Forthcoming Articles

International Journal of Wireless and Mobile Computing

International Journal of Wireless and Mobile Computing (IJWMC)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are also listed here. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Wireless and Mobile Computing (22 papers in press)

Regular Issues

  • Multi-objective workflow scheduling in the cloud environment based on NSGA-II   Order a copy of this article
    by Tingting Dong, Chuangbai Xiao 
    Abstract: The emergence of cloud computing offers a novel perspective to solve large-scale computing problems. Workflow scheduling is a major problem in the cloud environment, and parallelism and dependency are two important characteristics of tasks in a workflow, which increases the complexity of problem. Workflow scheduling is also a multi-objective scheduling problem, and task execution time and cost are the two extremely significant goals for users and providers in the cloud environment. Existing heuristic algorithms are popular, but they lack of robustness and need to be revised when the problem statement changes. Evolutionary algorithms have a complete algorithm system, which is widely used in the multi-objective scheduling problem. In this paper, Nondominated Sorting Genetic Algorithm-II (NSGA-II) is utilized to solve the workflow scheduling problem aiming at minimizing the task execution time and cost. Some real-world workflows are used to make simulation expriments, and comparative simulations with genetic algorithm are given. Results show that NSGA-II is effective for the workflow scheduling.
    Keywords: cloud computing; workflow scheduling; non-dominated sorting genetic algorithm-II; multi-objective scheduling.

  • Research on a laser cutting path planning method based on improved ant colony optimisation   Order a copy of this article
    by Naigong Yu, Qiao Xu, Zhen Zhang 
    Abstract: Laser cutting path planning for fabric patterns is critical to cutting efficiency. The ant colony optimisation algorithm commonly used in this field is constrained by the complete cutting and cannot plan a true global optimal path, resulting in large empty strokes. To solve this problem, this paper proposes an ant colony optimisation method based on virtual segmentation of multiple feature points for path planning of laser cutting. The method first changes the feature point selection strategy of traditional ant colony optimisation and increases the number of feature points in a single pattern. Then the single closed pattern is virtually divided into multiple open contours. Finally, the optimal cutting path is planned based on the solution of the travelling salesman problem. Experiments show that the cutting planning path obtained by the proposed method has a higher degree of compression on the idle stroke and significantly improves the laser cutting efficiency.
    Keywords: laser cutting; path planning; ant colony optimisation; virtual segmentation.

  • Performance analysis of downlink precoding techniques in massive MIMO under perfect and imperfect channel state information in single and multi-cell scenarios   Order a copy of this article
    by Chanchal Soni, Namit Gupta 
    Abstract: The novel Optimised Max-Min Zero forcing precoder (OM2ZFP) scheme is proposed in this work. The optimization is incorporated with the chimp optimization strategy (CPO) to maximise the spectral efficiency, achievable sum rate, max-min rate, and minimise BER. The designed precoder model is contemplated under single cell perfect CSI, single-cell imperfect CSI and multiple cells perfect CSI, multi-cell imperfect CSI. Three pre-coding schemes, zero forcing (ZF), Maximum Ratio Pre-coding (MRT) and Minimum Mean Square Error (MMSE) precoder techniques, are implemented in the Matlab platform to manifest the effects of the novel designed precoder. The performance of the achievable sum rate is analysed under three cases, namely case I (fixed users and varying antenna), case II (fixed and varying) and case III (varying channel estimation error). The results show that the increasing number of antenna and users enhance the spectral efficiency, downlink transmits power and achievable sum rate performance.
    Keywords: massive MIMO; precoder; downlink transmission; antenna; optimisation; spectral efficiency; achievable sum rate.

  • Preoperative staging of endometrial cancer based on decision tree model   Order a copy of this article
    by Jun Xu, Hao Zeng, Shuqian He, Lingling Qin, Zhengjie Deng 
    Abstract: Endometrial cancer is extremely common in gynaecological tumours. Ultrasound technology has become an important detection method for endometrial cancer, but the accuracy of ultrasound diagnosis is not high. Therefore, using data-driven methods to accurately predict the preoperative staging of endometrial cancer has important clinical significance. To build a more accurate diagnosis model, this paper uses a decision tree model to analyse the preoperative staging diagnosis indicators of endometrial cancer. Experimental results show that the three-detection data of tumour-free distance (TFD), ca125, and uterine to endometrial volume ratio are of high value for the diagnosis of endometrial cancer. The accuracy, sensitivity and specificity of the random forest (RF) model based on decision tree for preoperative staging of endometrial cancer were 97.71%, 94.11% and 100.00%, respectively. The comprehensive predictive ability based on the RF model has good application value for the prediction of preoperative staging of endometrial cancer.
    Keywords: random forest; decision tree; machine learning; endometrial cancer; preoperative staging.

