Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17,238)
  • Open Access

    ARTICLE

    Log-Based Anomaly Detection of System Logs Using Graph Neural Network

    Eman Alsalmi, Abeer Alhuzali*, Areej Alhothali

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.071012 - 09 December 2025

    Abstract Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems. Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems. In this study, we propose a hybrid model, BertGCN, that integrates BERT-based contextual embedding with Graph Convolutional Networks (GCNs) to identify anomalies in raw system logs, thereby eliminating the need for log parsing. The BERT module captures semantic representations of log messages, while the GCN models the structural relationships among log entries through a text-based graph. This combination More >

  • Open Access

    ARTICLE

    ResghostNet: Boosting GhostNet with Residual Connections and Adaptive-SE Blocks

    Yuang Chen1,2, Yong Li1,*, Fang Lin1,2, Shuhan Lv1,2, Jiaze Jiang1,2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-18, 2026, DOI:10.32604/cmc.2025.070990 - 09 December 2025

    Abstract Aiming at the problem of potential information noise introduced during the generation of ghost feature maps in GhostNet, this paper proposes a novel lightweight neural network model called ResghostNet. This model constructs the Resghost Module by combining residual connections and Adaptive-SE Blocks, which enhances the quality of generated feature maps through direct propagation of original input information and selection of important channels before cheap operations. Specifically, ResghostNet introduces residual connections on the basis of the Ghost Module to optimize the information flow, and designs a weight self-attention mechanism combined with SE blocks to enhance feature More >

  • Open Access

    ARTICLE

    Smart Contract Vulnerability Detection Based on Symbolic Execution and Graph Neural Networks

    Haoxin Sun1, Xiao Yu1,*, Jiale Li1, Yitong Xu1, Jie Yu1, Huanhuan Li1, Yuanzhang Li2, Yu-An Tan2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-15, 2026, DOI:10.32604/cmc.2025.070930 - 09 December 2025

    Abstract Since the advent of smart contracts, security vulnerabilities have remained a persistent challenge, compromsing both the reliability of contract execution and the overall stability of the virtual currency market. Consequently, the academic community has devoted increasing attention to these security risks. However, conventional approaches to vulnerability detection frequently exhibit limited accuracy. To address this limitation, the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks (GNNs). The proposed method first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts. More >

  • Open Access

    ARTICLE

    Enhancing Lightweight Mango Disease Detection Model Performance through a Combined Attention Module

    Wen-Tsai Sung1, Indra Griha Tofik Isa2,3, Sung-Jung Hsiao4,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.070922 - 09 December 2025

    Abstract Mango is a plant with high economic value in the agricultural industry; thus, it is necessary to maximize the productivity performance of the mango plant, which can be done by implementing artificial intelligence. In this study, a lightweight object detection model will be developed that can detect mango plant conditions based on disease potential, so that it becomes an early detection warning system that has an impact on increasing agricultural productivity. The proposed lightweight model integrates YOLOv7-Tiny and the proposed modules, namely the C2S module. The C2S module consists of three sub-modules such as the… More >

  • Open Access

    REVIEW

    Review of Metaheuristic Optimization Techniques for Enhancing E-Health Applications

    Qun Song1, Chao Gao1, Han Wu1, Zhiheng Rao1, Huafeng Qin1,*, Simon Fong1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-49, 2026, DOI:10.32604/cmc.2025.070918 - 09 December 2025

    Abstract Metaheuristic algorithms, renowned for strong global search capabilities, are effective tools for solving complex optimization problems and show substantial potential in e-Health applications. This review provides a systematic overview of recent advancements in metaheuristic algorithms and highlights their applications in e-Health. We selected representative algorithms published between 2019 and 2024, and quantified their influence using an entropy-weighted method based on journal impact factors and citation counts. CThe Harris Hawks Optimizer (HHO) demonstrated the highest early citation impact. The study also examined applications in disease prediction models, clinical decision support, and intelligent health monitoring. Notably, the More >

  • Open Access

    ARTICLE

    A Hierarchical Attention Framework for Business Information Systems: Theoretical Foundation and Proof-of-Concept Implementation

    Sabina-Cristiana Necula*, Napoleon-Alexandru Sireteanu

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-34, 2026, DOI:10.32604/cmc.2025.070861 - 09 December 2025

