul Muzammil2, Najm Addin Al-Khawlani1
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1371-1437, 2025, DOI:10.32604/cmes.2025.067854 - 31 August 2025
    Abstract This review provides a comprehensive and systematic examination of Computational Fluid Dynamics (CFD) techniques and methodologies applied to the development of Vertical Axis Wind Turbines (VAWTs). Although VAWTs offer significant advantages for urban wind applications, such as omnidirectional wind capture and a compact, ground-accessible design, they face substantial aerodynamic challenges, including dynamic stall, blade–wake interactions, and continuously varying angles of attack throughout their rotation. The review critically evaluates how CFD has been leveraged to address these challenges, detailing the modelling frameworks, simulation setups, mesh strategies, turbulence models, and boundary condition treatments adopted in the literature.… More >

  • Open AccessOpen Access

    REVIEW

    Large Language Models for Effective Detection of Algorithmically Generated Domains: A Comprehensive Review

    Hamed Alqahtani1, Gulshan Kumar2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1439-1479, 2025, DOI:10.32604/cmes.2025.067738 - 31 August 2025
    Abstract Domain Generation Algorithms (DGAs) continue to pose a significant threat in modern malware infrastructures by enabling resilient and evasive communication with Command and Control (C&C) servers. Traditional detection methods—rooted in statistical heuristics, feature engineering, and shallow machine learning—struggle to adapt to the increasing sophistication, linguistic mimicry, and adversarial variability of DGA variants. The emergence of Large Language Models (LLMs) marks a transformative shift in this landscape. Leveraging deep contextual understanding, semantic generalization, and few-shot learning capabilities, LLMs such as BERT, GPT, and T5 have shown promising results in detecting both character-based and dictionary-based DGAs, including… More >

  • Open AccessOpen Access

    REVIEW

    A Data-Driven Systematic Review of the Metaverse in Transportation: Current Research, Computational Modeling, and Future Trends

    Cecilia Castro1, Victor Leiva2,*, Franco Basso2,3
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1481-1543, 2025, DOI:10.32604/cmes.2025.067992 - 31 August 2025
    Abstract Metaverse technologies are increasingly promoted as game-changers in transport planning, connected-autonomous mobility, and immersive traveler services. However, the field lacks a systematic review of what has been achieved, where critical technical gaps remain, and where future deployments should be integrated. Using a transparent protocol-driven screening process, we reviewed 1589 records and retained 101 peer-reviewed journal and conference articles (2021–2025) that explicitly frame their contributions within a transport-oriented metaverse. Our review reveals a predominantly exploratory evidence base. Among the 101 studies reviewed, 17 (16.8%) apply fuzzy multi-criteria decision-making, 36 (35.6%) feature digital-twin visualizations or simulation-based testbeds,… More >

    Graphic Abstract

    A Data-Driven Systematic Review of the Metaverse in Transportation: Current Research, Computational Modeling, and Future Trends

  • Open AccessOpen Access

    ARTICLE

    A Novel Multi-Objective Topology Optimization Method for Stiffness and Strength-Constrained Design Using the SIMP Approach

    Jianchang Hou1, Zhanpeng Jiang1, Fenghe Wu1, Hui Lian1, Zhaohua Wang2, Zijian Liu3, Weicheng Li1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1545-1572, 2025, DOI:10.32604/cmes.2025.068482 - 31 August 2025
    Abstract In this paper, a topology optimization method for coordinated stiffness and strength design is proposed under mass constraints, utilizing the Solid Isotropic Material with Penalization approach. Element densities are regulated through sensitivity filtering to mitigate numerical instabilities associated with stress concentrations. A p-norm aggregation function is employed to globalize local stress constraints, and a normalization technique linearly weights strain energy and stress, transforming the multi-objective problem into a single-objective formulation. The sensitivity of the objective function with respect to design variables is rigorously derived. Three numerical examples are presented, comparing the optimized structures in terms More >

  • Open AccessOpen Access

    ARTICLE

    High-Fidelity Machine Learning Framework for Fracture Energy Prediction in Fiber-Reinforced Concrete

    Ala’a R. Al-Shamasneh1, Faten Khalid Karim2, Arsalan Mahmoodzadeh3,*, Abdulaziz Alghamdi4, Abdullah Alqahtani5, Shtwai Alsubai5, Abed Alanazi5
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1573-1606, 2025, DOI:10.32604/cmes.2025.068887 - 31 August 2025
    Abstract The fracture energy of fiber-reinforced concrete (FRC) affects the durability and structural performance of concrete elements. Advancements in experimental studies have yet to overcome the challenges of estimating fracture energy, as the process remains time-intensive and costly. Therefore, machine learning techniques have emerged as powerful alternatives. This study aims to investigate the performance of machine learning techniques to predict the fracture energy of FRC. For this purpose, 500 data points, including 8 input parameters that affect the fracture energy of FRC, are collected from three-point bending tests and employed to train and evaluate the machine… More >

  • Open AccessOpen Access

    ARTICLE

    Developing Hybrid XGBoost Model to Predict the Strength of Polypropylene and Straw Fibers Reinforced Cemented Paste Backfill and Interpretability Insights

    Yingui Qiu1, Enming Li1,2,*, Pablo Segarra2, Bin Xi3, Jian Zhou1
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1607-1629, 2025, DOI:10.32604/cmes.2025.068211 - 31 August 2025
    Abstract With the growing demand for sustainable development in the mining industry, cemented paste backfill (CPB) materials, primarily composed of tailings, play a crucial role in mine backfilling and underground support systems. To enhance the mechanical properties of CPB materials, fiber reinforcement technology has gradually gained attention, though challenges remain in predicting its performance. This study develops a hybrid model based on the adaptive equilibrium optimizer (adap-EO)-enhanced XGBoost method for accurately predicting the uniaxial compressive strength of fiber-reinforced CPB. Through systematic comparison with various other machine learning methods, results demonstrate that the proposed hybrid model exhibits… More >

