Home / Journals / CMC / Vol.85, No.1, 2025
Special Issues
Table of Content
cover

On the Cover

This review summarizes recent advances in understanding the dynamic behaviors of these nanomaterials, with a particular focus on insights gained from molecular dynamics (MD) simulations. Key areas discussed include the oscillatory and rotational dynamics of double-walled CNTs, fabrication and stability challenges associated with BPNTs, and the emerging potential of graphyne nanotubes (GNTs).
The cover image was created with AI-generated content via Canva, and it contains no copyrighted elements or misleading representations.
View this paper

  • Open AccessOpen Access

    ARTICLE

    Advanced Multi-Channel Echo Separation Techniques for High-Interference Automotive Radars

    Shih-Lin Lin*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1365-1382, 2025, DOI:10.32604/cmc.2025.067764 - 29 August 2025
    (This article belongs to the Special Issue: Intelligent Vehicles and Emerging Automotive Technologies: Integrating AI, IoT, and Computing in Next-Generation in Electric Vehicles)
    Abstract This paper proposes an integrated multi-stage framework to enhance frequency modulated continuous wave (FMCW) automotive radar performance under high noise and interference. The four-stage pipeline is applied consecutively: (i) an improved independent component analysis (ICA) blindly separates the two-channel echoes, isolating target and interference components; (ii) a recursive least-squares (RLS) filter compensates amplitude- and phase-mismatches, restoring signal fidelity; (iii) variational mode decomposition (VMD) followed by the Hilbert-Huang Transform (HHT) extracts noise-free intrinsic mode functions (IMFs) and sharpens their time-frequency signatures; and (iv) HHT-based beat-frequency estimation reconstructs a clean echo and delivers accurate range information. Finally, More >

  • Open AccessOpen Access

    ARTICLE

    CARE: Comprehensive Artificial Intelligence Techniques for Reliable Autism Evaluation in Pediatric Care

    Jihoon Moon1, Jiyoung Woo2,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1383-1425, 2025, DOI:10.32604/cmc.2025.067784 - 29 August 2025
    (This article belongs to the Special Issue: Bridging the Gap: AutoML and Explainable AI for Industrial and Healthcare Innovations)
    Abstract Improving early diagnosis of autism spectrum disorder (ASD) in children increasingly relies on predictive models that are reliable and accessible to non-experts. This study aims to develop such models using Python-based tools to improve ASD diagnosis in clinical settings. We performed exploratory data analysis to ensure data quality and identify key patterns in pediatric ASD data. We selected the categorical boosting (CatBoost) algorithm to effectively handle the large number of categorical variables. We used the PyCaret automated machine learning (AutoML) tool to make the models user-friendly for clinicians without extensive machine learning expertise. In addition,… More >

  • Open AccessOpen Access

    ARTICLE

    TGICP: A Text-Gated Interaction Network with Inter-Sample Commonality Perception for Multimodal Sentiment Analysis

    Erlin Tian1, Shuai Zhao2,*, Min Huang2, Yushan Pan3,4, Yihong Wang3,4, Zuhe Li1
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1427-1456, 2025, DOI:10.32604/cmc.2025.066476 - 29 August 2025
    Abstract With the increasing importance of multimodal data in emotional expression on social media, mainstream methods for sentiment analysis have shifted from unimodal to multimodal approaches. However, the challenges of extracting high-quality emotional features and achieving effective interaction between different modalities remain two major obstacles in multimodal sentiment analysis. To address these challenges, this paper proposes a Text-Gated Interaction Network with Inter-Sample Commonality Perception (TGICP). Specifically, we utilize a Inter-sample Commonality Perception (ICP) module to extract common features from similar samples within the same modality, and use these common features to enhance the original features of… More >

  • Open AccessOpen Access

    ARTICLE

    Real-Time Deepfake Detection via Gaze and Blink Patterns: A Transformer Framework

