Home / Journals / CMC / Vol.82, No.1, 2025
Special Issues
Table of Content
  • Open AccessOpen Access

    REVIEW

    The Internet of Things under Federated Learning: A Review of the Latest Advances and Applications

    Jinlong Wang1,2,*, Zhenyu Liu1, Xingtao Yang1, Min Li1, Zhihan Lyu3
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1-39, 2025, DOI:10.32604/cmc.2024.058926 - 03 January 2025
    Abstract With the rapid development of artificial intelligence, the Internet of Things (IoT) can deploy various machine learning algorithms for network and application management. In the IoT environment, many sensors and devices generate massive data, but data security and privacy protection have become a serious challenge. Federated learning (FL) can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing. This review aims to deeply explore the combination of FL and the IoT, and analyze the application of federated learning in the IoT from More >

  • Open AccessOpen Access

    REVIEW

    Comprehensive Review and Analysis on Facial Emotion Recognition: Performance Insights into Deep and Traditional Learning with Current Updates and Challenges

    Amjad Rehman1, Muhammad Mujahid1, Alex Elyassih1, Bayan AlGhofaily1, Saeed Ali Omer Bahaj2,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 41-72, 2025, DOI:10.32604/cmc.2024.058036 - 03 January 2025
    Abstract In computer vision and artificial intelligence, automatic facial expression-based emotion identification of humans has become a popular research and industry problem. Recent demonstrations and applications in several fields, including computer games, smart homes, expression analysis, gesture recognition, surveillance films, depression therapy, patient monitoring, anxiety, and others, have brought attention to its significant academic and commercial importance. This study emphasizes research that has only employed facial images for face expression recognition (FER), because facial expressions are a basic way that people communicate meaning to each other. The immense achievement of deep learning has resulted in a… More >

  • Open AccessOpen Access

    REVIEW

    Enhancing Deepfake Detection: Proactive Forensics Techniques Using Digital Watermarking

    Zhimao Lai1,2, Saad Arif3, Cong Feng4, Guangjun Liao5, Chuntao Wang6,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 73-102, 2025, DOI:10.32604/cmc.2024.059370 - 03 January 2025
    (This article belongs to the Special Issue: Challenges and Innovations in Multimedia Encryption and Information Security)
    Abstract With the rapid advancement of visual generative models such as Generative Adversarial Networks (GANs) and stable Diffusion, the creation of highly realistic Deepfake through automated forgery has significantly progressed. This paper examines the advancements in Deepfake detection and defense technologies, emphasizing the shift from passive detection methods to proactive digital watermarking techniques. Passive detection methods, which involve extracting features from images or videos to identify forgeries, encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics. In contrast, proactive digital watermarking techniques embed specific markers into images or videos, facilitating More >

  • Open AccessOpen Access

    REVIEW

    A Survey of Link Failure Detection and Recovery in Software-Defined Networks

    Suheib Alhiyari, Siti Hafizah AB Hamid*, Nur Nasuha Daud
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 103-137, 2025, DOI:10.32604/cmc.2024.059050 - 03 January 2025
    Abstract Software-defined networking (SDN) is an innovative paradigm that separates the control and data planes, introducing centralized network control. SDN is increasingly being adopted by Carrier Grade networks, offering enhanced network management capabilities than those of traditional networks. However, because SDN is designed to ensure high-level service availability, it faces additional challenges. One of the most critical challenges is ensuring efficient detection and recovery from link failures in the data plane. Such failures can significantly impact network performance and lead to service outages, making resiliency a key concern for the effective adoption of SDN. Since the More >

  • Open AccessOpen Access

    REVIEW

    Review of Techniques for Integrating Security in Software Development Lifecycle

    Hassan Saeed1, Imran Shafi1, Jamil Ahmad2, Adnan Ahmed Khan3, Tahir Khurshaid4,*, Imran Ashraf5,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 139-172, 2025, DOI:10.32604/cmc.2024.057587 - 03 January 2025
    Abstract Software-related security aspects are a growing and legitimate concern, especially with 5G data available just at our palms. To conduct research in this field, periodic comparative analysis is needed with the new techniques coming up rapidly. The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle (SDLC) by analyzing the articles published in the last two decades and to propose a way forward. This review follows Kitchenham’s review protocol. The review has been divided into three main stages including planning, execution, and analysis.… More >

  • Open AccessOpen Access

    ARTICLE

    Hourglass-GCN for 3D Human Pose Estimation Using Skeleton Structure and View Correlation

    Ange Chen, Chengdong Wu*, Chuanjiang Leng
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 173-191, 2025, DOI:10.32604/cmc.2024.059284 - 03 January 2025
    Abstract Previous multi-view 3D human pose estimation methods neither correlate different human joints in each view nor model learnable correlations between the same joints in different views explicitly, meaning that skeleton structure information is not utilized and multi-view pose information is not completely fused. Moreover, existing graph convolutional operations do not consider the specificity of different joints and different views of pose information when processing skeleton graphs, making the correlation weights between nodes in the graph and their neighborhood nodes shared. Existing Graph Convolutional Networks (GCNs) cannot extract global and deep-level skeleton structure information and view… More >

  • Open AccessOpen Access

    ARTICLE

    Toward Analytical Homogenized Relaxation Modulus for Fibrous Composite Material with Reduced Order Homogenization Method