  • Open AccessOpen Access

    ARTICLE

    A Time-Domain Irregular Wave Model with Different Random Numbers for FOWT Support Structures

    Shen-Haw Ju*, Yi-Chen Huang
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1631-1654, 2025, DOI:10.32604/cmes.2025.067679 - 31 August 2025
    Abstract This study focuses on determining the second-order irregular wave loads in the time domain without using the Inverse Fast Fourier Transform (IFFT). Considering the substantial displacement effects that Floating Offshore Wind Turbine (FOWT) support structures undergo when subjected to wave loads, the time-domain wave method is more suitable, while the frequency-domain method requiring IFFT cannot be used for moving bodies. Nonetheless, the computational challenges posed by the considerable computer time requirements of the time-domain wave method remain a significant obstacle. Thus, the paper incorporates various numerical schemes, including parallel computing and extrapolation of wave forces… More >

  • Open AccessOpen Access

    ARTICLE

    Dynamic Characteristics of Different Pantograph Structures for Heavy-Duty Trucks Considering Road Excitation

    Yan Xu1, Dietmar Gohlich2, Sangyoung Park2, William Zhendong Liu3, Ziwei Zhou1, Haiyang Qu4, Weidong Zhu5,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1655-1676, 2025, DOI:10.32604/cmes.2025.068771 - 31 August 2025
    Abstract The emissions from traditional fossil heavy-duty trucks have become a conspicuous issue worldwide. The electrical road system (ERS) can offer a viable solution for achieving zero CO2 emissions and has high energy efficiency in long-distance road cargo transport. While many kinds of pantograph structures have been developed for the ERS, their corresponding pantograph-catenary dynamic characteristics under different road conditions have not been investigated. This work performs a numerical study on the dynamics of the pantograph-catenary interaction of an ERS considering different pantograph structures. First, a pantograph-catenary-truck-road model is proposed. The reduced catenary model and reduced-plate model… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Reduced Error Pruning Tree Forest with Time-Based Missing Data Imputation (REPTF-TMDI) for Traffic Flow Prediction

    Yunus Dogan1, Goksu Tuysuzoglu1, Elife Ozturk Kiyak2, Bita Ghasemkhani3, Kokten Ulas Birant1,4, Semih Utku1, Derya Birant1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1677-1715, 2025, DOI:10.32604/cmes.2025.069255 - 31 August 2025
    Abstract Accurate traffic flow prediction (TFP) is vital for efficient and sustainable transportation management and the development of intelligent traffic systems. However, missing data in real-world traffic datasets poses a significant challenge to maintaining prediction precision. This study introduces REPTF-TMDI, a novel method that combines a Reduced Error Pruning Tree Forest (REPTree Forest) with a newly proposed Time-based Missing Data Imputation (TMDI) approach. The REPTree Forest, an ensemble learning approach, is tailored for time-related traffic data to enhance predictive accuracy and support the evolution of sustainable urban mobility solutions. Meanwhile, the TMDI approach exploits temporal patterns… More >

  • Open AccessOpen Access

    ARTICLE

    AGV Scheduling and Bidirectional Conflict-Free Routing Problem with Battery Swapping in Automated Container Terminals

    He Huang, Jin Zhu*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1717-1748, 2025, DOI:10.32604/cmes.2025.068384 - 31 August 2025
    Abstract Automated guided vehicles (AGVs) are key equipment in automated container terminals (ACTs), and their operational efficiency can be impacted by conflicts and battery swapping. Additionally, AGVs have bidirectional transportation capabilities, allowing them to move in the opposite direction without turning around, which helps reduce transportation time. This paper aims at the problem of AGV scheduling and bidirectional conflict-free routing with battery swapping in automated terminals. A bi-level mixed integer programming (MIP) model is proposed, taking into account task assignment, bidirectional conflict-free routing, and battery swapping. The upper model focuses on container task assignment and AGV… More >

  • Open AccessOpen Access

    ARTICLE

    Evaluating Domain Randomization Techniques in DRL Agents: A Comparative Study of Normal, Randomized, and Non-Randomized Resets

    Abubakar Elsafi*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1749-1766, 2025, DOI:10.32604/cmes.2025.066449 - 31 August 2025
    Abstract Domain randomization is a widely adopted technique in deep reinforcement learning (DRL) to improve agent generalization by exposing policies to diverse environmental conditions. This paper investigates the impact of different reset strategies, normal, non-randomized, and randomized, on agent performance using the Deep Deterministic Policy Gradient (DDPG) and Twin Delayed DDPG (TD3) algorithms within the CarRacing-v2 environment. Two experimental setups were conducted: an extended training regime with DDPG for 1000 steps per episode across 1000 episodes, and a fast execution setup comparing DDPG and TD3 for 30 episodes with 50 steps per episode under constrained computational… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Skin Cancer Detection through CNN-Transformer-GRU Fusion and Generative Adversarial Network Based Data Augmentation

    Alex Varghese1, Achin Jain2, Mohammed Inamur Rahman3, Mudassir Khan4,*, Arun Kumar Dubey2, Iqrar Ahmad5, Yash Prakash Narayan1, Arvind Panwar6, Anurag Choubey7, Saurav Mallik8,9,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1767-1791, 2025, DOI:10.32604/cmes.2025.067999 - 31 August 2025
    Abstract Skin cancer remains a significant global health challenge, and early detection is crucial to improving patient outcomes. This study presents a novel deep learning framework that combines Convolutional Neural Networks (CNNs), Transformers, and Gated Recurrent Units (GRUs) for robust skin cancer classification. To address data set imbalance, we employ StyleGAN3-based synthetic data augmentation alongside traditional techniques. The hybrid architecture effectively captures both local and global dependencies in dermoscopic images, while the GRU component models sequential patterns. Evaluated on the HAM10000 dataset, the proposed model achieves an accuracy of 90.61%, outperforming baseline architectures such as VGG16 More >