    Muhammad Javed1, Zhaohui Zhang1,*, Fida Hussain Dahri2, Asif Ali Laghari3,*, Martin Krajčík4, Ahmad Almadhor5
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1457-1493, 2025, DOI:10.32604/cmc.2025.062954 - 29 August 2025
    Abstract Recent advances in artificial intelligence and the availability of large-scale benchmarks have made deepfake video generation and manipulation easier. Therefore, developing reliable and robust deepfake video detection mechanisms is paramount. This research introduces a novel real-time deepfake video detection framework by analyzing gaze and blink patterns, addressing the spatial-temporal challenges unique to gaze and blink anomalies using the TimeSformer and hybrid Transformer-CNN models. The TimeSformer architecture leverages spatial-temporal attention mechanisms to capture fine-grained blinking intervals and gaze direction anomalies. Compared to state-of-the-art traditional convolutional models like MesoNet and EfficientNet, which primarily focus on global facial… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning-Based Faulty Wood Detection with Area Attention

    Vinh Truong Hoang*, Viet-Tuan Le, Nghia Dinh, Kiet Tran-Trung, Bay Nguyen Van, Ha Duong Thi Hong, Thien Ho Huong
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1495-1514, 2025, DOI:10.32604/cmc.2025.066506 - 29 August 2025
    (This article belongs to the Special Issue: Machine Vision Detection and Intelligent Recognition, 2nd Edition)
    Abstract Improving consumer satisfaction with the appearance and surface quality of wood-based products requires inspection methods that are both accurate and efficient. The adoption of artificial intelligence (AI) for surface evaluation has emerged as a promising solution. Since the visual appeal of wooden products directly impacts their market value and overall business success, effective quality control is crucial. However, conventional inspection techniques often fail to meet performance requirements due to limited accuracy and slow processing times. To address these shortcomings, the authors propose a real-time deep learning-based system for evaluating surface appearance quality. The method integrates… More >

  • Open AccessOpen Access

    ARTICLE

    Anomaly Diagnosis Using Machine Learning Method in Fiber Fault Diagnosis

    Xiaoping Yang1,2,3, Jinku Qiu2,3,4, Xifa Gong5, Jin Ye5, Fei Yao5,*, Jiaqiao Chen6, Xianzan Luo6, Da Qin6
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1515-1539, 2025, DOI:10.32604/cmc.2025.067518 - 29 August 2025
    Abstract In contemporary society, rapid and accurate optical cable fault detection is of paramount importance for ensuring the stability and reliability of optical networks. The emergence of novel faults in optical networks has introduced new challenges, significantly compromising their normal operation. Machine learning has emerged as a highly promising approach. Consequently, it is imperative to develop an automated and reliable algorithm that utilizes telemetry data acquired from Optical Time-Domain Reflectometers (OTDR) to enable real-time fault detection and diagnosis in optical fibers. In this paper, we introduce a multi-scale Convolutional Neural Network–Bidirectional Long Short-Term Memory (CNN-BiLSTM) deep… More >

  • Open AccessOpen Access

    ARTICLE

    A YOLOv11-Based Deep Learning Framework for Multi-Class Human Action Recognition

    Nayeemul Islam Nayeem1, Shirin Mahbuba1, Sanjida Islam Disha1, Md Rifat Hossain Buiyan1, Shakila Rahman1,*, M. Abdullah-Al-Wadud2, Jia Uddin3,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1541-1557, 2025, DOI:10.32604/cmc.2025.065061 - 29 August 2025
    (This article belongs to the Special Issue: Advances in Deep Learning and Neural Networks: Architectures, Applications, and Challenges)
    Abstract Human activity recognition is a significant area of research in artificial intelligence for surveillance, healthcare, sports, and human-computer interaction applications. The article benchmarks the performance of You Only Look Once version 11-based (YOLOv11-based) architecture for multi-class human activity recognition. The article benchmarks the performance of You Only Look Once version 11-based (YOLOv11-based) architecture for multi-class human activity recognition. The dataset consists of 14,186 images across 19 activity classes, from dynamic activities such as running and swimming to static activities such as sitting and sleeping. Preprocessing included resizing all images to 512 512 pixels, annotating them… More >

  • Open AccessOpen Access

    ARTICLE

    GLMTopic: A Hybrid Chinese Topic Model Leveraging Large Language Models

    Weisi Chen1,*, Walayat Hussain2,*, Junjie Chen1
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1559-1583, 2025, DOI:10.32604/cmc.2025.065916 - 29 August 2025
    Abstract Topic modeling is a fundamental technique of content analysis in natural language processing, widely applied in domains such as social sciences and finance. In the era of digital communication, social scientists increasingly rely on large-scale social media data to explore public discourse, collective behavior, and emerging social concerns. However, traditional models like Latent Dirichlet Allocation (LDA) and neural topic models like BERTopic struggle to capture deep semantic structures in short-text datasets, especially in complex non-English languages like Chinese. This paper presents Generative Language Model Topic (GLMTopic) a novel hybrid topic modeling framework leveraging the capabilities… More >