    Huilin Jia1, Shanqiao Huang1, Zifeng Yuan1,2,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 193-222, 2025, DOI:10.32604/cmc.2024.059950 - 03 January 2025
    (This article belongs to the Special Issue: Multiscale and Multiphysics Computational Methods of Heterogeneous Materials and Structures)
    Abstract In this manuscript, we propose an analytical equivalent linear viscoelastic constitutive model for fiber-reinforced composites, bypassing general computational homogenization. The method is based on the reduced-order homogenization (ROH) approach. The ROH method typically involves solving multiple finite element problems under periodic conditions to evaluate elastic strain and eigenstrain influence functions in an ‘off-line’ stage, which offers substantial cost savings compared to direct computational homogenization methods. Due to the unique structure of the fibrous unit cell, “off-line” stage calculation can be eliminated by influence functions obtained analytically. Introducing the standard solid model to the ROH method More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Linear and Nonlinear Vibrations of Composite Rectangular Sandwich Plates with Lattice Cores

    Alireza Moradi, Alireza Shaterzadeh*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 223-257, 2025, DOI:10.32604/cmc.2024.059441 - 03 January 2025
    (This article belongs to the Special Issue: Multiscale and Multiphysics Computational Methods of Heterogeneous Materials and Structures)
    Abstract For the first time, the linear and nonlinear vibrations of composite rectangular sandwich plates with various geometric patterns of lattice core have been analytically examined in this work. The plate comprises a lattice core located in the middle and several homogeneous orthotropic layers that are symmetrical relative to it. For this purpose, the partial differential equations of motion have been derived based on the first-order shear deformation theory, employing Hamilton’s principle and Von Kármán’s nonlinear displacement-strain relations. Then, the nonlinear partial differential equations of the plate are converted into a time-dependent nonlinear ordinary differential equation… More >

  • Open AccessOpen Access

    ARTICLE

    Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model

    Hoon Ko1, Marek R. Ogiela2,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 259-278, 2025, DOI:10.32604/cmc.2024.057257 - 03 January 2025
    (This article belongs to the Special Issue: Innovative AI Applications in Pattern Recognition and Visual Data Processing and Hiding)
    Abstract This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology. By combining the strengths of blockchain and generative AI, the research team aimed to address the timely challenge of safeguarding visual medical content. The participating researchers conducted a comprehensive analysis, examining the vulnerabilities of medical AI services, personal information protection issues, and overall security weaknesses. This multifaceted exploration led to an in-depth evaluation of the model’s performance and security. Notably, the correlation between accuracy, detection rate, and error rate was… More >

  • Open AccessOpen Access

    ARTICLE

    Text-Image Feature Fine-Grained Learning for Joint Multimodal Aspect-Based Sentiment Analysis

    Tianzhi Zhang1, Gang Zhou1,*, Shuang Zhang2, Shunhang Li1, Yepeng Sun1, Qiankun Pi1, Shuo Liu3
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 279-305, 2025, DOI:10.32604/cmc.2024.055943 - 03 January 2025
    Abstract Joint Multimodal Aspect-based Sentiment Analysis (JMASA) is a significant task in the research of multimodal fine-grained sentiment analysis, which combines two subtasks: Multimodal Aspect Term Extraction (MATE) and Multimodal Aspect-oriented Sentiment Classification (MASC). Currently, most existing models for JMASA only perform text and image feature encoding from a basic level, but often neglect the in-depth analysis of unimodal intrinsic features, which may lead to the low accuracy of aspect term extraction and the poor ability of sentiment prediction due to the insufficient learning of intra-modal features. Given this problem, we propose a Text-Image Feature Fine-grained… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Fine-Tuning in Quantized Language Models: An In-Depth Analysis of Key Variables

    Ao Shen1, Zhiquan Lai1,*, Dongsheng Li1,*, Xiaoyu Hu2
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 307-325, 2025, DOI:10.32604/cmc.2024.057491 - 03 January 2025
    Abstract Large-scale Language Models (LLMs) have achieved significant breakthroughs in Natural Language Processing (NLP), driven by the pre-training and fine-tuning paradigm. While this approach allows models to specialize in specific tasks with reduced training costs, the substantial memory requirements during fine-tuning present a barrier to broader deployment. Parameter-Efficient Fine-Tuning (PEFT) techniques, such as Low-Rank Adaptation (LoRA), and parameter quantization methods have emerged as solutions to address these challenges by optimizing memory usage and computational efficiency. Among these, QLoRA, which combines PEFT and quantization, has demonstrated notable success in reducing memory footprints during fine-tuning, prompting the development… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning for QoS Optimization and Energy-Efficient in Routing Clustering Wireless Sensors

    Rahma Gantassi, Zaki Masood, Yonghoon Choi*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 327-343, 2025, DOI:10.32604/cmc.2024.058143 - 03 January 2025
    (This article belongs to the Special Issue: From Nodes to Knowledge: Harnessing Wireless Sensor Networks)
    Abstract Wireless sensor network (WSN) technologies have advanced significantly in recent years. Within WSNs, machine learning algorithms are crucial in selecting cluster heads (CHs) based on various quality of service (QoS) metrics. This paper proposes a new clustering routing protocol employing the Traveling Salesman Problem (TSP) to locate the optimal path traversed by the Mobile Data Collector (MDC), in terms of energy and QoS efficiency. To be more specific, to minimize energy consumption in the CH election stage, we have developed the M-T protocol using the K-Means and the grid clustering algorithms. In addition, to improve More >

  • Open AccessOpen Access

    ARTICLE

    Evolutionary Particle Swarm Optimization Algorithm Based on Collective Prediction for Deployment of Base Stations