  • Open AccessOpen Access

    ARTICLE

    Big Texture Dataset Synthesized Based on Gradient and Convolution Kernels Using Pre-Trained Deep Neural Networks

    Farhan A. Alenizi1, Faten Khalid Karim2,*, Alaa R. Al-Shamasneh3, Mohammad Hossein Shakoor4
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1793-1829, 2025, DOI:10.32604/cmes.2025.066023 - 31 August 2025
    Abstract Deep neural networks provide accurate results for most applications. However, they need a big dataset to train properly. Providing a big dataset is a significant challenge in most applications. Image augmentation refers to techniques that increase the amount of image data. Common operations for image augmentation include changes in illumination, rotation, contrast, size, viewing angle, and others. Recently, Generative Adversarial Networks (GANs) have been employed for image generation. However, like image augmentation methods, GAN approaches can only generate images that are similar to the original images. Therefore, they also cannot generate new classes of data.… More >

  • Open AccessOpen Access

    ARTICLE

    AMA: Adaptive Multimodal Adversarial Attack with Dynamic Perturbation Optimization

    Yufei Shi, Ziwen He*, Teng Jin, Haochen Tong, Zhangjie Fu
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1831-1848, 2025, DOI:10.32604/cmes.2025.067658 - 31 August 2025
    Abstract This article proposes an innovative adversarial attack method, AMA (Adaptive Multimodal Attack), which introduces an adaptive feedback mechanism by dynamically adjusting the perturbation strength. Specifically, AMA adjusts perturbation amplitude based on task complexity and optimizes the perturbation direction based on the gradient direction in real time to enhance attack efficiency. Experimental results demonstrate that AMA elevates attack success rates from approximately 78.95% to 89.56% on visual question answering and from 78.82% to 84.96% on visual reasoning tasks across representative vision-language benchmarks. These findings demonstrate AMA’s superior attack efficiency and reveal the vulnerability of current visual More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Machine Learning and Blockchain Framework for IoT DDoS Mitigation

    Singamaneni Krishnapriya1,2,*, Sukhvinder Singh1
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1849-1881, 2025, DOI:10.32604/cmes.2025.068326 - 31 August 2025
    Abstract The explosive expansion of the Internet of Things (IoT) systems has increased the imperative to have strong and robust solutions to cyber Security, especially to curtail Distributed Denial of Service (DDoS) attacks, which can cripple critical infrastructure. The proposed framework presented in the current paper is a new hybrid scheme that induces deep learning-based traffic classification and blockchain-enabled mitigation to make intelligent, decentralized, and real-time DDoS countermeasures in an IoT network. The proposed model fuses the extracted deep features with statistical features and trains them by using traditional machine-learning algorithms, which makes them more accurate… More >

    Graphic Abstract

    A Hybrid Machine Learning and Blockchain Framework for IoT DDoS Mitigation

  • Open AccessOpen Access

    ARTICLE

    Equivalent Design Methodology for Ship-Stiffened Steel Plates under Ogival-Nosed Projectile Penetration

    Yezhi Qin*, Qinglin Chen*, Ying Wang, Yingqiang Cai
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1883-1906, 2025, DOI:10.32604/cmes.2025.066844 - 31 August 2025
    (This article belongs to the Special Issue: Theoretical and Computational Modeling of Advanced Materials and Structures-II)
    Abstract The penetration of ogival-nosed projectiles into ship plates represents a complex impact dynamics issue essential for analyzing structural failure mechanisms. Although stiffened plates are vital in ship construction, few studies have addressed the issue of model equivalence under penetration loading. This study employs numerical simulation to validate an experiment with an ogival-nosed projectile penetrating a Q345 steel plate. Four equivalent stiffened plate methods are proposed based on the area, flexural modulus, moment of inertia, and thickness. The results indicate that thickness equivalence (DM4) is unsuitable for penetration-loaded stiffened plates, except under low-speed, non-penetrating through impacts, More >

  • Open AccessOpen Access

    ARTICLE

    Reliability Topology Optimization Based on Kriging-Assisted Level Set Function and Novel Dynamic Hybrid Particle Swarm Optimization Algorithm

    Hang Zhou*, Xiaojun Ding, Song Chen, Qijun Zhang
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1907-1933, 2025, DOI:10.32604/cmes.2025.069198 - 31 August 2025
    (This article belongs to the Special Issue: Machine Learning-Assisted Structural Integrity Assessment and Design Optimization under Uncertainty)
    Abstract Structural Reliability-Based Topology Optimization (RBTO), as an efficient design methodology, serves as a crucial means to ensure the development of modern engineering structures towards high performance, long service life, and high reliability. However, in practical design processes, topology optimization must not only account for the static performance of structures but also consider the impacts of various responses and uncertainties under complex dynamic conditions, which traditional methods often struggle accommodate. Therefore, this study proposes an RBTO framework based on a Kriging-assisted level set function and a novel Dynamic Hybrid Particle Swarm Optimization (DHPSO) algorithm. By leveraging… More >

  • Open AccessOpen Access

    ARTICLE

    Fatigue Life Prediction Using Finite Element Hot-Spot and Notch Approaches: Strain-Based FAT Curves Proposal for Ti6Al4V Joints

