Home / Journals / CMC / Vol.86, No.1, 2026
Special Issues
Table of Content
cover

On the Cover

This paper presents an AI-enabled UAV system for optimizing user connectivity in 6G networks using cooperative reinforcement learning (CoRL). The proposed framework allows UAVs to autonomously adjust their positions, power, and resources while collaborating with neighboring UAVs. Simulations demonstrate enhanced user coverage, reduced latency, improved energy efficiency, and scalability, making it ideal for large-scale 6G deployments in dynamic environments.
The cover image was created with AI-generated content via Google Gemini, and it contains no copyrighted elements or misleading representations.
View this paper

  • Open AccessOpen Access

    REVIEW

    Deep Learning-Enhanced Human Sensing with Channel State Information: A Survey

    Binglei Yue, Aili Jiang, Chun Yang, Junwei Lei, Heng Liu, Yin Zhang*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-28, 2026, DOI:10.32604/cmc.2025.071047 - 10 November 2025
    Abstract With the growing advancement of wireless communication technologies, WiFi-based human sensing has gained increasing attention as a non-intrusive and device-free solution. Among the available signal types, Channel State Information (CSI) offers fine-grained temporal, frequency, and spatial insights into multipath propagation, making it a crucial data source for human-centric sensing. Recently, the integration of deep learning has significantly improved the robustness and automation of feature extraction from CSI in complex environments. This paper provides a comprehensive review of deep learning-enhanced human sensing based on CSI. We first outline mainstream CSI acquisition tools and their hardware specifications, More >

  • Open AccessOpen Access

    REVIEW

    Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity

    Md Shohel Rana1,2,3,4,*, Tonmoy Ghosh3, Mohammad Nur Nobi5, Anichur Rahman1,6,*, Andrew H. Sung4
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-38, 2026, DOI:10.32604/cmc.2025.069212 - 10 November 2025
    Abstract Zero-click attacks represent an advanced cybersecurity threat, capable of compromising devices without user interaction. High-profile examples such as Pegasus, Simjacker, Bluebugging, and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access, exfiltrate data, and enable long-term surveillance. Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging. This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework, a widely adopted standard for modeling adversarial behavior. Through this mapping, we categorize real-world attack vectors and better understand how… More >

  • Open AccessOpen Access

    REVIEW

    Machine Intelligence for Mental Health Diagnosis: A Systematic Review of Methods, Algorithms, and Key Challenges

    Ravita Chahar, Ashutosh Kumar Dubey*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-65, 2026, DOI:10.32604/cmc.2025.066990 - 10 November 2025
    (This article belongs to the Special Issue: Advanced Medical Imaging Techniques Using Generative Artificial Intelligence)
    Abstract Objective: The increasing global prevalence of mental health disorders highlights the urgent need for the development of innovative diagnostic methods. Conditions such as anxiety, depression, stress, bipolar disorder (BD), and autism spectrum disorder (ASD) frequently arise from the complex interplay of demographic, biological, and socioeconomic factors, resulting in aggravated symptoms. This review investigates machine intelligence approaches for the early detection and prediction of mental health conditions. Methods: The preferred reporting items for systematic reviews and meta-analyses (PRISMA) framework was employed to conduct a systematic review and analysis covering the period 2018 to 2025. The potential… More >

  • Open AccessOpen Access

    REVIEW

    Deep Learning for Brain Tumor Segmentation and Classification: A Systematic Review of Methods and Trends

    Ameer Hamza, Robertas Damaševičius*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-41, 2026, DOI:10.32604/cmc.2025.069721 - 10 November 2025
    (This article belongs to the Special Issue: Emerging Trends and Applications of Deep Learning for Biomedical Signal and Image Processing)
    Abstract This systematic review aims to comprehensively examine and compare deep learning methods for brain tumor segmentation and classification using MRI and other imaging modalities, focusing on recent trends from 2022 to 2025. The primary objective is to evaluate methodological advancements, model performance, dataset usage, and existing challenges in developing clinically robust AI systems. We included peer-reviewed journal articles and high-impact conference papers published between 2022 and 2025, written in English, that proposed or evaluated deep learning methods for brain tumor segmentation and/or classification. Excluded were non-open-access publications, books, and non-English articles. A structured search was… More >

  • Open AccessOpen Access

    REVIEW

    AI Agents in Finance and Fintech: A Scientific Review of Agent-Based Systems, Applications, and Future Horizons

    Maryan Rizinski1,2,*, Dimitar Trajanov1,2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-34, 2026, DOI:10.32604/cmc.2025.069678 - 10 November 2025
    (This article belongs to the Special Issue: Artificial Intelligence Algorithms and Applications, 2nd Edition)
    Abstract Artificial intelligence (AI) is reshaping financial systems and services, as intelligent AI agents increasingly form the foundation of autonomous, goal-driven systems capable of reasoning, learning, and action. This review synthesizes recent research and developments in the application of AI agents across core financial domains. Specifically, it covers the deployment of agent-based AI in algorithmic trading, fraud detection, credit risk assessment, robo-advisory, and regulatory compliance (RegTech). The review focuses on advanced agent-based methodologies, including reinforcement learning, multi-agent systems, and autonomous decision-making frameworks, particularly those leveraging large language models (LLMs), contrasting these with traditional AI or purely… More >

  • Open AccessOpen Access

    REVIEW

    Detecting Anomalies in FinTech: A Graph Neural Network and Feature Selection Perspective