  • Open AccessOpen Access

    ARTICLE

    A Facial Expression Recognition Network Using Rebalance-Based Regulation of Attention Consistency and Focus

    Xiaoliang Zhu, Hao Chen, Xin Yang, Zhicheng Dai, Liang Zhao*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1585-1602, 2025, DOI:10.32604/cmc.2025.066147 - 29 August 2025
    Abstract Facial expression datasets commonly exhibit imbalances between various categories or between difficult and simple samples. This imbalance introduces bias into feature extraction within facial expression recognition (FER) models, which hinders the algorithm’s comprehension of emotional states and reduces the overall recognition accuracy. A novel FER model is introduced to address these issues. It integrates rebalancing mechanisms to regulate attention consistency and focus, offering enhanced efficacy. Our approach proposes the following improvements: (i) rebalancing weights are used to enhance the consistency between the heatmaps of an original face sample and its horizontally flipped counterpart; (ii) coefficient More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Cardiovascular Disease Prediction Using Clustered Butterfly Algorithm

    Kamepalli S. L. Prasanna1, Vijaya J2, Parvathaneni Naga Srinivasu1, Babar Shah3, Farman Ali4,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1603-1630, 2025, DOI:10.32604/cmc.2025.068707 - 29 August 2025
    (This article belongs to the Special Issue: Recent Advancements in Machine Learning and Data Analysis for Disease Detection)
    Abstract Cardiovascular disease prediction is a significant area of research in healthcare management systems (HMS). We will only be able to reduce the number of deaths if we anticipate cardiac problems in advance. The existing heart disease detection systems using machine learning have not yet produced sufficient results due to the reliance on available data. We present Clustered Butterfly Optimization Techniques (RoughK-means+BOA) as a new hybrid method for predicting heart disease. This method comprises two phases: clustering data using Roughk-means (RKM) and data analysis using the butterfly optimization algorithm (BOA). The benchmark dataset from the UCI More >

  • Open AccessOpen Access

    ARTICLE

    Image Steganalysis Based on an Adaptive Attention Mechanism and Lightweight DenseNet

    Zhenxiang He*, Rulin Wu, Xinyuan Wang
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1631-1651, 2025, DOI:10.32604/cmc.2025.067252 - 29 August 2025
    Abstract With the continuous advancement of steganographic techniques, the task of image steganalysis has become increasingly challenging, posing significant obstacles to the fields of information security and digital forensics. Although existing deep learning methods have achieved certain progress in steganography detection, they still encounter several difficulties in real-world applications. Specifically, current methods often struggle to accurately focus on steganography sensitive regions, leading to limited detection accuracy. Moreover, feature information is frequently lost during transmission, which further reduces the model’s generalization ability. These issues not only compromise the reliability of steganography detection but also hinder its applicability… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation

    Ibtisam A. Taqi*, Sarab M. Hameed
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1653-1674, 2025, DOI:10.32604/cmc.2025.067524 - 29 August 2025
    Abstract The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated… More >

  • Open AccessOpen Access

    ARTICLE

    SSANet-Based Lightweight and Efficient Crop Disease Detection

    Hao Sun1,2, Di Cai1, Dae-Ki Kang2,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1675-1692, 2025, DOI:10.32604/cmc.2025.067675 - 29 August 2025
    Abstract Accurately identifying crop pests and diseases ensures agricultural productivity and safety. Although current YOLO-based detection models offer real-time capabilities, their conventional convolutional layers involve high computational redundancy and a fixed receptive field, making it challenging to capture local details and global semantics in complex scenarios simultaneously. This leads to significant issues like missed detections of small targets and heightened sensitivity to background interference. To address these challenges, this paper proposes a lightweight adaptive detection network—StarSpark-AdaptiveNet (SSANet), which optimizes features through a dual-module collaborative mechanism. Specifically, the StarNet module utilizes Depthwise separable convolutions (DW-Conv) and dynamic… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Ransomware Detection with Machine Learning Techniques and Effective API Integration

