CMC Open Access

Computers, Materials & Continua

ISSN:1546-2218 (print)
ISSN:1546-2226 (online)
Publication Frequency:Monthly

  • Online
    Articles

    7039

  • on board
    editors

    203

Special Issues
Table of Content


About the Journal

Computers, Materials & Continua is a peer-reviewed Open Access journal that publishes all types of academic papers in the areas of computer networks, artificial intelligence, big data, software engineering, multimedia, cyber security, internet of things, materials genome, integrated materials science, and data analysis, modeling, designing and manufacturing of modern functional and multifunctional materials. This journal is published monthly by Tech Science Press.

Indexing and Abstracting

SCI: 2024 Impact Factor 1.7; Scopus CiteScore (Impact per Publication 2024): 6.1; SNIP (Source Normalized Impact per Paper 2024): 0.675; Ei Compendex; Cambridge Scientific Abstracts; INSPEC Databases; Science Navigator; EBSCOhost; ProQuest Central; Zentralblatt für Mathematik; Portico, etc.

  • Open Access

    REVIEW

    Deep Learning-Enhanced Human Sensing with Channel State Information: A Survey

    Binglei Yue, Aili Jiang, Chun Yang, Junwei Lei, Heng Liu, Yin Zhang*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-28, 2026, DOI:10.32604/cmc.2025.071047 - 10 November 2025
    Abstract With the growing advancement of wireless communication technologies, WiFi-based human sensing has gained increasing attention as a non-intrusive and device-free solution. Among the available signal types, Channel State Information (CSI) offers fine-grained temporal, frequency, and spatial insights into multipath propagation, making it a crucial data source for human-centric sensing. Recently, the integration of deep learning has significantly improved the robustness and automation of feature extraction from CSI in complex environments. This paper provides a comprehensive review of deep learning-enhanced human sensing based on CSI. We first outline mainstream CSI acquisition tools and their hardware specifications, More >

  • Open Access

    REVIEW

    Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity

    Md Shohel Rana1,2,3,4,*, Tonmoy Ghosh3, Mohammad Nur Nobi5, Anichur Rahman1,6,*, Andrew H. Sung4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-38, 2026, DOI:10.32604/cmc.2025.069212 - 10 November 2025
    Abstract Zero-click attacks represent an advanced cybersecurity threat, capable of compromising devices without user interaction. High-profile examples such as Pegasus, Simjacker, Bluebugging, and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access, exfiltrate data, and enable long-term surveillance. Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging. This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework, a widely adopted standard for modeling adversarial behavior. Through this mapping, we categorize real-world attack vectors and better understand how… More >

  • Open Access

    REVIEW

    Machine Intelligence for Mental Health Diagnosis: A Systematic Review of Methods, Algorithms, and Key Challenges

    Ravita Chahar, Ashutosh Kumar Dubey*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-65, 2026, DOI:10.32604/cmc.2025.066990 - 10 November 2025
    (This article belongs to the Special Issue: Advanced Medical Imaging Techniques Using Generative Artificial Intelligence)
    Abstract Objective: The increasing global prevalence of mental health disorders highlights the urgent need for the development of innovative diagnostic methods. Conditions such as anxiety, depression, stress, bipolar disorder (BD), and autism spectrum disorder (ASD) frequently arise from the complex interplay of demographic, biological, and socioeconomic factors, resulting in aggravated symptoms. This review investigates machine intelligence approaches for the early detection and prediction of mental health conditions. Methods: The preferred reporting items for systematic reviews and meta-analyses (PRISMA) framework was employed to conduct a systematic review and analysis covering the period 2018 to 2025. The potential… More >

  • Open Access

    REVIEW

    Deep Learning for Brain Tumor Segmentation and Classification: A Systematic Review of Methods and Trends

    Ameer Hamza, Robertas Damaševičius*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-41, 2026, DOI:10.32604/cmc.2025.069721 - 10 November 2025
    (This article belongs to the Special Issue: Emerging Trends and Applications of Deep Learning for Biomedical Signal and Image Processing)
    Abstract This systematic review aims to comprehensively examine and compare deep learning methods for brain tumor segmentation and classification using MRI and other imaging modalities, focusing on recent trends from 2022 to 2025. The primary objective is to evaluate methodological advancements, model performance, dataset usage, and existing challenges in developing clinically robust AI systems. We included peer-reviewed journal articles and high-impact conference papers published between 2022 and 2025, written in English, that proposed or evaluated deep learning methods for brain tumor segmentation and/or classification. Excluded were non-open-access publications, books, and non-English articles. A structured search was… More >

  • Open Access

    REVIEW

    AI Agents in Finance and Fintech: A Scientific Review of Agent-Based Systems, Applications, and Future Horizons

    Maryan Rizinski1,2,*, Dimitar Trajanov1,2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-34, 2026, DOI:10.32604/cmc.2025.069678 - 10 November 2025
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications, 2nd Edition)
    Abstract Artificial intelligence (AI) is reshaping financial systems and services, as intelligent AI agents increasingly form the foundation of autonomous, goal-driven systems capable of reasoning, learning, and action. This review synthesizes recent research and developments in the application of AI agents across core financial domains. Specifically, it covers the deployment of agent-based AI in algorithmic trading, fraud detection, credit risk assessment, robo-advisory, and regulatory compliance (RegTech). The review focuses on advanced agent-based methodologies, including reinforcement learning, multi-agent systems, and autonomous decision-making frameworks, particularly those leveraging large language models (LLMs), contrasting these with traditional AI or purely… More >

  • Open Access

    REVIEW

    Detecting Anomalies in FinTech: A Graph Neural Network and Feature Selection Perspective

    Vinh Truong Hoang1,*, Nghia Dinh1, Viet-Tuan Le1, Kiet Tran-Trung1, Bay Nguyen Van1, Kittikhun Meethongjan2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-40, 2026, DOI:10.32604/cmc.2025.068733 - 10 November 2025
    (This article belongs to the Special Issue: Advanced Algorithms for Feature Selection in Machine Learning)
    Abstract The Financial Technology (FinTech) sector has witnessed rapid growth, resulting in increasingly complex and high-volume digital transactions. Although this expansion improves efficiency and accessibility, it also introduces significant vulnerabilities, including fraud, money laundering, and market manipulation. Traditional anomaly detection techniques often fail to capture the relational and dynamic characteristics of financial data. Graph Neural Networks (GNNs), capable of modeling intricate interdependencies among entities, have emerged as a powerful framework for detecting subtle and sophisticated anomalies. However, the high-dimensionality and inherent noise of FinTech datasets demand robust feature selection strategies to improve model scalability, performance, and More >

  • Open Access

    ARTICLE

    Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments

    Yeasul Kim1, Chaeeun Won1, Hwankuk Kim2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-28, 2026, DOI:10.32604/cmc.2025.069608 - 10 November 2025
    (This article belongs to the Special Issue: Intelligence and Security Enhancement for Internet of Things)
    Abstract With the increasing emphasis on personal information protection, encryption through security protocols has emerged as a critical requirement in data transmission and reception processes. Nevertheless, IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices, spanning a range of devices from non-encrypted ones to fully encrypted ones. Given the limited visibility into payloads in this context, this study investigates AI-based attack detection methods that leverage encrypted traffic metadata, eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices. Using the UNSW-NB15 and CICIoT-2023 dataset, encrypted and… More >

  • Open Access

    ARTICLE

    Motion In-Betweening via Frequency-Domain Diffusion Model

    Qiang Zhang1, Shuo Feng1, Shanxiong Chen2, Teng Wan1, Ying Qi1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.068247 - 10 November 2025
    Abstract Human motion modeling is a core technology in computer animation, game development, and human-computer interaction. In particular, generating natural and coherent in-between motion using only the initial and terminal frames remains a fundamental yet unresolved challenge. Existing methods typically rely on dense keyframe inputs or complex prior structures, making it difficult to balance motion quality and plausibility under conditions such as sparse constraints, long-term dependencies, and diverse motion styles. To address this, we propose a motion generation framework based on a frequency-domain diffusion model, which aims to better model complex motion distributions and enhance generation… More >

  • Open Access

    ARTICLE

    Compatible Remediation for Vulnerabilities in the Presence and Absence of Security Patches

    Xiaohu Song1, Zhiliang Zhu2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.068930 - 10 November 2025
    Abstract Vulnerabilities are a known problem in modern Open Source Software (OSS). Most developers often rely on third-party libraries to accelerate feature implementation. However, these libraries may contain vulnerabilities that attackers can exploit to propagate malicious code, posing security risks to dependent projects. Existing research addresses these challenges through Software Composition Analysis (SCA) for vulnerability detection and remediation. Nevertheless, current solutions may introduce additional issues, such as incompatibilities, dependency conflicts, and additional vulnerabilities. To address this, we propose Vulnerability Scan and Protection (), a robust solution for detection and remediation vulnerabilities in Java projects. Specifically, builds… More >

  • Open Access

    ARTICLE

    Artificial Neural Network Model for Thermal Conductivity Estimation of Metal Oxide Water-Based Nanofluids

    Nikhil S. Mane1, Sheetal Kumar Dewangan2,*, Sayantan Mukherjee3, Pradnyavati Mane4, Deepak Kumar Singh1, Ravindra Singh Saluja5

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.072090 - 10 November 2025
    (This article belongs to the Special Issue: Applications of Neural Networks in Materials)
    Abstract The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids. Researchers rely on experimental investigations to explore nanofluid properties, as it is a necessary step before their practical application. As these investigations are time and resource-consuming undertakings, an effective prediction model can significantly improve the efficiency of research operations. In this work, an Artificial Neural Network (ANN) model is developed to predict the thermal conductivity of metal oxide water-based nanofluid. For this, a comprehensive set of 691 data points was collected from the literature. This dataset is split More >

  • Open Access

    ARTICLE

    Coupled Effects of Single-Vacancy Defect Positions on the Mechanical Properties and Electronic Structure of Aluminum Crystals

    Binchang Ma1, Xinhai Yu2, Gang Huang3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.071320 - 10 November 2025
    Abstract Vacancy defects, as fundamental disruptions in metallic lattices, play an important role in shaping the mechanical and electronic properties of aluminum crystals. However, the influence of vacancy position under coupled thermomechanical fields remains insufficiently understood. In this study, transmission and scanning electron microscopy were employed to observe dislocation structures and grain boundary heterogeneities in processed aluminum alloys, suggesting stress concentrations and microstructural inhomogeneities associated with vacancy accumulation. To complement these observations, first-principles calculations and molecular dynamics simulations were conducted for seven single-vacancy configurations in face-centered cubic aluminum. The stress response, total energy, density of states More >

  • Open Access

    ARTICLE

    First-Principles Study on the Mechanical and Thermodynamic Properties of (NbZrHfTi)C High-Entropy Ceramics

