Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Quantum-Inspired Optimization Algorithm for 3D Multi-Objective Base-Station Deployment in Next-Generation 5G/6G Wireless Network

    Yao-Hsin Chou1, Cheng-Yen Hua1, Ru-Wei Tseng1, Shu-Yu Kuo2,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2025.075705 - 12 March 2026

    Abstract The rapid growth of mobile and Internet of Things (IoT) applications in dense urban environments places stringent demands on future Beyond 5G (B5G) or Beyond 6G (B6G) networks, which must ensure high Quality of Service (QoS) while maintaining cost-efficiency and sustainable deployment. Traditional strategies struggle with complex 3D propagation, building penetration loss, and the balance between coverage and infrastructure cost. To address this challenge, this study presents the first application of a Global-best Guided Quantum-inspired Tabu Search with Quantum-Not Gate (GQTS-QNG) framework for 3D base-station deployment optimization. The problem is formulated as a multi-objective model… More >

  • Open Access

    ARTICLE

    Interior Point Method-Assisted Differential Evolution for Expensive Optimization of Secondary Source Deployment

    Chao Wu1, Weijian Kong2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.2, 2026, DOI:10.32604/cmes.2026.077613 - 26 February 2026

    Abstract In active noise control, the optimal deployment of secondary sources is a critical factor influencing the noise reduction performance due to the spatial inhomogeneity of the sound field. Traditional methods, which rely on finite element analysis to model the sound field, are accurate but computationally intensive, leading to high costs in solving the deployment optimization problem. To address this issue, this paper proposes an expensive optimization method for secondary source deployment based on Interior Point Method-assisted Differential Evolution with Weibull distribution (IPMDEW). During the optimization process, a Kriging model is employed to construct a response… More >

  • Open Access

    ARTICLE

    Engine Failure Prediction on Large-Scale CMAPSS Data Using Hybrid Feature Selection and Imbalance-Aware Learning

    Ahmad Junaid1, Abid Iqbal2,*, Abuzar Khan1, Ghassan Husnain1,*, Abdul-Rahim Ahmad3, Mohammed Al-Naeem4

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073189 - 10 February 2026

    Abstract Most predictive maintenance studies have emphasized accuracy but provide very little focus on Interpretability or deployment readiness. This study improves on prior methods by developing a small yet robust system that can predict when turbofan engines will fail. It uses the NASA CMAPSS dataset, which has over 200,000 engine cycles from 260 engines. The process begins with systematic preprocessing, which includes imputation, outlier removal, scaling, and labelling of the remaining useful life. Dimensionality is reduced using a hybrid selection method that combines variance filtering, recursive elimination, and gradient-boosted importance scores, yielding a stable set of… More >

  • Open Access

    ARTICLE

    A Virtual Probe Deployment Method Based on User Behavioral Feature Analysis

    Bing Zhang, Wenqi Shi*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-19, 2026, DOI:10.32604/cmc.2025.067470 - 09 December 2025

    Abstract To address the challenge of low survival rates and limited data collection efficiency in current virtual probe deployments, which results from anomaly detection mechanisms in location-based service (LBS) applications, this paper proposes a novel virtual probe deployment method based on user behavioral feature analysis. The core idea is to circumvent LBS anomaly detection by mimicking real-user behavior patterns. First, we design an automated data extraction algorithm that recognizes graphical user interface (GUI) elements to collect spatio-temporal behavior data. Then, by analyzing the automatically collected user data, we identify normal users’ spatio-temporal patterns and extract their… More >

  • Open Access

    ARTICLE

    The Research on Low-Light Autonomous Driving Object Detection Method

    Jianhua Yang*, Zhiwei Lv, Changling Huo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068442 - 10 November 2025

    Abstract Aiming at the scale adaptation of automatic driving target detection algorithms in low illumination environments and the shortcomings in target occlusion processing, this paper proposes a YOLO-LKSDS automatic driving detection model. Firstly, the Contrast-Limited Adaptive Histogram Equalisation (CLAHE) image enhancement algorithm is improved to increase the image contrast and enhance the detailed features of the target; then, on the basis of the YOLOv5 model, the Kmeans++ clustering algorithm is introduced to obtain a suitable anchor frame, and SPPELAN spatial pyramid pooling is improved to enhance the accuracy and robustness of the model for multi-scale target… More >

  • Open Access

    ARTICLE

    Optimized Deployment Method for Finite Access Points Based on Virtual Force Fusion Bat Algorithm

    Jian Li1,*, Qing Zhang2, Tong Yang2, Yu’an Chen2, Yongzhong Zhan3

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3029-3051, 2025, DOI:10.32604/cmes.2025.068644 - 30 September 2025