    Asad Iqbal1, Mehdi Hussain1,*, Qaiser Riaz1, Madiha Khalid1, Rafia Mumtaz1, Ki-Hyun Jung2,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1693-1714, 2025, DOI:10.32604/cmc.2025.064260 - 29 August 2025
    (This article belongs to the Special Issue: Safe and Secure Artificial Intelligence)
    Abstract Ransomware, particularly crypto-ransomware, remains a significant cybersecurity challenge, encrypting victim data and demanding a ransom, often leaving the data irretrievable even if payment is made. This study proposes an early detection approach to mitigate such threats by identifying ransomware activity before the encryption process begins. The approach employs a two-tiered approach: a signature-based method using hashing techniques to match known threats and a dynamic behavior-based analysis leveraging Cuckoo Sandbox and machine learning algorithms. A critical feature is the integration of the most effective Application Programming Interface call monitoring, which analyzes system-level interactions such as file More >

  • Open AccessOpen Access

    ARTICLE

    CD-AKA-IoV: A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle

    Tsu-Yang Wu1,2, Haozhi Wu2, Maoxin Tang3, Saru Kumari4, Chien-Ming Chen1,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1715-1732, 2025, DOI:10.32604/cmc.2025.065560 - 29 August 2025
    Abstract With the rapid development and widespread adoption of Internet of Things (IoT) technology, the innovative concept of the Internet of Vehicles (IoV) has emerged, ushering in a new era of intelligent transportation. Since vehicles are mobile entities, they move across different domains and need to communicate with the Roadside Unit (RSU) in various regions. However, open environments are highly susceptible to becoming targets for attackers, posing significant risks of malicious attacks. Therefore, it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs, particularly in scenarios where More >

  • Open AccessOpen Access

    ARTICLE

    DSGNN: Dual-Shield Defense for Robust Graph Neural Networks

    Xiaohan Chen1, Yuanfang Chen1,*, Gyu Myoung Lee2, Noel Crespi3, Pierluigi Siano4
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1733-1750, 2025, DOI:10.32604/cmc.2025.067284 - 29 August 2025
    Abstract Graph Neural Networks (GNNs) have demonstrated outstanding capabilities in processing graph-structured data and are increasingly being integrated into large-scale pre-trained models, such as Large Language Models (LLMs), to enhance structural reasoning, knowledge retrieval, and memory management. The expansion of their application scope imposes higher requirements on the robustness of GNNs. However, as GNNs are applied to more dynamic and heterogeneous environments, they become increasingly vulnerable to real-world perturbations. In particular, graph data frequently encounters joint adversarial perturbations that simultaneously affect both structures and features, which are significantly more challenging than isolated attacks. These disruptions, caused… More >

  • Open AccessOpen Access

    ARTICLE

    AI-Driven Identification of Attack Precursors: A Machine Learning Approach to Predictive Cybersecurity

    Abdulwahid Al Abdulwahid*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1751-1777, 2025, DOI:10.32604/cmc.2025.066892 - 29 August 2025
    (This article belongs to the Special Issue: Artificial Intelligence Methods and Techniques to Cybersecurity)
    Abstract The increasing sophistication of cyberattacks, coupled with the limitations of rule-based detection systems, underscores the urgent need for proactive and intelligent cybersecurity solutions. Traditional intrusion detection systems often struggle with detecting early-stage threats, particularly in dynamic environments such as IoT, SDNs, and cloud infrastructures. These systems are hindered by high false positive rates, poor adaptability to evolving threats, and reliance on large labeled datasets. To address these challenges, this paper introduces CyberGuard-X, an AI-driven framework designed to identify attack precursors—subtle indicators of malicious intent—before full-scale intrusions occur. CyberGuard-X integrates anomaly detection, time-series analysis, and multi-stage… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Multi-Learning Cooperation Search Algorithm for Photovoltaic Model Parameter Identification

    Xu Chen1,*, Shuai Wang1, Kaixun He2
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1779-1806, 2025, DOI:10.32604/cmc.2025.066543 - 29 August 2025
    (This article belongs to the Special Issue: Advanced Bio-Inspired Optimization Algorithms and Applications)
    Abstract Accurate and reliable photovoltaic (PV) modeling is crucial for the performance evaluation, control, and optimization of PV systems. However, existing methods for PV parameter identification often suffer from limitations in accuracy and efficiency. To address these challenges, we propose an adaptive multi-learning cooperation search algorithm (AMLCSA) for efficient identification of unknown parameters in PV models. AMLCSA is a novel algorithm inspired by teamwork behaviors in modern enterprises. It enhances the original cooperation search algorithm in two key aspects: (i) an adaptive multi-learning strategy that dynamically adjusts search ranges using adaptive weights, allowing better individuals to More >