    Yonggang Tong1,*, Kai Yang1, Pengfei Li1, Yongle Hu1, Xiubing Liang2,*, Jian Liu3, Yejun Li4, Jingzhong Fang1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.071890 - 10 November 2025
    (This article belongs to the Special Issue: Computational Analysis of Micro-Nano Material Mechanics and Manufacturing)
    Abstract (NbZrHfTi)C high-entropy ceramics, as an emerging class of ultra-high-temperature materials, have garnered significant interest due to their unique multi-principal-element crystal structure and exceptional high-temperature properties. This study systematically investigates the mechanical properties of (NbZrHfTi)C high-entropy ceramics by employing first-principles density functional theory, combined with the Debye-Grüneisen model, to explore the variations in their thermophysical properties with temperature (0–2000 K) and pressure (0–30 GPa). Thermodynamically, the calculated mixing enthalpy and Gibbs free energy confirm the feasibility of forming a stable single-phase solid solution in (NbZrHfTi)C. The calculated results of the elastic stiffness constant indicate that the… More >

  • Open Access

    ARTICLE

    Mechanisms of Pore-Grain Boundary Interactions Influencing Nanoindentation Behavior in Pure Nickel: A Molecular Dynamics Study

    Chen-Xi Hu1, Wu-Gui Jiang1,*, Jin Wang1, Tian-Yu He2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.068655 - 10 November 2025
    (This article belongs to the Special Issue: Computational Analysis of Micro-Nano Material Mechanics and Manufacturing)
    Abstract THE mechanical response and deformation mechanisms of pure nickel under nanoindentation were systematically investigated using molecular dynamics (MD) simulations, with a particular focus on the novel interplay between crystallographic orientation, grain boundary (GB) proximity, and pore characteristics (size/location). This study compares single-crystal nickel models along [100], [110], and [111] orientations with equiaxed polycrystalline models containing 0, 1, and 2.5 nm pores in surface and subsurface configurations. Our results reveal that crystallographic anisotropy manifests as a 24.4% higher elastic modulus and 22.2% greater hardness in [111]-oriented single crystals compared to [100]. Pore-GB synergistic effects are found More >

  • Open Access

    ARTICLE

    Individual Software Expertise Formalization and Assessment from Project Management Tool Databases

    Traian-Radu Ploscă1,*, Alexandru-Mihai Pescaru2, Bianca-Valeria Rus1, Daniel-Ioan Curiac1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069707 - 10 November 2025
    (This article belongs to the Special Issue: Emerging Machine Learning Methods and Applications)
    Abstract Objective expertise evaluation of individuals, as a prerequisite stage for team formation, has been a long-term desideratum in large software development companies. With the rapid advancements in machine learning methods, based on reliable existing data stored in project management tools’ datasets, automating this evaluation process becomes a natural step forward. In this context, our approach focuses on quantifying software developer expertise by using metadata from the task-tracking systems. For this, we mathematically formalize two categories of expertise: technology-specific expertise, which denotes the skills required for a particular technology, and general expertise, which encapsulates overall knowledge More >

  • Open Access

    ARTICLE

    Multiaxial Fatigue Life Prediction of Metallic Specimens Using Deep Learning Algorithms

    Jing Yang1, Zhiming Liu1,*, Xingchao Li2, Zhongyao Wang3, Beitong Li1, Kaiyang Liu1, Wang Long4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068353 - 10 November 2025
    Abstract Accurately predicting fatigue life under multiaxial fatigue damage conditions is essential for ensuring the safety of critical components in service. However, due to the complexity of fatigue failure mechanisms, achieving accurate multiaxial fatigue life predictions remains challenging. Traditional multiaxial fatigue prediction models are often limited by specific material properties and loading conditions, making it difficult to maintain reliable life prediction results beyond these constraints. This paper presents a study on the impact of seven key feature quantities on multiaxial fatigue life, using Convolutional Neural Networks (CNN), Long Short-Term Memory Networks (LSTM), and Fully Connected Neural… More >

  • Open Access

    ARTICLE

    An Optimal Right-Turn Coordination System for Connected and Automated Vehicles at Urban Intersections

    Mahmudul Hasan1, Shuji Doman1, A. S. M. Bakibillah2, Md Abdus Samad Kamal1,*, Kou Yamada1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-17, 2026, DOI:10.32604/cmc.2025.070222 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Vehicular Ad-Hoc Networks (VANETs) for Intelligent Transportation Systems)
    Abstract Traffic at urban intersections frequently encounters unexpected obstructions, resulting in congestion due to uncooperative and priority-based driving behavior. This paper presents an optimal right-turn coordination system for Connected and Automated Vehicles (CAVs) at single-lane intersections, particularly in the context of left-hand side driving on roads. The goal is to facilitate smooth right turns for certain vehicles without creating bottlenecks. We consider that all approaching vehicles share relevant information through vehicular communications. The Intersection Coordination Unit (ICU) processes this information and communicates the optimal crossing or turning times to the vehicles. The primary objective of this… More >

  • Open Access

    ARTICLE

    Recurrent MAPPO for Joint UAV Trajectory and Traffic Offloading in Space-Air-Ground Integrated Networks

    Zheyuan Jia, Fenglin Jin*, Jun Xie, Yuan He

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.069128 - 10 November 2025
    Abstract This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks (SAGIN) through a novel Recursive Multi-Agent Proximal Policy Optimization (RMAPPO) algorithm. The exponential growth of mobile devices and data traffic has substantially increased network congestion, particularly in urban areas and regions with limited terrestrial infrastructure. Our approach jointly optimizes unmanned aerial vehicle (UAV) trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput, minimize energy consumption, and maintain equitable resource distribution. The proposed RMAPPO framework incorporates recurrent neural networks (RNNs) to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent More >

  • Open Access

    ARTICLE

    Hybrid AI-IoT Framework with Digital Twin Integration for Predictive Urban Infrastructure Management in Smart Cities

    Abdullah Alourani1, Mehtab Alam2,*, Ashraf Ali3, Ihtiram Raza Khan4, Chandra Kanta Samal2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-32, 2026, DOI:10.32604/cmc.2025.070161 - 10 November 2025
    (This article belongs to the Special Issue: Empowered Connected Futures of AI, IoT, and Cloud Computing in the Development of Cognitive Cities)
    Abstract The evolution of cities into digitally managed environments requires computational systems that can operate in real time while supporting predictive and adaptive infrastructure management. Earlier approaches have often advanced one dimension—such as Internet of Things (IoT)-based data acquisition, Artificial Intelligence (AI)-driven analytics, or digital twin visualization—without fully integrating these strands into a single operational loop. As a result, many existing solutions encounter bottlenecks in responsiveness, interoperability, and scalability, while also leaving concerns about data privacy unresolved. This research introduces a hybrid AI–IoT–Digital Twin framework that combines continuous sensing, distributed intelligence, and simulation-based decision support. The… More >

  • Open Access

    ARTICLE

    CAPGen: An MLLM-Based Framework Integrated with Iterative Optimization Mechanism for Cultural Artifacts Poster Generation

    Qianqian Hu, Chuhan Li, Mohan Zhang, Fang Liu*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-17, 2026, DOI:10.32604/cmc.2025.068225 - 10 November 2025
    Abstract Due to the digital transformation tendency among cultural institutions and the substantial influence of the social media platform, the demands of visual communication keep increasing for promoting traditional cultural artifacts online. As an effective medium, posters serve to attract public attention and facilitate broader engagement with cultural artifacts. However, existing poster generation methods mainly rely on fixed templates and manual design, which limits their scalability and adaptability to the diverse visual and semantic features of the artifacts. Therefore, we propose CAPGen, an automated aesthetic Cultural Artifacts Poster Generation framework built on a Multimodal Large Language More >

  • Open Access

    ARTICLE

    SwinHCAD: A Robust Multi-Modality Segmentation Model for Brain Tumors Using Transformer and Channel-Wise Attention

    Seyong Jin1, Muhammad Fayaz2, L. Minh Dang3, Hyoung-Kyu Song3, Hyeonjoon Moon2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.070667 - 10 November 2025
    (This article belongs to the Special Issue: New Trends in Image Processing)
    Abstract Brain tumors require precise segmentation for diagnosis and treatment plans due to their complex morphology and heterogeneous characteristics. While MRI-based automatic brain tumor segmentation technology reduces the burden on medical staff and provides quantitative information, existing methodologies and recent models still struggle to accurately capture and classify the fine boundaries and diverse morphologies of tumors. In order to address these challenges and maximize the performance of brain tumor segmentation, this research introduces a novel SwinUNETR-based model by integrating a new decoder block, the Hierarchical Channel-wise Attention Decoder (HCAD), into a powerful SwinUNETR encoder. The HCAD… More >

  • Open Access

    ARTICLE

    Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks

    Zeeshan Ali Haider1, Inam Ullah2,*, Ahmad Abu Shareha3, Rashid Nasimov4, Sufyan Ali Memon5,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.071042 - 10 November 2025
    (This article belongs to the Special Issue: Integrating Generative AI with UAVs for Autonomous Navigation and Decision Making)
    Abstract The advent of sixth-generation (6G) networks introduces unprecedented challenges in achieving seamless connectivity, ultra-low latency, and efficient resource management in highly dynamic environments. Although fifth-generation (5G) networks transformed mobile broadband and machine-type communications at massive scales, their properties of scaling, interference management, and latency remain a limitation in dense high mobility settings. To overcome these limitations, artificial intelligence (AI) and unmanned aerial vehicles (UAVs) have emerged as potential solutions to develop versatile, dynamic, and energy-efficient communication systems. The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning (CoRL) to manage an autonomous network.… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Verification Scheme for Context Semantic-Aware Ciphertext Retrieval

    Haochen Bao1, Lingyun Yuan1,2,*, Tianyu Xie1,2, Han Chen1, Hui Dai1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-30, 2026, DOI:10.32604/cmc.2025.069240 - 10 November 2025
    Abstract In the age of big data, ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge. Traditional searchable encryption schemes face difficulties in handling complex semantic queries. Additionally, they typically rely on honest but curious cloud servers, which introduces the risk of repudiation. Furthermore, the combined operations of search and verification increase system load, thereby reducing performance. Traditional verification mechanisms, which rely on complex hash constructions, suffer from low verification efficiency. To address these challenges, this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification. Building on existing… More >

  • Open Access

    ARTICLE

    Siphon-Based Divide-and-Conquer Policy for Enforcing Liveness on Petri Net Models of FMS Suffering from Deadlocks or Livelocks

    Murat Uzam1, Bernard Berthomieu2, Wei Wei3,*, Yufeng Chen3, Mohammed El-Meligy4,5, Mohamed Abdel Fattah Sharaf 6

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-30, 2026, DOI:10.32604/cmc.2025.069502 - 10 November 2025
    Abstract A novel siphon-based divide-and-conquer (SbDaC) policy is presented in this paper for the synthesis of Petri net (PN) based liveness-enforcing supervisors (LES) for flexible manufacturing systems (FMS) prone to deadlocks or livelocks. The proposed method takes an uncontrolled and bounded PN model (UPNM) of the FMS. Firstly, the reduced PNM (RPNM) is obtained from the UPNM by using PN reduction rules to reduce the computation burden. Then, the set of strict minimal siphons (SMSs) of the RPNM is computed. Next, the complementary set of SMSs is computed from the set of SMSs. By the union… More >

