Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,347)
  • Open Access

    ARTICLE

    State Space Guided Spatio-Temporal Network for Efficient Long-Term Traffic Prediction

    Guangyu Huo, Chang Su, Xiaoyu Zhang*, Xiaohui Cui, Lizhong Zhang

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.072147 - 09 December 2025

    Abstract Long-term traffic flow prediction is a crucial component of intelligent transportation systems within intelligent networks, requiring predictive models that balance accuracy with low-latency and lightweight computation to optimize traffic management and enhance urban mobility and sustainability. However, traditional predictive models struggle to capture long-term temporal dependencies and are computationally intensive, limiting their practicality in real-time. Moreover, many approaches overlook the periodic characteristics inherent in traffic data, further impacting performance. To address these challenges, we introduce ST-MambaGCN, a State-Space-Based Spatio-Temporal Graph Convolution Network. Unlike conventional models, ST-MambaGCN replaces the temporal attention layer with Mamba, a state-space More >

  • Open Access

    ARTICLE

    Smart Contract Vulnerability Detection Based on Symbolic Execution and Graph Neural Networks

    Haoxin Sun1, Xiao Yu1,*, Jiale Li1, Yitong Xu1, Jie Yu1, Huanhuan Li1, Yuanzhang Li2, Yu-An Tan2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-15, 2026, DOI:10.32604/cmc.2025.070930 - 09 December 2025

    Abstract Since the advent of smart contracts, security vulnerabilities have remained a persistent challenge, compromsing both the reliability of contract execution and the overall stability of the virtual currency market. Consequently, the academic community has devoted increasing attention to these security risks. However, conventional approaches to vulnerability detection frequently exhibit limited accuracy. To address this limitation, the present study introduces a novel vulnerability detection framework called GNNSE that integrates symbolic execution with graph neural networks (GNNs). The proposed method first constructs semantic graphs to comprehensively capture the control flow and data flow dependencies within smart contracts. More >

  • Open Access

    ARTICLE

    Optimizing Resource Allocation in Blockchain Networks Using Neural Genetic Algorithm

    Malvinder Singh Bali1, Weiwei Jiang2,*, Saurav Verma3, Kanwalpreet Kour4, Ashwini Rao3

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-19, 2026, DOI:10.32604/cmc.2025.070866 - 09 December 2025

    Abstract In recent years, Blockchain Technology has become a paradigm shift, providing Transparent, Secure, and Decentralized platforms for diverse applications, ranging from Cryptocurrency to supply chain management. Nevertheless, the optimization of blockchain networks remains a critical challenge due to persistent issues such as latency, scalability, and energy consumption. This study proposes an innovative approach to Blockchain network optimization, drawing inspiration from principles of biological evolution and natural selection through evolutionary algorithms. Specifically, we explore the application of genetic algorithms, particle swarm optimization, and related evolutionary techniques to enhance the performance of blockchain networks. The proposed methodologies More >

  • Open Access

    REVIEW

    Toward Robust Deepfake Defense: A Review of Deepfake Detection and Prevention Techniques in Images

    Ahmed Abdel-Wahab1, Mohammad Alkhatib2,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-34, 2026, DOI:10.32604/cmc.2025.070010 - 09 December 2025

    Abstract Deepfake is a sort of fake media made by advanced AI methods like Generative Adversarial Networks (GANs). Deepfake technology has many useful uses in education and entertainment, but it also raises a lot of ethical, social, and security issues, such as identity theft, the dissemination of false information, and privacy violations. This study seeks to provide a comprehensive analysis of several methods for identifying and circumventing Deepfakes, with a particular focus on image-based Deepfakes. There are three main types of detection methods: classical, machine learning (ML) and deep learning (DL)-based, and hybrid methods. There are… More >

  • Open Access

    ARTICLE

    FeatherGuard: A Data-Driven Lightweight Error Protection Scheme for DNN Inference on Edge Devices

    Dong Hyun Lee1, Na Kyung Lee2, Young Seo Lee1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-17, 2026, DOI:10.32604/cmc.2025.069976 - 09 December 2025

