Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18,225)
  • Open Access

    ARTICLE

    Multi-Objective Enhanced Cheetah Optimizer for Joint Optimization of Computation Offloading and Task Scheduling in Fog Computing

    Ahmad Zia1, Nazia Azim2, Bekarystankyzy Akbayan3, Khalid J. Alzahrani4, Ateeq Ur Rehman5,*, Faheem Ullah Khan6, Nouf Al-Kahtani7, Hend Khalid Alkahtani8,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073818 - 12 January 2026

    Abstract The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks. Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay. In this network, the task processed at fog nodes reduces transmission delay. Still, it increases energy consumption, while routing tasks to the cloud server saves energy at the cost of higher communication delay. Moreover, the… More >

  • Open Access

    ARTICLE

    Data-Driven Prediction and Optimization of Mechanical Properties and Vibration Damping in Cast Iron–Granite-Epoxy Hybrid Composites

    Girish Hariharan1, Vinyas1, Gowrishankar Mandya Chennegowda1, Nitesh Kumar1, Shiva Kumar1, Deepak Doreswamy2, Subraya Krishna Bhat1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073772 - 12 January 2026

    Abstract This study presents a framework involving statistical modeling and machine learning to accurately predict and optimize the mechanical and damping properties of hybrid granite–epoxy (G–E) composites reinforced with cast iron (CI) filler particles. Hybrid G–E composite with added cast iron (CI) filler particles enhances stiffness, strength, and vibration damping, offering enhanced performance for vibration-sensitive engineering applications. Unlike conventional approaches, this work simultaneously employs Artificial Neural Networks (ANN) for high-accuracy property prediction and Response Surface Methodology (RSM) for in-depth analysis of factor interactions and optimization. A total of 24 experimental test data sets of varying input… More >

  • Open Access

    ARTICLE

    Enhanced Multi-Scale Feature Extraction Lightweight Network for Remote Sensing Object Detection

    Xiang Luo1, Yuxuan Peng2, Renghong Xie1, Peng Li3, Yuwen Qian3,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073700 - 12 January 2026

    Abstract Deep learning has made significant progress in the field of oriented object detection for remote sensing images. However, existing methods still face challenges when dealing with difficult tasks such as multi-scale targets, complex backgrounds, and small objects in remote sensing. Maintaining model lightweight to address resource constraints in remote sensing scenarios while improving task completion for remote sensing tasks remains a research hotspot. Therefore, we propose an enhanced multi-scale feature extraction lightweight network EM-YOLO based on the YOLOv8s architecture, specifically optimized for the characteristics of large target scale variations, diverse orientations, and numerous small objects… More >

  • Open Access

    ARTICLE

    FedDPL: Federated Dynamic Prototype Learning for Privacy-Preserving Malware Analysis across Heterogeneous Clients

    Danping Niu1, Yuan Ping1,*, Chun Guo2, Xiaojun Wang3, Bin Hao4

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073630 - 12 January 2026

    Abstract With the increasing complexity of malware attack techniques, traditional detection methods face significant challenges, such as privacy preservation, data heterogeneity, and lacking category information. To address these issues, we propose Federated Dynamic Prototype Learning (FedDPL) for malware classification by integrating Federated Learning with a specifically designed K-means. Under the Federated Learning framework, model training occurs locally without data sharing, effectively protecting user data privacy and preventing the leakage of sensitive information. Furthermore, to tackle the challenges of data heterogeneity and the lack of category information, FedDPL introduces a dynamic prototype learning mechanism, which adaptively adjusts the More >

  • Open Access

    REVIEW

    A Survey of Federated Learning: Advances in Architecture, Synchronization, and Security Threats

    Faisal Mahmud1, Fahim Mahmud2, Rashedur M. Rahman1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073519 - 12 January 2026

    Abstract Federated Learning (FL) has become a leading decentralized solution that enables multiple clients to train a model in a collaborative environment without directly sharing raw data, making it suitable for privacy-sensitive applications such as healthcare, finance, and smart systems. As the field continues to evolve, the research field has become more complex and scattered, covering different system designs, training methods, and privacy techniques. This survey is organized around the three core challenges: how the data is distributed, how models are synchronized, and how to defend against attacks. It provides a structured and up-to-date review of… More >