    Vinh Truong Hoang1,*, Nghia Dinh1, Viet-Tuan Le1, Kiet Tran-Trung1, Bay Nguyen Van1, Kittikhun Meethongjan2,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-40, 2026, DOI:10.32604/cmc.2025.068733 - 10 November 2025
    (This article belongs to the Special Issue: Advanced Algorithms for Feature Selection in Machine Learning)
    Abstract The Financial Technology (FinTech) sector has witnessed rapid growth, resulting in increasingly complex and high-volume digital transactions. Although this expansion improves efficiency and accessibility, it also introduces significant vulnerabilities, including fraud, money laundering, and market manipulation. Traditional anomaly detection techniques often fail to capture the relational and dynamic characteristics of financial data. Graph Neural Networks (GNNs), capable of modeling intricate interdependencies among entities, have emerged as a powerful framework for detecting subtle and sophisticated anomalies. However, the high-dimensionality and inherent noise of FinTech datasets demand robust feature selection strategies to improve model scalability, performance, and More >

  • Open AccessOpen Access

    ARTICLE

    Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments

    Yeasul Kim1, Chaeeun Won1, Hwankuk Kim2,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-28, 2026, DOI:10.32604/cmc.2025.069608 - 10 November 2025
    (This article belongs to the Special Issue: Intelligence and Security Enhancement for Internet of Things)
    Abstract With the increasing emphasis on personal information protection, encryption through security protocols has emerged as a critical requirement in data transmission and reception processes. Nevertheless, IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices, spanning a range of devices from non-encrypted ones to fully encrypted ones. Given the limited visibility into payloads in this context, this study investigates AI-based attack detection methods that leverage encrypted traffic metadata, eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices. Using the UNSW-NB15 and CICIoT-2023 dataset, encrypted and… More >

  • Open AccessOpen Access

    ARTICLE

    Motion In-Betweening via Frequency-Domain Diffusion Model

    Qiang Zhang1, Shuo Feng1, Shanxiong Chen2, Teng Wan1, Ying Qi1,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.068247 - 10 November 2025
    Abstract Human motion modeling is a core technology in computer animation, game development, and human-computer interaction. In particular, generating natural and coherent in-between motion using only the initial and terminal frames remains a fundamental yet unresolved challenge. Existing methods typically rely on dense keyframe inputs or complex prior structures, making it difficult to balance motion quality and plausibility under conditions such as sparse constraints, long-term dependencies, and diverse motion styles. To address this, we propose a motion generation framework based on a frequency-domain diffusion model, which aims to better model complex motion distributions and enhance generation… More >

  • Open AccessOpen Access

    ARTICLE

    Compatible Remediation for Vulnerabilities in the Presence and Absence of Security Patches

    Xiaohu Song1, Zhiliang Zhu2,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.068930 - 10 November 2025
    Abstract Vulnerabilities are a known problem in modern Open Source Software (OSS). Most developers often rely on third-party libraries to accelerate feature implementation. However, these libraries may contain vulnerabilities that attackers can exploit to propagate malicious code, posing security risks to dependent projects. Existing research addresses these challenges through Software Composition Analysis (SCA) for vulnerability detection and remediation. Nevertheless, current solutions may introduce additional issues, such as incompatibilities, dependency conflicts, and additional vulnerabilities. To address this, we propose Vulnerability Scan and Protection (), a robust solution for detection and remediation vulnerabilities in Java projects. Specifically, builds… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Neural Network Model for Thermal Conductivity Estimation of Metal Oxide Water-Based Nanofluids

    Nikhil S. Mane1, Sheetal Kumar Dewangan2,*, Sayantan Mukherjee3, Pradnyavati Mane4, Deepak Kumar Singh1, Ravindra Singh Saluja5
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.072090 - 10 November 2025
    (This article belongs to the Special Issue: Applications of Neural Networks in Materials)
    Abstract The thermal conductivity of nanofluids is an important property that influences the heat transfer capabilities of nanofluids. Researchers rely on experimental investigations to explore nanofluid properties, as it is a necessary step before their practical application. As these investigations are time and resource-consuming undertakings, an effective prediction model can significantly improve the efficiency of research operations. In this work, an Artificial Neural Network (ANN) model is developed to predict the thermal conductivity of metal oxide water-based nanofluid. For this, a comprehensive set of 691 data points was collected from the literature. This dataset is split More >

  • Open AccessOpen Access

    ARTICLE

    Coupled Effects of Single-Vacancy Defect Positions on the Mechanical Properties and Electronic Structure of Aluminum Crystals

    Binchang Ma1, Xinhai Yu2, Gang Huang3,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.071320 - 10 November 2025
    Abstract Vacancy defects, as fundamental disruptions in metallic lattices, play an important role in shaping the mechanical and electronic properties of aluminum crystals. However, the influence of vacancy position under coupled thermomechanical fields remains insufficiently understood. In this study, transmission and scanning electron microscopy were employed to observe dislocation structures and grain boundary heterogeneities in processed aluminum alloys, suggesting stress concentrations and microstructural inhomogeneities associated with vacancy accumulation. To complement these observations, first-principles calculations and molecular dynamics simulations were conducted for seven single-vacancy configurations in face-centered cubic aluminum. The stress response, total energy, density of states More >

  • Open AccessOpen Access

    ARTICLE

    First-Principles Study on the Mechanical and Thermodynamic Properties of (NbZrHfTi)C High-Entropy Ceramics

    Yonggang Tong1,*, Kai Yang1, Pengfei Li1, Yongle Hu1, Xiubing Liang2,*, Jian Liu3, Yejun Li4, Jingzhong Fang1
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.071890 - 10 November 2025
    (This article belongs to the Special Issue: Computational Analysis of Micro-Nano Material Mechanics and Manufacturing)
    Abstract (NbZrHfTi)C high-entropy ceramics, as an emerging class of ultra-high-temperature materials, have garnered significant interest due to their unique multi-principal-element crystal structure and exceptional high-temperature properties. This study systematically investigates the mechanical properties of (NbZrHfTi)C high-entropy ceramics by employing first-principles density functional theory, combined with the Debye-Grüneisen model, to explore the variations in their thermophysical properties with temperature (0–2000 K) and pressure (0–30 GPa). Thermodynamically, the calculated mixing enthalpy and Gibbs free energy confirm the feasibility of forming a stable single-phase solid solution in (NbZrHfTi)C. The calculated results of the elastic stiffness constant indicate that the… More >