    Jiaying Shen1, Donglin Zhu1, Yujia Liu2, Leyi Wang1, Jialing Hu1, Zhaolong Ouyang1, Changjun Zhou1, Taiyong Li3,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 345-369, 2025, DOI:10.32604/cmc.2024.060335 - 03 January 2025
    (This article belongs to the Special Issue: Particle Swarm Optimization: Advances and Applications)
    Abstract The wireless signals emitted by base stations serve as a vital link connecting people in today’s society and have been occupying an increasingly important role in real life. The development of the Internet of Things (IoT) relies on the support of base stations, which provide a solid foundation for achieving a more intelligent way of living. In a specific area, achieving higher signal coverage with fewer base stations has become an urgent problem. Therefore, this article focuses on the effective coverage area of base station signals and proposes a novel Evolutionary Particle Swarm Optimization (EPSO)… More >

  • Open AccessOpen Access

    ARTICLE

    An Iterated Greedy Algorithm with Memory and Learning Mechanisms for the Distributed Permutation Flow Shop Scheduling Problem

    Binhui Wang, Hongfeng Wang*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 371-388, 2025, DOI:10.32604/cmc.2024.058885 - 03 January 2025
    (This article belongs to the Special Issue: Recent Advances in Ensemble Framework of Meta-heuristics and Machine Learning: Methods and Applications)
    Abstract The distributed permutation flow shop scheduling problem (DPFSP) has received increasing attention in recent years. The iterated greedy algorithm (IGA) serves as a powerful optimizer for addressing such a problem because of its straightforward, single-solution evolution framework. However, a potential draw-back of IGA is the lack of utilization of historical information, which could lead to an imbalance between exploration and exploitation, especially in large-scale DPFSPs. As a consequence, this paper develops an IGA with memory and learning mechanisms (MLIGA) to efficiently solve the DPFSP targeted at the mini-mal makespan. In MLIGA, we incorporate a memory… More >

  • Open AccessOpen Access

    ARTICLE

    A Support Vector Machine (SVM) Model for Privacy Recommending Data Processing Model (PRDPM) in Internet of Vehicles

    Ali Alqarni*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 389-406, 2025, DOI:10.32604/cmc.2024.059238 - 03 January 2025
    Abstract Open networks and heterogeneous services in the Internet of Vehicles (IoV) can lead to security and privacy challenges. One key requirement for such systems is the preservation of user privacy, ensuring a seamless experience in driving, navigation, and communication. These privacy needs are influenced by various factors, such as data collected at different intervals, trip durations, and user interactions. To address this, the paper proposes a Support Vector Machine (SVM) model designed to process large amounts of aggregated data and recommend privacy-preserving measures. The model analyzes data based on user demands and interactions with service More >

  • Open AccessOpen Access

    ARTICLE

    A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain

    Binyong Li1,2,3, Liangming Deng1,*, Jie Zhang1, Xianhui Deng1
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 407-426, 2025, DOI:10.32604/cmc.2024.056730 - 03 January 2025
    Abstract To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants, this research focuses on addressing the complex supply relationships in the automotive market, improving data sharing and interactions across various platforms, and achieving more detailed integration of data and operations. We propose a trust evaluation permission delegation method based on the automotive industry chain. The proposed method combines smart contracts with trust evaluation mechanisms, dynamically calculating the trust value of users based on the historical behavior of the delegated entity, network environment, and other More >

  • Open AccessOpen Access

    ARTICLE

    Anomaly Detection of Controllable Electric Vehicles through Node Equation against Aggregation Attack

    Jing Guo*, Ziying Wang, Yajuan Guo, Haitao Jiang
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 427-442, 2025, DOI:10.32604/cmc.2024.057045 - 03 January 2025
    (This article belongs to the Special Issue: Best Practices for Smart Grid SCADA Security Systems Using Artificial Intelligence (AI) Models)
    Abstract The rapid proliferation of electric vehicle (EV) charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system. This study presents an innovative anomaly detection framework for EV charging stations, addressing the unique challenges posed by third-party aggregation platforms. Our approach integrates node equations-based on the parameter identification with a novel deep learning model, xDeepCIN, to detect abnormal data reporting indicative of aggregation attacks. We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation. The xDeepCIN model, incorporating a Compressed Interaction Network, has the ability… More >

  • Open AccessOpen Access

    ARTICLE

    A Robust Security Detection Strategy for Next Generation IoT Networks

    Hafida Assmi1, Azidine Guezzaz1, Said Benkirane1, Mourade Azrour2,*, Said Jabbour3, Nisreen Innab4, Abdulatif Alabdulatif5
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 443-466, 2025, DOI:10.32604/cmc.2024.059047 - 03 January 2025
    (This article belongs to the Special Issue: Security and Privacy in IoT and Smart City: Current Challenges and Future Directions)
    Abstract Internet of Things (IoT) refers to the infrastructures that connect smart devices to the Internet, operating autonomously. This connectivity makes it possible to harvest vast quantities of data, creating new opportunities for the emergence of unprecedented knowledge. To ensure IoT securit, various approaches have been implemented, such as authentication, encoding, as well as devices to guarantee data integrity and availability. Among these approaches, Intrusion Detection Systems (IDS) is an actual security solution, whose performance can be enhanced by integrating various algorithms, including Machine Learning (ML) and Deep Learning (DL), enabling proactive and accurate detection of… More >

  • Open AccessOpen Access

    ARTICLE

    Unmasking Social Robots’ Camouflage: A GNN-Random Forest Framework for Enhanced Detection

