Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (152)
  • Open Access

    ARTICLE

    High-Dimensional Multi-Objective Computation Offloading for MEC in Serial Isomerism Tasks via Flexible Optimization Framework

    Zheng Yao*, Puqing Chang

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068248 - 10 November 2025

    Abstract As Internet of Things (IoT) applications expand, Mobile Edge Computing (MEC) has emerged as a promising architecture to overcome the real-time processing limitations of mobile devices. Edge-side computation offloading plays a pivotal role in MEC performance but remains challenging due to complex task topologies, conflicting objectives, and limited resources. This paper addresses high-dimensional multi-objective offloading for serial heterogeneous tasks in MEC. We jointly consider task heterogeneity, high-dimensional objectives, and flexible resource scheduling, modeling the problem as a Many-objective optimization. To solve it, we propose a flexible framework integrating an improved cooperative co-evolutionary algorithm based on More >

  • Open Access

    ARTICLE

    An Impact-Aware and Taxonomy-Driven Explainable Machine Learning Framework with Edge Computing for Security in Industrial IoT–Cyber Physical Systems

    Tamara Zhukabayeva1,2, Zulfiqar Ahmad1,3,*, Nurbolat Tasbolatuly4, Makpal Zhartybayeva1, Yerik Mardenov1,4, Nurdaulet Karabayev1,*, Dilaram Baumuratova1,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2573-2599, 2025, DOI:10.32604/cmes.2025.070426 - 26 November 2025

    Abstract The Industrial Internet of Things (IIoT), combined with the Cyber-Physical Systems (CPS), is transforming industrial automation but also poses great cybersecurity threats because of the complexity and connectivity of the systems. There is a lack of explainability, challenges with imbalanced attack classes, and limited consideration of practical edge–cloud deployment strategies in prior works. In the proposed study, we suggest an Impact-Aware Taxonomy-Driven Machine Learning Framework with Edge Deployment and SHapley Additive exPlanations (SHAP)-based Explainable AI (XAI) to attack detection and classification in IIoT-CPS settings. It includes not only unsupervised clustering (K-Means and DBSCAN) to extract… More >

  • Open Access

    ARTICLE

    Priority-Based Scheduling and Orchestration in Edge-Cloud Computing: A Deep Reinforcement Learning-Enhanced Concurrency Control Approach

    Mohammad A Al Khaldy1, Ahmad Nabot2, Ahmad Al-Qerem3,*, Mohammad Alauthman4, Amina Salhi5,*, Suhaila Abuowaida6, Naceur Chihaoui7

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 673-697, 2025, DOI:10.32604/cmes.2025.070004 - 30 October 2025

    Abstract The exponential growth of Internet of Things (IoT) devices has created unprecedented challenges in data processing and resource management for time-critical applications. Traditional cloud computing paradigms cannot meet the stringent latency requirements of modern IoT systems, while pure edge computing faces resource constraints that limit processing capabilities. This paper addresses these challenges by proposing a novel Deep Reinforcement Learning (DRL)-enhanced priority-based scheduling framework for hybrid edge-cloud computing environments. Our approach integrates adaptive priority assignment with a two-level concurrency control protocol that ensures both optimal performance and data consistency. The framework introduces three key innovations: (1)… More >

  • Open Access

    REVIEW

    Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework

    Inam Ullah Khan1, Fida Muhammad Khan1,*, Zeeshan Ali Haider1, Fahad Alturise2,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4307-4344, 2025, DOI:10.32604/cmc.2025.070189 - 23 October 2025

    Abstract The rapid expansion of the Internet of Things (IoT) has introduced significant security challenges due to the scale, complexity, and heterogeneity of interconnected devices. The current traditional centralized security models are deemed irrelevant in dealing with these threats, especially in decentralized applications where the IoT devices may at times operate on minimal resources. The emergence of new technologies, including Artificial Intelligence (AI), blockchain, edge computing, and Zero-Trust-Architecture (ZTA), is offering potential solutions as it helps with additional threat detection, data integrity, and system resilience in real-time. AI offers sophisticated anomaly detection and prediction analytics, and… More >

  • Open Access

    REVIEW

    Federated Learning in Convergence ICT: A Systematic Review on Recent Advancements, Challenges, and Future Directions

    Imran Ahmed1,#, Misbah Ahmad2,3,#, Gwanggil Jeon4,5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4237-4273, 2025, DOI:10.32604/cmc.2025.068319 - 23 October 2025

    Abstract The rapid convergence of Information and Communication Technologies (ICT), driven by advancements in 5G/6G networks, cloud computing, Artificial Intelligence (AI), and the Internet of Things (IoT), is reshaping modern digital ecosystems. As massive, distributed data streams are generated across edge devices and network layers, there is a growing need for intelligent, privacy-preserving AI solutions that can operate efficiently at the network edge. Federated Learning (FL) enables decentralized model training without transferring sensitive data, addressing key challenges around privacy, bandwidth, and latency. Despite its benefits in enhancing efficiency, real-time analytics, and regulatory compliance, FL adoption faces… More >