  • Open AccessOpen Access

    ARTICLE

    Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue.js, Spring Boot and MySQL

    Kevin Santiago Rey Rodriguez, Julián David Avellaneda Galindo, Josep Tárrega Juan, Juan Ramón Bermejo Higuera*, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1807-1858, 2025, DOI:10.32604/cmc.2025.067127 - 29 August 2025
    Abstract In today’s rapidly evolving digital landscape, web application security has become paramount as organizations face increasingly sophisticated cyber threats. This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js, Spring Boot, and MySQL architecture. The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication, fine-grained authorization controls, sophisticated session management, data confidentiality and integrity protection, secure logging mechanisms, comprehensive error handling, high availability strategies, advanced input validation, and security headers implementation. Significant… More >

  • Open AccessOpen Access

    ARTICLE

    An Energy-Efficient Cross-Layer Clustering Approach Based on Gini Index Theory for WSNs

    Deyu Lin1,2, Yujie Zhang 2, Zhiwei Hua2, Jianfeng Xu2,3,*, Yufei Zhao1, Yong Liang Guan1
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1859-1882, 2025, DOI:10.32604/cmc.2025.066283 - 29 August 2025
    (This article belongs to the Special Issue: Advances in Wireless Sensor Networks: Security, Efficiency, and Intelligence)
    Abstract Energy efficiency is critical in Wireless Sensor Networks (WSNs) due to the limited power supply. While clustering algorithms are commonly used to extend network lifetime, most of them focus on single-layer optimization. To this end, an Energy-efficient Cross-layer Clustering approach based on the Gini (ECCG) index theory was proposed in this paper. Specifically, a novel mechanism of Gini Index theory-based energy-efficient Cluster Head Election (GICHE) is presented based on the Gini Index and the expected energy distribution to achieve balanced energy consumption among different clusters. In addition, to improve inter-cluster energy efficiency, a Queue synchronous More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Semantic and Texture Consistency in Video Generation

    Xian Yu, Jianxun Zhang*, Siran Tian, Xiaobao He
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1883-1897, 2025, DOI:10.32604/cmc.2025.065529 - 29 August 2025
    Abstract In recent years, diffusion models have achieved remarkable progress in image generation. However, extending them to text-to-video (T2V) generation remains challenging, particularly in maintaining semantic consistency and visual quality across frames. Existing approaches often overlook the synergy between high-level semantics and low-level texture information, resulting in blurry or temporally inconsistent outputs. To address these issues, we propose Dual Consistency Training (DCT), a novel framework designed to jointly optimize semantic and texture consistency in video generation. Specifically, we introduce a multi-scale spatial adapter to enhance spatial feature extraction, and leverage the complementary strengths of CLIP and More >

  • Open AccessOpen Access

    ARTICLE

    Unveiling CyberFortis: A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer

    Kuncham Sreenivasa Rao1, Rajitha Kotoju2, B. Ramana Reddy3, Taher Al-Shehari4, Nasser A. Alsadhan5, Subhav Singh6,7,8, Shitharth Selvarajan9,10,11,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1899-1916, 2025, DOI:10.32604/cmc.2025.064728 - 29 August 2025
    Abstract Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things (SCADA-IIoT) systems against intruders has become essential since industrial control systems now oversee critical infrastructure, and cyber attackers more frequently target these systems. Due to their connection of physical assets with digital networks, SCADA-IIoT systems face substantial risks from multiple attack types, including Distributed Denial of Service (DDoS), spoofing, and more advanced intrusion methods. Previous research in this field faces challenges due to insufficient solutions, as current intrusion detection systems lack the necessary accuracy, scalability, and adaptability needed for IIoT environments. This paper introduces CyberFortis, a… More >

  • Open AccessOpen Access

    ARTICLE

    A Method for Small Target Detection and Counting of the End of Drill Pipes Based on the Improved YOLO11n