    Weijian Fan1,*, Chunhua Wang2, Xiao Han3, Chichen Lin4
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 467-483, 2025, DOI:10.32604/cmc.2024.056930 - 03 January 2025
    Abstract The proliferation of robot accounts on social media platforms has posed a significant negative impact, necessitating robust measures to counter network anomalies and safeguard content integrity. Social robot detection has emerged as a pivotal yet intricate task, aimed at mitigating the dissemination of misleading information. While graph-based approaches have attained remarkable performance in this realm, they grapple with a fundamental limitation: the homogeneity assumption in graph convolution allows social robots to stealthily evade detection by mingling with genuine human profiles. To unravel this challenge and thwart the camouflage tactics, this work proposed an innovative social… More >

  • Open AccessOpen Access

    ARTICLE

    MixerKT: A Knowledge Tracing Model Based on Pure MLP Architecture

    Jun Wang1,2, Mingjie Wang1,2, Zijie Li1,2, Ken Chen1,2, Jiatian Mei1,2, Shu Zhang1,2,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 485-498, 2025, DOI:10.32604/cmc.2024.057224 - 03 January 2025
    Abstract In the field of intelligent education, the integration of artificial intelligence, especially deep learning technologies, has garnered significant attention. Knowledge tracing (KT) plays a pivotal role in this field by predicting students’ future performance through the analysis of historical interaction data, thereby assisting educators in evaluating knowledge mastery and tailoring instructional strategies. Traditional knowledge tracing methods, largely based on Recurrent Neural Networks (RNNs) and Transformer models, primarily focus on capturing long-term interaction patterns in sequential data. However, these models may neglect crucial short-term dynamics and other relevant features. This paper introduces a novel approach to… More >

  • Open AccessOpen Access

    ARTICLE

    Steel Surface Defect Detection Using Learnable Memory Vision Transformer

    Syed Tasnimul Karim Ayon1,#, Farhan Md. Siraj1,#, Jia Uddin2,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 499-520, 2025, DOI:10.32604/cmc.2025.058361 - 03 January 2025
    (This article belongs to the Special Issue: Advancements in Machine Fault Diagnosis and Prognosis: Data-Driven Approaches and Autonomous Systems)
    Abstract This study investigates the application of Learnable Memory Vision Transformers (LMViT) for detecting metal surface flaws, comparing their performance with traditional CNNs, specifically ResNet18 and ResNet50, as well as other transformer-based models including Token to Token ViT, ViT without memory, and Parallel ViT. Leveraging a widely-used steel surface defect dataset, the research applies data augmentation and t-distributed stochastic neighbor embedding (t-SNE) to enhance feature extraction and understanding. These techniques mitigated overfitting, stabilized training, and improved generalization capabilities. The LMViT model achieved a test accuracy of 97.22%, significantly outperforming ResNet18 (88.89%) and ResNet50 (88.90%), as well… More >

  • Open AccessOpen Access

    ARTICLE

    A Lightweight Multiscale Feature Fusion Network for Solar Cell Defect Detection

    Xiaoyun Chen1, Lanyao Zhang1, Xiaoling Chen1, Yigang Cen2, Linna Zhang1,*, Fugui Zhang1
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 521-542, 2025, DOI:10.32604/cmc.2024.058063 - 03 January 2025
    Abstract Solar cell defect detection is crucial for quality inspection in photovoltaic power generation modules. In the production process, defect samples occur infrequently and exhibit random shapes and sizes, which makes it challenging to collect defective samples. Additionally, the complex surface background of polysilicon cell wafers complicates the accurate identification and localization of defective regions. This paper proposes a novel Lightweight Multi-scale Feature Fusion network (LMFF) to address these challenges. The network comprises a feature extraction network, a multi-scale feature fusion module (MFF), and a segmentation network. Specifically, a feature extraction network is proposed to obtain… More >

  • Open AccessOpen Access

    ARTICLE

    Stochastic Augmented-Based Dual-Teaching for Semi-Supervised Medical Image Segmentation

    Hengyang Liu1, Yang Yuan1,*, Pengcheng Ren1, Chengyun Song1, Fen Luo2
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 543-560, 2025, DOI:10.32604/cmc.2024.056478 - 03 January 2025
    (This article belongs to the Special Issue: Deep Learning in Computer-Aided Diagnosis Based on Medical Image)
    Abstract Existing semi-supervised medical image segmentation algorithms use copy-paste data augmentation to correct the labeled-unlabeled data distribution mismatch. However, current copy-paste methods have three limitations: (1) training the model solely with copy-paste mixed pictures from labeled and unlabeled input loses a lot of labeled information; (2) low-quality pseudo-labels can cause confirmation bias in pseudo-supervised learning on unlabeled data; (3) the segmentation performance in low-contrast and local regions is less than optimal. We design a Stochastic Augmentation-Based Dual-Teaching Auxiliary Training Strategy (SADT), which enhances feature diversity and learns high-quality features to overcome these problems. To be more… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Approach for Pavement Crack Detection Using Mask R-CNN and Vision Transformer Model

    Shorouq Alshawabkeh, Li Wu*, Daojun Dong, Yao Cheng, Liping Li
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 561-577, 2025, DOI:10.32604/cmc.2024.057213 - 03 January 2025
    (This article belongs to the Special Issue: Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems)
    Abstract Detecting pavement cracks is critical for road safety and infrastructure management. Traditional methods, relying on manual inspection and basic image processing, are time-consuming and prone to errors. Recent deep-learning (DL) methods automate crack detection, but many still struggle with variable crack patterns and environmental conditions. This study aims to address these limitations by introducing the MaskerTransformer, a novel hybrid deep learning model that integrates the precise localization capabilities of Mask Region-based Convolutional Neural Network (Mask R-CNN) with the global contextual awareness of Vision Transformer (ViT). The research focuses on leveraging the strengths of both architectures… More >