  • Open Access

    ARTICLE

    Graph-Based Intrusion Detection with Explainable Edge Classification Learning

    Jaeho Shin1, Jaekwang Kim2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.068767 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract Network attacks have become a critical issue in the internet security domain. Artificial intelligence technology-based detection methodologies have attracted attention; however, recent studies have struggled to adapt to changing attack patterns and complex network environments. In addition, it is difficult to explain the detection results logically using artificial intelligence. We propose a method for classifying network attacks using graph models to explain the detection results. First, we reconstruct the network packet data into a graphical structure. We then use a graph model to predict network attacks using edge classification. To explain the prediction results, we… More >

  • Open Access

    ARTICLE

    A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix

    Hongyu Zhao1,2, Shengsheng Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.068426 - 10 November 2025
    Abstract Driven by advancements in mobile internet technology, images have become a crucial data medium. Ensuring the security of image information during transmission has thus emerged as an urgent challenge. This study proposes a novel image encryption algorithm specifically designed for grayscale image security. This research introduces a new Cantor diagonal matrix permutation method. The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix, where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice (CML). The high initial value sensitivity of the… More >

  • Open Access

    ARTICLE

    An Integrated Approach to Condition-Based Maintenance Decision-Making of Planetary Gearboxes: Combining Temporal Convolutional Network Auto Encoders with Wiener Process

    Bo Zhu1,#, Enzhi Dong1,#, Zhonghua Cheng1,*, Xianbiao Zhan2, Kexin Jiang1, Rongcai Wang 3

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.069194 - 10 November 2025
    Abstract With the increasing complexity of industrial automation, planetary gearboxes play a vital role in large-scale equipment transmission systems, directly impacting operational efficiency and safety. Traditional maintenance strategies often struggle to accurately predict the degradation process of equipment, leading to excessive maintenance costs or potential failure risks. However, existing prediction methods based on statistical models are difficult to adapt to nonlinear degradation processes. To address these challenges, this study proposes a novel condition-based maintenance framework for planetary gearboxes. A comprehensive full-lifecycle degradation experiment was conducted to collect raw vibration signals, which were then processed using a… More >

  • Open Access

    ARTICLE

    MewCDNet: A Wavelet-Based Multi-Scale Interaction Network for Efficient Remote Sensing Building Change Detection

    Jia Liu1, Hao Chen1, Hang Gu1, Yushan Pan2,3, Haoran Chen1, Erlin Tian4, Min Huang4, Zuhe Li1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-24, 2026, DOI:10.32604/cmc.2025.068162 - 10 November 2025
    Abstract Accurate and efficient detection of building changes in remote sensing imagery is crucial for urban planning, disaster emergency response, and resource management. However, existing methods face challenges such as spectral similarity between buildings and backgrounds, sensor variations, and insufficient computational efficiency. To address these challenges, this paper proposes a novel Multi-scale Efficient Wavelet-based Change Detection Network (MewCDNet), which integrates the advantages of Convolutional Neural Networks and Transformers, balances computational costs, and achieves high-performance building change detection. The network employs EfficientNet-B4 as the backbone for hierarchical feature extraction, integrates multi-level feature maps through a multi-scale fusion… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction

    Abeer Alnuaim*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.069110 - 10 November 2025
    Abstract The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats. In the evolving landscape of cybersecurity, the efficacy of Intrusion Detection Systems (IDS) is increasingly measured by technical performance, operational usability, and adaptability. This study introduces and rigorously evaluates a Human-Computer Interaction (HCI)-Integrated IDS with the utilization of Convolutional Neural Network (CNN), CNN-Long Short Term Memory (LSTM), and Random Forest (RF) against both a Baseline Machine Learning (ML) and a Traditional IDS model, through an extensive experimental framework encompassing many performance metrics, including detection latency, accuracy, alert prioritization, classification… More >

  • Open Access

    ARTICLE

    Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning

    Misbah Anwer1,*, Ghufran Ahmed1, Maha Abdelhaq2, Raed Alsaqour3, Shahid Hussain4, Adnan Akhunzada5,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068673 - 10 November 2025
    Abstract The exponential growth of the Internet of Things (IoT) has introduced significant security challenges, with zero-day attacks emerging as one of the most critical and challenging threats. Traditional Machine Learning (ML) and Deep Learning (DL) techniques have demonstrated promising early detection capabilities. However, their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints, high computational costs, and the costly time-intensive process of data labeling. To address these challenges, this study proposes a Federated Learning (FL) framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in… More >

  • Open Access

    ARTICLE

    Multi-Feature Fragile Image Watermarking Algorithm for Tampering Blind-Detection and Content Self-Recovery

    Qiuling Wu1,*, Hao Li1, Mingjian Li1, Ming Wang2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068220 - 10 November 2025
    Abstract Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright. However, in practical applications, this technology faces various problems such as severe image distortion, inaccurate localization of the tampered regions, and difficulty in recovering content. Given these shortcomings, a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed. The multi-feature watermarking authentication code (AC) is constructed using texture feature of local binary patterns (LBP), direct coefficient of discrete cosine transform (DCT) and contrast feature of gray level co-occurrence matrix (GLCM) for detecting the tampered region, and the… More >

  • Open Access

    ARTICLE

    Multi-Constraint Generative Adversarial Network-Driven Optimization Method for Super-Resolution Reconstruction of Remote Sensing Images

    Binghong Zhang, Jialing Zhou, Xinye Zhou, Jia Zhao, Jinchun Zhu, Guangpeng Fan*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068309 - 10 November 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Remote sensing image super-resolution technology is pivotal for enhancing image quality in critical applications including environmental monitoring, urban planning, and disaster assessment. However, traditional methods exhibit deficiencies in detail recovery and noise suppression, particularly when processing complex landscapes (e.g., forests, farmlands), leading to artifacts and spectral distortions that limit practical utility. To address this, we propose an enhanced Super-Resolution Generative Adversarial Network (SRGAN) framework featuring three key innovations: (1) Replacement of L1/L2 loss with a robust Charbonnier loss to suppress noise while preserving edge details via adaptive gradient balancing; (2) A multi-loss joint optimization strategy… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Multi-Class Classification Model for Alzheimer’s Disease Using Enhanced MRI Images

    Ghadah Naif Alwakid*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.068666 - 10 November 2025
    (This article belongs to the Special Issue: Advancements in Machine Learning and Artificial Intelligence for Pattern Detection and Predictive Analytics in Healthcare)
    Abstract Alzheimer’s Disease (AD) is a progressive neurodegenerative disorder that significantly affects cognitive function, making early and accurate diagnosis essential. Traditional Deep Learning (DL)-based approaches often struggle with low-contrast MRI images, class imbalance, and suboptimal feature extraction. This paper develops a Hybrid DL system that unites MobileNetV2 with adaptive classification methods to boost Alzheimer’s diagnosis by processing MRI scans. Image enhancement is done using Contrast-Limited Adaptive Histogram Equalization (CLAHE) and Enhanced Super-Resolution Generative Adversarial Networks (ESRGAN). A classification robustness enhancement system integrates class weighting techniques and a Matthews Correlation Coefficient (MCC)-based evaluation method into the design.… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Distributed Authentication Scheme for IoV with Reputation-Driven Consensus and SM9

    Hui Wei1,2, Zhanfei Ma1,3,*, Jing Jiang1, Bisheng Wang1, Zhong Di1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069236 - 10 November 2025
    Abstract The Internet of Vehicles (IoV) operates in highly dynamic and open network environments and faces serious challenges in secure and real-time authentication and consensus mechanisms. Existing methods often suffer from complex certificate management, inefficient consensus protocols, and poor resilience in high-frequency communication, resulting in high latency, poor scalability, and unstable network performance. To address these issues, this paper proposes a secure and efficient distributed authentication scheme for IoV with reputation-driven consensus and SM9. First, this paper proposes a decentralized authentication architecture that utilizes the certificate-free feature of SM9, enabling lightweight authentication and key negotiation, thereby… More >

  • Open Access

    ARTICLE

    DAUNet: Unsupervised Neural Network Based on Dual Attention for Clock Synchronization in Multi-Agent Wireless Ad Hoc Networks

    Haihao He1,2, Xianzhou Dong1,*, Shuangshuang Wang1, Chengzhang Zhu1, Xiaotong Zhao1,2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069513 - 10 November 2025
    Abstract Clock synchronization has important applications in multi-agent collaboration (such as drone light shows, intelligent transportation systems, and game AI), group decision-making, and emergency rescue operations. Synchronization method based on pulse-coupled oscillators (PCOs) provides an effective solution for clock synchronization in wireless networks. However, the existing clock synchronization algorithms in multi-agent ad hoc networks are difficult to meet the requirements of high precision and high stability of synchronization clock in group cooperation. Hence, this paper constructs a network model, named DAUNet (unsupervised neural network based on dual attention), to enhance clock synchronization accuracy in multi-agent wireless ad hocMore >

  • Open Access

    ARTICLE

    Face-Pedestrian Joint Feature Modeling with Cross-Category Dynamic Matching for Occlusion-Robust Multi-Object Tracking

    Qin Hu, Hongshan Kong*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-31, 2026, DOI:10.32604/cmc.2025.069078 - 10 November 2025
    (This article belongs to the Special Issue: Secure & Intelligent Cloud-Edge Systems for Real-Time Object Detection and Tracking)
    Abstract To address the issues of frequent identity switches (IDs) and degraded identification accuracy in multi object tracking (MOT) under complex occlusion scenarios, this study proposes an occlusion-robust tracking framework based on face-pedestrian joint feature modeling. By constructing a joint tracking model centered on “intra-class independent tracking + cross-category dynamic binding”, designing a multi-modal matching metric with spatio-temporal and appearance constraints, and innovatively introducing a cross-category feature mutual verification mechanism and a dual matching strategy, this work effectively resolves performance degradation in traditional single-category tracking methods caused by short-term occlusion, cross-camera tracking, and crowded environments. Experiments… More >

  • Open Access

    ARTICLE

    DRL-Based Cross-Regional Computation Offloading Algorithm

    Lincong Zhang1, Yuqing Liu1, Kefeng Wei2, Weinan Zhao1, Bo Qian1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.069108 - 10 November 2025
    Abstract In the field of edge computing, achieving low-latency computational task offloading with limited resources is a critical research challenge, particularly in resource-constrained and latency-sensitive vehicular network environments where rapid response is mandatory for safety-critical applications. In scenarios where edge servers are sparsely deployed, the lack of coordination and information sharing often leads to load imbalance, thereby increasing system latency. Furthermore, in regions without edge server coverage, tasks must be processed locally, which further exacerbates latency issues. To address these challenges, we propose a novel and efficient Deep Reinforcement Learning (DRL)-based approach aimed at minimizing average… More >

  • Open Access

    ARTICLE

    Lightweight Multi-Agent Edge Framework for Cybersecurity and Resource Optimization in Mobile Sensor Networks

    Fatima Al-Quayed*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069102 - 10 November 2025
    Abstract Due to the growth of smart cities, many real-time systems have been developed to support smart cities using Internet of Things (IoT) and emerging technologies. They are formulated to collect the data for environment monitoring and automate the communication process. In recent decades, researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations. However, the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity. These systems are vulnerable to a variety of cyberattacks, including unauthorized access,… More >

  • Open Access

    ARTICLE

    EGOP: A Server-Side Enhanced Architecture to Eliminate End-to-End Latency Caused by GOP Length in Live Streaming