    Abstract There has been an increasing emphasis on performing deep neural network (DNN) inference locally on edge devices due to challenges such as network congestion and security concerns. However, as DRAM process technology continues to scale down, the bit-flip errors in the memory of edge devices become more frequent, thereby leading to substantial DNN inference accuracy loss. Though several techniques have been proposed to alleviate the accuracy loss in edge environments, they require complex computations and additional parity bits for error correction, thus resulting in significant performance and storage overheads. In this paper, we propose FeatherGuard,… More >

  • Open Access

    ARTICLE

    A Super-Resolution Generative Adversarial Network for Remote Sensing Images Based on Improved Residual Module and Attention Mechanism

    Yifan Zhang1, Yong Gan2,*, Mengke Tang1, Xinxin Gan3

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-19, 2026, DOI:10.32604/cmc.2025.068880 - 09 December 2025

    Abstract High-resolution remote sensing imagery is essential for critical applications such as precision agriculture, urban management planning, and military reconnaissance. Although significant progress has been made in single-image super-resolution (SISR) using generative adversarial networks (GANs), existing approaches still face challenges in recovering high-frequency details, effectively utilizing features, maintaining structural integrity, and ensuring training stability—particularly when dealing with the complex textures characteristic of remote sensing imagery. To address these limitations, this paper proposes the Improved Residual Module and Attention Mechanism Network (IRMANet), a novel architecture specifically designed for remote sensing image reconstruction. IRMANet builds upon the Super-Resolution… More >

  • Open Access

    ARTICLE

    Artificial Neural Network Model for Thermal Conductivity Estimation of Metal Oxide Water-Based Nanofluids

    Nikhil S. Mane1, Sheetal Kumar Dewangan2,*, Sayantan Mukherjee3, Pradnyavati Mane4, Deepak Kumar Singh1, Ravindra Singh Saluja5

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.072090 - 10 November 2025

    Abstract The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids. Researchers rely on experimental investigations to explore nanofluid properties, as it is a necessary step before their practical application. As these investigations are time and resource-consuming undertakings, an effective prediction model can significantly improve the efficiency of research operations. In this work, an Artificial Neural Network (ANN) model is developed to predict the thermal conductivity of metal oxide water-based nanofluid. For this, a comprehensive set of 691 data points was collected from the literature. This dataset is split More >

  • Open Access

    ARTICLE

    Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks

    Zeeshan Ali Haider1, Inam Ullah2,*, Ahmad Abu Shareha3, Rashid Nasimov4, Sufyan Ali Memon5,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.071042 - 10 November 2025

    Abstract The advent of sixth-generation (6G) networks introduces unprecedented challenges in achieving seamless connectivity, ultra-low latency, and efficient resource management in highly dynamic environments. Although fifth-generation (5G) networks transformed mobile broadband and machine-type communications at massive scales, their properties of scaling, interference management, and latency remain a limitation in dense high mobility settings. To overcome these limitations, artificial intelligence (AI) and unmanned aerial vehicles (UAVs) have emerged as potential solutions to develop versatile, dynamic, and energy-efficient communication systems. The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning (CoRL) to manage an autonomous network.… More >

  • Open Access

    ARTICLE

    FedCW: Client Selection with Adaptive Weight in Heterogeneous Federated Learning

    Haotian Wu1, Jiaming Pei2, Jinhai Li3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069873 - 10 November 2025

    Abstract With the increasing complexity of vehicular networks and the proliferation of connected vehicles, Federated Learning (FL) has emerged as a critical framework for decentralized model training while preserving data privacy. However, efficient client selection and adaptive weight allocation in heterogeneous and non-IID environments remain challenging. To address these issues, we propose Federated Learning with Client Selection and Adaptive Weighting (FedCW), a novel algorithm that leverages adaptive client selection and dynamic weight allocation for optimizing model convergence in real-time vehicular networks. FedCW selects clients based on their Euclidean distance from the global model and dynamically adjusts More >

  • Open Access

    ARTICLE

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    D. Bernal*, O. Ledesma, P. Lamo, J. Bermejo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-39, 2026, DOI:10.32604/cmc.2025.069746 - 10 November 2025

    Abstract This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices,… More >

Displaying 21-30 on page 3 of 1347. Per Page