    Abstract In the deployment of wireless networks in two-dimensional outdoor campus spaces, aiming at the problem of efficient coverage of the monitoring area by limited number of access points (APs), this paper proposes a deployment method of multi-objective optimization with virtual force fusion bat algorithm (VFBA) using the classical four-node regular distribution as an entry point. The introduction of Lévy flight strategy for bat position updating helps to maintain the population diversity, reduce the premature maturity problem caused by population convergence, avoid the over aggregation of individuals in the local optimal region, and enhance the superiority… More >

  • Open Access

    ARTICLE

    IECC-SAIN: Innovative ECC-Based Approach for Secure Authentication in IoT Networks

    Younes Lahraoui1, Jihane Jebrane2, Youssef Amal1, Saiida Lazaar1, Cheng-Chi Lee3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.1, pp. 615-641, 2025, DOI:10.32604/cmes.2025.067778 - 31 July 2025

    Abstract Due to their resource constraints, Internet of Things (IoT) devices require authentication mechanisms that are both secure and efficient. Elliptic curve cryptography (ECC) meets these needs by providing strong security with shorter key lengths, which significantly reduces the computational overhead required for authentication algorithms. This paper introduces a novel ECC-based IoT authentication system utilizing our previously proposed efficient mapping and reverse mapping operations on elliptic curves over prime fields. By reducing reliance on costly point multiplication, the proposed algorithm significantly improves execution time, storage requirements, and communication cost across varying security levels. The proposed authentication… More >

  • Open Access

    ARTICLE

    Enhanced Practical Byzantine Fault Tolerance for Service Function Chain Deployment: Advancing Big Data Intelligence in Control Systems

    Peiying Zhang1,2,*, Yihong Yu1,2, Jing Liu3, Chong Lv1,2, Lizhuang Tan4,5, Yulin Zhang6,7,8

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4393-4409, 2025, DOI:10.32604/cmc.2025.064654 - 19 May 2025

    Abstract As Internet of Things (IoT) technologies continue to evolve at an unprecedented pace, intelligent big data control and information systems have become critical enablers for organizational digital transformation, facilitating data-driven decision making, fostering innovation ecosystems, and maintaining operational stability. In this study, we propose an advanced deployment algorithm for Service Function Chaining (SFC) that leverages an enhanced Practical Byzantine Fault Tolerance (PBFT) mechanism. The main goal is to tackle the issues of security and resource efficiency in SFC implementation across diverse network settings. By integrating blockchain technology and Deep Reinforcement Learning (DRL), our algorithm not… More >

  • Open Access

    ARTICLE

    Priority-Aware Resource Allocation for VNF Deployment in Service Function Chains Based on Graph Reinforcement Learning

    Seyha Ros1,#, Seungwoo Kang1,#, Taikuong Iv1, Inseok Song1, Prohim Tam2, Seokhoon Kim1,3,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1649-1665, 2025, DOI:10.32604/cmc.2025.062716 - 16 April 2025

    Abstract Recently, Network Functions Virtualization (NFV) has become a critical resource for optimizing capability utilization in the 5G/B5G era. NFV decomposes the network resource paradigm, demonstrating the efficient utilization of Network Functions (NFs) to enable configurable service priorities and resource demands. Telecommunications Service Providers (TSPs) face challenges in network utilization, as the vast amounts of data generated by the Internet of Things (IoT) overwhelm existing infrastructures. IoT applications, which generate massive volumes of diverse data and require real-time communication, contribute to bottlenecks and congestion. In this context, Multi-access Edge Computing (MEC) is employed to support resource… More >

  • Open Access

    REVIEW

    A Literature Review on Model Conversion, Inference, and Learning Strategies in EdgeML with TinyML Deployment

    Muhammad Arif1,*, Muhammad Rashid2

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 13-64, 2025, DOI:10.32604/cmc.2025.062819 - 26 March 2025

    Abstract Edge Machine Learning (EdgeML) and Tiny Machine Learning (TinyML) are fast-growing fields that bring machine learning to resource-constrained devices, allowing real-time data processing and decision-making at the network’s edge. However, the complexity of model conversion techniques, diverse inference mechanisms, and varied learning strategies make designing and deploying these models challenging. Additionally, deploying TinyML models on resource-constrained hardware with specific software frameworks has broadened EdgeML’s applications across various sectors. These factors underscore the necessity for a comprehensive literature review, as current reviews do not systematically encompass the most recent findings on these topics. Consequently, it provides… More >

Displaying 1-10 on page 1 of 45. Per Page