    Kunpeng Zhou1, Tao Wu1,*, Jia Zhang2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-27, 2026, DOI:10.32604/cmc.2025.068160 - 10 November 2025
    Abstract Over the past few years, video live streaming has gained immense popularity as a leading internet application. In current solutions offered by cloud service providers, the Group of Pictures (GOP) length of the video source often significantly impacts end-to-end (E2E) latency. However, designing an optimized GOP structure to reduce this effect remains a significant challenge. This paper presents two key contributions. First, it explores how the GOP length at the video source influences E2E latency in mainstream cloud streaming services. Experimental results reveal that the mean E2E latency increases linearly with longer GOP lengths. Second, More >

  • Open Access

    ARTICLE

    Pavement Crack Detection Based on Star-YOLO11

    Jiang Mi1, Zhijian Gan1, Pengliu Tan2,*, Xin Chang2, Zhi Wang2, Haisheng Xie2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.069348 - 10 November 2025
    Abstract In response to the challenges in highway pavement distress detection, such as multiple defect categories, difficulties in feature extraction for different damage types, and slow identification speeds, this paper proposes an enhanced pavement crack detection model named Star-YOLO11. This improved algorithm modifies the YOLO11 architecture by substituting the original C3k2 backbone network with a Star-s50 feature extraction network. The enhanced structure adjusts the number of stacked layers in the StarBlock module to optimize detection accuracy and improve model efficiency. To enhance the accuracy of pavement crack detection and improve model efficiency, three key modifications to… More >

  • Open Access

    ARTICLE

    Energy Optimization for Autonomous Mobile Robot Path Planning Based on Deep Reinforcement Learning

    Longfei Gao*, Weidong Wang, Dieyun Ke

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068873 - 10 November 2025
    Abstract At present, energy consumption is one of the main bottlenecks in autonomous mobile robot development. To address the challenge of high energy consumption in path planning for autonomous mobile robots navigating unknown and complex environments, this paper proposes an Attention-Enhanced Dueling Deep Q-Network (AD-Dueling DQN), which integrates a multi-head attention mechanism and a prioritized experience replay strategy into a Dueling-DQN reinforcement learning framework. A multi-objective reward function, centered on energy efficiency, is designed to comprehensively consider path length, terrain slope, motion smoothness, and obstacle avoidance, enabling optimal low-energy trajectory generation in 3D space from the… More >

  • Open Access

    ARTICLE

    HCL Net: Deep Learning for Accurate Classification of Honeycombing Lung and Ground Glass Opacity in CT Images

    Hairul Aysa Abdul Halim Sithiq1,*, Liyana Shuib1,*, Muneer Ahmad2, Chermaine Deepa Antony3

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.067781 - 10 November 2025
    (This article belongs to the Special Issue: Advancements in Machine Learning and Artificial Intelligence for Pattern Detection and Predictive Analytics in Healthcare)
    Abstract Honeycombing Lung (HCL) is a chronic lung condition marked by advanced fibrosis, resulting in enlarged air spaces with thick fibrotic walls, which are visible on Computed Tomography (CT) scans. Differentiating between normal lung tissue, honeycombing lungs, and Ground Glass Opacity (GGO) in CT images is often challenging for radiologists and may lead to misinterpretations. Although earlier studies have proposed models to detect and classify HCL, many faced limitations such as high computational demands, lower accuracy, and difficulty distinguishing between HCL and GGO. CT images are highly effective for lung classification due to their high resolution,… More >

  • Open Access

    ARTICLE

    A Transformer-Based Deep Learning Framework with Semantic Encoding and Syntax-Aware LSTM for Fake Electronic News Detection

    Hamza Murad Khan1, Shakila Basheer2, Mohammad Tabrez Quasim3, Raja`a Al-Naimi4, Vijaykumar Varadarajan5, Anwar Khan1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069327 - 10 November 2025
    Abstract With the increasing growth of online news, fake electronic news detection has become one of the most important paradigms of modern research. Traditional electronic news detection techniques are generally based on contextual understanding, sequential dependencies, and/or data imbalance. This makes distinction between genuine and fabricated news a challenging task. To address this problem, we propose a novel hybrid architecture, T5-SA-LSTM, which synergistically integrates the T5 Transformer for semantically rich contextual embedding with the Self-Attention-enhanced (SA) Long Short-Term Memory (LSTM). The LSTM is trained using the Adam optimizer, which provides faster and more stable convergence compared… More >

  • Open Access

    ARTICLE

    Interactive Dynamic Graph Convolution with Temporal Attention for Traffic Flow Forecasting

    Zitong Zhao1, Zixuan Zhang2, Zhenxing Niu3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069752 - 10 November 2025
    (This article belongs to the Special Issue: Attention Mechanism-based Complex System Pattern Intelligent Recognition and Accurate Prediction)
    Abstract Reliable traffic flow prediction is crucial for mitigating urban congestion. This paper proposes Attention-based spatiotemporal Interactive Dynamic Graph Convolutional Network (AIDGCN), a novel architecture integrating Interactive Dynamic Graph Convolution Network (IDGCN) with Temporal Multi-Head Trend-Aware Attention. Its core innovation lies in IDGCN, which uniquely splits sequences into symmetric intervals for interactive feature sharing via dynamic graphs, and a novel attention mechanism incorporating convolutional operations to capture essential local traffic trends—addressing a critical gap in standard attention for continuous data. For 15- and 60-min forecasting on METR-LA, AIDGCN achieves MAEs of 0.75% and 0.39%, and RMSEs More >

  • Open Access

    ARTICLE

    Ponzi Scheme Detection for Smart Contracts Based on Oversampling

    Yafei Liu1,2, Yuling Chen1,2,*, Xuewei Wang3, Yuxiang Yang2, Chaoyue Tan2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069152 - 10 November 2025
    Abstract As blockchain technology rapidly evolves, smart contracts have seen widespread adoption in financial transactions and beyond. However, the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems. Although numerous detection techniques have been proposed, existing methods suffer from significant limitations, such as class imbalance and insufficient modeling of transaction-related semantic features. To address these challenges, this paper proposes an oversampling-based detection framework for Ponzi smart contracts. We enhance the Adaptive Synthetic Sampling (ADASYN) algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions. This enhancement facilitates the… More >

  • Open Access

    ARTICLE

    DriftXMiner: A Resilient Process Intelligence Approach for Safe and Transparent Detection of Incremental Concept Drift in Process Mining

    Puneetha B. H.1,*, Manoj Kumar M. V.2,*, Prashanth B. S.2, Piyush Kumar Pareek3

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.067706 - 10 November 2025
    (This article belongs to the Special Issue: Safe and Secure Artificial Intelligence)
    Abstract Processes supported by process-aware information systems are subject to continuous and often subtle changes due to evolving operational, organizational, or regulatory factors. These changes, referred to as incremental concept drift, gradually alter the behavior or structure of processes, making their detection and localization a challenging task. Traditional process mining techniques frequently assume process stationarity and are limited in their ability to detect such drift, particularly from a control-flow perspective. The objective of this research is to develop an interpretable and robust framework capable of detecting and localizing incremental concept drift in event logs, with a… More >

  • Open Access

    ARTICLE

    A Dual-Attention CNN-BiLSTM Model for Network Intrusion Detection

    Zheng Zhang1,2, Jie Hao2, Liquan Chen1,*, Tianhao Hou2, Yanan Liu2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.068372 - 10 November 2025
    Abstract With the increasing severity of network security threats, Network Intrusion Detection (NID) has become a key technology to ensure network security. To address the problem of low detection rate of traditional intrusion detection models, this paper proposes a Dual-Attention model for NID, which combines Convolutional Neural Network (CNN) and Bidirectional Long Short-Term Memory (BiLSTM) to design two modules: the FocusConV and the TempoNet module. The FocusConV module, which automatically adjusts and weights CNN extracted local features, focuses on local features that are more important for intrusion detection. The TempoNet module focuses on global information, identifies… More >

  • Open Access

    ARTICLE

    Federated Multi-Label Feature Selection via Dual-Layer Hybrid Breeding Cooperative Particle Swarm Optimization with Manifold and Sparsity Regularization

    Songsong Zhang1, Huazhong Jin1,2,*, Zhiwei Ye1,2, Jia Yang1,2, Jixin Zhang1,2, Dongfang Wu1,2, Xiao Zheng1,2, Dingfeng Song1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.068044 - 10 November 2025
    Abstract Multi-label feature selection (MFS) is a crucial dimensionality reduction technique aimed at identifying informative features associated with multiple labels. However, traditional centralized methods face significant challenges in privacy-sensitive and distributed settings, often neglecting label dependencies and suffering from low computational efficiency. To address these issues, we introduce a novel framework, Fed-MFSDHBCPSO—federated MFS via dual-layer hybrid breeding cooperative particle swarm optimization algorithm with manifold and sparsity regularization (DHBCPSO-MSR). Leveraging the federated learning paradigm, Fed-MFSDHBCPSO allows clients to perform local feature selection (FS) using DHBCPSO-MSR. Locally selected feature subsets are encrypted with differential privacy (DP) and transmitted… More >

  • Open Access

    ARTICLE

    High-Dimensional Multi-Objective Computation Offloading for MEC in Serial Isomerism Tasks via Flexible Optimization Framework

    Zheng Yao*, Puqing Chang

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068248 - 10 November 2025
    (This article belongs to the Special Issue: IoT-assisted Network Information System)
    Abstract As Internet of Things (IoT) applications expand, Mobile Edge Computing (MEC) has emerged as a promising architecture to overcome the real-time processing limitations of mobile devices. Edge-side computation offloading plays a pivotal role in MEC performance but remains challenging due to complex task topologies, conflicting objectives, and limited resources. This paper addresses high-dimensional multi-objective offloading for serial heterogeneous tasks in MEC. We jointly consider task heterogeneity, high-dimensional objectives, and flexible resource scheduling, modeling the problem as a Many-objective optimization. To solve it, we propose a flexible framework integrating an improved cooperative co-evolutionary algorithm based on More >

  • Open Access

    ARTICLE

    Conditional Generative Adversarial Network-Based Travel Route Recommendation

    Sunbin Shin1, Luong Vuong Nguyen2, Grzegorz J. Nalepa3,4, Paulo Novais5, Xuan Hau Pham6, Jason J. Jung1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-40, 2026, DOI:10.32604/cmc.2025.070613 - 10 November 2025
    Abstract Recommending personalized travel routes from sparse, implicit feedback poses a significant challenge, as conventional systems often struggle with information overload and fail to capture the complex, sequential nature of user preferences. To address this, we propose a Conditional Generative Adversarial Network (CGAN) that generates diverse and highly relevant itineraries. Our approach begins by constructing a conditional vector that encapsulates a user’s profile. This vector uniquely fuses embeddings from a Heterogeneous Information Network (HIN) to model complex user-place-route relationships, a Recurrent Neural Network (RNN) to capture sequential path dynamics, and Neural Collaborative Filtering (NCF) to incorporate… More >

  • Open Access

    ARTICLE

    HS-APF-RRT*: An Off-Road Path-Planning Algorithm for Unmanned Ground Vehicles Based on Hierarchical Sampling and an Enhanced Artificial Potential Field