  • Open AccessOpen Access

    ARTICLE

    Intrumer: A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment

    Nazreen Banu A*, S.K.B. Sangeetha
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 579-607, 2025, DOI:10.32604/cmc.2024.059805 - 03 January 2025
    Abstract The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network traffic. Cloud environments pose significant challenges in maintaining privacy and security. Global approaches, such as IDS, have been developed to tackle these issues. However, most conventional Intrusion Detection System (IDS) models struggle with unseen cyberattacks and complex high-dimensional data. In fact, this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system, named INTRUMER, which offers balanced accuracy, reliability, and security in cloud settings by multiple modules working together within it. The traffic captured… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Stock Price Prediction Method Based on the GAN-LSTM-Attention Model

    Peng Li, Yanrui Wei, Lili Yin*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 609-625, 2025, DOI:10.32604/cmc.2024.056651 - 03 January 2025
    Abstract Stock price prediction is a typical complex time series prediction problem characterized by dynamics, nonlinearity, and complexity. This paper introduces a generative adversarial network model that incorporates an attention mechanism (GAN-LSTM-Attention) to improve the accuracy of stock price prediction. Firstly, the generator of this model combines the Long and Short-Term Memory Network (LSTM), the Attention Mechanism and, the Fully-Connected Layer, focusing on generating the predicted stock price. The discriminator combines the Convolutional Neural Network (CNN) and the Fully-Connected Layer to discriminate between real stock prices and generated stock prices. Secondly, to evaluate the practical application… More >

  • Open AccessOpen Access

    ARTICLE

    Attention Eraser and Quantitative Measures for Automated Bone Age Assessment

    Liuqiang Shu, Lei Yu*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 627-644, 2025, DOI:10.32604/cmc.2024.056077 - 03 January 2025
    (This article belongs to the Special Issue: Medical Imaging Based Disease Diagnosis Using AI)
    Abstract Bone age assessment (BAA) aims to determine whether a child’s growth and development are normal concerning their chronological age. To predict bone age more accurately based on radiographs, and for the left-hand X-ray images of different races model can have better adaptability, we propose a neural network in parallel with the quantitative features from the left-hand bone measurements for BAA. In this study, a lightweight feature extractor (LFE) is designed to obtain the feature maps from radiographs, and a module called attention eraser module (AEM) is proposed to capture the fine-grained features. Meanwhile, the dimensional… More >

  • Open AccessOpen Access

    ARTICLE

    DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm

    Chunhui Li1,2, Xiaoying Wang1,2,*, Qingjie Zhang1,2, Jiaye Liang1, Aijing Zhang1
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 645-674, 2025, DOI:10.32604/cmc.2024.058081 - 03 January 2025
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract Previous studies have shown that deep learning is very effective in detecting known attacks. However, when facing unknown attacks, models such as Deep Neural Networks (DNN) combined with Long Short-Term Memory (LSTM), Convolutional Neural Networks (CNN) combined with LSTM, and so on are built by simple stacking, which has the problems of feature loss, low efficiency, and low accuracy. Therefore, this paper proposes an autonomous detection model for Distributed Denial of Service attacks, Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention (MSCNN-BiGRU-SHA), which is based on a Multi-strategy Integrated Zebra Optimization Algorithm (MI-ZOA). The… More >

  • Open AccessOpen Access

    ARTICLE

    Federated Learning’s Role in Next-Gen TV Ad Optimization

    Gabriela Dobrița, Simona-Vasilica Oprea*, Adela Bâra
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 675-712, 2025, DOI:10.32604/cmc.2024.058656 - 03 January 2025
    Abstract In the rapidly evolving landscape of television advertising, optimizing ad schedules to maximize viewer engagement and revenue has become significant. Traditional methods often operate in silos, limiting the potential insights gained from broader data analysis due to concerns over privacy and data sharing. This article introduces a novel approach that leverages Federated Learning (FL) to enhance TV ad schedule optimization, combining the strengths of local optimization techniques with the power of global Machine Learning (ML) models to uncover actionable insights without compromising data privacy. It combines linear programming for initial ads scheduling optimization with ML—specifically,… More >

  • Open AccessOpen Access

    ARTICLE

    Lightweight Underwater Target Detection Using YOLOv8 with Multi-Scale Cross-Channel Attention

    Xueyan Ding1,2, Xiyu Chen1, Jiaxin Wang1, Jianxin Zhang1,2,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 713-727, 2025, DOI:10.32604/cmc.2024.057655 - 03 January 2025
    Abstract Underwater target detection is extensively applied in domains such as underwater search and rescue, environmental monitoring, and marine resource surveys. It is crucial in enabling autonomous underwater robot operations and promoting ocean exploration. Nevertheless, low imaging quality, harsh underwater environments, and obscured objects considerably increase the difficulty of detecting underwater targets, making it difficult for current detection methods to achieve optimal performance. In order to enhance underwater object perception and improve target detection precision, we propose a lightweight underwater target detection method using You Only Look Once (YOLO) v8 with multi-scale cross-channel attention (MSCCA), named… More >

  • Open AccessOpen Access

    ARTICLE

    IDSSCNN-XgBoost: Improved Dual-Stream Shallow Convolutional Neural Network Based on Extreme Gradient Boosting Algorithm for Micro Expression Recognition