  • An improved fuzzy clustering log anomaly detection method   Order a copy of this article
    by Shuqian He, WenJuan Jiang, Zhengjie Deng, Xuechao Sun, Chun Shi 
    Abstract: Logs are semi-structured text data generated by log statements in software code. Owing to the relatively small amount of abnormal data in log data, there is a situation of data imbalance, which causes a large number of false negatives and false positives in most existing log anomaly detection methods. This paper proposes a fuzzy clustering anomaly detection model for unbalanced data, which can effectively deal with the problem of data imbalance and can effectively detect singular anomalies. We introduce an imbalance compensation factor to improve the fuzzy clustering method, and use this method to build an anomaly detection model for anomaly detection of real log data. Experiments on real data sets show that our proposed method can be effectively applied to log-based anomaly detection. Furthermore, the proposed log-based anomaly detection algorithms outperform other the state-of-the-art algorithms in terms of the accuracy, recall and F1 measurement.
    Keywords: distributed information system; log data; anomaly detection; artificial intelligence for IT operations; fuzzy clustering; imbalanced datasets; unsupervised learning; machine learning.

  • Research on wireless routing problem based on dynamic polycephalus algorithm   Order a copy of this article
    by Zhang Yi, Yang Zhengquan 
    Abstract: The efficiency of the traditional Physarum Polycephalum Model (PPM) is low for wireless planning problems. Also, other heuristic algorithms are easy to fall into local optimum and usually require a large training set to find the optimal parameter combination. Aiming at these problems, we propose a new dynamic model of Physarum Polydynia (DMOP2) algorithm combined with PPM in this paper. This algorithm can judge the irrelevant nodes according to the traffic matrix after each iteration and then delete them and re-establish a new distance matrix when solving the routing problem. The improvements not only reduce the time consumed by calculation but also improve the accuracy of calculation pressure. Simulation experiments in random network and real road network prove the feasibility and effectiveness of the proposed algorithm in solving the path planning problem, and the experimental results show that the efficiency is significantly improved compared with PPM.
    Keywords: wireless planning; Physarum Polycephalum model; dynamic model.

  • A trusted management mechanism based on trust domain in hierarchical internet of things   Order a copy of this article
    by Mingchun Wang, Jia Lou, Yedong Yuan, Chunzi Chen 
    Abstract: Existing trusted models usually authenticate the identity and behaviour of sensing nodes, without considering the role of sensing nodes in the process of interaction and transmission of information. Therefore, in view of the hierarchical wireless sensor network architecture of the internet of things, this paper proposes a new hierarchical trusted management mechanism based on trusted domain. The mechanism abstracts different nodes in the hierarchical structure of the internet of things, gives them different identities, and calculates the trust value of the sensing nodes by using similarity weighted reconciliation method. The experimental results show that the proposed scheme is feasible and effective.
    Keywords: trusted domain; trusted management; similarity weighted reconciliation; trust value; hierarchical structure.

  • Automatic modulation recognition based on channel and spatial attention mechanism   Order a copy of this article
    by Tianjun Peng, Guangxue Yue 
    Abstract: With the complexity of the wireless communication environment, automatic modulation recognition (AMR) of wireless communication signals has become a significant challenge. Most existing researches improve the model recognition performance by designing high-complexity architectures or providing supplementary feature information. This paper proposes a novel AMR framework named CCSGNet. The convolutional neural network (CNN) and bidirectional gate recurrent unit (BiGRU) are employed in CCSGNet to reduce the spectral and time variation of the signals, furthermore, the channel and spatial attention are employed to fully extract local and global features of signals. In order to reduce the training time cost of the model, we propose a piecewise adaptive learning rate tuning method to improve the training of the model. The comparisons with several common learning rate tuning methods on CCSGNet show that the proposed method achieves convergence in 25 training epochs, reducing the training time cost of the model. Moreover, CCSGNet improves the recognition accuracy of 16QAM and 64QAM by 6.47%-50.95% and 4.54%-25.66%, respectively.
    Keywords: automatic modulation recognition; attention mechanism; learning rate; deep learning.