    Pasqualino Corigliano*, Giulia Palomba
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1935-1955, 2025, DOI:10.32604/cmes.2025.067094 - 31 August 2025
    (This article belongs to the Special Issue: Advances in Fatigue Life Prediction and Reliability Assessment)
    Abstract Experimental tests are essential for evaluating S-N curves and assessing the fatigue life of welded joints. However, in the case of complex geometries, experimental tests often cannot provide the necessary stress-strain data for specific materials and welded joints. Therefore, finite element (FE) analyses are frequently utilized to assess fatigue behavior in complex geometries and address the discontinuities induced by welding processes. In this study, the fatigue properties of titanium welded joints, produced using an innovative laser source and welded without the use of filler materials, were analyzed through numerical methods. Two different FE methods were… More >

  • Open AccessOpen Access

    ARTICLE

    Effect of Streamline Length on Aerodynamic Performance of 600 km/h Maglev Trains

    Yan Li1, Bailong Sun2, Tian Li2,*, Weihua Zhang2
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1957-1970, 2025, DOI:10.32604/cmes.2025.069159 - 31 August 2025
    Abstract High-speed maglev trains represent a key direction for the future development of rail transportation. As operating speeds increase, they face increasingly severe aerodynamic challenges. The streamlined aerodynamic shape of a maglev train is a critical factor influencing its aerodynamic performance, and optimizing its length plays a significant role in improving the overall aerodynamic characteristics of the train. In this study, a numerical simulation model of a high-speed maglev train was established based on computational fluid dynamics (CFD) to investigate the effects of streamline length on the aerodynamic performance of the train operating on an open… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy Logic-Based Robust Global Consensus in Leader-Follower Robotic Systems under Sensor and Actuator Attacks Using Hybrid Control Strategy

    Asad Khan1, Fathia Moh. Al Samman2,*, Waqar Ul Hassan3, Mohammed M. A. Almazah4, A. Y. Al-Rezami5, Azmat Ullah Khan Niazi3,*, Adnan Manzor6
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1971-1999, 2025, DOI:10.32604/cmes.2025.068240 - 31 August 2025
    (This article belongs to the Special Issue: Intelligent Control and Machine Learning for Renewable Energy Systems and Industries)
    Abstract This research paper tackles the complexities of achieving global fuzzy consensus in leader-follower systems in robotic systems, focusing on robust control systems against an advanced signal attack that integrates sensor and actuator disturbances within the dynamics of follower robots. Each follower robot has unknown dynamics and control inputs, which expose it to the risks of both sensor and actuator attacks. The leader robot, described by a second-order, time-varying nonlinear model, transmits its position, velocity, and acceleration information to follower robots through a wireless connection. To handle the complex setup and communication among robots in the… More >

    Graphic Abstract

    Fuzzy Logic-Based Robust Global Consensus in Leader-Follower Robotic Systems under Sensor and Actuator Attacks Using Hybrid Control Strategy

  • Open AccessOpen Access

    ARTICLE

    Greylag Goose Optimization and Deep Learning-Based Electrohysterogram Signal Analysis for Preterm Birth Risk Prediction

    Anis Ben Ghorbal1,*, Azedine Grine1, Marwa M. Eid2,3,*, El-Sayed M. El-Kenawy4,5
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2001-2028, 2025, DOI:10.32604/cmes.2025.068212 - 31 August 2025
    (This article belongs to the Special Issue: Swarm and Metaheuristic Optimization for Applied Engineering Application)
    Abstract Preterm birth remains a leading cause of neonatal complications and highlights the need for early and accurate prediction techniques to improve both fetal and maternal health outcomes. This study introduces a hybrid approach integrating Long Short-Term Memory (LSTM) networks with the Hybrid Greylag Goose and Particle Swarm Optimization (GGPSO) algorithm to optimize preterm birth classification using Electrohysterogram signals. The dataset consists of 58 samples of 1000-second-long Electrohysterogram recordings, capturing key physiological features such as contraction patterns, entropy, and statistical variations. Statistical analysis and feature selection methods are applied to identify the most relevant predictors and More >

    Graphic Abstract

    Greylag Goose Optimization and Deep Learning-Based Electrohysterogram Signal Analysis for Preterm Birth Risk Prediction

  • Open AccessOpen Access

    ARTICLE

    A Flexible Exponential Log-Logistic Distribution for Modeling Complex Failure Behaviors in Reliability and Engineering Data

    Hadeel AlQadi1, Fatimah M. Alghamdi2, Hamada H. Hassan3, Mohamed E. Mead4, Ahmed Z. Afify5,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2029-2061, 2025, DOI:10.32604/cmes.2025.069801 - 31 August 2025
    (This article belongs to the Special Issue: Frontiers in Parametric Survival Models: Incorporating Trigonometric Baseline Distributions, Machine Learning, and Beyond)
    Abstract Parametric survival models are essential for analyzing time-to-event data in fields such as engineering and biomedicine. While the log-logistic distribution is popular for its simplicity and closed-form expressions, it often lacks the flexibility needed to capture complex hazard patterns. In this article, we propose a novel extension of the classical log-logistic distribution, termed the new exponential log-logistic (NExLL) distribution, designed to provide enhanced flexibility in modeling time-to-event data with complex failure behaviors. The NExLL model incorporates a new exponential generator to expand the shape adaptability of the baseline log-logistic distribution, allowing it to capture a… More >

  • Open AccessOpen Access

    ARTICLE

    A New Extension Odd Generalized Exponential Model Using Type-II Progressive Censoring and Its Applications in Engineering and Medicine