    Adnan Ahmad, Zhao Li*, Irfan Tariq, Zhengran He
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 729-749, 2025, DOI:10.32604/cmc.2024.055768 - 03 January 2025
    Abstract Micro-expressions (ME) recognition is a complex task that requires advanced techniques to extract informative features from facial expressions. Numerous deep neural networks (DNNs) with convolutional structures have been proposed. However, unlike DNNs, shallow convolutional neural networks often outperform deeper models in mitigating overfitting, particularly with small datasets. Still, many of these methods rely on a single feature for recognition, resulting in an insufficient ability to extract highly effective features. To address this limitation, in this paper, an Improved Dual-stream Shallow Convolutional Neural Network based on an Extreme Gradient Boosting Algorithm (IDSSCNN-XgBoost) is introduced for ME… More >

  • Open AccessOpen Access

    ARTICLE

    Loss Aware Feature Attention Mechanism for Class and Feature Imbalance Issue

    Yuewei Wu1, Ruiling Fu1, Tongtong Xing1, Fulian Yin1,2,*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 751-775, 2025, DOI:10.32604/cmc.2024.057606 - 03 January 2025
    Abstract In the Internet era, recommendation systems play a crucial role in helping users find relevant information from large datasets. Class imbalance is known to severely affect data quality, and therefore reduce the performance of recommendation systems. Due to the imbalance, machine learning algorithms tend to classify inputs into the positive (majority) class every time to achieve high prediction accuracy. Imbalance can be categorized such as by features and classes, but most studies consider only class imbalance. In this paper, we propose a recommendation system that can integrate multiple networks to adapt to a large number… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Backstepping Control of a Quadrotor Unmanned Aerial Vehicle under Colored Noises

    Mehmet Karahan*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 777-798, 2025, DOI:10.32604/cmc.2024.059123 - 03 January 2025
    Abstract Advances in software and hardware technologies have facilitated the production of quadrotor unmanned aerial vehicles (UAVs). Nowadays, people actively use quadrotor UAVs in essential missions such as search and rescue, counter-terrorism, firefighting, surveillance, and cargo transportation. While performing these tasks, quadrotors must operate in noisy environments. Therefore, a robust controller design that can control the altitude and attitude of the quadrotor in noisy environments is of great importance. Many researchers have focused only on white Gaussian noise in their studies, whereas researchers need to consider the effects of all colored noises during the operation of… More >

  • Open AccessOpen Access

    ARTICLE

    AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation

    Congcong Wang1, Chen Wang2,3,*, Wenying Zheng4,*, Wei Gu5
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 799-816, 2025, DOI:10.32604/cmc.2024.057975 - 03 January 2025
    (This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
    Abstract As smart grid technology rapidly advances, the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection. Current research emphasizes data security and user privacy concerns within smart grids. However, existing methods struggle with efficiency and security when processing large-scale data. Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge. This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities. The approach optimizes data preprocessing, More >

  • Open AccessOpen Access

    ARTICLE

    DIGNN-A: Real-Time Network Intrusion Detection with Integrated Neural Networks Based on Dynamic Graph

    Jizhao Liu, Minghao Guo*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 817-842, 2025, DOI:10.32604/cmc.2024.057660 - 03 January 2025
    Abstract The increasing popularity of the Internet and the widespread use of information technology have led to a rise in the number and sophistication of network attacks and security threats. Intrusion detection systems are crucial to network security, playing a pivotal role in safeguarding networks from potential threats. However, in the context of an evolving landscape of sophisticated and elusive attacks, existing intrusion detection methodologies often overlook critical aspects such as changes in network topology over time and interactions between hosts. To address these issues, this paper proposes a real-time network intrusion detection method based on… More >

  • Open AccessOpen Access

    ARTICLE

    Engine Misfire Fault Detection Based on the Channel Attention Convolutional Model

    Feifei Yu1, Yongxian Huang2,*, Guoyan Chen1, Xiaoqing Yang2, Canyi Du2,*, Yongkang Gong2
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 843-862, 2025, DOI:10.32604/cmc.2024.058051 - 03 January 2025
    Abstract To accurately diagnose misfire faults in automotive engines, we propose a Channel Attention Convolutional Model, specifically the Squeeze-and-Excitation Networks (SENET), for classifying engine vibration signals and precisely pinpointing misfire faults. In the experiment, we established a total of 11 distinct states, encompassing the engine’s normal state, single-cylinder misfire faults, and dual-cylinder misfire faults for different cylinders. Data collection was facilitated by a highly sensitive acceleration signal collector with a high sampling rate of 20,840 Hz. The collected data were methodically divided into training and testing sets based on different experimental groups to ensure generalization and… More >

  • Open AccessOpen Access

    ARTICLE

    Offload Strategy for Edge Computing in Satellite Networks Based on Software Defined Network

    Zhiguo Liu1,#, Yuqing Gui1,#, Lin Wang2,*, Yingru Jiang1
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 863-879, 2025, DOI:10.32604/cmc.2024.057353 - 03 January 2025
    (This article belongs to the Special Issue: Practical Application and Services in Fog/Edge Computing System)
    Abstract Satellite edge computing has garnered significant attention from researchers; however, processing a large volume of tasks within multi-node satellite networks still poses considerable challenges. The sharp increase in user demand for latency-sensitive tasks has inevitably led to offloading bottlenecks and insufficient computational capacity on individual satellite edge servers, making it necessary to implement effective task offloading scheduling to enhance user experience. In this paper, we propose a priority-based task scheduling strategy based on a Software-Defined Network (SDN) framework for satellite-terrestrial integrated networks, which clarifies the execution order of tasks based on their priority. Subsequently, we More >