    Abstract Modern business information systems face significant challenges in managing heterogeneous data sources, integrating disparate systems, and providing real-time decision support in complex enterprise environments. Contemporary enterprises typically operate 200+ interconnected systems, with research indicating that 52% of organizations manage three or more enterprise content management systems, creating information silos that reduce operational efficiency by up to 35%. While attention mechanisms have demonstrated remarkable success in natural language processing and computer vision, their systematic application to business information systems remains largely unexplored. This paper presents the theoretical foundation for a Hierarchical Attention-Based Business Information System (HABIS)… More >

  • Open Access

    ARTICLE

    An Improved Variant of Multi-Population Cooperative Constrained Multi-Objective Optimization (MCCMO) for Multi-Objective Optimization Problem

    Muhammad Waqar Khan1,*, Adnan Ahmed Siddiqui1, Syed Sajjad Hussain Rizvi2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-15, 2026, DOI:10.32604/cmc.2025.070858 - 09 December 2025

    Abstract The multi-objective optimization problems, especially in constrained environments such as power distribution planning, demand robust strategies for discovering effective solutions. This work presents the improved variant of the Multi-population Cooperative Constrained Multi-Objective Optimization (MCCMO) Algorithm, termed Adaptive Diversity Preservation (ADP). This enhancement is primarily focused on the improvement of constraint handling strategies, local search integration, hybrid selection approaches, and adaptive parameter control. The improved variant was experimented on with the RWMOP50 power distribution system planning benchmark. As per the findings, the improved variant outperformed the original MCCMO across the eleven performance metrics, particularly in terms… More >

  • Open Access

    ARTICLE

    Lightweight Complex-Valued Neural Network for Indoor Positioning

    Le Wang1, Bing Xu1,*, Peng Liu2, En Yuan1

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-14, 2026, DOI:10.32604/cmc.2025.070794 - 09 December 2025

    Abstract Deep learning has been recognized as an effective method for indoor positioning. However, most existing real-valued neural networks (RVNNs) treat the two constituent components of complex-valued channel state information (CSI) as real-valued inputs, potentially discarding useful information embedded in the original CSI. In addition, existing positioning models generally face the contradiction between computational complexity and positioning accuracy. To address these issues, we combine graph neural network (GNN) with complex-valued neural network (CVNN) to construct a lightweight indoor positioning model named CGNet. CGNet employs complex-valued convolution operation to directly process the original CSI data, fully exploiting… More >

  • Open Access

    ARTICLE

    PMCFusion: A Parallel Multi-Dimensional Complementary Network for Infrared and Visible Image Fusion

    Xu Tao1, Qiang Xiao2, Zhaoqi Jin2, Hao Li1,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-18, 2026, DOI:10.32604/cmc.2025.070790 - 09 December 2025

    Abstract Image fusion technology aims to generate a more informative single image by integrating complementary information from multi-modal images. Despite the significant progress of deep learning-based fusion methods, existing algorithms are often limited to single or dual-dimensional feature interactions, thus struggling to fully exploit the profound complementarity between multi-modal images. To address this, this paper proposes a parallel multi-dimensional complementary fusion network, termed PMCFusion, for the task of infrared and visible image fusion. The core of this method is its unique parallel three-branch fusion module, PTFM, which pioneers the parallel synergistic perception and efficient integration of… More >

  • Open Access

    ARTICLE

    Porosity-Impact Strength Relationship in Material Extrusion: Insights from MicroCT, and Computational Image Analysis

    Jia Yan Lim1,2, Siti Madiha Muhammad Amir3, Roslan Yahya3, Marta Peña Fernández2, Tze Chuen Yap1,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-19, 2026, DOI:10.32604/cmc.2025.070707 - 09 December 2025

    Abstract Additive Manufacturing, also known as 3D printing, has transformed conventional manufacturing by building objects layer by layer, with material extrusion or fused deposition modeling standing out as particularly popular. However, due to its manufacturing process and thermal nature, internal voids and pores are formed within the thermoplastic materials being fabricated, potentially leading to a decrease in mechanical properties. This paper discussed the effect of printing parameters on the porosity and the mechanical properties of the 3D printed polylactic acid (PLA) through micro-computed tomography (microCT), computational image analysis, and Charpy impact testing. The results for both… More >

Displaying 21-30 on page 3 of 17238. Per Page