    Zhenpeng Jiang, Qingquan Liu*, Ende Wang

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068780 - 10 November 2025
    Abstract Rapidly-exploring Random Tree (RRT) and its variants have become foundational in path-planning research, yet in complex three-dimensional off-road environments their uniform blind sampling and limited safety guarantees lead to slow convergence and force an unfavorable trade-off between path quality and traversal safety. To address these challenges, we introduce HS-APF-RRT*, a novel algorithm that fuses layered sampling, an enhanced Artificial Potential Field (APF), and a dynamic neighborhood-expansion mechanism. First, the workspace is hierarchically partitioned into macro, meso, and micro sampling layers, progressively biasing random samples toward safer, lower-energy regions. Second, we augment the traditional APF by More >

  • Open Access

    ARTICLE

    P4LoF: Scheduling Loop-Free Multi-Flow Updates in Programmable Networks

    Jiqiang Xia1, Qi Zhan1, Le Tian1,2,3,*, Yuxiang Hu1,2,3, Jianhua Peng4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.069533 - 10 November 2025
    Abstract The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency, high-throughput communication, necessitating frequent and flexible updates to network routing configurations. However, maintaining consistent forwarding states during these updates is challenging, particularly when rerouting multiple flows simultaneously. Existing approaches pay little attention to multi-flow update, where improper update sequences across data plane nodes may construct deadlock dependencies. Moreover, these methods typically involve excessive control-data plane interactions, incurring significant resource overhead and performance degradation. This paper presents P4LoF, an efficient loop-free update approach that enables the controller to reroute multiple flows through More >

  • Open Access

    ARTICLE

    Deep Learning-Based Toolkit Inspection: Object Detection and Segmentation in Assembly Lines

    Arvind Mukundan1,2, Riya Karmakar1, Devansh Gupta3, Hsiang-Chen Wang1,4,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069646 - 10 November 2025
    Abstract Modern manufacturing processes have become more reliant on automation because of the accelerated transition from Industry 3.0 to Industry 4.0. Manual inspection of products on assembly lines remains inefficient, prone to errors and lacks consistency, emphasizing the need for a reliable and automated inspection system. Leveraging both object detection and image segmentation approaches, this research proposes a vision-based solution for the detection of various kinds of tools in the toolkit using deep learning (DL) models. Two Intel RealSense D455f depth cameras were arranged in a top down configuration to capture both RGB and depth images… More >

  • Open Access

    ARTICLE

    Lightweight Small Defect Detection with YOLOv8 Using Cascaded Multi-Receptive Fields and Enhanced Detection Heads

    Shengran Zhao, Zhensong Li*, Xiaotan Wei, Yutong Wang, Kai Zhao

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-14, 2026, DOI:10.32604/cmc.2025.068138 - 10 November 2025
    Abstract In printed circuit board (PCB) manufacturing, surface defects can significantly affect product quality. To address the performance degradation, high false detection rates, and missed detections caused by complex backgrounds in current intelligent inspection algorithms, this paper proposes CG-YOLOv8, a lightweight and improved model based on YOLOv8n for PCB surface defect detection. The proposed method optimizes the network architecture and compresses parameters to reduce model complexity while maintaining high detection accuracy, thereby enhancing the capability of identifying diverse defects under complex conditions. Specifically, a cascaded multi-receptive field (CMRF) module is adopted to replace the SPPF module… More >

  • Open Access

    ARTICLE

    FMCSNet: Mobile Devices-Oriented Lightweight Multi-Scale Object Detection via Fast Multi-Scale Channel Shuffling Network Model

    Lijuan Huang1, Xianyi Liu2, Jinping Liu2,*, Pengfei Xu2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068818 - 10 November 2025
    (This article belongs to the Special Issue: Novel Methods for Image Classification, Object Detection, and Segmentation)
    Abstract The ubiquity of mobile devices has driven advancements in mobile object detection. However, challenges in multi-scale object detection in open, complex environments persist due to limited computational resources. Traditional approaches like network compression, quantization, and lightweight design often sacrifice accuracy or feature representation robustness. This article introduces the Fast Multi-scale Channel Shuffling Network (FMCSNet), a novel lightweight detection model optimized for mobile devices. FMCSNet integrates a fully convolutional Multilayer Perceptron (MLP) module, offering global perception without significantly increasing parameters, effectively bridging the gap between CNNs and Vision Transformers. FMCSNet achieves a delicate balance between computation… More >

  • Open Access

    ARTICLE

    A Synthetic Speech Detection Model Combining Local-Global Dependency

    Jiahui Song, Yuepeng Zhang, Wenhao Yuan*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.069918 - 10 November 2025
    Abstract Synthetic speech detection is an essential task in the field of voice security, aimed at identifying deceptive voice attacks generated by text-to-speech (TTS) systems or voice conversion (VC) systems. In this paper, we propose a synthetic speech detection model called TFTransformer, which integrates both local and global features to enhance detection capabilities by effectively modeling local and global dependencies. Structurally, the model is divided into two main components: a front-end and a back-end. The front-end of the model uses a combination of SincLayer and two-dimensional (2D) convolution to extract high-level feature maps (HFM) containing local… More >

  • Open Access

    ARTICLE

    A Multi-Stage Pipeline for Date Fruit Processing: Integrating YOLOv11 Detection, Classification, and Automated Counting

    Ali S. Alzaharani, Abid Iqbal*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-27, 2026, DOI:10.32604/cmc.2025.070410 - 10 November 2025
    Abstract In this study, an automated multimodal system for detecting, classifying, and dating fruit was developed using a two-stage YOLOv11 pipeline. In the first stage, the YOLOv11 detection model locates individual date fruits in real time by drawing bounding boxes around them. These bounding boxes are subsequently passed to a YOLOv11 classification model, which analyzes cropped images and assigns class labels. An additional counting module automatically tallies the detected fruits, offering a near-instantaneous estimation of quantity. The experimental results suggest high precision and recall for detection, high classification accuracy (across 15 classes), and near-perfect counting in More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Convolutional Neural Network Inference Framework for AIoT Applications

    Haoran Wang1, Shuhong Yang2, Kuan Shao2, Tao Xiao2, Zhenyong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.069404 - 10 November 2025
    Abstract With the rapid development of the Artificial Intelligence of Things (AIoT), convolutional neural networks (CNNs) have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks. However, the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices. Therefore, this paper proposes an efficient privacy-preserving CNN framework (i.e., EPPA) based on the Fully Homomorphic Encryption (FHE) scheme for AIoT application scenarios. In the plaintext domain, we verify schemes with different activation structures to determine the… More >

  • Open Access

    ARTICLE

    Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection

    Ran Wei*, Hui Shu

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069562 - 10 November 2025
    Abstract Transformer-based models have significantly advanced binary code similarity detection (BCSD) by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings. Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code, existing techniques predominantly depend on inserting artificial instructions, which incur high computational costs and offer limited diversity of perturbations. To address these limitations, we propose AIMA, a novel gradient-guided assembly instruction relocation method. Our method decouples the detection model into tokenization, embedding, and encoding layers to enable efficient gradient computation. Since token IDs of instructions are… More >

  • Open Access

    ARTICLE

    Lightweight YOLOv5 with ShuffleNetV2 for Rice Disease Detection in Edge Computing

    Qingtao Meng, Sang-Hyun Lee*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.069970 - 10 November 2025
    Abstract This study proposes a lightweight rice disease detection model optimized for edge computing environments. The goal is to enhance the You Only Look Once (YOLO) v5 architecture to achieve a balance between real-time diagnostic performance and computational efficiency. To this end, a total of 3234 high-resolution images (2400 × 1080) were collected from three major rice diseases Rice Blast, Bacterial Blight, and Brown Spot—frequently found in actual rice cultivation fields. These images served as the training dataset. The proposed YOLOv5-V2 model removes the Focus layer from the original YOLOv5s and integrates ShuffleNet V2 into the… More >

  • Open Access

    ARTICLE

    A Convolutional Neural Network-Based Deep Support Vector Machine for Parkinson’s Disease Detection with Small-Scale and Imbalanced Datasets

    Kwok Tai Chui1,*, Varsha Arya1, Brij B. Gupta2,3,4,*, Miguel Torres-Ruiz5, Razaz Waheeb Attar6

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.068842 - 10 November 2025
    (This article belongs to the Special Issue: Emerging Trends and Applications of Deep Learning for Biomedical Signal and Image Processing)
    Abstract Parkinson’s disease (PD) is a debilitating neurological disorder affecting over 10 million people worldwide. PD classification models using voice signals as input are common in the literature. It is believed that using deep learning algorithms further enhances performance; nevertheless, it is challenging due to the nature of small-scale and imbalanced PD datasets. This paper proposed a convolutional neural network-based deep support vector machine (CNN-DSVM) to automate the feature extraction process using CNN and extend the conventional SVM to a DSVM for better classification performance in small-scale PD datasets. A customized kernel function reduces the impact… More >

  • Open Access

    ARTICLE

    YOLO-SDW: Traffic Sign Detection Algorithm Based on YOLOv8s Skip Connection and Dynamic Convolution

    Qing Guo1,2, Juwei Zhang1,2,3,*, Bingyi Ren1,2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069053 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Object Detection: Methods and Applications)
    Abstract Traffic sign detection is an important part of autonomous driving, and its recognition accuracy and speed are directly related to road traffic safety. Although convolutional neural networks (CNNs) have made certain breakthroughs in this field, in the face of complex scenes, such as image blur and target occlusion, the traffic sign detection continues to exhibit limited accuracy, accompanied by false positives and missed detections. To address the above problems, a traffic sign detection algorithm, You Only Look Once-based Skip Dynamic Way (YOLO-SDW) based on You Only Look Once version 8 small (YOLOv8s), is proposed. Firstly,… More >

  • Open Access

    ARTICLE

    Multi-Objective Evolutionary Framework for High-Precision Community Detection in Complex Networks

    Asal Jameel Khudhair#, Amenah Dahim Abbood#,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-31, 2026, DOI:10.32604/cmc.2025.068553 - 10 November 2025
    (This article belongs to the Special Issue: Advancements in Evolutionary Optimization Approaches: Theory and Applications)
    Abstract Community detection is one of the most fundamental applications in understanding the structure of complicated networks. Furthermore, it is an important approach to identifying closely linked clusters of nodes that may represent underlying patterns and relationships. Networking structures are highly sensitive in social networks, requiring advanced techniques to accurately identify the structure of these communities. Most conventional algorithms for detecting communities perform inadequately with complicated networks. In addition, they miss out on accurately identifying clusters. Since single-objective optimization cannot always generate accurate and comprehensive results, as multi-objective optimization can. Therefore, we utilized two objective functions… More >

  • Open Access

    ARTICLE

    Cooperative Metaheuristics with Dynamic Dimension Reduction for High-Dimensional Optimization Problems