    Zohra A. Esaadi1, Rabab S. Gomaa1, Beih S. El-Desouky1, Ehab M. Almetwally2, Alia M. Magar1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2063-2097, 2025, DOI:10.32604/cmes.2025.065604 - 31 August 2025
    (This article belongs to the Special Issue: Frontiers in Parametric Survival Models: Incorporating Trigonometric Baseline Distributions, Machine Learning, and Beyond)
    Abstract A new extended distribution called the Odd Exponential Generalized Exponential-Exponential distribution is proposed based on generalization of the odd generalized exponential family (OEGE-E). The statistical properties of the proposed distribution are derived. The study evaluates the accuracy of six estimation methods under complete samples. Estimation techniques include maximum likelihood, ordinary least squares, weighted least squares, maximum product of spacing, Cramer von Mises, and Anderson-Darling methods. Two methods of estimation for the involved parameters are considered based on progressively type II censored data (PTIIC). These methods are maximum likelihood and maximum product of spacing. The proposed More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Interval-Valued Picture Fuzzy TOPSIS Approach Based on New Divergence Measures for Risk Assessment

    Sijia Zhu1, Yuhan Li2, Prasanalakshmi Balaji3,*, Akila Thiyagarajan3, Rajanikanth Aluvalu4, Zhe Liu5,6,7,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2099-2121, 2025, DOI:10.32604/cmes.2025.068734 - 31 August 2025
    (This article belongs to the Special Issue: Algorithms, Models, and Applications of Fuzzy Optimization and Decision Making)
    Abstract While interval-valued picture fuzzy sets (IvPFSs) provide a powerful tool for modeling uncertainty and ambiguity in various fields, existing divergence measures for IvPFSs remain limited and often produce counterintuitive results. To address these shortcomings, this paper introduces two novel divergence measures for IvPFSs, inspired by the Jensen-Shannon divergence. The fundamental properties of the proposed measures—non-degeneracy, symmetry, triangular inequality, and boundedness—are rigorously proven. Comparative analyses with existing measures are conducted through specific cases and numerical examples, clearly demonstrating the advantages of our approach. Furthermore, we apply the new divergence measures to develop an enhanced interval-valued picture More >

  • Open AccessOpen Access

    ARTICLE

    Innovative Aczel Alsina Group Overlap Functions for AI-Based Criminal Justice Policy Selection under Intuitionistic Fuzzy Set

    Ikhtesham Ullah1, Muhammad Sajjad Ali Khan2, Fawad Hussain1, Madad Khan3, Kamran4,*, Ioan-Lucian Popa5,6,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2123-2164, 2025, DOI:10.32604/cmes.2025.064832 - 31 August 2025
    (This article belongs to the Special Issue: Algorithms, Models, and Applications of Fuzzy Optimization and Decision Making)
    Abstract Multi-criteria decision-making (MCDM) is essential for handling complex decision problems under uncertainty, especially in fields such as criminal justice, healthcare, and environmental management. Traditional fuzzy MCDM techniques have failed to deal with problems where uncertainty or vagueness is involved. To address this issue, we propose a novel framework that integrates group and overlap functions with Aczel-Alsina (AA) operational laws in the intuitionistic fuzzy set (IFS) environment. Overlap functions capture the degree to which two inputs share common features and are used to find how closely two values or criteria match in uncertain environments, while the… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Wavelet Methods for Nonlinear Multi-Term Caputo Variable-Order Partial Differential Equations

    Junseo Lee1, Bongsoo Jang1, Umer Saeed1,2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2165-2189, 2025, DOI:10.32604/cmes.2025.069023 - 31 August 2025
    (This article belongs to the Special Issue: Analytical and Numerical Solution of the Fractional Differential Equation)
    Abstract In recent years, variable-order fractional partial differential equations have attracted growing interest due to their enhanced ability to model complex physical phenomena with memory and spatial heterogeneity. However, existing numerical methods often struggle with the computational challenges posed by such equations, especially in nonlinear, multi-term formulations. This study introduces two hybrid numerical methods—the Linear-Sine and Cosine (L1-CAS) and fast-CAS schemes—for solving linear and nonlinear multi-term Caputo variable-order (CVO) fractional partial differential equations. These methods combine CAS wavelet-based spatial discretization with L1 and fast algorithms in the time domain. A key feature of the approach is More >

  • Open AccessOpen Access

    ARTICLE

    A Time-Continuous Model for an Untreated HIV-Infection and a Novel Non-Standard Finite-Difference-Method for Its Discretization

    Benjamin Wacker1, Jan Christian Schlüter2,3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2191-2229, 2025, DOI:10.32604/cmes.2025.067397 - 31 August 2025
    (This article belongs to the Special Issue: Advances in Mathematical Modeling: Numerical Approaches and Simulation for Computational Biology)
    Abstract In this work, we re-investigate a classical mathematical model of untreated HIV infection suggested by Kirschner and introduce a novel non-standard finite-difference method for its numerical solution. As our first contribution, we establish non-negativity, boundedness of some solution components, existence globally in time, and uniqueness on a time interval for an arbitrary for the time-continuous problem which extends known results of Kirschner’s model in the literature. As our second analytical result, we establish different equilibrium states and examine their stability properties in the time-continuous setting or discuss some numerical tools to evaluate this question. Our More >

  • Open AccessOpen Access

    ARTICLE

    Computational Design of Interval Type-2 Fuzzy Control for Formation and Containment of Multi-Agent Systems with Collision Avoidance Capability