  • Open AccessOpen Access

    ARTICLE

    5DGWO-GAN: A Novel Five-Dimensional Gray Wolf Optimizer for Generative Adversarial Network-Enabled Intrusion Detection in IoT Systems

    Sarvenaz Sadat Khatami1, Mehrdad Shoeibi2, Anita Ershadi Oskouei3, Diego Martín4,*, Maral Keramat Dashliboroun5
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 881-911, 2025, DOI:10.32604/cmc.2024.059999 - 03 January 2025
    Abstract The Internet of Things (IoT) is integral to modern infrastructure, enabling connectivity among a wide range of devices from home automation to industrial control systems. With the exponential increase in data generated by these interconnected devices, robust anomaly detection mechanisms are essential. Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns. This paper presents a novel approach utilizing generative adversarial networks (GANs) for anomaly detection in IoT systems. However, optimizing GANs involves tuning hyper-parameters such as learning rate, batch size, and optimization algorithms,… More >

  • Open AccessOpen Access

    ARTICLE

    PD-YOLO: Colon Polyp Detection Model Based on Enhanced Small-Target Feature Extraction

    Yicong Yu1,2, Kaixin Lin1, Jiajun Hong1, Rong-Guei Tsai3,*, Yuanzhi Huang1
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 913-928, 2025, DOI:10.32604/cmc.2024.058467 - 03 January 2025
    Abstract In recent years, the number of patients with colon disease has increased significantly. Colon polyps are the precursor lesions of colon cancer. If not diagnosed in time, they can easily develop into colon cancer, posing a serious threat to patients’ lives and health. A colonoscopy is an important means of detecting colon polyps. However, in polyp imaging, due to the large differences and diverse types of polyps in size, shape, color, etc., traditional detection methods face the problem of high false positive rates, which creates problems for doctors during the diagnosis process. In order to… More >

  • Open AccessOpen Access

    ARTICLE

    A Generative Model-Based Network Framework for Ecological Data Reconstruction

    Shuqiao Liu1, Zhao Zhang2,*, Hongyan Zhou1, Xuebo Chen1
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 929-948, 2025, DOI:10.32604/cmc.2024.057319 - 03 January 2025
    Abstract This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection systems. Combining Strengths, Weaknesses, Opportunities, Threats (SWOT) analysis data with Variation Autoencoder (VAE) and Generative Adversarial Network (GAN) the network framework model (SAE-GAN), is proposed for environmental data reconstruction. The model combines two popular generative models, GAN and VAE, to generate features conditional on categorical data embedding after SWOT Analysis. The model is capable of generating features that resemble real feature distributions and adding sample factors to more accurately track individual sample data. Reconstructed data is… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Deep Learning Approach for Automating App Review Classification: Advancing Usability Metrics Classification with an Aspect-Based Sentiment Analysis Framework

    Nahed Alsaleh1,2, Reem Alnanih1,*, Nahed Alowidi1
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 949-976, 2025, DOI:10.32604/cmc.2024.059351 - 03 January 2025
    Abstract App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their products. Automating the analysis of these reviews is vital for efficient review management. While traditional machine learning (ML) models rely on basic word-based feature extraction, deep learning (DL) methods, enhanced with advanced word embeddings, have shown superior performance. This research introduces a novel aspect-based sentiment analysis (ABSA) framework to classify app reviews based on key non-functional requirements, focusing on usability factors: effectiveness, efficiency, and satisfaction. We propose a hybrid DL model, combining BERT (Bidirectional Encoder Representations from Transformers) More >

  • Open AccessOpen Access

    ARTICLE

    A Cross Attention Transformer-Mixed Feedback Video Recommendation Algorithm Based on DIEN

    Jianwei Zhang1,2,*, Zhishang Zhao3, Zengyu Cai3, Yuan Feng4, Liang Zhu3, Yahui Sun3
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 977-996, 2025, DOI:10.32604/cmc.2024.058438 - 03 January 2025
    Abstract The rapid development of short video platforms poses new challenges for traditional recommendation systems. Recommender systems typically depend on two types of user behavior feedback to construct user interest profiles: explicit feedback (interactive behavior), which significantly influences users’ short-term interests, and implicit feedback (viewing time), which substantially affects their long-term interests. However, the previous model fails to distinguish between these two feedback methods, leading it to predict only the overall preferences of users based on extensive historical behavior sequences. Consequently, it cannot differentiate between users’ long-term and short-term interests, resulting in low accuracy in describing… More >

  • Open AccessOpen Access

    ARTICLE

    A Multi-Objective Particle Swarm Optimization Algorithm Based on Decomposition and Multi-Selection Strategy

    Li Ma1, Cai Dai1,*, Xingsi Xue2, Cheng Peng3
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 997-1026, 2025, DOI:10.32604/cmc.2024.057168 - 03 January 2025
    Abstract The multi-objective particle swarm optimization algorithm (MOPSO) is widely used to solve multi-objective optimization problems. In the article, a multi-objective particle swarm optimization algorithm based on decomposition and multi-selection strategy is proposed to improve the search efficiency. First, two update strategies based on decomposition are used to update the evolving population and external archive, respectively. Second, a multi-selection strategy is designed. The first strategy is for the subspace without a non-dominated solution. Among the neighbor particles, the particle with the smallest penalty-based boundary intersection value is selected as the global optimal solution and the particle… More >