    Junxiang Li1,2, Zhipeng Dong2, Ben Han3, Jianqiao Chen3, Xinxin Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.070816 - 10 November 2025
    (This article belongs to the Special Issue: Advancements in Evolutionary Optimization Approaches: Theory and Applications)
    Abstract Owing to their global search capabilities and gradient-free operation, metaheuristic algorithms are widely applied to a wide range of optimization problems. However, their computational demands become prohibitive when tackling high-dimensional optimization challenges. To effectively address these challenges, this study introduces cooperative metaheuristics integrating dynamic dimension reduction (DR). Building upon particle swarm optimization (PSO) and differential evolution (DE), the proposed cooperative methods C-PSO and C-DE are developed. In the proposed methods, the modified principal components analysis (PCA) is utilized to reduce the dimension of design variables, thereby decreasing computational costs. The dynamic DR strategy implements periodic… More >

  • Open Access

    ARTICLE

    A Q-Learning Improved Particle Swarm Optimization for Aircraft Pulsating Assembly Line Scheduling Problem Considering Skilled Operator Allocation

    Xiaoyu Wen1,2, Haohao Liu1,2, Xinyu Zhang1,2, Haoqi Wang1,2, Yuyan Zhang1,2, Guoyong Ye1,2, Hongwen Xing3, Siren Liu3, Hao Li1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-27, 2026, DOI:10.32604/cmc.2025.069492 - 10 November 2025
    (This article belongs to the Special Issue: Algorithms for Planning and Scheduling Problems)
    Abstract Aircraft assembly is characterized by stringent precedence constraints, limited resource availability, spatial restrictions, and a high degree of manual intervention. These factors lead to considerable variability in operator workloads and significantly increase the complexity of scheduling. To address this challenge, this study investigates the Aircraft Pulsating Assembly Line Scheduling Problem (APALSP) under skilled operator allocation, with the objective of minimizing assembly completion time. A mathematical model considering skilled operator allocation is developed, and a Q-Learning improved Particle Swarm Optimization algorithm (QLPSO) is proposed. In the algorithm design, a reverse scheduling strategy is adopted to effectively… More >

  • Open Access

    ARTICLE

    DPIL-Traj: Differential Privacy Trajectory Generation Framework with Imitation Learning

    Huaxiong Liao1,2, Xiangxuan Zhong2, Xueqi Chen2, Yirui Huang3, Yuwei Lin2, Jing Zhang2,*, Bruce Gu4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069208 - 10 November 2025
    Abstract The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns. However, the use of real-world trajectory data poses significant privacy risks, such as location re-identification and correlation attacks. To address these challenges, privacy-preserving trajectory generation methods are critical for applications relying on sensitive location data. This paper introduces DPIL-Traj, an advanced framework designed to generate synthetic trajectories while achieving a superior balance between data utility and privacy preservation. Firstly, the framework incorporates Differential Privacy Clustering, which anonymizes trajectory data by applying differential privacy techniques that add noise, ensuring the… More >

  • Open Access

    ARTICLE

    FedCW: Client Selection with Adaptive Weight in Heterogeneous Federated Learning

    Haotian Wu1, Jiaming Pei2, Jinhai Li3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069873 - 10 November 2025
    (This article belongs to the Special Issue: Advances in AI Techniques in Convergence ICT)
    Abstract With the increasing complexity of vehicular networks and the proliferation of connected vehicles, Federated Learning (FL) has emerged as a critical framework for decentralized model training while preserving data privacy. However, efficient client selection and adaptive weight allocation in heterogeneous and non-IID environments remain challenging. To address these issues, we propose Federated Learning with Client Selection and Adaptive Weighting (FedCW), a novel algorithm that leverages adaptive client selection and dynamic weight allocation for optimizing model convergence in real-time vehicular networks. FedCW selects clients based on their Euclidean distance from the global model and dynamically adjusts More >

  • Open Access

    ARTICLE

    Enhanced Capacity Reversible Data Hiding Based on Pixel Value Ordering in Triple Stego Images

    Kim Sao Nguyen, Ngoc Dung Bui*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069355 - 10 November 2025
    (This article belongs to the Special Issue: New Trends in Image Processing)
    Abstract Reversible data hiding (RDH) enables secret data embedding while preserving complete cover image recovery, making it crucial for applications requiring image integrity. The pixel value ordering (PVO) technique used in multi-stego images provides good image quality but often results in low embedding capability. To address these challenges, this paper proposes a high-capacity RDH scheme based on PVO that generates three stego images from a single cover image. The cover image is partitioned into non-overlapping blocks with pixels sorted in ascending order. Four secret bits are embedded into each block’s maximum pixel value, while three additional More >

  • Open Access

    ARTICLE

    Bearing Fault Diagnosis Based on Multimodal Fusion GRU and Swin-Transformer

    Yingyong Zou*, Yu Zhang, Long Li, Tao Liu, Xingkui Zhang

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-24, 2026, DOI:10.32604/cmc.2025.068246 - 10 November 2025
    (This article belongs to the Special Issue: Advancements in Machine Fault Diagnosis and Prognosis: Data-Driven Approaches and Autonomous Systems)
    Abstract Fault diagnosis of rolling bearings is crucial for ensuring the stable operation of mechanical equipment and production safety in industrial environments. However, due to the nonlinearity and non-stationarity of collected vibration signals, single-modal methods struggle to capture fault features fully. This paper proposes a rolling bearing fault diagnosis method based on multi-modal information fusion. The method first employs the Hippopotamus Optimization Algorithm (HO) to optimize the number of modes in Variational Mode Decomposition (VMD) to achieve optimal modal decomposition performance. It combines Convolutional Neural Networks (CNN) and Gated Recurrent Units (GRU) to extract temporal features… More >

  • Open Access

    ARTICLE

    The Research on Low-Light Autonomous Driving Object Detection Method

    Jianhua Yang*, Zhiwei Lv, Changling Huo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068442 - 10 November 2025
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications)
    Abstract Aiming at the scale adaptation of automatic driving target detection algorithms in low illumination environments and the shortcomings in target occlusion processing, this paper proposes a YOLO-LKSDS automatic driving detection model. Firstly, the Contrast-Limited Adaptive Histogram Equalisation (CLAHE) image enhancement algorithm is improved to increase the image contrast and enhance the detailed features of the target; then, on the basis of the YOLOv5 model, the Kmeans++ clustering algorithm is introduced to obtain a suitable anchor frame, and SPPELAN spatial pyramid pooling is improved to enhance the accuracy and robustness of the model for multi-scale target… More >

  • Open Access

    ARTICLE

    Intelligent Semantic Segmentation with Vision Transformers for Aerial Vehicle Monitoring

    Moneerah Alotaibi*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069195 - 10 November 2025
    Abstract Advanced traffic monitoring systems encounter substantial challenges in vehicle detection and classification due to the limitations of conventional methods, which often demand extensive computational resources and struggle with diverse data acquisition techniques. This research presents a novel approach for vehicle classification and recognition in aerial image sequences, integrating multiple advanced techniques to enhance detection accuracy. The proposed model begins with preprocessing using Multiscale Retinex (MSR) to enhance image quality, followed by Expectation-Maximization (EM) Segmentation for precise foreground object identification. Vehicle detection is performed using the state-of-the-art YOLOv10 framework, while feature extraction incorporates Maximally Stable Extremal… More >

  • Open Access

    ARTICLE

    Day-Ahead Electricity Price Forecasting Using the XGBoost Algorithm: An Application to the Turkish Electricity Market

    Yağmur Yılan, Ahad Beykent*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.068440 - 10 November 2025
    (This article belongs to the Special Issue: Advancements and Challenges in Artificial Intelligence, Data Analysis and Big Data)
    Abstract Accurate short-term electricity price forecasts are essential for market participants to optimize bidding strategies, hedge risk and plan generation schedules. By leveraging advanced data analytics and machine learning methods, accurate and reliable price forecasts can be achieved. This study forecasts day-ahead prices in Türkiye’s electricity market using eXtreme Gradient Boosting (XGBoost). We benchmark XGBoost against four alternatives—Support Vector Machines (SVM), Long Short-Term Memory (LSTM), Random Forest (RF), and Gradient Boosting (GBM)—using 8760 hourly observations from 2023 provided by Energy Exchange Istanbul (EXIST). All models were trained on an identical chronological 80/20 train–test split, with hyperparameters More >

  • Open Access

    ARTICLE

    EHDC-YOLO: Enhancing Object Detection for UAV Imagery via Multi-Scale Edge and Detail Capture

    Zhiyong Deng1, Yanchen Ye2, Jiangling Guo1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.069090 - 10 November 2025
    Abstract With the rapid expansion of drone applications, accurate detection of objects in aerial imagery has become crucial for intelligent transportation, urban management, and emergency rescue missions. However, existing methods face numerous challenges in practical deployment, including scale variation handling, feature degradation, and complex backgrounds. To address these issues, we propose Edge-enhanced and Detail-Capturing You Only Look Once (EHDC-YOLO), a novel framework for object detection in Unmanned Aerial Vehicle (UAV) imagery. Based on the You Only Look Once version 11 nano (YOLOv11n) baseline, EHDC-YOLO systematically introduces several architectural enhancements: (1) a Multi-Scale Edge Enhancement (MSEE) module… More >

  • Open Access

    ARTICLE

    GFL-SAR: Graph Federated Collaborative Learning Framework Based on Structural Amplification and Attention Refinement

    Hefei Wang, Ruichun Gu*, Jingyu Wang, Xiaolin Zhang, Hui Wei

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069251 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Deep Learning and Neural Networks: Architectures, Applications, and Challenges)
    Abstract Graph Federated Learning (GFL) has shown great potential in privacy protection and distributed intelligence through distributed collaborative training of graph-structured data without sharing raw information. However, existing GFL approaches often lack the capability for comprehensive feature extraction and adaptive optimization, particularly in non-independent and identically distributed (NON-IID) scenarios where balancing global structural understanding and local node-level detail remains a challenge. To this end, this paper proposes a novel framework called GFL-SAR (Graph Federated Collaborative Learning Framework Based on Structural Amplification and Attention Refinement), which enhances the representation learning capability of graph data through a dual-branch… More >

  • Open Access

    ARTICLE

    Aerial Images for Intelligent Vehicle Detection and Classification via YOLOv11 and Deep Learner

    Ghulam Mujtaba1,2,#, Wenbiao Liu1,#, Mohammed Alshehri3, Yahya AlQahtani4, Nouf Abdullah Almujally5, Hui Liu1,6,7,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.067895 - 10 November 2025
    Abstract As urban landscapes evolve and vehicular volumes soar, traditional traffic monitoring systems struggle to scale, often failing under the complexities of dense, dynamic, and occluded environments. This paper introduces a novel, unified deep learning framework for vehicle detection, tracking, counting, and classification in aerial imagery designed explicitly for modern smart city infrastructure demands. Our approach begins with adaptive histogram equalization to optimize aerial image clarity, followed by a cutting-edge scene parsing technique using Mask2Former, enabling robust segmentation even in visually congested settings. Vehicle detection leverages the latest YOLOv11 architecture, delivering superior accuracy in aerial contexts… More >