    Miao Li1,2,*, Xiaojun Li1,3, Mingyang Zhao1,2
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1917-1936, 2025, DOI:10.32604/cmc.2025.067382 - 29 August 2025
    Abstract Aiming at problems such as large errors and low efficiency in manual counting of drill pipes during drilling depth measurement, an intelligent detection and counting method for the small targets at the end of drill pipes based on the improved YOLO11n is proposed. This method realizes the high-precision detection of targets at drill pipe ends in the image by optimizing the target detection model, and combines a post-processing correction mechanism to improve the drill pipe counting accuracy. In order to alleviate the low-precision problem of YOLO11n algorithm for small target recognition in the complex underground… More >

  • Open AccessOpen Access

    ARTICLE

    Dynamic Session Key Allocation with Time-Indexed Ascon for Low-Latency Cloud-Edge-End Communication

    Fang-Yie Leu1, Kun-Lin Tsai2,*, Li-Woei Chen3, Deng-Yao Yao2, Jian-Fu Tsai2, Ju-Wei Zhu2, Guo-Wei Wang2
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1937-1957, 2025, DOI:10.32604/cmc.2025.068486 - 29 August 2025
    (This article belongs to the Special Issue: Fortifying the Foundations: IoT Intrusion Detection Systems in Cloud-Edge-End Architecture)
    Abstract With the rapid development of Cloud-Edge-End (CEE) computing, the demand for secure and lightweight communication protocols is increasingly critical, particularly for latency-sensitive applications such as smart manufacturing, healthcare, and real-time monitoring. While traditional cryptographic schemes offer robust protection, they often impose excessive computational and energy overhead, rendering them unsuitable for use in resource-constrained edge and end devices. To address these challenges, in this paper, we propose a novel lightweight encryption framework, namely Dynamic Session Key Allocation with Time-Indexed Ascon (DSKA-TIA). Built upon the NIST-endorsed Ascon algorithm, the DSKA-TIA introduces a time-indexed session key generation mechanism… More >

  • Open AccessOpen Access

    ARTICLE

    Evaluating Method of Lower Limb Coordination Based on Spatial-Temporal Dependency Networks

    Xuelin Qin1, Huinan Sang2, Shihua Wu2, Shishu Chen2, Zhiwei Chen2, Yongjun Ren2,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1959-1980, 2025, DOI:10.32604/cmc.2025.066266 - 29 August 2025
    Abstract As an essential tool for quantitative analysis of lower limb coordination, optical motion capture systems with marker-based encoding still suffer from inefficiency, high costs, spatial constraints, and the requirement for multiple markers. While 3D pose estimation algorithms combined with ordinary cameras offer an alternative, their accuracy often deteriorates under significant body occlusion. To address the challenge of insufficient 3D pose estimation precision in occluded scenarios—which hinders the quantitative analysis of athletes’ lower-limb coordination—this paper proposes a multimodal training framework integrating spatiotemporal dependency networks with text-semantic guidance. Compared to traditional optical motion capture systems, this work… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid HRNet-Swin Transformer: Multi-Scale Feature Fusion for Aerial Segmentation and Classification

    Asaad Algarni1, Aysha Naseer 2, Mohammed Alshehri3, Yahya AlQahtani4, Abdulmonem Alshahrani4, Jeongmin Park5,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1981-1998, 2025, DOI:10.32604/cmc.2025.064268 - 29 August 2025
    Abstract Remote sensing plays a pivotal role in environmental monitoring, disaster relief, and urban planning, where accurate scene classification of aerial images is essential. However, conventional convolutional neural networks (CNNs) struggle with long-range dependencies and preserving high-resolution features, limiting their effectiveness in complex aerial image analysis. To address these challenges, we propose a Hybrid HRNet-Swin Transformer model that synergizes the strengths of HRNet-W48 for high-resolution segmentation and the Swin Transformer for global feature extraction. This hybrid architecture ensures robust multi-scale feature fusion, capturing fine-grained details and broader contextual relationships in aerial imagery. Our methodology begins with… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Modal Attention Networks for Driving Style-Aware Trajectory Prediction in Autonomous Driving