  • Open AccessOpen Access

    ARTICLE

    Mechanisms of Pore-Grain Boundary Interactions Influencing Nanoindentation Behavior in Pure Nickel: A Molecular Dynamics Study

    Chen-Xi Hu1, Wu-Gui Jiang1,*, Jin Wang1, Tian-Yu He2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.068655 - 10 November 2025
    (This article belongs to the Special Issue: Computational Analysis of Micro-Nano Material Mechanics and Manufacturing)
    Abstract THE mechanical response and deformation mechanisms of pure nickel under nanoindentation were systematically investigated using molecular dynamics (MD) simulations, with a particular focus on the novel interplay between crystallographic orientation, grain boundary (GB) proximity, and pore characteristics (size/location). This study compares single-crystal nickel models along [100], [110], and [111] orientations with equiaxed polycrystalline models containing 0, 1, and 2.5 nm pores in surface and subsurface configurations. Our results reveal that crystallographic anisotropy manifests as a 24.4% higher elastic modulus and 22.2% greater hardness in [111]-oriented single crystals compared to [100]. Pore-GB synergistic effects are found More >

  • Open AccessOpen Access

    ARTICLE

    Individual Software Expertise Formalization and Assessment from Project Management Tool Databases

    Traian-Radu Ploscă1,*, Alexandru-Mihai Pescaru2, Bianca-Valeria Rus1, Daniel-Ioan Curiac1,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069707 - 10 November 2025
    (This article belongs to the Special Issue: Emerging Machine Learning Methods and Applications)
    Abstract Objective expertise evaluation of individuals, as a prerequisite stage for team formation, has been a long-term desideratum in large software development companies. With the rapid advancements in machine learning methods, based on reliable existing data stored in project management tools’ datasets, automating this evaluation process becomes a natural step forward. In this context, our approach focuses on quantifying software developer expertise by using metadata from the task-tracking systems. For this, we mathematically formalize two categories of expertise: technology-specific expertise, which denotes the skills required for a particular technology, and general expertise, which encapsulates overall knowledge More >

  • Open AccessOpen Access

    ARTICLE

    Multiaxial Fatigue Life Prediction of Metallic Specimens Using Deep Learning Algorithms

    Jing Yang1, Zhiming Liu1,*, Xingchao Li2, Zhongyao Wang3, Beitong Li1, Kaiyang Liu1, Wang Long4
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068353 - 10 November 2025
    Abstract Accurately predicting fatigue life under multiaxial fatigue damage conditions is essential for ensuring the safety of critical components in service. However, due to the complexity of fatigue failure mechanisms, achieving accurate multiaxial fatigue life predictions remains challenging. Traditional multiaxial fatigue prediction models are often limited by specific material properties and loading conditions, making it difficult to maintain reliable life prediction results beyond these constraints. This paper presents a study on the impact of seven key feature quantities on multiaxial fatigue life, using Convolutional Neural Networks (CNN), Long Short-Term Memory Networks (LSTM), and Fully Connected Neural… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimal Right-Turn Coordination System for Connected and Automated Vehicles at Urban Intersections

    Mahmudul Hasan1, Shuji Doman1, A. S. M. Bakibillah2, Md Abdus Samad Kamal1,*, Kou Yamada1
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-17, 2026, DOI:10.32604/cmc.2025.070222 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Vehicular Ad-Hoc Networks (VANETs) for Intelligent Transportation Systems)
    Abstract Traffic at urban intersections frequently encounters unexpected obstructions, resulting in congestion due to uncooperative and priority-based driving behavior. This paper presents an optimal right-turn coordination system for Connected and Automated Vehicles (CAVs) at single-lane intersections, particularly in the context of left-hand side driving on roads. The goal is to facilitate smooth right turns for certain vehicles without creating bottlenecks. We consider that all approaching vehicles share relevant information through vehicular communications. The Intersection Coordination Unit (ICU) processes this information and communicates the optimal crossing or turning times to the vehicles. The primary objective of this… More >

  • Open AccessOpen Access

    ARTICLE

    Recurrent MAPPO for Joint UAV Trajectory and Traffic Offloading in Space-Air-Ground Integrated Networks

    Zheyuan Jia, Fenglin Jin*, Jun Xie, Yuan He
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.069128 - 10 November 2025
    Abstract This paper investigates the traffic offloading optimization challenge in Space-Air-Ground Integrated Networks (SAGIN) through a novel Recursive Multi-Agent Proximal Policy Optimization (RMAPPO) algorithm. The exponential growth of mobile devices and data traffic has substantially increased network congestion, particularly in urban areas and regions with limited terrestrial infrastructure. Our approach jointly optimizes unmanned aerial vehicle (UAV) trajectories and satellite-assisted offloading strategies to simultaneously maximize data throughput, minimize energy consumption, and maintain equitable resource distribution. The proposed RMAPPO framework incorporates recurrent neural networks (RNNs) to model temporal dependencies in UAV mobility patterns and utilizes a decentralized multi-agent More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid AI-IoT Framework with Digital Twin Integration for Predictive Urban Infrastructure Management in Smart Cities

    Abdullah Alourani1, Mehtab Alam2,*, Ashraf Ali3, Ihtiram Raza Khan4, Chandra Kanta Samal2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-32, 2026, DOI:10.32604/cmc.2025.070161 - 10 November 2025
    (This article belongs to the Special Issue: Empowered Connected Futures of AI, IoT, and Cloud Computing in the Development of Cognitive Cities)
    Abstract The evolution of cities into digitally managed environments requires computational systems that can operate in real time while supporting predictive and adaptive infrastructure management. Earlier approaches have often advanced one dimension—such as Internet of Things (IoT)-based data acquisition, Artificial Intelligence (AI)-driven analytics, or digital twin visualization—without fully integrating these strands into a single operational loop. As a result, many existing solutions encounter bottlenecks in responsiveness, interoperability, and scalability, while also leaving concerns about data privacy unresolved. This research introduces a hybrid AI–IoT–Digital Twin framework that combines continuous sensing, distributed intelligence, and simulation-based decision support. The… More >