  • Open Access

    ARTICLE

    HUANNet: A High-Resolution Unified Attention Network for Accurate Counting

    Haixia Wang, Huan Zhang, Xiuling Wang, Xule Xin, Zhiguo Zhang*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069340 - 10 November 2025
    Abstract Accurately counting dense objects in complex and diverse backgrounds is a significant challenge in computer vision, with applications ranging from crowd counting to various other object counting tasks. To address this, we propose HUANNet (High-Resolution Unified Attention Network), a convolutional neural network designed to capture both local features and rich semantic information through a high-resolution representation learning framework, while optimizing computational distribution across parallel branches. HUANNet introduces three core modules: the High-Resolution Attention Module (HRAM), which enhances feature extraction by optimizing multi-resolution feature fusion; the Unified Multi-Scale Attention Module (UMAM), which integrates spatial, channel, and More >

  • Open Access

    ARTICLE

    CAFE-GAN: CLIP-Projected GAN with Attention-Aware Generation and Multi-Scale Discrimination

    Xuanhong Wang1, Hongyu Guo1, Jiazhen Li1, Mingchen Wang1, Xian Wang1, Yijun Zhang2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.069482 - 10 November 2025
    Abstract Over the past decade, large-scale pre-trained autoregressive and diffusion models rejuvenated the field of text-guided image generation. However, these models require enormous datasets and parameters, and their multi-step generation processes are often inefficient and difficult to control. To address these challenges, we propose CAFE-GAN, a CLIP-Projected GAN with Attention-Aware Generation and Multi-Scale Discrimination, which incorporates a pre-trained CLIP model along with several key architectural innovations. First, we embed a coordinate attention mechanism into the generator to capture long-range dependencies and enhance feature representation. Second, we introduce a trainable linear projection layer after the CLIP text… More >

  • Open Access

    ARTICLE

    A Novel Unsupervised Structural Attack and Defense for Graph Classification

    Yadong Wang1, Zhiwei Zhang1,*, Pengpeng Qiao2, Ye Yuan1, Guoren Wang1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.068590 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Deep Learning and Neural Networks: Architectures, Applications, and Challenges)
    Abstract Graph Neural Networks (GNNs) have proven highly effective for graph classification across diverse fields such as social networks, bioinformatics, and finance, due to their capability to learn complex graph structures. However, despite their success, GNNs remain vulnerable to adversarial attacks that can significantly degrade their classification accuracy. Existing adversarial attack strategies primarily rely on label information to guide the attacks, which limits their applicability in scenarios where such information is scarce or unavailable. This paper introduces an innovative unsupervised attack method for graph classification, which operates without relying on label information, thereby enhancing its applicability… More >

  • Open Access

    ARTICLE

    An Optimized Customer Churn Prediction Approach Based on Regularized Bidirectional Long Short-Term Memory Model

    Adel Saad Assiri1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069826 - 10 November 2025
    Abstract Customer churn is the rate at which customers discontinue doing business with a company over a given time period. It is an essential measure for businesses to monitor high churn rates, as they often indicate underlying issues with services, products, or customer experience, resulting in considerable income loss. Prediction of customer churn is a crucial task aimed at retaining customers and maintaining revenue growth. Traditional machine learning (ML) models often struggle to capture complex temporal dependencies in client behavior data. To address this, an optimized deep learning (DL) approach using a Regularized Bidirectional Long Short-Term… More >

  • Open Access

    ARTICLE

    Advances in Machine Learning for Explainable Intrusion Detection Using Imbalance Datasets in Cybersecurity with Harris Hawks Optimization

    Amjad Rehman1,*, Tanzila Saba1, Mona M. Jamjoom2, Shaha Al-Otaibi3, Muhammad I. Khan1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068958 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract Modern intrusion detection systems (MIDS) face persistent challenges in coping with the rapid evolution of cyber threats, high-volume network traffic, and imbalanced datasets. Traditional models often lack the robustness and explainability required to detect novel and sophisticated attacks effectively. This study introduces an advanced, explainable machine learning framework for multi-class IDS using the KDD99 and IDS datasets, which reflects real-world network behavior through a blend of normal and diverse attack classes. The methodology begins with sophisticated data preprocessing, incorporating both RobustScaler and QuantileTransformer to address outliers and skewed feature distributions, ensuring standardized and model-ready inputs.… More >

  • Open Access

    ARTICLE

    M2ATNet: Multi-Scale Multi-Attention Denoising and Feature Fusion Transformer for Low-Light Image Enhancement

    Zhongliang Wei1,*, Jianlong An1, Chang Su2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069335 - 10 November 2025
    Abstract Images taken in dim environments frequently exhibit issues like insufficient brightness, noise, color shifts, and loss of detail. These problems pose significant challenges to dark image enhancement tasks. Current approaches, while effective in global illumination modeling, often struggle to simultaneously suppress noise and preserve structural details, especially under heterogeneous lighting. Furthermore, misalignment between luminance and color channels introduces additional challenges to accurate enhancement. In response to the aforementioned difficulties, we introduce a single-stage framework, M2ATNet, using the multi-scale multi-attention and Transformer architecture. First, to address the problems of texture blurring and residual noise, we design… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Gender-Based Customer Behavior Analytics in Retail Spaces Using Computer Vision

    Ginanjar Suwasono Adi1, Samsul Huda2,*, Griffani Megiyanto Rahmatullah3, Dodit Suprianto1, Dinda Qurrota Aini Al-Sefy3, Ivon Sandya Sari Putri4, Lalu Tri Wijaya Nata Kusuma5

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.068619 - 10 November 2025
    (This article belongs to the Special Issue: Towards Privacy-preserving, Secure and Trustworthy AI-enabled Systems)
    Abstract In the competitive retail industry of the digital era, data-driven insights into gender-specific customer behavior are essential. They support the optimization of store performance, layout design, product placement, and targeted marketing. However, existing computer vision solutions often rely on facial recognition to gather such insights, raising significant privacy and ethical concerns. To address these issues, this paper presents a privacy-preserving customer analytics system through two key strategies. First, we deploy a deep learning framework using YOLOv9s, trained on the RCA-TVGender dataset. Cameras are positioned perpendicular to observation areas to reduce facial visibility while maintaining accurate More >

  • Open Access

    ARTICLE

    Blockchain-Assisted Improved Cryptographic Privacy-Preserving FL Model with Consensus Algorithm for ORAN

    Raghavendra Kulkarni1, Venkata Satya Suresh kumar Kondeti1, Binu Sudhakaran Pillai2, Surendran Rajendran3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069835 - 10 November 2025
    Abstract The next-generation RAN, known as Open Radio Access Network (ORAN), allows for several advantages, including cost-effectiveness, network flexibility, and interoperability. Now ORAN applications, utilising machine learning (ML) and artificial intelligence (AI) techniques, have become standard practice. The need for Federated Learning (FL) for ML model training in ORAN environments is heightened by the modularised structure of the ORAN architecture and the shortcomings of conventional ML techniques. However, the traditional plaintext model update sharing of FL in multi-BS contexts is susceptible to privacy violations such as deep-leakage gradient assaults and inference. Therefore, this research presents a… More >

  • Open Access

    ARTICLE

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    D. Bernal*, O. Ledesma, P. Lamo, J. Bermejo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-39, 2026, DOI:10.32604/cmc.2025.069746 - 10 November 2025
    Abstract This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices,… More >

  • Open Access

    ARTICLE

    UGEA-LMD: A Continuous-Time Dynamic Graph Representation Enhancement Framework for Lateral Movement Detection

    Jizhao Liu, Yuanyuan Shao*, Shuqin Zhang, Fangfang Shan, Jun Li

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068998 - 10 November 2025
    Abstract Lateral movement represents the most covert and critical phase of Advanced Persistent Threats (APTs), and its detection still faces two primary challenges: sample scarcity and “cold start” of new entities. To address these challenges, we propose an Uncertainty-Driven Graph Embedding-Enhanced Lateral Movement Detection framework (UGEA-LMD). First, the framework employs event-level incremental encoding on a continuous-time graph to capture fine-grained behavioral evolution, enabling newly appearing nodes to retain temporal contextual awareness even in the absence of historical interactions and thereby fundamentally mitigating the cold-start problem. Second, in the embedding space, we model the dependency structure among… More >

  • Open Access

    ARTICLE

    A Deep Learning Framework for Heart Disease Prediction with Explainable Artificial Intelligence

    Muhammad Adil1, Nadeem Javaid1,*, Imran Ahmed2, Abrar Ahmed3, Nabil Alrajeh4,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.071215 - 10 November 2025
    Abstract Heart disease remains a leading cause of mortality worldwide, emphasizing the urgent need for reliable and interpretable predictive models to support early diagnosis and timely intervention. However, existing Deep Learning (DL) approaches often face several limitations, including inefficient feature extraction, class imbalance, suboptimal classification performance, and limited interpretability, which collectively hinder their deployment in clinical settings. To address these challenges, we propose a novel DL framework for heart disease prediction that integrates a comprehensive preprocessing pipeline with an advanced classification architecture. The preprocessing stage involves label encoding and feature scaling. To address the issue of… More >

  • Open Access

    ARTICLE

    Graph Attention Networks for Skin Lesion Classification with CNN-Driven Node Features

    Ghadah Naif Alwakid1, Samabia Tehsin2,*, Mamoona Humayun3,*, Asad Farooq2, Ibrahim Alrashdi1, Amjad Alsirhani1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069162 - 10 November 2025
    (This article belongs to the Special Issue: Emerging Machine Learning Methods and Applications)
    Abstract Skin diseases affect millions worldwide. Early detection is key to preventing disfigurement, lifelong disability, or death. Dermoscopic images acquired in primary-care settings show high intra-class visual similarity and severe class imbalance, and occasional imaging artifacts can create ambiguity for state-of-the-art convolutional neural networks (CNNs). We frame skin lesion recognition as graph-based reasoning and, to ensure fair evaluation and avoid data leakage, adopt a strict lesion-level partitioning strategy. Each image is first over-segmented using SLIC (Simple Linear Iterative Clustering) to produce perceptually homogeneous superpixels. These superpixels form the nodes of a region-adjacency graph whose edges encode… More >

  • Open Access

    ARTICLE

    A Composite Loss-Based Autoencoder for Accurate and Scalable Missing Data Imputation

    Thierry Mugenzi, Cahit Perkgoz*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.070381 - 10 November 2025
    Abstract Missing data presents a crucial challenge in data analysis, especially in high-dimensional datasets, where missing data often leads to biased conclusions and degraded model performance. In this study, we present a novel autoencoder-based imputation framework that integrates a composite loss function to enhance robustness and precision. The proposed loss combines (i) a guided, masked mean squared error focusing on missing entries; (ii) a noise-aware regularization term to improve resilience against data corruption; and (iii) a variance penalty to encourage expressive yet stable reconstructions. We evaluate the proposed model across four missingness mechanisms, such as Missing… More >

  • Open Access

    ARTICLE

    GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT

    Wanwei Huang1,*, Huicong Yu1, Jiawei Ren2, Kun Wang3, Yanbu Guo1, Lifeng Jin4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-24, 2026, DOI:10.32604/cmc.2025.068493 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity. These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy. This paper proposes an industrial Internet of Things intrusion detection feature selection algorithm based on an improved whale optimization algorithm (GSLDWOA). The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to, such as local optimality, long detection time, and reduced accuracy. First, the initial population’s diversity is increased using the Gaussian Mutation More >

