Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (59)
  • Open Access

    ARTICLE

    Adaptive Net-Profit-Based Scheduling with Minimizing Mutual Exclusion vRB Allocation in 5G-A NR Networking

    Wei-Teng Chang1, Ben-Jye Chang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.147, No.1, 2026, DOI:10.32604/cmes.2026.077118 - 27 April 2026

    Abstract Some critical applications of emergency, Active Safe Driving (ASD), eV2X, and LEO communications require ultra-low delay and highly reliable transmission according to beyond 5G-Advanced (5G-A), 6G, and LEO specifications. Related studies proposed various scheduling algorithms in terms of single and multiple QoS requirements. However, these approaches tend to prioritize traditional QoS requirements while neglecting crucial considerations such as bearer costs and associated benefits. Moreover, most scheduling neglects the carrying cost according to the radio resource state and the bringing reward from different types of flows. Thus, this paper proposes a novel cost-based flow scheduling (eSCFS)… More >

  • Open Access

    ARTICLE

    An Agent-Based Network Power Management Scheme in WSN for Enhanced Edge Communication in Beyond 5G Networks

    Pratik Goswami1,#, Hamid Naseem2,#, Khizar Abbas3,*, Kwonhue Choi1,*

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077012 - 09 April 2026

    Abstract In a distributed edge computing environment, Internet of Things (IoT) and Vehicular-IoT (V-IoT) devices communicate through Wireless Sensor Networks (WSNs) by collecting and transmitting data from different environments. Although energy efficiency is always a critical challenge in WSN due to limited battery power, along with the demand for fast communication over edge devices in 5G and beyond 5G scenarios. Therefore, to overcome the challenges, an advanced hierarchical agent-based power management scheme is proposed for WSNs that optimizes energy distribution while maintaining reliable communication. The proposed model employs Master Agents (MAs), Coordination Agents (CoAs), and Task More >

  • Open Access

    ARTICLE

    A Multi-Agent Deep Reinforcement Learning-Based Task Offloading Method for 6G-Enabled Internet of Vehicles with Cloud-Edge-Device Collaboration

    Fangxiang Hu1, Qi Fu1,2,*, Shiwen Zhang1, Jing Huang1

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.074154 - 09 April 2026

    Abstract In the Internet of Vehicles (IoV) environment, the growing demand for computational resources from diverse vehicular applications often exceeds the capabilities of intelligent connected vehicles. Traditional approaches, which rely on one or more computational resources within the cloud-edge-device computing model, struggle to ensure overall service quality when handling high-density traffic flows and large-scale tasks. To address this issue, we propose a computational offloading scheme based on a cloud-edge-device collaborative 6G IoV edge computing model, namely, Multi-Agent Deep Reinforcement Learning-based and Server-weighted scoring Selection (MADRLSS), which aims to optimize dynamic offloading decisions and resource allocation. The… More >

  • Open Access

    ARTICLE

    Lightweight Meta-Learned RF Fingerprinting under Channel Imperfections for 6G Physical Layer Security

    Chia-Hui Liu*, Hao-Feng Liu

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.3, 2026, DOI:10.32604/cmes.2026.077837 - 30 March 2026

    Abstract Artificial Intelligence (AI)-native sixth-generation (6G) wireless networks require data-efficient and channel-resilient physical-layer modeling techniques that learn stable device-specific representations under channel variations and hardware imperfections to support secure and reliable device-level authentication under highly dynamic environments. In such networks, massive device heterogeneity and time-varying channel conditions pose significant challenges, as reliable authentication must be achieved with limited labeled data and constrained edge resources. To address this challenge, this paper proposes an Artificial Intelligence (AI)-assisted few-shot physical-layer modeling framework for channel robust device identification, formulated within the paradigm of Specific Emitter Identification (SEI) based on radio… More >

  • Open Access

    ARTICLE

    ARQ–UCB: A Reinforcement-Learning Framework for Reliability-Aware and Efficient Spectrum Access in Vehicular IoT

    Adeel Iqbal1,#, Tahir Khurshaid2,#, Syed Abdul Mannan Kirmani3, Mohammad Arif4,*, Muhammad Faisal Siddiqui5,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.075819 - 12 March 2026

    Abstract Vehicular Internet of Things (V-IoT) networks need intelligent and adaptive spectrum access methods for ensuring ultra-reliable and low-latency communication (URLLC) in highly dynamic environments. Traditional reinforcement learning (RL)-based algorithms, such as Q-Learning and Double Q-Learning, are often characterized by unstable convergence and inefficient exploration in the presence of stochastic vehicular traffic and interference. This paper proposes Adaptive Reinforcement Q-learning with Upper Confidence Bound (ARQ-UCB), a lightweight and reliability-aware RL framework, which explicitly reduces interruption and blocking probabilities while improving throughput and delay across diverse vehicular traffic conditions. This proposed ARQ-UCB algorithm extends the basic Q-updates More >