  • Open AccessOpen Access

    ARTICLE

    CAPGen: An MLLM-Based Framework Integrated with Iterative Optimization Mechanism for Cultural Artifacts Poster Generation

    Qianqian Hu, Chuhan Li, Mohan Zhang, Fang Liu*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-17, 2026, DOI:10.32604/cmc.2025.068225 - 10 November 2025
    Abstract Due to the digital transformation tendency among cultural institutions and the substantial influence of the social media platform, the demands of visual communication keep increasing for promoting traditional cultural artifacts online. As an effective medium, posters serve to attract public attention and facilitate broader engagement with cultural artifacts. However, existing poster generation methods mainly rely on fixed templates and manual design, which limits their scalability and adaptability to the diverse visual and semantic features of the artifacts. Therefore, we propose CAPGen, an automated aesthetic Cultural Artifacts Poster Generation framework built on a Multimodal Large Language More >

  • Open AccessOpen Access

    ARTICLE

    SwinHCAD: A Robust Multi-Modality Segmentation Model for Brain Tumors Using Transformer and Channel-Wise Attention

    Seyong Jin1, Muhammad Fayaz2, L. Minh Dang3, Hyoung-Kyu Song3, Hyeonjoon Moon2,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.070667 - 10 November 2025
    (This article belongs to the Special Issue: New Trends in Image Processing)
    Abstract Brain tumors require precise segmentation for diagnosis and treatment plans due to their complex morphology and heterogeneous characteristics. While MRI-based automatic brain tumor segmentation technology reduces the burden on medical staff and provides quantitative information, existing methodologies and recent models still struggle to accurately capture and classify the fine boundaries and diverse morphologies of tumors. In order to address these challenges and maximize the performance of brain tumor segmentation, this research introduces a novel SwinUNETR-based model by integrating a new decoder block, the Hierarchical Channel-wise Attention Decoder (HCAD), into a powerful SwinUNETR encoder. The HCAD… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks

    Zeeshan Ali Haider1, Inam Ullah2,*, Ahmad Abu Shareha3, Rashid Nasimov4, Sufyan Ali Memon5,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.071042 - 10 November 2025
    (This article belongs to the Special Issue: Integrating Generative AI with UAVs for Autonomous Navigation and Decision Making)
    Abstract The advent of sixth-generation (6G) networks introduces unprecedented challenges in achieving seamless connectivity, ultra-low latency, and efficient resource management in highly dynamic environments. Although fifth-generation (5G) networks transformed mobile broadband and machine-type communications at massive scales, their properties of scaling, interference management, and latency remain a limitation in dense high mobility settings. To overcome these limitations, artificial intelligence (AI) and unmanned aerial vehicles (UAVs) have emerged as potential solutions to develop versatile, dynamic, and energy-efficient communication systems. The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning (CoRL) to manage an autonomous network.… More >

  • Open AccessOpen Access

    ARTICLE

    A Blockchain-Based Efficient Verification Scheme for Context Semantic-Aware Ciphertext Retrieval

    Haochen Bao1, Lingyun Yuan1,2,*, Tianyu Xie1,2, Han Chen1, Hui Dai1
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-30, 2026, DOI:10.32604/cmc.2025.069240 - 10 November 2025
    Abstract In the age of big data, ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge. Traditional searchable encryption schemes face difficulties in handling complex semantic queries. Additionally, they typically rely on honest but curious cloud servers, which introduces the risk of repudiation. Furthermore, the combined operations of search and verification increase system load, thereby reducing performance. Traditional verification mechanisms, which rely on complex hash constructions, suffer from low verification efficiency. To address these challenges, this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification. Building on existing… More >

  • Open AccessOpen Access

    ARTICLE

    Siphon-Based Divide-and-Conquer Policy for Enforcing Liveness on Petri Net Models of FMS Suffering from Deadlocks or Livelocks

    Murat Uzam1, Bernard Berthomieu2, Wei Wei3,*, Yufeng Chen3, Mohammed El-Meligy4,5, Mohamed Abdel Fattah Sharaf 6
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-30, 2026, DOI:10.32604/cmc.2025.069502 - 10 November 2025
    Abstract A novel siphon-based divide-and-conquer (SbDaC) policy is presented in this paper for the synthesis of Petri net (PN) based liveness-enforcing supervisors (LES) for flexible manufacturing systems (FMS) prone to deadlocks or livelocks. The proposed method takes an uncontrolled and bounded PN model (UPNM) of the FMS. Firstly, the reduced PNM (RPNM) is obtained from the UPNM by using PN reduction rules to reduce the computation burden. Then, the set of strict minimal siphons (SMSs) of the RPNM is computed. Next, the complementary set of SMSs is computed from the set of SMSs. By the union… More >

  • Open AccessOpen Access

    ARTICLE

    Graph-Based Intrusion Detection with Explainable Edge Classification Learning

    Jaeho Shin1, Jaekwang Kim2,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.068767 - 10 November 2025
    (This article belongs to the Special Issue: Advances in Machine Learning and Artificial Intelligence for Intrusion Detection Systems)
    Abstract Network attacks have become a critical issue in the internet security domain. Artificial intelligence technology-based detection methodologies have attracted attention; however, recent studies have struggled to adapt to changing attack patterns and complex network environments. In addition, it is difficult to explain the detection results logically using artificial intelligence. We propose a method for classifying network attacks using graph models to explain the detection results. First, we reconstruct the network packet data into a graphical structure. We then use a graph model to predict network attacks using edge classification. To explain the prediction results, we… More >