    Lang Ding, Qinmu Wu*, Jiaheng Li, Tao Hong, Linqing Bian
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1999-2020, 2025, DOI:10.32604/cmc.2025.066423 - 29 August 2025
    Abstract Trajectory prediction is a critical task in autonomous driving systems. It enables vehicles to anticipate the future movements of surrounding traffic participants, which facilitates safe and human-like decision-making in the planning and control layers. However, most existing approaches rely on end-to-end deep learning architectures that overlook the influence of driving style on trajectory prediction. These methods often lack explicit modeling of semantic driving behavior and effective interaction mechanisms, leading to potentially unrealistic predictions. To address these limitations, we propose the Driving Style Guided Trajectory Prediction framework (DSG-TP), which incorporates a probabilistic representation of driving style… More >

  • Open AccessOpen Access

    ARTICLE

    An Adaptive and Parallel Metaheuristic Framework for Wrapper-Based Feature Selection Using Arctic Puffin Optimization

    Wy-Liang Cheng1, Wei Hong Lim1,*, Kim Soon Chong1, Sew Sun Tiang1, Yit Hong Choo2, El-Sayed M. El-kenawy3,4, Amal H. Alharbi5, Marwa M. Eid6,7
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2021-2050, 2025, DOI:10.32604/cmc.2025.064243 - 29 August 2025
    (This article belongs to the Special Issue: Advanced Algorithms for Feature Selection in Machine Learning)
    Abstract The exponential growth of data in recent years has introduced significant challenges in managing high-dimensional datasets, particularly in industrial contexts where efficient data handling and process innovation are critical. Feature selection, an essential step in data-driven process innovation, aims to identify the most relevant features to improve model interpretability, reduce complexity, and enhance predictive accuracy. To address the limitations of existing feature selection methods, this study introduces a novel wrapper-based feature selection framework leveraging the recently proposed Arctic Puffin Optimization (APO) algorithm. Specifically, we incorporate a specialized conversion mechanism to effectively adapt APO from continuous… More >

  • Open AccessOpen Access

    ARTICLE

    Event-Aware Sarcasm Detection in Chinese Social Media Using Multi-Head Attention and Contrastive Learning

    Kexuan Niu, Xiameng Si*, Xiaojie Qi, Haiyan Kang
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2051-2070, 2025, DOI:10.32604/cmc.2025.065377 - 29 August 2025
    Abstract Sarcasm detection is a complex and challenging task, particularly in the context of Chinese social media, where it exhibits strong contextual dependencies and cultural specificity. To address the limitations of existing methods in capturing the implicit semantics and contextual associations in sarcastic expressions, this paper proposes an event-aware model for Chinese sarcasm detection, leveraging a multi-head attention (MHA) mechanism and contrastive learning (CL) strategies. The proposed model employs a dual-path Bidirectional Encoder Representations from Transformers (BERT) encoder to process comment text and event context separately and integrates an MHA mechanism to facilitate deep interactions between More >

  • Open AccessOpen Access

    ARTICLE

    Semantic Knowledge Based Reinforcement Learning Formalism for Smart Learning Environments

    Taimoor Hassan1, Ibrar Hussain1,*, Hafiz Mahfooz Ul Haque2, Hamid Turab Mirza3, Muhammad Nadeem Ali4, Byung-Seo Kim4,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2071-2094, 2025, DOI:10.32604/cmc.2025.068533 - 29 August 2025
    Abstract Smart learning environments have been considered as vital sources and essential needs in modern digital education systems. With the rapid proliferation of smart and assistive technologies, smart learning processes have become quite convenient, comfortable, and financially affordable. This shift has led to the emergence of pervasive computing environments, where user’s intelligent behavior is supported by smart gadgets; however, it is becoming more challenging due to inconsistent behavior of Artificial intelligence (AI) assistive technologies in terms of networking issues, slow user responses to technologies and limited computational resources. This paper presents a context-aware predictive reasoning based… More >

  • Open AccessOpen Access

    ARTICLE

    The Identification of Influential Users Based on Semi-Supervised Contrastive Learning

    Jialong Zhang1, Meijuan Yin2,*, Yang Pei2, Fenlin Liu2, Chenyu Wang2
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2095-2115, 2025, DOI:10.32604/cmc.2025.065679 - 29 August 2025
    Abstract Identifying influential users in social networks is of great significance in areas such as public opinion monitoring and commercial promotion. Existing identification methods based on Graph Neural Networks (GNNs) often lead to yield inaccurate features of influential users due to neighborhood aggregation, and require a large substantial amount of labeled data for training, making them difficult and challenging to apply in practice. To address this issue, we propose a semi-supervised contrastive learning method for identifying influential users. First, the proposed method constructs positive and negative samples for contrastive learning based on multiple node centrality metrics… More >