    Yann-Horng Lin1, Wen-Jer Chang1,*, Yi-Chen Lee2,*, Muhammad Shamrooz Aslam3, Cheung-Chieh Ku4
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2231-2262, 2025, DOI:10.32604/cmes.2025.067464 - 31 August 2025
    (This article belongs to the Special Issue: Computational Models and Applications of Multi-Agent Systems in Control Engineering and Information Science)
    Abstract An Interval Type-2 (IT-2) fuzzy controller design approach is proposed in this research to simultaneously achieve multiple control objectives in Nonlinear Multi-Agent Systems (NMASs), including formation, containment, and collision avoidance. However, inherent nonlinearities and uncertainties present in practical control systems contribute to the challenge of achieving precise control performance. Based on the IT-2 Takagi-Sugeno Fuzzy Model (T-SFM), the fuzzy control approach can offer a more effective solution for NMASs facing uncertainties. Unlike existing control methods for NMASs, the Formation and Containment (F-and-C) control problem with collision avoidance capability under uncertainties based on the IT-2 T-SFM… More >

  • Open AccessOpen Access

    ARTICLE

    A Region-Aware Deep Learning Model for Dual-Subject Gait Recognition in Occluded Surveillance Scenarios

    Zeeshan Ali1, Jihoon Moon2, Saira Gillani3, Sitara Afzal4, Maryam Bukhari5, Seungmin Rho6,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2263-2286, 2025, DOI:10.32604/cmes.2025.067743 - 31 August 2025
    (This article belongs to the Special Issue: Advanced Image Segmentation and Object Detection: Innovations, Challenges, and Applications)
    Abstract Surveillance systems can take various forms, but gait-based surveillance is emerging as a powerful approach due to its ability to identify individuals without requiring their cooperation. In the existing studies, several approaches have been suggested for gait recognition; nevertheless, the performance of existing systems is often degraded in real-world conditions due to covariate factors such as occlusions, clothing changes, walking speed, and varying camera viewpoints. Furthermore, most existing research focuses on single-person gait recognition; however, counting, tracking, detecting, and recognizing individuals in dual-subject settings with occlusions remains a challenging task. Therefore, this research proposed a… More >

  • Open AccessOpen Access

    ARTICLE

    A Method for Ultrasound Servo Tracking of Puncture Needle

    Shitong Ye1, Bo Yang2,*, Hao Quan3, Shan Liu4, Minyi Tang5, Jiawei Tian6,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2287-2306, 2025, DOI:10.32604/cmes.2025.066195 - 31 August 2025
    (This article belongs to the Special Issue: Emerging Artificial Intelligence Technologies and Applications)
    Abstract Computer-aided surgical navigation technology helps and guides doctors to complete the operation smoothly, which simulates the whole surgical environment with computer technology, and then visualizes the whole operation link in three dimensions. At present, common image-guided surgical techniques such as computed tomography (CT) and X-ray imaging (X-ray) will cause radiation damage to the human body during the imaging process. To address this, we propose a novel Extended Kalman filter-based model that tracks the puncture needle-point using an ultrasound probe. To address the limitations of Kalman filtering methods based on position and velocity, our method of More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Haze Removal: A Variable Scattering Approach to Transmission Mapping

    Gaurav Saxena1, Kiran Napte2, Neeraj Kumar Shukla3,4, Sushma Parihar5,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2307-2323, 2025, DOI:10.32604/cmes.2025.067530 - 31 August 2025
    (This article belongs to the Special Issue: Recent Advances in Signal Processing and Computer Vision)
    Abstract The ill-posed character of haze or fog makes it difficult to remove from a single image. While most existing methods rely on a transmission map refined through depth estimation and assume a constant scattering coefficient, this assumption limits their effectiveness. In this paper, we propose an enhanced transmission map that incorporates spatially varying scattering information inherent in hazy images. To improve linearity, the model utilizes the ratio of the difference between intensity and saturation to their sum. Our approach also addresses critical issues such as edge preservation and color fidelity. In terms of qualitative as More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Explainable AI Model for Accurate Brain Tumor Detection Using MRI Images

    Fatma M. Talaat1,2,*, Mohamed Salem1, Mohamed Shehata3,4,*, Warda M. Shaban5
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2325-2358, 2025, DOI:10.32604/cmes.2025.067195 - 31 August 2025
    (This article belongs to the Special Issue: Recent Advances in Signal Processing and Computer Vision)
    Abstract The diagnosis of brain tumors is an extended process that significantly depends on the expertise and skills of radiologists. The rise in patient numbers has substantially elevated the data processing volume, making conventional methods both costly and inefficient. Recently, Artificial Intelligence (AI) has gained prominence for developing automated systems that can accurately diagnose or segment brain tumors in a shorter time frame. Many researchers have examined various algorithms that provide both speed and accuracy in detecting and classifying brain tumors. This paper proposes a new model based on AI, called the Brain Tumor Detection (BTD)… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Approach for Heavily Occluded Face Detection Using Histogram of Oriented Gradients and Deep Learning Models

    Thaer Thaher1,*, Muhammed Saffarini2, Majdi Mafarja3, Abdulaziz Alashbi4, Abdul Hakim Mohamed5, Ayman A. El-Saleh6
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2359-2394, 2025, DOI:10.32604/cmes.2025.065388 - 31 August 2025
    (This article belongs to the Special Issue: Machine Learning and Deep Learning-Based Pattern Recognition)
    Abstract Face detection is a critical component in modern security, surveillance, and human-computer interaction systems, with widespread applications in smartphones, biometric access control, and public monitoring. However, detecting faces with high levels of occlusion, such as those covered by masks, veils, or scarves, remains a significant challenge, as traditional models often fail to generalize under such conditions. This paper presents a hybrid approach that combines traditional handcrafted feature extraction technique called Histogram of Oriented Gradients (HOG) and Canny edge detection with modern deep learning models. The goal is to improve face detection accuracy under occlusions. The… More >

  • Open AccessOpen Access

    ARTICLE

    DA-ViT: Deformable Attention Vision Transformer for Alzheimer’s Disease Classification from MRI Scans