  • Open Access

    ARTICLE

    Quantum-Inspired Optimization Algorithm for 3D Multi-Objective Base-Station Deployment in Next-Generation 5G/6G Wireless Network

    Yao-Hsin Chou1, Cheng-Yen Hua1, Ru-Wei Tseng1, Shu-Yu Kuo2,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2025.075705 - 12 March 2026

    Abstract The rapid growth of mobile and Internet of Things (IoT) applications in dense urban environments places stringent demands on future Beyond 5G (B5G) or Beyond 6G (B6G) networks, which must ensure high Quality of Service (QoS) while maintaining cost-efficiency and sustainable deployment. Traditional strategies struggle with complex 3D propagation, building penetration loss, and the balance between coverage and infrastructure cost. To address this challenge, this study presents the first application of a Global-best Guided Quantum-inspired Tabu Search with Quantum-Not Gate (GQTS-QNG) framework for 3D base-station deployment optimization. The problem is formulated as a multi-objective model… More >

  • Open Access

    ARTICLE

    A PPO-Based DRL Approach for Scalable Communication in Civilian UAV Networks

    Chu Thi Minh Hue1, Nguyen Minh Quy2,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.074398 - 12 March 2026

    Abstract Nowadays, Unmanned Aerial Vehicles (UAVs) are making increasingly important contributions to numerous applications that enhance human quality of life, such as sensing and data collection, computing, and communication. However, communication between UAVs still faces challenges due to high-dynamic topology, volatile wireless links, and strict energy budgets. In this work, we introduce an improved communication scheme, namely Proximal Policy Optimization (PPO). Our solution casts hop–by–hop relay selection as a Markov decision process and develops a decentralized Proximal Policy Optimization framework in an actor–critic form. A key novelty is the design of the reward function, which jointly More >

  • Open Access

    ARTICLE

    Safety-Aware Reinforcement Learning for Self-Healing Intrusion Detection in 5G-Enabled IoT Networks

    Wajdan Al Malwi1, Fatima Asiri1, Nazik Alturki2, Noha Alnazzawi3, Dimitrios Kasimatis4, Nikolaos Pitropakis5,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.074274 - 12 March 2026

    Abstract The expansion of 5G-enabled Internet of Things (IoT) networks, while enabling transformative applications, significantly increases the attack surface and necessitates security solutions that extend beyond traditional intrusion detection. Existing intrusion detection systems (IDSs) mainly operate in an open-loop manner, excelling at classification but lacking the ability for autonomous, safety-aware remediation. This gap is particularly critical in 5G environments, where manual intervention is too slow and naive automation can lead to severe service disruptions. To address this issue, we propose a novel Self-Healing Intrusion Detection System (SH-IDS) framework that develops a closed-loop cyber defense mechanism. The… More >

  • Open Access

    ARTICLE

    Information Diffusion Models and Fuzzing Algorithms for a Privacy-Aware Data Transmission Scheduling in 6G Heterogeneous ad hoc Networks

    Borja Bordel Sánchez*, Ramón Alcarria, Tomás Robles

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.2, 2026, DOI:10.32604/cmes.2025.072603 - 26 February 2026

    Abstract In this paper, we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks. This system enables end nodes to select the optimum time and scheme to transmit private data safely. In 6G dynamic heterogeneous infrastructures, unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy. Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service (QoS). As the transport network is built of ad hoc nodes, there is no guarantee about their trustworthiness or behavior, and transversal functionalities are delegated to the extreme nodes. However, More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Blockchain-Enabled Techniques and Federated Learning for Secure 5G/6G Networks: Challenges, Opportunities, and Future Directions

    Muhammad Asim1,*, Abdelhamied A. Ateya1, Mudasir Ahmad Wani1,2, Gauhar Ali1, Mohammed ElAffendi1, Ahmed A. Abd El-Latif1, Reshma Siyal3

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.070684 - 12 January 2026

    Abstract The growing developments in 5G and 6G wireless communications have revolutionized communications technologies, providing faster speeds with reduced latency and improved connectivity to users. However, it raises significant security challenges, including impersonation threats, data manipulation, distributed denial of service (DDoS) attacks, and privacy breaches. Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks. This survey provides a comprehensive review of how Federated Learning (FL), Blockchain, and Digital Twin (DT) technologies can collectively enhance the security of 5G and 6G systems. Blockchain offers decentralized, immutable, and transparent mechanisms for securing More >

Displaying 1-10 on page 1 of 59. Per Page