  • Open AccessOpen Access

    ARTICLE

    A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix

    Hongyu Zhao1,2, Shengsheng Wang1,2,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.068426 - 10 November 2025
    Abstract Driven by advancements in mobile internet technology, images have become a crucial data medium. Ensuring the security of image information during transmission has thus emerged as an urgent challenge. This study proposes a novel image encryption algorithm specifically designed for grayscale image security. This research introduces a new Cantor diagonal matrix permutation method. The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix, where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice (CML). The high initial value sensitivity of the… More >

  • Open AccessOpen Access

    ARTICLE

    An Integrated Approach to Condition-Based Maintenance Decision-Making of Planetary Gearboxes: Combining Temporal Convolutional Network Auto Encoders with Wiener Process

    Bo Zhu1,#, Enzhi Dong1,#, Zhonghua Cheng1,*, Xianbiao Zhan2, Kexin Jiang1, Rongcai Wang 3
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.069194 - 10 November 2025
    Abstract With the increasing complexity of industrial automation, planetary gearboxes play a vital role in large-scale equipment transmission systems, directly impacting operational efficiency and safety. Traditional maintenance strategies often struggle to accurately predict the degradation process of equipment, leading to excessive maintenance costs or potential failure risks. However, existing prediction methods based on statistical models are difficult to adapt to nonlinear degradation processes. To address these challenges, this study proposes a novel condition-based maintenance framework for planetary gearboxes. A comprehensive full-lifecycle degradation experiment was conducted to collect raw vibration signals, which were then processed using a… More >

  • Open AccessOpen Access

    ARTICLE

    MewCDNet: A Wavelet-Based Multi-Scale Interaction Network for Efficient Remote Sensing Building Change Detection

    Jia Liu1, Hao Chen1, Hang Gu1, Yushan Pan2,3, Haoran Chen1, Erlin Tian4, Min Huang4, Zuhe Li1,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-24, 2026, DOI:10.32604/cmc.2025.068162 - 10 November 2025
    Abstract Accurate and efficient detection of building changes in remote sensing imagery is crucial for urban planning, disaster emergency response, and resource management. However, existing methods face challenges such as spectral similarity between buildings and backgrounds, sensor variations, and insufficient computational efficiency. To address these challenges, this paper proposes a novel Multi-scale Efficient Wavelet-based Change Detection Network (MewCDNet), which integrates the advantages of Convolutional Neural Networks and Transformers, balances computational costs, and achieves high-performance building change detection. The network employs EfficientNet-B4 as the backbone for hierarchical feature extraction, integrates multi-level feature maps through a multi-scale fusion… More >

  • Open AccessOpen Access

    ARTICLE

    Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction

    Abeer Alnuaim*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.069110 - 10 November 2025
    Abstract The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats. In the evolving landscape of cybersecurity, the efficacy of Intrusion Detection Systems (IDS) is increasingly measured by technical performance, operational usability, and adaptability. This study introduces and rigorously evaluates a Human-Computer Interaction (HCI)-Integrated IDS with the utilization of Convolutional Neural Network (CNN), CNN-Long Short Term Memory (LSTM), and Random Forest (RF) against both a Baseline Machine Learning (ML) and a Traditional IDS model, through an extensive experimental framework encompassing many performance metrics, including detection latency, accuracy, alert prioritization, classification… More >

  • Open AccessOpen Access

    ARTICLE

    Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning

    Misbah Anwer1,*, Ghufran Ahmed1, Maha Abdelhaq2, Raed Alsaqour3, Shahid Hussain4, Adnan Akhunzada5,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068673 - 10 November 2025
    Abstract The exponential growth of the Internet of Things (IoT) has introduced significant security challenges, with zero-day attacks emerging as one of the most critical and challenging threats. Traditional Machine Learning (ML) and Deep Learning (DL) techniques have demonstrated promising early detection capabilities. However, their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints, high computational costs, and the costly time-intensive process of data labeling. To address these challenges, this study proposes a Federated Learning (FL) framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Feature Fragile Image Watermarking Algorithm for Tampering Blind-Detection and Content Self-Recovery

    Qiuling Wu1,*, Hao Li1, Mingjian Li1, Ming Wang2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068220 - 10 November 2025
    Abstract Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright. However, in practical applications, this technology faces various problems such as severe image distortion, inaccurate localization of the tampered regions, and difficulty in recovering content. Given these shortcomings, a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed. The multi-feature watermarking authentication code (AC) is constructed using texture feature of local binary patterns (LBP), direct coefficient of discrete cosine transform (DCT) and contrast feature of gray level co-occurrence matrix (GLCM) for detecting the tampered region, and the… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Constraint Generative Adversarial Network-Driven Optimization Method for Super-Resolution Reconstruction of Remote Sensing Images

    Binghong Zhang, Jialing Zhou, Xinye Zhou, Jia Zhao, Jinchun Zhu, Guangpeng Fan*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068309 - 10 November 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Remote sensing image super-resolution technology is pivotal for enhancing image quality in critical applications including environmental monitoring, urban planning, and disaster assessment. However, traditional methods exhibit deficiencies in detail recovery and noise suppression, particularly when processing complex landscapes (e.g., forests, farmlands), leading to artifacts and spectral distortions that limit practical utility. To address this, we propose an enhanced Super-Resolution Generative Adversarial Network (SRGAN) framework featuring three key innovations: (1) Replacement of L1/L2 loss with a robust Charbonnier loss to suppress noise while preserving edge details via adaptive gradient balancing; (2) A multi-loss joint optimization strategy… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Deep Learning Multi-Class Classification Model for Alzheimer’s Disease Using Enhanced MRI Images

