Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,087)
  • Open Access

    ARTICLE

    Multi-Objective Enhanced Cheetah Optimizer for Joint Optimization of Computation Offloading and Task Scheduling in Fog Computing

    Ahmad Zia1, Nazia Azim2, Bekarystankyzy Akbayan3, Khalid J. Alzahrani4, Ateeq Ur Rehman5,*, Faheem Ullah Khan6, Nouf Al-Kahtani7, Hend Khalid Alkahtani8,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073818 - 12 January 2026

    Abstract The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks. Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay. In this network, the task processed at fog nodes reduces transmission delay. Still, it increases energy consumption, while routing tasks to the cloud server saves energy at the cost of higher communication delay. Moreover, the… More >

  • Open Access

    ARTICLE

    Energy Aware Task Scheduling of IoT Application Using a Hybrid Metaheuristic Algorithm in Cloud Computing

    Ahmed Awad Mohamed1, Eslam Abdelhakim Seyam2,*, Ahmed R. Elsaeed3, Laith Abualigah4, Aseel Smerat5,6, Ahmed M. AbdelMouty7, Hosam E. Refaat8

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073171 - 12 January 2026

    Abstract In recent years, fog computing has become an important environment for dealing with the Internet of Things. Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing. Task scheduling is crucial for efficiently handling IoT user requests, thereby improving system performance, cost, and energy consumption across nodes in cloud computing. With the large amount of data and user requests, achieving the optimal solution to the task scheduling problem is challenging, particularly in terms of cost and energy efficiency. In this paper, we develop novel strategies to save energy consumption across… More >

  • Open Access

    ARTICLE

    FedCCM: Communication-Efficient Federated Learning via Clustered Client Momentum in Non-IID Settings

    Hang Wen1,2, Kai Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072909 - 12 January 2026

    Abstract Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity. This problem becomes more severe when edge participation rate is low, as the information collected from different edge devices varies significantly. As a result, communication overhead increases, which further slows down the convergence process. To address this challenge, we propose a simple yet effective federated learning framework that improves consistency among edge devices. The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates. In parallel, a global momentum… More > Graphic Abstract

    FedCCM: Communication-Efficient Federated Learning via Clustered Client Momentum in Non-IID Settings

  • Open Access

    ARTICLE

    Advanced Video Processing and Data Transmission Technology for Unmanned Ground Vehicles in the Internet of Battlefield Things (loBT)

    Tai Liu1,2, Mao Ye2,*, Feng Wu3, Chao Zhu2, Bo Chen2, Guoyan Zhang1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072692 - 12 January 2026

    Abstract With the continuous advancement of unmanned technology in various application domains, the development and deployment of blind-spot-free panoramic video systems have gained increasing importance. Such systems are particularly critical in battlefield environments, where advanced panoramic video processing and wireless communication technologies are essential to enable remote control and autonomous operation of unmanned ground vehicles (UGVs). However, conventional video surveillance systems suffer from several limitations, including limited field of view, high processing latency, low reliability, excessive resource consumption, and significant transmission delays. These shortcomings impede the widespread adoption of UGVs in battlefield settings. To overcome these… More >

  • Open Access

    ARTICLE

    Hybrid Malware Detection Model for Internet of Things Environment

    Abdul Rahaman Wahab Sait1,*, Yazeed Alkhurayyif2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072481 - 12 January 2026

    Abstract Malware poses a significant threat to the Internet of Things (IoT). It enables unauthorized access to devices in the IoT environment. The lack of unique architectural standards causes challenges in developing robust malware detection (MD) models. The existing models demand substantial computational resources. This study intends to build a lightweight MD model to detect anomalies in IoT networks. The authors develop a transformation technique, converting the malware binaries into images. MobileNet V2 is fine-tuned using improved grey wolf optimization (IGWO) to extract crucial features of malicious and benign samples. The ResNeXt model is combined with… More >

  • Open Access

    ARTICLE

    VMFD: Virtual Meetings Fatigue Detector Using Eye Polygon Area and Dlib Shape Indicator