  • Optimisation of a high-speed optical OFDM system for indoor atmospheric conditions   Order a copy of this article
    by B. Sridhar, S. Sridhar, Naresh K. Darimireddy 
    Abstract: VLC provides high security and broadband functionality for optical communication in free space. In particular, this proposed work focuses on analysing receiving power distribution patterns and signal-to-noise ratios for indoor and vehicle applications. The optical systems of indoor communications are more suitable than wireless radio systems. The significant advantage of optical wireless communication (OWC) is providing high-speed data up to 2.5 Gbps at a low cost. In indoor areas such as auditoriums and public places, the OWC systems are more suitable. But optical signals are distorted by the signal propagation effects due to obstacles, walls, etc. The proposed system is an OFDM-based system that can transmit multiple channels and connects many modems over a given indoor area. Proposed methods initially focus on the LED/LD transmitter sources placement at the ceiling of indoor space and observed signal power distribution; in an IM/DD-based OWC system, the information signal must be accurate and nonnegative. The proposed asymmetric optical OFDM (ACO-OFDM) system is implemented for indoor communications, and the system's performance is evaluated with the Bit error rate. In particular, the performance of the specific M-QAM ACO-OFDM method with adaptive frequency is assessed by using theoretical analysis and simulations. Compared to the M-QAM ACO-OFDM method, the ACO-OFDM and DCO-OFDM showed lower spectral efficiency performance for the OWC system in the frequency selective channel.
    Keywords: ACO-OFDM; indoor networks; power distribution; clipping; bit error rate.

  • The agnostics way platform for data governance with metadata management on the big data ecosystem   Order a copy of this article
    by Ashish N. Patil, Prakash R. Devale 
    Abstract: This research focuses on enhancing the security of Metadata in big data environments by developing a novel Recurrent Neural Data Encryption Model (RNDEM). The model addresses critical data governance and security challenges, particularly in cloud computing, where traditional encryption methods often prove inadequate. RNDEM integrates advanced techniques such as Homomorphic encryption and blockchain mechanisms to protect against unauthorized access and denial-of- service (DoS) attacks. This model offers organizations a reliable framework for securing sensitive data in large-scale data ecosystems, supporting improved data governance and regulatory compliance. Combining neural networks with encryption algorithms in a hybrid system aims to strengthen data security while maintaining efficiency. Experimental results demonstrate significant improvements, achieving a confidentiality rate of 1.035%, a low error rate of 15.27%, an encryption time of 0.531ms, and a hash calculation time of 1.95s. Compared to existing models, RNDEM exhibits superior performance regarding privacy rate, error rate, and hash computation time.
    Keywords: blockchain; metadata; data encryption; data analysis; homomorphism; security analysis; DoS attack.
    DOI: 10.1504/IJWMC.2025.10071235
     
  • Optimising low-carbon supply chains in crossborder trade: a tripartite game model analysis   Order a copy of this article
    by Chuan Yang, Feng Ding, Qianqian Wang, Zixia Chen 
    Abstract: This paper focuses on optimizing low-carbon supply chains in cross-border trade. It develops a game model with government, enterprises, and consumers to explore optimal low-carbon implementation strategies under carbon tariffs. By constructing a dynamic game model and deriving a mixed-strategy Nash equilibrium, it analyzes the interactions between government regulation, corporate strategies, and consumer behavior. The study shows that government investment and social welfare maximization strongly influence corporate low-carbon strategies and consumer preferences for green products. This article innovatively proposes a tripartite game model to analyze the optimal strategies for low-carbon supply chain implementation under carbon tariffs. This study enriches the theoretical foundation of low-carbon supply chains in cross-border trade and offers a scientific basis for government policies and corporate low-carbon strategies.
    Keywords: cross-border trade; low-carbon supply chain; game model; optimal strategy.
    DOI: 10.1504/IJWMC.2025.10072589
     