    Ghadah Naif Alwakid*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.068666 - 10 November 2025
    (This article belongs to the Special Issue: Advancements in Machine Learning and Artificial Intelligence for Pattern Detection and Predictive Analytics in Healthcare)
    Abstract Alzheimer’s Disease (AD) is a progressive neurodegenerative disorder that significantly affects cognitive function, making early and accurate diagnosis essential. Traditional Deep Learning (DL)-based approaches often struggle with low-contrast MRI images, class imbalance, and suboptimal feature extraction. This paper develops a Hybrid DL system that unites MobileNetV2 with adaptive classification methods to boost Alzheimer’s diagnosis by processing MRI scans. Image enhancement is done using Contrast-Limited Adaptive Histogram Equalization (CLAHE) and Enhanced Super-Resolution Generative Adversarial Networks (ESRGAN). A classification robustness enhancement system integrates class weighting techniques and a Matthews Correlation Coefficient (MCC)-based evaluation method into the design.… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure and Efficient Distributed Authentication Scheme for IoV with Reputation-Driven Consensus and SM9

    Hui Wei1,2, Zhanfei Ma1,3,*, Jing Jiang1, Bisheng Wang1, Zhong Di1
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069236 - 10 November 2025
    Abstract The Internet of Vehicles (IoV) operates in highly dynamic and open network environments and faces serious challenges in secure and real-time authentication and consensus mechanisms. Existing methods often suffer from complex certificate management, inefficient consensus protocols, and poor resilience in high-frequency communication, resulting in high latency, poor scalability, and unstable network performance. To address these issues, this paper proposes a secure and efficient distributed authentication scheme for IoV with reputation-driven consensus and SM9. First, this paper proposes a decentralized authentication architecture that utilizes the certificate-free feature of SM9, enabling lightweight authentication and key negotiation, thereby… More >

  • Open AccessOpen Access

    ARTICLE

    DAUNet: Unsupervised Neural Network Based on Dual Attention for Clock Synchronization in Multi-Agent Wireless Ad Hoc Networks

    Haihao He1,2, Xianzhou Dong1,*, Shuangshuang Wang1, Chengzhang Zhu1, Xiaotong Zhao1,2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069513 - 10 November 2025
    Abstract Clock synchronization has important applications in multi-agent collaboration (such as drone light shows, intelligent transportation systems, and game AI), group decision-making, and emergency rescue operations. Synchronization method based on pulse-coupled oscillators (PCOs) provides an effective solution for clock synchronization in wireless networks. However, the existing clock synchronization algorithms in multi-agent ad hoc networks are difficult to meet the requirements of high precision and high stability of synchronization clock in group cooperation. Hence, this paper constructs a network model, named DAUNet (unsupervised neural network based on dual attention), to enhance clock synchronization accuracy in multi-agent wireless ad hocMore >

  • Open AccessOpen Access

    ARTICLE

    Face-Pedestrian Joint Feature Modeling with Cross-Category Dynamic Matching for Occlusion-Robust Multi-Object Tracking

    Qin Hu, Hongshan Kong*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-31, 2026, DOI:10.32604/cmc.2025.069078 - 10 November 2025
    (This article belongs to the Special Issue: Secure & Intelligent Cloud-Edge Systems for Real-Time Object Detection and Tracking)
    Abstract To address the issues of frequent identity switches (IDs) and degraded identification accuracy in multi object tracking (MOT) under complex occlusion scenarios, this study proposes an occlusion-robust tracking framework based on face-pedestrian joint feature modeling. By constructing a joint tracking model centered on “intra-class independent tracking + cross-category dynamic binding”, designing a multi-modal matching metric with spatio-temporal and appearance constraints, and innovatively introducing a cross-category feature mutual verification mechanism and a dual matching strategy, this work effectively resolves performance degradation in traditional single-category tracking methods caused by short-term occlusion, cross-camera tracking, and crowded environments. Experiments… More >

  • Open AccessOpen Access

    ARTICLE

    DRL-Based Cross-Regional Computation Offloading Algorithm

    Lincong Zhang1, Yuqing Liu1, Kefeng Wei2, Weinan Zhao1, Bo Qian1,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.069108 - 10 November 2025
    Abstract In the field of edge computing, achieving low-latency computational task offloading with limited resources is a critical research challenge, particularly in resource-constrained and latency-sensitive vehicular network environments where rapid response is mandatory for safety-critical applications. In scenarios where edge servers are sparsely deployed, the lack of coordination and information sharing often leads to load imbalance, thereby increasing system latency. Furthermore, in regions without edge server coverage, tasks must be processed locally, which further exacerbates latency issues. To address these challenges, we propose a novel and efficient Deep Reinforcement Learning (DRL)-based approach aimed at minimizing average… More >

  • Open AccessOpen Access

    ARTICLE

    Lightweight Multi-Agent Edge Framework for Cybersecurity and Resource Optimization in Mobile Sensor Networks

    Fatima Al-Quayed*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069102 - 10 November 2025
    Abstract Due to the growth of smart cities, many real-time systems have been developed to support smart cities using Internet of Things (IoT) and emerging technologies. They are formulated to collect the data for environment monitoring and automate the communication process. In recent decades, researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations. However, the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity. These systems are vulnerable to a variety of cyberattacks, including unauthorized access,… More >

  • Open AccessOpen Access

    ARTICLE

    EGOP: A Server-Side Enhanced Architecture to Eliminate End-to-End Latency Caused by GOP Length in Live Streaming

    Kunpeng Zhou1, Tao Wu1,*, Jia Zhang2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-27, 2026, DOI:10.32604/cmc.2025.068160 - 10 November 2025
    Abstract Over the past few years, video live streaming has gained immense popularity as a leading internet application. In current solutions offered by cloud service providers, the Group of Pictures (GOP) length of the video source often significantly impacts end-to-end (E2E) latency. However, designing an optimized GOP structure to reduce this effect remains a significant challenge. This paper presents two key contributions. First, it explores how the GOP length at the video source influences E2E latency in mainstream cloud streaming services. Experimental results reveal that the mean E2E latency increases linearly with longer GOP lengths. Second, More >