    Abdullah G. M. Almansour1,*, Faisal Alshomrani2, Abdulaziz T. M. Almutairi3, Easa Alalwany4, Mohammed S. Alshuhri1, Hussein Alshaari5, Abdullah Alfahaid4
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2395-2418, 2025, DOI:10.32604/cmes.2025.069661 - 31 August 2025
    (This article belongs to the Special Issue: Intelligent Medical Decision Support Systems: Methods and Applications)
    Abstract The early and precise identification of Alzheimer’s Disease (AD) continues to pose considerable clinical difficulty due to subtle structural alterations and overlapping symptoms across the disease phases. This study presents a novel Deformable Attention Vision Transformer (DA-ViT) architecture that integrates deformable Multi-Head Self-Attention (MHSA) with a Multi-Layer Perceptron (MLP) block for efficient classification of Alzheimer’s disease (AD) using Magnetic resonance imaging (MRI) scans. In contrast to traditional vision transformers, our deformable MHSA module preferentially concentrates on spatially pertinent patches through learned offset predictions, markedly diminishing processing demands while improving localized feature representation. DA-ViT contains only More >

  • Open AccessOpen Access

    ARTICLE

    Advanced Brain Tumor Segmentation in Magnetic Resonance Imaging via 3D U-Net and Generalized Gaussian Mixture Model-Based Preprocessing

    Khalil Ibrahim Lairedj1, Zouaoui Chama1, Amina Bagdaoui1, Samia Larguech2, Younes Menni3,4,*, Nidhal Becheikh5, Lioua Kolsi6,*, Badr M. Alshammari7
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2419-2443, 2025, DOI:10.32604/cmes.2025.069396 - 31 August 2025
    (This article belongs to the Special Issue: Advanced Computational Intelligence Techniques, Uncertain Knowledge Processing and Multi-Attribute Group Decision-Making Methods Applied in Modeling of Medical Diagnosis and Prognosis)
    Abstract Brain tumor segmentation from Magnetic Resonance Imaging (MRI) supports neurologists and radiologists in analyzing tumors and developing personalized treatment plans, making it a crucial yet challenging task. Supervised models such as 3D U-Net perform well in this domain, but their accuracy significantly improves with appropriate preprocessing. This paper demonstrates the effectiveness of preprocessing in brain tumor segmentation by applying a pre-segmentation step based on the Generalized Gaussian Mixture Model (GGMM) to T1 contrast-enhanced MRI scans from the BraTS 2020 dataset. The Expectation-Maximization (EM) algorithm is employed to estimate parameters for four tissue classes, generating a More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Animated Oat Optimization Algorithm with Particle Swarm Optimization for Dry Eye Disease Classification

    Essam H. Houssein1,*, Eman Saber1, Nagwan Abdel Samee2
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2445-2480, 2025, DOI:10.32604/cmes.2025.069184 - 31 August 2025
    (This article belongs to the Special Issue: Advanced Computational Intelligence Techniques, Uncertain Knowledge Processing and Multi-Attribute Group Decision-Making Methods Applied in Modeling of Medical Diagnosis and Prognosis)
    Abstract The diagnosis of Dry Eye Disease (DED), however, usually depends on clinical information and complex, high-dimensional datasets. To improve the performance of classification models, this paper proposes a Computer Aided Design (CAD) system that presents a new method for DED classification called (IAOO-PSO), which is a powerful Feature Selection technique (FS) that integrates with Opposition-Based Learning (OBL) and Particle Swarm Optimization (PSO). We improve the speed of convergence with the PSO algorithm and the exploration with the IAOO algorithm. The IAOO is demonstrated to possess superior global optimization capabilities, as validated on the IEEE Congress on More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Heart Sound Classification with Iterative Clustering and Silhouette Analysis: An Effective Preprocessing Selective Method to Diagnose Rare and Difficult Cardiovascular Cases

    Sami Alrabie#,*, Ahmed Barnawi#
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2481-2519, 2025, DOI:10.32604/cmes.2025.067977 - 31 August 2025
    (This article belongs to the Special Issue: Exploring the Impact of Artificial Intelligence on Healthcare: Insights into Data Management, Integration, and Ethical Considerations)
    Abstract In the effort to enhance cardiovascular diagnostics, deep learning-based heart sound classification presents a promising solution. This research introduces a novel preprocessing method: iterative k-means clustering combined with silhouette score analysis, aimed at downsampling. This approach ensures optimal cluster formation and improves data quality for deep learning models. The process involves applying k-means clustering to the dataset, calculating the average silhouette score for each cluster, and selecting the cluster with the highest score. We evaluated this method using 10-fold cross-validation across various transfer learning models from different families and architectures. The evaluation was conducted on… More >

  • Open AccessOpen Access

    ARTICLE

    System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes

    Phu Tran Tin1, Minh-Sang Van Nguyen2, Quy-Anh Bui1, Agbotiname Lucky Imoize3, Byung-Seo Kim4,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2521-2543, 2025, DOI:10.32604/cmes.2025.066669 - 31 August 2025
    (This article belongs to the Special Issue: Artificial Intelligence for 6G Wireless Networks)
    Abstract Digital content such as games, extended reality (XR), and movies has been widely and easily distributed over wireless networks. As a result, unauthorized access, copyright infringement by third parties or eavesdroppers, and cyberattacks over these networks have become pressing concerns. Therefore, protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention. The Intelligent Reflecting Surface (IRS) is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment. This study investigates the security performance of an uplink Non-Orthogonal Multiple Access (NOMA)… More >

