Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (42)
  • Open Access

    REVIEW

    A Data-Driven Systematic Review of the Metaverse in Transportation: Current Research, Computational Modeling, and Future Trends

    Cecilia Castro1, Victor Leiva2,*, Franco Basso2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1481-1543, 2025, DOI:10.32604/cmes.2025.067992 - 31 August 2025

    Abstract Metaverse technologies are increasingly promoted as game-changers in transport planning, connected-autonomous mobility, and immersive traveler services. However, the field lacks a systematic review of what has been achieved, where critical technical gaps remain, and where future deployments should be integrated. Using a transparent protocol-driven screening process, we reviewed 1589 records and retained 101 peer-reviewed journal and conference articles (2021–2025) that explicitly frame their contributions within a transport-oriented metaverse. Our review reveals a predominantly exploratory evidence base. Among the 101 studies reviewed, 17 (16.8%) apply fuzzy multi-criteria decision-making, 36 (35.6%) feature digital-twin visualizations or simulation-based testbeds,… More > Graphic Abstract

    A Data-Driven Systematic Review of the Metaverse in Transportation: Current Research, Computational Modeling, and Future Trends

  • Open Access

    ARTICLE

    Innovative Aczel Alsina Group Overlap Functions for AI-Based Criminal Justice Policy Selection under Intuitionistic Fuzzy Set

    Ikhtesham Ullah1, Muhammad Sajjad Ali Khan2, Fawad Hussain1, Madad Khan3, Kamran4,*, Ioan-Lucian Popa5,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 2123-2164, 2025, DOI:10.32604/cmes.2025.064832 - 31 August 2025

    Abstract Multi-criteria decision-making (MCDM) is essential for handling complex decision problems under uncertainty, especially in fields such as criminal justice, healthcare, and environmental management. Traditional fuzzy MCDM techniques have failed to deal with problems where uncertainty or vagueness is involved. To address this issue, we propose a novel framework that integrates group and overlap functions with Aczel-Alsina (AA) operational laws in the intuitionistic fuzzy set (IFS) environment. Overlap functions capture the degree to which two inputs share common features and are used to find how closely two values or criteria match in uncertain environments, while the… More >

  • Open Access

    ARTICLE

    Classification of Cyber Threat Detection Techniques for Next-Generation Cyber Defense via Hesitant Bipolar Fuzzy Frank Information

    Hafiz Muhammad Waqas1, Tahir Mahmood1,2, Walid Emam3, Ubaid ur Rehman4, Dragan Pamucar5,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4699-4727, 2025, DOI:10.32604/cmc.2025.065011 - 30 July 2025

    Abstract Cyber threat detection is a crucial aspect of contemporary cybersecurity due to the depth and complexity of cyberattacks. It is the identification of malicious activity, unauthorized access, and possible intrusions in networks and systems. Modern detection methods employ artificial intelligence and machine learning to study vast amounts of data, learn patterns, and anticipate potential threats. Real-time monitoring and anomaly detection improve the capacity to react to changing threats more rapidly. Cyber threat detection systems aim to reduce false positives and provide complete coverage against the broadest possible attacks. This research advocates for proactive measures and… More >

  • Open Access

    ARTICLE

    An Enhanced VIKOR and Its Revisit for the Manufacturing Process Application

    Ting-Yu Lin1, Kuo-Chen Hung2,*, Josef Jablonsky3, Kuo-Ping Lin1

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1901-1927, 2025, DOI:10.32604/cmc.2025.063543 - 16 April 2025

    Abstract VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) has been developed and applied for over twenty-five years, gaining recognition as a prominent multi-criteria decision-making (MCDM) method. Over this period, numerous studies have explored its applications, conducted comparative analyses, integrated it with other methods, and proposed various modifications to enhance its performance. This paper aims to delve into the fundamental principles and objectives of VIKOR, which aim to maximize group utility and minimize individual regret simultaneously. However, this study identifies a significant limitation in the VIKOR methodology: its process amplifies the weight of individual regret, and the calculated… More >

  • Open Access

    ARTICLE

    Fuzzy N-Bipolar Soft Sets for Multi-Criteria Decision-Making: Theory and Application

    Sagvan Y. Musa1,2, Baravan A. Asaad3,4,*, Hanan Alohali5, Zanyar A. Ameen6, Mesfer H. Alqahtani7