    Hafsa Sidaq1, Lei Wang1, Sghaier Guizani2,*, Hussain Haider3, Ateeq Ur Rehman4,*, Habib Hamam5,6,7

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.071254 - 12 January 2026

    Abstract Numerous sectors, such as education, the IT sector, and corporate organizations, transitioned to virtual meetings after the COVID-19 crisis. Organizations now seek to assess participants’ fatigue levels in online meetings to remain competitive. Instructors cannot effectively monitor every individual in a virtual environment, which raises significant concerns about participant fatigue. Our proposed system monitors fatigue, identifying attentive and drowsy individuals throughout the online session. We leverage Dlib’s pre-trained facial landmark detector and focus on the eye landmarks only, offering a more detailed analysis for predicting eye opening and closing of the eyes, rather than focusing… More >

  • Open Access

    ARTICLE

    An IoT-Based Predictive Maintenance Framework Using a Hybrid Deep Learning Model for Smart Industrial Systems

    Atheer Aleran1, Hanan Almukhalfi1, Ayman Noor1, Reyadh Alluhaibi2, Abdulrahman Hafez3, Talal H. Noor1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.070741 - 12 January 2026

    Abstract Modern industrial environments require uninterrupted machinery operation to maintain productivity standards while ensuring safety and minimizing costs. Conventional maintenance methods, such as reactive maintenance (i.e., run to failure) or time-based preventive maintenance (i.e., scheduled servicing), prove ineffective for complex systems with many Internet of Things (IoT) devices and sensors because they fall short in detecting faults at early stages when it is most crucial. This paper presents a predictive maintenance framework based on a hybrid deep learning model that integrates the capabilities of Long Short-Term Memory (LSTM) Networks and Convolutional Neural Networks (CNNs). The framework… More >

  • Open Access

    ARTICLE

    Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things

    Chia-Hui Liu*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-18, 2026, DOI:10.32604/cmc.2025.072887 - 09 December 2025

    Abstract The Industrial Internet of Things (IIoT) has emerged as a cornerstone of Industry 4.0, enabling large-scale automation and data-driven decision-making across factories, supply chains, and critical infrastructures. However, the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping, data tampering, and device impersonation. While digital signatures are indispensable for ensuring authenticity and non-repudiation, conventional schemes such as RSA and ECC are vulnerable to quantum algorithms, jeopardizing long-term trust in IIoT deployments. This study proposes a lightweight, stateless, hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT. The… More >

  • Open Access

    ARTICLE

    Structural and Helix Reversal Defects of Carbon Nanosprings: A Molecular Dynamics Study

    Alexander V. Savin1,2, Elena A. Korznikova3,4, Sergey V. Dmitriev5,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.072786 - 09 December 2025

    Abstract Due to their chiral structure, carbon nanosprings possess unique properties that are promising for nanotechnology applications. The structural transformations of carbon nanosprings in the form of spiral macromolecules derived from planar coronene and kekulene molecules (graphene helicoids and spiral nanoribbons) are analyzed using molecular dynamics simulations. The interatomic interactions are described by a force field including valence bonds, bond angles, torsional and dihedral angles, as well as van der Waals interactions. While the tension/compression of such nanosprings has been analyzed in the literature, this study investigates other modes of deformation, including bending and twisting. Depending… More >

  • Open Access

    ARTICLE

    Log-Based Anomaly Detection of System Logs Using Graph Neural Network

    Eman Alsalmi, Abeer Alhuzali*, Areej Alhothali

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.071012 - 09 December 2025

    Abstract Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems. Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems. In this study, we propose a hybrid model, BertGCN, that integrates BERT-based contextual embedding with Graph Convolutional Networks (GCNs) to identify anomalies in raw system logs, thereby eliminating the need for log parsing. The BERT module captures semantic representations of log messages, while the GCN models the structural relationships among log entries through a text-based graph. This combination More >

Displaying 1-10 on page 1 of 1087. Per Page