  • Open Access

    ARTICLE

    Two-Stage LightGBM Framework for Cost-Sensitive Prediction of Impending Failures of Component X in Scania Trucks

    Si-Woo Kim, Yong Soo Kim*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073492 - 12 January 2026

    Abstract Predictive maintenance (PdM) is vital for ensuring the reliability, safety, and cost efficiency of heavy-duty vehicle fleets. However, real-world sensor data are often highly imbalanced, noisy, and temporally irregular, posing significant challenges to model robustness and deployment. Using multivariate time-series data from Scania trucks, this study proposes a novel PdM framework that integrates efficient feature summarization with cost-sensitive hierarchical classification. First, the proposed last_k_summary method transforms recent operational records into compact statistical and trend-based descriptors while preserving missingness, allowing LightGBM to leverage its inherent split rules without ad-hoc imputation. Then, a two-stage LightGBM framework is developed… More >

  • Open Access

    ARTICLE

    LUAR: Lightweight and Universal Attribute Revocation Mechanism with SGX Assistance towards Applicable ABE Systems

    Fei Tang1,*, Ping Wang1, Jiang Yu1, Huihui Zhu1, Mengxue Qin1, Ling Yang2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073423 - 12 January 2026

    Abstract Attribute-Based Encryption (ABE) has emerged as a fundamental access control mechanism in data sharing, enabling data owners to define flexible access policies. A critical aspect of ABE is key revocation, which plays a pivotal role in maintaining security. However, existing key revocation mechanisms face two major challenges: (1) High overhead due to ciphertext and key updates, primarily stemming from the reliance on revocation lists during attribute revocation, which increases computation and communication costs. (2) Limited universality, as many attribute revocation mechanisms are tailored to specific ABE constructions, restricting their broader applicability. To address these challenges,… More >

  • Open Access

    REVIEW

    AI-Generated Text Detection: A Comprehensive Review of Active and Passive Approaches

    Lingyun Xiang1,*, Nian Li2, Yuling Liu3, Jiayong Hu1

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073347 - 12 January 2026

    Abstract The rapid advancement of large language models (LLMs) has driven the pervasive adoption of AI-generated content (AIGC), while also raising concerns about misinformation, academic misconduct, biased or harmful content, and other risks. Detecting AI-generated text has thus become essential to safeguard the authenticity and reliability of digital information. This survey reviews recent progress in detection methods, categorizing approaches into passive and active categories based on their reliance on intrinsic textual features or embedded signals. Passive detection is further divided into surface linguistic feature-based and language model-based methods, whereas active detection encompasses watermarking-based and semantic retrieval-based More >

  • Open Access

    ARTICLE

    HATLedger: An Approach to Hybrid Account and Transaction Partitioning for Sharded Permissioned Blockchains

    Shuai Zhao, Zhiwei Zhang*, Junkai Wang, Ye Yuan, Guoren Wang

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073315 - 12 January 2026

    Abstract With the development of sharded blockchains, high cross-shard rates and load imbalance have emerged as major challenges. Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates. Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads. Meanwhile, because of the coupling between consensus and execution, a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution. However, we observe that transaction partitioning and subsequent consensus do not require… More >

  • Open Access

    ARTICLE

    IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-Encryption

    Han-Yu Lin, Tung-Tso Tsai*, Yi-Chuan Wang

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073234 - 12 January 2026

    Abstract Cloud services, favored by many enterprises due to their high flexibility and easy operation, are widely used for data storage and processing. However, the high latency, together with transmission overheads of the cloud architecture, makes it difficult to quickly respond to the demands of IoT applications and local computation. To make up for these deficiencies in the cloud, fog computing has emerged as a critical role in the IoT applications. It decentralizes the computing power to various lower nodes close to data sources, so as to achieve the goal of low latency and distributed processing.… More >

Displaying 1-10 on page 1 of 18225. Per Page