  • Open Access

    ARTICLE

    VHO Algorithm for Heterogeneous Networks of UAV-Hangar Cluster Based on GA Optimization and Edge Computing

    Siliang Chen1, Dongri Shan2,*, Yansheng Niu3

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5263-5286, 2025, DOI:10.32604/cmc.2025.067892 - 23 October 2025

    Abstract With the increasing deployment of Unmanned Aerial Vehicle-Hangar (UAV-H) clusters in dynamic environments such as disaster response and precision agriculture, existing networking schemes often struggle with adaptability to complex scenarios, while traditional Vertical Handoff (VHO) algorithms fail to fully address the unique challenges of UAV-H systems, including high-speed mobility and limited computational resources. To bridge this gap, this paper proposes a heterogeneous network architecture integrating 5th Generation Mobile Communication Technology (5G) cellular networks and self-organizing mesh networks for UAV-H clusters, accompanied by a novel VHO algorithm. The proposed algorithm leverages Multi-Attribute Decision-Making (MADM) theory combined… More >

  • Open Access

    ARTICLE

    Secure Malicious Node Detection in Decentralized Healthcare Networks Using Cloud and Edge Computing with Blockchain-Enabled Federated Learning

    Raj Sonani1, Reham Alhejaili2,*, Pushpalika Chatterjee3, Khalid Hamad Alnafisah4, Jehad Ali5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3169-3189, 2025, DOI:10.32604/cmes.2025.070225 - 30 September 2025

    Abstract Healthcare networks are transitioning from manual records to electronic health records, but this shift introduces vulnerabilities such as secure communication issues, privacy concerns, and the presence of malicious nodes. Existing machine and deep learning-based anomalies detection methods often rely on centralized training, leading to reduced accuracy and potential privacy breaches. Therefore, this study proposes a Blockchain-based-Federated Learning architecture for Malicious Node Detection (BFL-MND) model. It trains models locally within healthcare clusters, sharing only model updates instead of patient data, preserving privacy and improving accuracy. Cloud and edge computing enhance the model’s scalability, while blockchain ensures More >

  • Open Access

    ARTICLE

    An Online Optimization of Prediction-Enhanced Digital Twin Migration over Edge Computing with Adaptive Information Updating

    Xinyu Yu1, Lucheng Chen2,3, Xingzhi Feng2,4, Xiaoping Lu2,4,*, Yuye Yang1, You Shi5,*

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3231-3252, 2025, DOI:10.32604/cmc.2025.066975 - 23 September 2025

    Abstract This paper investigates mobility-aware online optimization for digital twin (DT)-assisted task execution in edge computing environments. In such systems, DTs, hosted on edge servers (ESs), require proactive migration to maintain proximity to their mobile physical twin (PT) counterparts. To minimize task response latency under a stringent energy consumption constraint, we jointly optimize three key components: the status data uploading frequency from the PT, the DT migration decisions, and the allocation of computational and communication resources. To address the asynchronous nature of these decisions, we propose a novel two-timescale mobility-aware online optimization (TMO) framework. The TMO… More >

  • Open Access

    ARTICLE

    FedEPC: An Efficient and Privacy-Enhancing Clustering Federated Learning Method for Sensing-Computing Fusion Scenarios

    Ning Tang1,2, Wang Luo1,2,*, Yiwei Wang1,2, Bao Feng1,2, Shuang Yang1,2, Jiangtao Xu3, Daohua Zhu3, Zhechen Huang3, Wei Liang3

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 4091-4113, 2025, DOI:10.32604/cmc.2025.066241 - 23 September 2025

    Abstract With the deep integration of edge computing, 5G and Artificial Intelligence of Things (AIoT) technologies, the large-scale deployment of intelligent terminal devices has given rise to data silos and privacy security challenges in sensing-computing fusion scenarios. Traditional federated learning (FL) algorithms face significant limitations in practical applications due to client drift, model bias, and resource constraints under non-independent and identically distributed (Non-IID) data, as well as the computational overhead and utility loss caused by privacy-preserving techniques. To address these issues, this paper proposes an Efficient and Privacy-enhancing Clustering Federated Learning method (FedEPC). This method introduces… More >

  • Open Access

    ARTICLE

    Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning

    Fatima Asiri1, Wajdan Al Malwi1, Fahad Masood2, Mohammed S. Alshehri3, Tamara Zhukabayeva4, Syed Aziz Shah5, Jawad Ahmad6,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3943-3960, 2025, DOI:10.32604/cmc.2025.066498 - 03 July 2025

    Abstract Edge computing (EC) combined with the Internet of Things (IoT) provides a scalable and efficient solution for smart homes. The rapid proliferation of IoT devices poses real-time data processing and security challenges. EC has become a transformative paradigm for addressing these challenges, particularly in intrusion detection and anomaly mitigation. The widespread connectivity of IoT edge networks has exposed them to various security threats, necessitating robust strategies to detect malicious activities. This research presents a privacy-preserving federated anomaly detection framework combined with Bayesian game theory (BGT) and double deep Q-learning (DDQL). The proposed framework integrates BGT… More >

Displaying 11-20 on page 2 of 152. Per Page