  • Open AccessOpen Access

    ARTICLE

    Pavement Crack Detection Based on Star-YOLO11

    Jiang Mi1, Zhijian Gan1, Pengliu Tan2,*, Xin Chang2, Zhi Wang2, Haisheng Xie2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.069348 - 10 November 2025
    Abstract In response to the challenges in highway pavement distress detection, such as multiple defect categories, difficulties in feature extraction for different damage types, and slow identification speeds, this paper proposes an enhanced pavement crack detection model named Star-YOLO11. This improved algorithm modifies the YOLO11 architecture by substituting the original C3k2 backbone network with a Star-s50 feature extraction network. The enhanced structure adjusts the number of stacked layers in the StarBlock module to optimize detection accuracy and improve model efficiency. To enhance the accuracy of pavement crack detection and improve model efficiency, three key modifications to… More >

  • Open AccessOpen Access

    ARTICLE

    Energy Optimization for Autonomous Mobile Robot Path Planning Based on Deep Reinforcement Learning

    Longfei Gao*, Weidong Wang, Dieyun Ke
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068873 - 10 November 2025
    Abstract At present, energy consumption is one of the main bottlenecks in autonomous mobile robot development. To address the challenge of high energy consumption in path planning for autonomous mobile robots navigating unknown and complex environments, this paper proposes an Attention-Enhanced Dueling Deep Q-Network (AD-Dueling DQN), which integrates a multi-head attention mechanism and a prioritized experience replay strategy into a Dueling-DQN reinforcement learning framework. A multi-objective reward function, centered on energy efficiency, is designed to comprehensively consider path length, terrain slope, motion smoothness, and obstacle avoidance, enabling optimal low-energy trajectory generation in 3D space from the… More >

  • Open AccessOpen Access

    ARTICLE

    HCL Net: Deep Learning for Accurate Classification of Honeycombing Lung and Ground Glass Opacity in CT Images

    Hairul Aysa Abdul Halim Sithiq1,*, Liyana Shuib1,*, Muneer Ahmad2, Chermaine Deepa Antony3
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.067781 - 10 November 2025
    (This article belongs to the Special Issue: Advancements in Machine Learning and Artificial Intelligence for Pattern Detection and Predictive Analytics in Healthcare)
    Abstract Honeycombing Lung (HCL) is a chronic lung condition marked by advanced fibrosis, resulting in enlarged air spaces with thick fibrotic walls, which are visible on Computed Tomography (CT) scans. Differentiating between normal lung tissue, honeycombing lungs, and Ground Glass Opacity (GGO) in CT images is often challenging for radiologists and may lead to misinterpretations. Although earlier studies have proposed models to detect and classify HCL, many faced limitations such as high computational demands, lower accuracy, and difficulty distinguishing between HCL and GGO. CT images are highly effective for lung classification due to their high resolution,… More >

  • Open AccessOpen Access

    ARTICLE

    A Transformer-Based Deep Learning Framework with Semantic Encoding and Syntax-Aware LSTM for Fake Electronic News Detection

    Hamza Murad Khan1, Shakila Basheer2, Mohammad Tabrez Quasim3, Raja`a Al-Naimi4, Vijaykumar Varadarajan5, Anwar Khan1,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069327 - 10 November 2025
    Abstract With the increasing growth of online news, fake electronic news detection has become one of the most important paradigms of modern research. Traditional electronic news detection techniques are generally based on contextual understanding, sequential dependencies, and/or data imbalance. This makes distinction between genuine and fabricated news a challenging task. To address this problem, we propose a novel hybrid architecture, T5-SA-LSTM, which synergistically integrates the T5 Transformer for semantically rich contextual embedding with the Self-Attention-enhanced (SA) Long Short-Term Memory (LSTM). The LSTM is trained using the Adam optimizer, which provides faster and more stable convergence compared… More >

  • Open AccessOpen Access

    ARTICLE

    Interactive Dynamic Graph Convolution with Temporal Attention for Traffic Flow Forecasting

    Zitong Zhao1, Zixuan Zhang2, Zhenxing Niu3,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069752 - 10 November 2025
    (This article belongs to the Special Issue: Attention Mechanism-based Complex System Pattern Intelligent Recognition and Accurate Prediction)
    Abstract Reliable traffic flow prediction is crucial for mitigating urban congestion. This paper proposes Attention-based spatiotemporal Interactive Dynamic Graph Convolutional Network (AIDGCN), a novel architecture integrating Interactive Dynamic Graph Convolution Network (IDGCN) with Temporal Multi-Head Trend-Aware Attention. Its core innovation lies in IDGCN, which uniquely splits sequences into symmetric intervals for interactive feature sharing via dynamic graphs, and a novel attention mechanism incorporating convolutional operations to capture essential local traffic trends—addressing a critical gap in standard attention for continuous data. For 15- and 60-min forecasting on METR-LA, AIDGCN achieves MAEs of 0.75% and 0.39%, and RMSEs More >

  • Open AccessOpen Access

    ARTICLE

    Ponzi Scheme Detection for Smart Contracts Based on Oversampling

    Yafei Liu1,2, Yuling Chen1,2,*, Xuewei Wang3, Yuxiang Yang2, Chaoyue Tan2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069152 - 10 November 2025
    Abstract As blockchain technology rapidly evolves, smart contracts have seen widespread adoption in financial transactions and beyond. However, the growing prevalence of malicious Ponzi scheme contracts presents serious security threats to blockchain ecosystems. Although numerous detection techniques have been proposed, existing methods suffer from significant limitations, such as class imbalance and insufficient modeling of transaction-related semantic features. To address these challenges, this paper proposes an oversampling-based detection framework for Ponzi smart contracts. We enhance the Adaptive Synthetic Sampling (ADASYN) algorithm by incorporating sample proximity to decision boundaries and ensuring realistic sample distributions. This enhancement facilitates the… More >

  • Open AccessOpen Access

    ARTICLE

    DriftXMiner: A Resilient Process Intelligence Approach for Safe and Transparent Detection of Incremental Concept Drift in Process Mining