  • Open Access

    ARTICLE

    An Improved Reinforcement Learning-Based 6G UAV Communication for Smart Cities

    Vi Hoai Nam1, Chu Thi Minh Hue2, Dang Van Anh1,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.070605 - 10 November 2025
    (This article belongs to the Special Issue: AI-Driven Next-Generation Networks: Innovations, Challenges, and Applications)
    Abstract Unmanned Aerial Vehicles (UAVs) have become integral components in smart city infrastructures, supporting applications such as emergency response, surveillance, and data collection. However, the high mobility and dynamic topology of Flying Ad Hoc Networks (FANETs) present significant challenges for maintaining reliable, low-latency communication. Conventional geographic routing protocols often struggle in situations where link quality varies and mobility patterns are unpredictable. To overcome these limitations, this paper proposes an improved routing protocol based on reinforcement learning. This new approach integrates Q-learning with mechanisms that are both link-aware and mobility-aware. The proposed method optimizes the selection of… More >

  • Open Access

    ARTICLE

    LLM-KE: An Ontology-Aware LLM Methodology for Military Domain Knowledge Extraction

    Yu Tao1, Ruopeng Yang1,2, Yongqi Wen1,*, Yihao Zhong1, Kaige Jiao1, Xiaolei Gu1,2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-17, 2026, DOI:10.32604/cmc.2025.068670 - 10 November 2025
    Abstract Since Google introduced the concept of Knowledge Graphs (KGs) in 2012, their construction technologies have evolved into a comprehensive methodological framework encompassing knowledge acquisition, extraction, representation, modeling, fusion, computation, and storage. Within this framework, knowledge extraction, as the core component, directly determines KG quality. In military domains, traditional manual curation models face efficiency constraints due to data fragmentation, complex knowledge architectures, and confidentiality protocols. Meanwhile, crowdsourced ontology construction approaches from general domains prove non-transferable, while human-crafted ontologies struggle with generalization deficiencies. To address these challenges, this study proposes an Ontology-Aware LLM Methodology for Military Domain More >

  • Open Access

    ARTICLE

    An Improved Forest Fire Detection Model Using Audio Classification and Machine Learning

    Kemahyanto Exaudi1,2, Deris Stiawan3,*, Bhakti Yudho Suprapto1, Hanif Fakhrurroja4, Mohd. Yazid Idris5, Tami A. Alghamdi6, Rahmat Budiarto6

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-24, 2026, DOI:10.32604/cmc.2025.069377 - 10 November 2025
    (This article belongs to the Special Issue: Emerging Machine Learning Methods and Applications)
    Abstract Sudden wildfires cause significant global ecological damage. While satellite imagery has advanced early fire detection and mitigation, image-based systems face limitations including high false alarm rates, visual obstructions, and substantial computational demands, especially in complex forest terrains. To address these challenges, this study proposes a novel forest fire detection model utilizing audio classification and machine learning. We developed an audio-based pipeline using real-world environmental sound recordings. Sounds were converted into Mel-spectrograms and classified via a Convolutional Neural Network (CNN), enabling the capture of distinctive fire acoustic signatures (e.g., crackling, roaring) that are minimally impacted by… More >

  • Open Access

    ARTICLE

    GLMCNet: A Global-Local Multiscale Context Network for High-Resolution Remote Sensing Image Semantic Segmentation

    Yanting Zhang1, Qiyue Liu1,2, Chuanzhao Tian1,2,*, Xuewen Li1, Na Yang1, Feng Zhang1, Hongyue Zhang3

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.068403 - 10 November 2025
    Abstract High-resolution remote sensing images (HRSIs) are now an essential data source for gathering surface information due to advancements in remote sensing data capture technologies. However, their significant scale changes and wealth of spatial details pose challenges for semantic segmentation. While convolutional neural networks (CNNs) excel at capturing local features, they are limited in modeling long-range dependencies. Conversely, transformers utilize multihead self-attention to integrate global context effectively, but this approach often incurs a high computational cost. This paper proposes a global-local multiscale context network (GLMCNet) to extract both global and local multiscale contextual information from HRSIs.… More >

  • Open Access

    ARTICLE

    A Multi-Objective Deep Reinforcement Learning Algorithm for Computation Offloading in Internet of Vehicles

    Junjun Ren1, Guoqiang Chen2, Zheng-Yi Chai3, Dong Yuan4,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.068795 - 10 November 2025
    Abstract Vehicle Edge Computing (VEC) and Cloud Computing (CC) significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit (RSU), thereby achieving lower delay and energy consumption. However, due to the limited storage capacity and energy budget of RSUs, it is challenging to meet the demands of the highly dynamic Internet of Vehicles (IoV) environment. Therefore, determining reasonable service caching and computation offloading strategies is crucial. To address this, this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading. By… More >

  • Open Access

    ARTICLE

    When Large Language Models and Machine Learning Meet Multi-Criteria Decision Making: Fully Integrated Approach for Social Media Moderation

    Noreen Fuentes1, Janeth Ugang1, Narcisan Galamiton1, Suzette Bacus1, Samantha Shane Evangelista2, Fatima Maturan2, Lanndon Ocampo2,3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.068104 - 10 November 2025
    Abstract This study demonstrates a novel integration of large language models, machine learning, and multi-criteria decision-making to investigate self-moderation in small online communities, a topic under-explored compared to user behavior and platform-driven moderation on social media. The proposed methodological framework (1) utilizes large language models for social media post analysis and categorization, (2) employs k-means clustering for content characterization, and (3) incorporates the TODIM (Tomada de Decisão Interativa Multicritério) method to determine moderation strategies based on expert judgments. In general, the fully integrated framework leverages the strengths of these intelligent systems in a more systematic evaluation… More >

  • Open Access

    ARTICLE

    Automatic Detection of Health-Related Rumors: A Dual-Graph Collaborative Reasoning Framework Based on Causal Logic and Knowledge Graph

    Ning Wang, Haoran Lyu*, Yuchen Fu

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-31, 2026, DOI:10.32604/cmc.2025.068784 - 10 November 2025
    (This article belongs to the Special Issue: Fake News Detection in the Era of Social Media and Generative AI)
    Abstract With the widespread use of social media, the propagation of health-related rumors has become a significant public health threat. Existing methods for detecting health rumors predominantly rely on external knowledge or propagation structures, with only a few recent approaches attempting causal inference; however, these have not yet effectively integrated causal discovery with domain-specific knowledge graphs for detecting health rumors. In this study, we found that the combined use of causal discovery and domain-specific knowledge graphs can effectively identify implicit pseudo-causal logic embedded within texts, holding significant potential for health rumor detection. To this end, we… More >

  • Open Access

    ARTICLE

    PhishNet: A Real-Time, Scalable Ensemble Framework for Smishing Attack Detection Using Transformers and LLMs

    Abeer Alhuzali1,*, Qamar Al-Qahtani1, Asmaa Niyazi1, Lama Alshehri1, Fatemah Alharbi2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.069491 - 10 November 2025
    (This article belongs to the Special Issue: Enhancing AI Applications through NLP and LLM Integration)
    Abstract The surge in smishing attacks underscores the urgent need for robust, real-time detection systems powered by advanced deep learning models. This paper introduces PhishNet, a novel ensemble learning framework that integrates transformer-based models (RoBERTa) and large language models (LLMs) (GPT-OSS 120B, LLaMA3.3 70B, and Qwen3 32B) to enhance smishing detection performance significantly. To mitigate class imbalance, we apply synthetic data augmentation using T5 and leverage various text preprocessing techniques. Our system employs a dual-layer voting mechanism: weighted majority voting among LLMs and a final ensemble vote to classify messages as ham, spam, or smishing. Experimental More >

  • Open Access

    ARTICLE

    A Boundary Element Reconstruction (BER) Model for Moving Morphable Component Topology Optimization

    Zhao Li1, Hongyu Xu1,*, Shuai Zhang2, Jintao Cui1, Xiaofeng Liu1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068763 - 10 November 2025
    Abstract The moving morphable component (MMC) topology optimization method, as a typical explicit topology optimization method, has been widely concerned. In the MMC topology optimization framework, the surrogate material model is mainly used for finite element analysis at present, and the effectiveness of the surrogate material model has been fully confirmed. However, there are some accuracy problems when dealing with boundary elements using the surrogate material model, which will affect the topology optimization results. In this study, a boundary element reconstruction (BER) model is proposed based on the surrogate material model under the MMC topology optimization… More >

  • Open Access

    ARTICLE

    LinguTimeX a Framework for Multilingual CTC Detection Using Explainable AI and Natural Language Processing

    Omar Darwish1, Shorouq Al-Eidi2, Abdallah Al-Shorman1, Majdi Maabreh3, Anas Alsobeh4, Plamen Zahariev5, Yahya Tashtoush6,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.068266 - 10 November 2025
    Abstract Covert timing channels (CTC) exploit network resources to establish hidden communication pathways, posing significant risks to data security and policy compliance. Therefore, detecting such hidden and dangerous threats remains one of the security challenges. This paper proposes LinguTimeX, a new framework that combines natural language processing with artificial intelligence, along with explainable Artificial Intelligence (AI) not only to detect CTC but also to provide insights into the decision process. LinguTimeX performs multidimensional feature extraction by fusing linguistic attributes with temporal network patterns to identify covert channels precisely. LinguTimeX demonstrates strong effectiveness in detecting CTC across… More >

  • Open Access

    ARTICLE

    Syntax-Aware Hierarchical Attention Networks for Code Vulnerability Detection

    Yongbo Jiang, Shengnan Huang, Tao Feng, Baofeng Duan*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.069423 - 10 November 2025
    Abstract In the context of modern software development characterized by increasing complexity and compressed development cycles, traditional static vulnerability detection methods face prominent challenges including high false positive rates and missed detections of complex logic due to their over-reliance on rule templates. This paper proposes a Syntax-Aware Hierarchical Attention Network (SAHAN) model, which achieves high-precision vulnerability detection through grammar-rule-driven multi-granularity code slicing and hierarchical semantic fusion mechanisms. The SAHAN model first generates Syntax Independent Units (SIUs), which slices the code based on Abstract Syntax Tree (AST) and predefined grammar rules, retaining vulnerability-sensitive contexts. Following this, through More >

  • Open Access

    ARTICLE

    Efficient Arabic Essay Scoring with Hybrid Models: Feature Selection, Data Optimization, and Performance Trade-Offs

    Mohamed Ezz1, Meshrif Alruily1,*, Ayman Mohamed Mostafa2,*, Alaa S. Alaerjan1, Bader Aldughayfiq2, Hisham Allahem2, Abdulaziz Shehab2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-28, 2026, DOI:10.32604/cmc.2025.063189 - 10 November 2025
    Abstract Automated essay scoring (AES) systems have gained significant importance in educational settings, offering a scalable, efficient, and objective method for evaluating student essays. However, developing AES systems for Arabic poses distinct challenges due to the language’s complex morphology, diglossia, and the scarcity of annotated datasets. This paper presents a hybrid approach to Arabic AES by combining text-based, vector-based, and embedding-based similarity measures to improve essay scoring accuracy while minimizing the training data required. Using a large Arabic essay dataset categorized into thematic groups, the study conducted four experiments to evaluate the impact of feature selection,… More >

Copyright © 2025 The Author(s). Published by Tech Science Press.

Share Link