  • MCNN-SENet: Bearing fault diagnosis method based on multi-scale convolution and squeeze-and-excitation networks   Order a copy of this article
    by Lida Liu, Yingjie Chen, Mei Sun, Qimiao Wang, Peiguang Lin 
    Abstract: In modern automated mechanical systems, the health status of rolling bearings directly affects the performance and service life of the machine, which is the focus of fault diagnosis research Traditional bearing fault diagnosis methods rely on manual feature extraction and classifier design, which have limited efficiency and accuracy In view of the problems of limited labelled samples and noise in industrial data, this study proposed a bearing fault diagnosis method based on multi-scale convolution networks (MCNet) and squeeze-and-excitation networks (SENet) In this method, large convolutional kernel and multi-scale convolution are used for efficient feature extraction, and the squeeze-and-excitation blocks are combined to enhance the sensitivity and recognition ability of the network to fault features, so as to improve the accuracy and robustness of fault diagnosis The experimental results show that the average accuracy of the proposed method on the bearing dataset of Case Western is 99 7%, and has good performance in the noisy environment as well.
    Keywords: vibration signals; convolutional neural networks; attention mechanisms; bearing fault diagnosis.
    DOI: 10.1504/IJWMC.2025.10072801
     
  • Game theory with Tuna-Sandcat optimisation-based robust and energy efficient spectrum sensing against malicious users in cognitive radio network   Order a copy of this article
    by Purushottam G. Chilveri, Manisha Ajaykumar Dudhedia 
    Abstract: In 5G Het-net, spectrum sensing (SS) efficiency and energy efficiency (EE) are balanced by the Cognitive Radio Network (CRN). By taking into account different SS circumstances, this effort aims to achieve EE. This work proposes a Tuna-Sandcat Optimization-based Spectrum Sensing (TSI-SCSA) method, integrating Stackelberg game theory to enhance spectrum sensing efficiency and energy efficiency in CRNs while mitigating the impact of MUs providing false information. The approach ensures robust decision-making and optimal channel selection, even under malicious conditions. The performance of the proposed algorithm is evaluated over conventional algorithms for analyses such as spectrum is busy, missed detection, false alarm, useful detection and throughput. The proposed TSI-SCSA model achieves minimal mission detection value of 0.25 at iteration 100, when compared to existing techniques for efficient spectrum sensing in CRN.
    Keywords: cognitive radio network; spectrum sensing; malicious users; Stackelberg Game theory; secondary user.
    DOI: 10.1504/IJWMC.2025.10073489
     
  • Optimal pre-trained deep ensemble of classification model for multimodal sarcasm detection   Order a copy of this article
    by Dnyaneshwar Madhukar Bavkar, Ramgopal Kashyap, Vaishali Khairnar 
    Abstract: The practice of using words or sentences that have a meaning other than their literal meaning is known as verbal irony or sarcasm. Making a machine recognise sarcasm is not an easy task because it can take humans a while to comprehend it. Deep Learning (DL) is becoming increasingly necessary for operations involving detection and classification. The four essential steps in this method are pre-processing, feature extraction, improved modality level fusion, and ensemble classification technique. The very next stage is feature extraction, wherein n-gram, cosine similarity, and improved TF-IDF (ITF-IDF) features are extracted from the text. Through improved modality level feature fusion, all the input modality attributes that have been extracted are placed through fusion to produce the fused feature set. An ensemble classification model is proposed that uses Deep Maxout, DBN, CNN, and Bi-LSTM. Atom Search Assisted Bald Eagle Optimization (ASBEO) trains the Bi-LSTM by tuning the optimum weights.
    Keywords: sarcasm detection; ensemble model; deep learning; optimisation; tokenisation.
    DOI: 10.1504/IJWMC.2024.10073490
     
  • A research on power optimisation of wireless vibration sensors by the embedded data pre-processing   Order a copy of this article
    by Xuejun Ni 
    Abstract: This thesis proposes a low power consumption and low-cost wireless sensor network for vibration signal monitoring. To achieve this, a local condition indicator algorithm is implemented within the vibration sensor, enabling the transmission of indicator data instead of raw data. This approach significantly reduces power consumption while maintaining accuracy. Extensive testing confirms the effectiveness of the proposed solution, demonstrating improved power efficiency by nearly 98% without compromising data accuracy. This innovative approach allows for scalable and distributed measurement of vibration signals, benefiting fault diagnosis and condition monitoring in industrial and engineering applications.
    Keywords: wireless vibration sensor; fault diagnosis; embedded system.
    DOI: 10.1504/IJWMC.2024.10073491
     