  • Open AccessOpen Access

    ARTICLE

    CSRWA: Covert and Severe Attacks Resistant Watermarking Algorithm

    Balsam Dhyia Majeed1,2, Amir Hossein Taherinia1,*, Hadi Sadoghi Yazdi1, Ahad Harati1
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1027-1047, 2025, DOI:10.32604/cmc.2024.059789 - 03 January 2025
    (This article belongs to the Special Issue: Computer Vision and Image Processing: Feature Selection, Image Enhancement and Recognition)
    Abstract Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright. The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification. Some of these features are important perceptual features according to the human visual system (HVS), which means that the embedded watermark should be imperceptible in these features. Therefore, both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions. The two roles will be considered in this paper… More >

  • Open AccessOpen Access

    ARTICLE

    DecMamba: Mamba Utilizing Series Decomposition for Multivariate Time Series Forecasting

    Jianxin Feng*, Jianhao Zhang, Ge Cao, Zhiguo Liu, Yuanming Ding
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1049-1068, 2025, DOI:10.32604/cmc.2024.058374 - 03 January 2025
    Abstract Multivariate time series forecasting is widely used in traffic planning, weather forecasting, and energy consumption. Series decomposition algorithms can help models better understand the underlying patterns of the original series to improve the forecasting accuracy of multivariate time series. However, the decomposition kernel of previous decomposition-based models is fixed, and these models have not considered the differences in frequency fluctuations between components. These problems make it difficult to analyze the intricate temporal variations of real-world time series. In this paper, we propose a series decomposition-based Mamba model, DecMamba, to obtain the intricate temporal dependencies and… More >

  • Open AccessOpen Access

    ARTICLE

    Joint Feature Encoding and Task Alignment Mechanism for Emotion-Cause Pair Extraction

    Shi Li, Didi Sun*
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1069-1086, 2025, DOI:10.32604/cmc.2024.057349 - 03 January 2025
    (This article belongs to the Special Issue: Next-Generation Techniques and Applications on Opinion Mining and Affective Computing)
    Abstract With the rapid expansion of social media, analyzing emotions and their causes in texts has gained significant importance. Emotion-cause pair extraction enables the identification of causal relationships between emotions and their triggers within a text, facilitating a deeper understanding of expressed sentiments and their underlying reasons. This comprehension is crucial for making informed strategic decisions in various business and societal contexts. However, recent research approaches employing multi-task learning frameworks for modeling often face challenges such as the inability to simultaneously model extracted features and their interactions, or inconsistencies in label prediction between emotion-cause pair extraction… More >

  • Open AccessOpen Access

    ARTICLE

    A Decentralized and TCAM-Aware Failure Recovery Model in Software Defined Data Center Networks

    Suheib Alhiyari, Siti Hafizah AB Hamid*, Nur Nasuha Daud
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1087-1107, 2025, DOI:10.32604/cmc.2024.058953 - 03 January 2025
    Abstract Link failure is a critical issue in large networks and must be effectively addressed. In software-defined networks (SDN), link failure recovery schemes can be categorized into proactive and reactive approaches. Reactive schemes have longer recovery times while proactive schemes provide faster recovery but overwhelm the memory of switches by flow entries. As SDN adoption grows, ensuring efficient recovery from link failures in the data plane becomes crucial. In particular, data center networks (DCNs) demand rapid recovery times and efficient resource utilization to meet carrier-grade requirements. This paper proposes an efficient Decentralized Failure Recovery (DFR) model… More >

  • Open AccessOpen Access

    ARTICLE

    Detection and Recognition of Spray Code Numbers on Can Surfaces Based on OCR

    Hailong Wang*, Junchao Shi
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1109-1128, 2025, DOI:10.32604/cmc.2024.057706 - 03 January 2025
    (This article belongs to the Special Issue: Deep Learning and Computer Vision for Industry 4.0 and Emerging Technologies)
    Abstract A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition. In the coding number detection stage, Differentiable Binarization Network is used as the backbone network, combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect. In terms of text recognition, using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate… More >

  • Open AccessOpen Access

    ARTICLE

    Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning

    Shijie Tang1,2, Yong Ding1,3,4,*, Huiyong Wang5
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1129-1150, 2025, DOI:10.32604/cmc.2024.059143 - 03 January 2025
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract As more and more devices in Cyber-Physical Systems (CPS) are connected to the Internet, physical components such as programmable logic controller (PLC), sensors, and actuators are facing greater risks of network attacks, and fast and accurate attack detection techniques are crucial. The key problem in distinguishing between normal and abnormal sequences is to model sequential changes in a large and diverse field of time series. To address this issue, we propose an anomaly detection method based on distributed deep learning. Our method uses a bilateral filtering algorithm for sequential sequences to remove noise in the More >

  • Open AccessOpen Access

    ARTICLE

    Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks

    Khalil Ullah1,*, Song Jian1, Muhammad Naeem Ul Hassan1, Suliman Khan2, Mohammad Babar3,*, Arshad Ahmad4, Shafiq Ahmad5
    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1151-1169, 2025, DOI:10.32604/cmc.2024.057328 - 03 January 2025
    (This article belongs to the Special Issue: Exploring the Metaverse: Advancements in Future Networks Communication and Computing Technologies for Enhanced Quality of Experience)
    Abstract The emergence of next generation networks (NextG), including 5G and beyond, is reshaping the technological landscape of cellular and mobile networks. These networks are sufficiently scaled to interconnect billions of users and devices. Researchers in academia and industry are focusing on technological advancements to achieve high-speed transmission, cell planning, and latency reduction to facilitate emerging applications such as virtual reality, the metaverse, smart cities, smart health, and autonomous vehicles. NextG continuously improves its network functionality to support these applications. Multiple input multiple output (MIMO) technology offers spectral efficiency, dependability, and overall performance in conjunction with More >

Per Page:

Share Link