  • Open AccessOpen Access

    ARTICLE

    Super-Resolution Generative Adversarial Network with Pyramid Attention Module for Face Generation

    Parvathaneni Naga Srinivasu1,2, G. JayaLakshmi3, Sujatha Canavoy Narahari4, Victor Hugo C. de Albuquerque2, Muhammad Attique Khan5, Hee-Chan Cho6, Byoungchol Chang7,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2117-2139, 2025, DOI:10.32604/cmc.2025.065232 - 29 August 2025
    Abstract The generation of high-quality, realistic face generation has emerged as a key field of research in computer vision. This paper proposes a robust approach that combines a Super-Resolution Generative Adversarial Network (SRGAN) with a Pyramid Attention Module (PAM) to enhance the quality of deep face generation. The SRGAN framework is designed to improve the resolution of generated images, addressing common challenges such as blurriness and a lack of intricate details. The Pyramid Attention Module further complements the process by focusing on multi-scale feature extraction, enabling the network to capture finer details and complex facial features… More >

  • Open AccessOpen Access

    ARTICLE

    An Effective Adversarial Defense Framework: From Robust Feature Perspective

    Baolin Li1, Tao Hu1,2,3,*, Xinlei Liu1, Jichao Xie1, Peng Yi1,2,3
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2141-2155, 2025, DOI:10.32604/cmc.2025.066370 - 29 August 2025
    Abstract Deep neural networks are known to be vulnerable to adversarial attacks. Unfortunately, the underlying mechanisms remain insufficiently understood, leading to empirical defenses that often fail against new attacks. In this paper, we explain adversarial attacks from the perspective of robust features, and propose a novel Generative Adversarial Network (GAN)-based Robust Feature Disentanglement framework (GRFD) for adversarial defense. The core of GRFD is an adversarial disentanglement structure comprising a generator and a discriminator. For the generator, we introduce a novel Latent Variable Constrained Variational Auto-Encoder (LVCVAE), which enhances the typical beta-VAE with a constrained rectification module… More >

  • Open AccessOpen Access

    ARTICLE

    Sine-Polynomial Chaotic Map (SPCM): A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks

    David S. Bhatti1,*, Annas W. Malik2, Haeung Choi1, Ki-Il Kim3,*
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2157-2177, 2025, DOI:10.32604/cmc.2025.068360 - 29 August 2025
    Abstract Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies, limiting their use for lightweight, secure image encryption in resource-constrained Wireless Sensor Networks (WSNs). We propose the SPCM, a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions, leveraging a piecewise function to achieve a broad chaotic range () and a high Lyapunov exponent (5.04). Validated through nine benchmarks, including standard randomness tests, Diehard tests, and Shannon entropy (3.883), SPCM demonstrates superior randomness and high sensitivity to initial conditions. Applied to image encryption, SPCM achieves 0.152582 s (39% faster than some techniques) and 433.42 More >

  • Open AccessOpen Access

    ARTICLE

    Energy Efficient and Resource Allocation in Cloud Computing Using QT-DNN and Binary Bird Swarm Optimization

    Puneet Sharma1, Dhirendra Prasad Yadav1, Bhisham Sharma2,*, Surbhi B. Khan3,4,*, Ahlam Almusharraf 5
    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2179-2193, 2025, DOI:10.32604/cmc.2025.063190 - 29 August 2025
    (This article belongs to the Special Issue: Heuristic Algorithms for Optimizing Network Technologies: Innovations and Applications)
    Abstract The swift expansion of cloud computing has heightened the demand for energy-efficient and high-performance resource allocation solutions across extensive systems. This research presents an innovative hybrid framework that combines a Quantum Tensor-based Deep Neural Network (QT-DNN) with Binary Bird Swarm Optimization (BBSO) to enhance resource allocation while preserving Quality of Service (QoS). In contrast to conventional approaches, the QT-DNN accurately predicts task-resource mappings using tensor-based task representation, significantly minimizing computing overhead. The BBSO allocates resources dynamically, optimizing energy efficiency and task distribution. Experimental results from extensive simulations indicate the efficacy of the suggested strategy; the… More >

Per Page:

Share Link