  • Context-aware detection of selfish nodes in mobile ad-hoc networks using fusion of hybrid leader optimisation with barnacles mating optimiser and adaptive deep belief network   Order a copy of this article
    by K. Sudhaakar, K.T. Meena Abarna, E. Mohan 
    Abstract: A self-configuring network of mobile nodes linked by wireless connections is a Mobile Ad-hoc Network (MANET). Like the existence of an attack node, the selfish node is present in the network and cannot transfer the information to the neighbor nodes. Due to this reason, the performance gets affected. Hence, this work considers the attributes of nodes, such as like hop count, residual energy, and cooperation history, termed as the input factors. With the help of these constraints, the Adaptive Deep Belief Network (ADBN) is newly developed to determine the target value for the cooperation rate. Further, the hyper-parameters in the Deep Belief Network (DBN) are optimally chosen by proposing the Fusion of Hybrid Leader Optimization with Barnacles Mating Optimizer (FHLO-BMO). From the results, the accuracy and precision rate of the developed model are 92.86% and 93.29%. Finally, the effectiveness of the model is validated and measured with various metrics.
    Keywords: selfish node detection; mobile ad-hoc network; adaptive deep belief network; fusion of hybrid leader optimisation; barnacles mating optimiser.
    DOI: 10.1504/IJWMC.2024.10073498
     
  • A secure transmission protocol using C-ACO routing selection in MANET   Order a copy of this article
    by Sandeep Lalasaheb Dhende, Suresh Damodar Shirbahadurkar 
    Abstract: Developing extremely effective routing protocols for Mobile Ad hoc NETworks (MANETs) is a challenging task. Specifically, the existing methods faced difficulty in satisfying the Quality of Service (QoS) factors and lacked proper adaptation to the changes in network topology with minimal control overhead, making the routing in MANETs an NP-hard problem. Hence, this research proposes an energy-efficient Cuckoo-Ant Colony Optimisation (C-ACO) routing protocol to achieve efficient routing in MANET. The proposed approach demonstrates that the data transmission ought to choose the best path when the repetition of computation occurs within the network. In addition, the AES-128 standard encrypts the routing messages, and the network communication occurs using the QoS-aware C-ACO algorithm that enhances the routing. Experimental results demonstrate that the proposed algorithm reached the end-to-end delay of 9 ms, Packet Delivery Rate of 95%, routing overhead of 0.020, and throughput of 4500 kbps on evaluating with blackhole attack.
    Keywords: MANET; C-ACO; cuckoo-ant colony optimisation; security; QoS; quality-ofservice; AES-128.
    DOI: 10.1504/IJWMC.2024.10073524
     
  • How does common institutional ownership affect the high-quality development of private manufacturing firms: based on the perspective of R&D investment   Order a copy of this article
    by Jie Wang, Xusheng Fang, Haiming Zhang, Jiangjun Yuan 
    Abstract: The high-quality development of private manufacturing firms is important for enhancing Chinas international competitiveness. In this paper, we test how common institutional ownership affects private manufacturing firms R&D investment, a decision that relates to firms long-term value creation. Using data from listed private manufacturing firms in China from 2009 of 2022, we find that common institutional ownership significantly promotes private firms R&D investment, a finding that still holds after robustness tests using propensity score matching, replacing key variables and son on. The mechanism analysis suggests that common institutional ownership mainly plays a resource effect, which promotes R&D investment by alleviating the financing constraints of private firms. Finally, we also find that common institutional ownership can play a greater role when economic policy uncertainty is high and the level of analyst following is high. This study provides new empirical evidence that firms can benefit from common institutional ownership and provides a reference for authorities to guide common institutional investors.
    Keywords: common institutional ownership; R&D investment; financing constraints.
    DOI: 10.1504/IJWMC.2025.10073550
     