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 911-943, 2025, DOI:10.32604/cmes.2025.062524 - 11 April 2025

    Abstract This paper introduces fuzzy N-bipolar soft (FN-BS) sets, a novel mathematical framework designed to enhance multi-criteria decision-making (MCDM) processes under uncertainty. The study addresses a significant limitation in existing models by unifying fuzzy logic, the consideration of bipolarity, and the ability to evaluate attributes on a multinary scale. The specific contributions of the FN-BS framework include: (1) a formal definition and set-theoretic foundation, (2) the development of two innovative algorithms for solving decision-making (DM) problems, and (3) a comparative analysis demonstrating its superiority over established models. The proposed framework is applied to a real-world case More >

  • Open Access

    ARTICLE

    Prioritizing Network-On-Chip Routers for Countermeasure Techniques against Flooding Denial-of-Service Attacks: A Fuzzy Multi-Criteria Decision-Making Approach

    Ahmed Abbas Jasim Al-Hchaimi1, Yousif Raad Muhsen2,3,*, Wisam Hazim Gwad4, Entisar Soliman Alkayal5, Riyadh Rahef Nuiaa Al Ogaili6, Zaid Abdi Alkareem Alyasseri7,8, Alhamzah Alnoor9

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2661-2689, 2025, DOI:10.32604/cmes.2025.061318 - 03 March 2025

    Abstract The implementation of Countermeasure Techniques (CTs) in the context of Network-On-Chip (NoC) based Multiprocessor System-On-Chip (MPSoC) routers against the Flooding Denial-of-Service Attack (F-DoSA) falls under Multi-Criteria Decision-Making (MCDM) due to the three main concerns, called: traffic variations, multiple evaluation criteria-based traffic features, and prioritization NoC routers as an alternative. In this study, we propose a comprehensive evaluation of various NoC traffic features to identify the most efficient routers under the F-DoSA scenarios. Consequently, an MCDM approach is essential to address these emerging challenges. While the recent MCDM approach has some issues, such as uncertainty, this… More >

  • Open Access

    ARTICLE

    Group Decision-Making Based on GIS and MultiCriteria Analysis for Assessing Land Suitability for Agriculture

    Abdelkader Mendas*, Abdellah Mebrek, Zohra Mekranfar

    Revue Internationale de Géomatique, Vol.33, pp. 383-398, 2024, DOI:10.32604/rig.2024.055321 - 25 September 2024

    Abstract The main purpose of this work is to propose a methodology that considers the multicriteria and multi-actor aspects for assessing land suitability for agriculture. This involves offering a group spatial decision-making approach. The members of a multidisciplinary team can decide on the relative importance of the criteria and the ranking of alternatives. Each member provides his judgment and contributes in a distinct and identifiable manner to find a compromise solution. Twelve criteria (easily available water reserve, cation exchange capacity, electric conductivity, potential of hydrogen (pH), drainage, permeability, active limestone, soil texture, soil useful depth, slopes,… More >

  • Open Access

    ARTICLE

    Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach

    Wajdi Alhakami*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3211-3237, 2024, DOI:10.32604/cmc.2023.043935 - 15 May 2024

    Abstract The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatory mechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes… More >

  • Open Access

    ARTICLE

    Linguistic Knowledge Representation in DPoS Consensus Scheme for Blockchain

    Yixia Chen1,2, Mingwei Lin1,2,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 845-866, 2023, DOI:10.32604/cmc.2023.040970 - 31 October 2023

    Abstract The consensus scheme is an essential component in the real blockchain environment. The Delegated Proof of Stake (DPoS) is a competitive consensus scheme that can decrease energy costs, promote decentralization, and increase efficiency, respectively. However, how to study the knowledge representation of the collective voting information and then select delegates is a new open problem. To ensure the fairness and effectiveness of transactions in the blockchain, in this paper, we propose a novel fine-grained knowledge representation method, which improves the DPoS scheme based on the linguistic term set (LTS) and proportional hesitant fuzzy linguistic term… More >

  • Open Access

    ARTICLE

    Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

    Wenshu Xu, Mingwei Lin*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 199-222, 2023, DOI:10.32604/cmc.2023.041475 - 31 October 2023

    Abstract Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst… More >

Displaying 1-10 on page 1 of 42. Per Page