    Puneetha B. H.1,*, Manoj Kumar M. V.2,*, Prashanth B. S.2, Piyush Kumar Pareek3
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.067706 - 10 November 2025
    (This article belongs to the Special Issue: Safe and Secure Artificial Intelligence)
    Abstract Processes supported by process-aware information systems are subject to continuous and often subtle changes due to evolving operational, organizational, or regulatory factors. These changes, referred to as incremental concept drift, gradually alter the behavior or structure of processes, making their detection and localization a challenging task. Traditional process mining techniques frequently assume process stationarity and are limited in their ability to detect such drift, particularly from a control-flow perspective. The objective of this research is to develop an interpretable and robust framework capable of detecting and localizing incremental concept drift in event logs, with a… More >

  • Open AccessOpen Access

    ARTICLE

    A Dual-Attention CNN-BiLSTM Model for Network Intrusion Detection

    Zheng Zhang1,2, Jie Hao2, Liquan Chen1,*, Tianhao Hou2, Yanan Liu2
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-22, 2026, DOI:10.32604/cmc.2025.068372 - 10 November 2025
    Abstract With the increasing severity of network security threats, Network Intrusion Detection (NID) has become a key technology to ensure network security. To address the problem of low detection rate of traditional intrusion detection models, this paper proposes a Dual-Attention model for NID, which combines Convolutional Neural Network (CNN) and Bidirectional Long Short-Term Memory (BiLSTM) to design two modules: the FocusConV and the TempoNet module. The FocusConV module, which automatically adjusts and weights CNN extracted local features, focuses on local features that are more important for intrusion detection. The TempoNet module focuses on global information, identifies… More >

  • Open AccessOpen Access

    ARTICLE

    Federated Multi-Label Feature Selection via Dual-Layer Hybrid Breeding Cooperative Particle Swarm Optimization with Manifold and Sparsity Regularization

    Songsong Zhang1, Huazhong Jin1,2,*, Zhiwei Ye1,2, Jia Yang1,2, Jixin Zhang1,2, Dongfang Wu1,2, Xiao Zheng1,2, Dingfeng Song1
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-19, 2026, DOI:10.32604/cmc.2025.068044 - 10 November 2025
    Abstract Multi-label feature selection (MFS) is a crucial dimensionality reduction technique aimed at identifying informative features associated with multiple labels. However, traditional centralized methods face significant challenges in privacy-sensitive and distributed settings, often neglecting label dependencies and suffering from low computational efficiency. To address these issues, we introduce a novel framework, Fed-MFSDHBCPSO—federated MFS via dual-layer hybrid breeding cooperative particle swarm optimization algorithm with manifold and sparsity regularization (DHBCPSO-MSR). Leveraging the federated learning paradigm, Fed-MFSDHBCPSO allows clients to perform local feature selection (FS) using DHBCPSO-MSR. Locally selected feature subsets are encrypted with differential privacy (DP) and transmitted… More >

  • Open AccessOpen Access

    ARTICLE

    High-Dimensional Multi-Objective Computation Offloading for MEC in Serial Isomerism Tasks via Flexible Optimization Framework

    Zheng Yao*, Puqing Chang
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068248 - 10 November 2025
    (This article belongs to the Special Issue: IoT-assisted Network Information System)
    Abstract As Internet of Things (IoT) applications expand, Mobile Edge Computing (MEC) has emerged as a promising architecture to overcome the real-time processing limitations of mobile devices. Edge-side computation offloading plays a pivotal role in MEC performance but remains challenging due to complex task topologies, conflicting objectives, and limited resources. This paper addresses high-dimensional multi-objective offloading for serial heterogeneous tasks in MEC. We jointly consider task heterogeneity, high-dimensional objectives, and flexible resource scheduling, modeling the problem as a Many-objective optimization. To solve it, we propose a flexible framework integrating an improved cooperative co-evolutionary algorithm based on More >

  • Open AccessOpen Access

    ARTICLE

    Conditional Generative Adversarial Network-Based Travel Route Recommendation

    Sunbin Shin1, Luong Vuong Nguyen2, Grzegorz J. Nalepa3,4, Paulo Novais5, Xuan Hau Pham6, Jason J. Jung1,*
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-40, 2026, DOI:10.32604/cmc.2025.070613 - 10 November 2025
    Abstract Recommending personalized travel routes from sparse, implicit feedback poses a significant challenge, as conventional systems often struggle with information overload and fail to capture the complex, sequential nature of user preferences. To address this, we propose a Conditional Generative Adversarial Network (CGAN) that generates diverse and highly relevant itineraries. Our approach begins by constructing a conditional vector that encapsulates a user’s profile. This vector uniquely fuses embeddings from a Heterogeneous Information Network (HIN) to model complex user-place-route relationships, a Recurrent Neural Network (RNN) to capture sequential path dynamics, and Neural Collaborative Filtering (NCF) to incorporate… More >

  • Open AccessOpen Access

    ARTICLE

    HS-APF-RRT*: An Off-Road Path-Planning Algorithm for Unmanned Ground Vehicles Based on Hierarchical Sampling and an Enhanced Artificial Potential Field

    Zhenpeng Jiang, Qingquan Liu*, Ende Wang
    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.068780 - 10 November 2025
    Abstract Rapidly-exploring Random Tree (RRT) and its variants have become foundational in path-planning research, yet in complex three-dimensional off-road environments their uniform blind sampling and limited safety guarantees lead to slow convergence and force an unfavorable trade-off between path quality and traversal safety. To address these challenges, we introduce HS-APF-RRT*, a novel algorithm that fuses layered sampling, an enhanced Artificial Potential Field (APF), and a dynamic neighborhood-expansion mechanism. First, the workspace is hierarchically partitioned into macro, meso, and micro sampling layers, progressively biasing random samples toward safer, lower-energy regions. Second, we augment the traditional APF by More >

Per Page:

Share Link