  • Open AccessOpen Access

    ARTICLE

    A Dynamic SDN-Based Address Hopping Model for IoT Anonymization

    Zesheng Xi1,2,#, Chuan He1,3,#, Yunfan Wang1,3,#, Bo Zhang1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2545-2565, 2025, DOI:10.32604/cmes.2025.066822 - 31 August 2025
    (This article belongs to the Special Issue: Computer Modeling for Future Communications and Networks)
    Abstract The increasing reliance on interconnected Internet of Things (IoT) devices has amplified the demand for robust anonymization strategies to protect device identities and ensure secure communication. However, traditional anonymization methods for IoT networks often rely on static identity models, making them vulnerable to inference attacks through long-term observation. Moreover, these methods tend to sacrifice data availability to protect privacy, limiting their practicality in real-world applications. To overcome these limitations, we propose a dynamic device identity anonymization framework using Moving Target Defense (MTD) principles implemented via Software-Defined Networking (SDN). In our model, the SDN controller periodically… More >

  • Open AccessOpen Access

    ARTICLE

    Temporal Attention LSTM Network for NGAP Anomaly Detection in 5GC Boundary

    Shaocong Feng, Baojiang Cui*, Shengjia Chang, Meiyi Jiang
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2567-2590, 2025, DOI:10.32604/cmes.2025.067326 - 31 August 2025
    (This article belongs to the Special Issue: Cutting-Edge Security and Privacy Solutions for Next-Generation Intelligent Mobile Internet Technologies and Applications)
    Abstract Service-Based Architecture (SBA) of 5G network introduces novel communication technology and advanced features, while simultaneously presenting new security requirements and challenges. Commercial 5G Core (5GC) networks are highly secure closed systems with interfaces defined through the 3rd Generation Partnership Project (3GPP) specifications to fulfill communication requirements. However, the 5GC boundary, especially the access domain, faces diverse security threats due to the availability of open-source cellular software suites and Software Defined Radio (SDR) devices. Therefore, we systematically summarize security threats targeting the N2 interfaces at the 5GC boundary, which are categorized as Illegal Registration, Protocol attack,… More >

  • Open AccessOpen Access

    ARTICLE

    Wireless Sensor Network Modeling and Analysis for Attack Detection

    Tamara Zhukabayeva1,2,*, Vasily Desnitsky3, Assel Abdildayeva1,4
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2591-2625, 2025, DOI:10.32604/cmes.2025.067142 - 31 August 2025
    (This article belongs to the Special Issue: Emerging Technologies in Information Security )
    Abstract Wireless Sensor Networks (WSN) have gained significant attention over recent years due to their extensive applications in various domains such as environmental monitoring, healthcare systems, industrial automation, and smart cities. However, such networks are inherently vulnerable to different types of attacks because they operate in open environments with limited resources and constrained communication capabilities. The paper addresses challenges related to modeling and analysis of wireless sensor networks and their susceptibility to attacks. Its objective is to create versatile modeling tools capable of detecting attacks against network devices and identifying anomalies caused either by legitimate user… More >

  • Open AccessOpen Access

    ARTICLE

    Dual-Channel Attention Deep Bidirectional Long Short Term Memory for Enhanced Malware Detection and Risk Mitigation

    Madini O. Alassafi, Syed Hamid Hasan*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2627-2645, 2025, DOI:10.32604/cmes.2025.064926 - 31 August 2025
    (This article belongs to the Special Issue: Emerging Technologies in Information Security )
    Abstract Over the past few years, Malware attacks have become more and more widespread, posing threats to digital assets throughout the world. Although numerous methods have been developed to detect malicious attacks, these malware detection techniques need to be more efficient in detecting new and progressively sophisticated variants of malware. Therefore, the development of more advanced and accurate techniques is necessary for malware detection. This paper introduces a comprehensive Dual-Channel Attention Deep Bidirectional Long Short-Term Memory (DCA-DBiLSTM) model for malware detection and risk mitigation. The Dual Channel Attention (DCA) mechanism improves the model’s capability to concentrate… More >

  • Open AccessOpen Access

    ARTICLE

    MBID: A Scalable Multi-Tier Blockchain Architecture with Physics-Informed Neural Networks for Intrusion Detection in Large-Scale IoT Networks

    Saeed Ullah1, Junsheng Wu1,*, Mian Muhammad Kamal2, Heba G. Mohamed3, Muhammad Sheraz4, Teong Chee Chuah4,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2647-2681, 2025, DOI:10.32604/cmes.2025.068849 - 31 August 2025
    (This article belongs to the Special Issue: Machine learning and Blockchain for AIoT: Robustness, Privacy, Trust and Security)
    Abstract The Internet of Things (IoT) ecosystem faces growing security challenges because it is projected to have 76.88 billion devices by 2025 and $1.4 trillion market value by 2027, operating in distributed networks with resource limitations and diverse system architectures. The current conventional intrusion detection systems (IDS) face scalability problems and trust-related issues, but blockchain-based solutions face limitations because of their low transaction throughput (Bitcoin: 7 TPS (Transactions Per Second), Ethereum: 15–30 TPS) and high latency. The research introduces MBID (Multi-Tier Blockchain Intrusion Detection) as a groundbreaking Multi-Tier Blockchain Intrusion Detection System with AI-Enhanced Detection, which… More >

  • Open AccessOpen Access

    CORRECTION

    Correction: Scheme Based on Multi-Level Patch Attention and Lesion Localization for Diabetic Retinopathy Grading

    Zhuoqun Xia1, Hangyu Hu1, Wenjing Li2,3, Qisheng Jiang1, Lan Pu1, Yicong Shu1, Arun Kumar Sangaiah4,5,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2683-2683, 2025, DOI:10.32604/cmes.2025.069871 - 31 August 2025
    (This article belongs to the Special Issue: Smart and Secure Solutions for Medical Industry)
    Abstract This article has no abstract. More >

Per Page:

Share Link