  • Simulation of the signal processing system for airborne forwarding-looking windshear   Order a copy of this article
    by Bo Chen, Meng Jia 
    Abstract: In this paper, the signal processing system of the windshear radar was simulated, which mainly included echo signal simulation of microburst, echo signal simulation of ground clutter, clutter suppression, wind speed extraction, and risk factor calculation. The simulation results showed that the fast Fourier transform (FFT) and pulse pair processing (PPP) methods had similar wind speed estimation performance under general conditions, obtaining good wind speed estimations in the core microburst area. When the local clutter was very strong, the ground clutter filter might cause deviations in wind speed estimation. However, ground clutter filtering was unnecessary for the pattern recognition method, which could ensure the integrity of the meteorological signal echo.
    Keywords: windshear detection; ground clutter suppression; pulse pair processing (PPP) method; fast Fourier transform method.
    DOI: 10.1504/IJWMC.2024.10073551
     
  • Trajectory tracking of a multi-robot system based on optimization approach   Order a copy of this article
    by Amol G. Patil, Gautam A. Shah 
    Abstract: The primary goal of this work is to develop a multi-robot trajectory tracking system based on an actor-critic network with hybrid optimisation. Initially, a connectivity graph is constructed in a distributed manner. Then, multiple groups are formed using the proposed Particle Swarm Energy Valley Optimisation (PSEVO) which combines Energy Valley Optimisation (EVO) and Particle Swarm Optimisation (PSO). To define the objective function, parameters such as distance and cost are utilised. The trajectory tracking is then performed using the Hierarchical Rendezvous algorithm. Finally, using the Actor critic network, leader robots are selected. The PSEVO model is assessed using convergence, distance and fitness metrics, achieving values of 1.017, 15.07 m and 0.140. The performance gain achieved by the proposed method for distance is 40.99%, 51.18%, 45.18%, 52.83%, 41.57%, 60.47% and 52.26% greater than the Hierarchical Rendezvous, actor critic network, Switching Topology, PSO-actor critic network, Leaderfollower + algebraic graph, EVO-actor critic network and GCF methods.
    Keywords: consensus tracking algorithm; actor critic network; EVO; energy valley optimisation; multi-robot systems; PSO; particle swarm optimisation.
    DOI: 10.1504/IJWMC.2025.10073637
     
  • Research on image layered defogging algorithm based on transmittance optimization   Order a copy of this article
    by Zhang Xiaoli, Jin Duan, Yao Wang 
    Abstract: In the process of image dehazing, in order to improve the loss of texture details and boundary blurring caused by traditional dark channel prior dehazing algorithms after dehazing, and to avoid mutual interference caused by simultaneous processing of image structure and texture, this article proposes to layer the structure and texture of foggy images, and then optimize the algorithm separately for the defects of traditional dehazing algorithms in the structure layer and texture layer dehazing process. Finally, the optimized texture layer and structure layer are recombined to obtain a dehazing image. The experimental results show that the hierarchical optimization algorithm can preserve the fine texture parts of foggy images, and the edge structure of the scene is clear after dehazing, without distortion in the sky area. The method proposed in this paper is effective.
    Keywords: image defogging; structural layer; texture layer; transmissivity.
    DOI: 10.1504/IJWMC.2025.10073936
     
  • Research on the key core technological innovation of Chinese high-tech enterprises: an empirical analysis using Poisson regression and neural network modelling   Order a copy of this article
    by Zaiyang Xie, THORIN STEVEN JEAN-LOUIS, Yancheng Li 
    Abstract: In order to verify and predict the innovation performance of Chinese high-tech enterprises in key core technology areas in the face of U.S. technology blockade, this paper first employs data from Chinese high-tech listed companies from 2016 to 2022 and uses the Poisson regression model to empirically examine the impact and influencing factors of Sino-US technological decoupling on the innovation of key core technologies in enterprises. Additionally, to further validate the reliability of the results obtained from the Poisson regression model, a feedforward neural network model is constructed. Upon evaluation, this model demonstrates high accuracy and effectiveness in predicting the number of enterprise innovation patents, capturing the complex relationships between variables and enterprise innovation patents well and exhibiting good predictive performance. Based on the above conclusions, this paper aims to provide some empirical enlightenment and prediction tools for how to drive the key core technological innovation.
    Keywords: Sino-US technological decoupling; key core technology; Poisson regression; feedforward neural network.
    DOI: 10.1504/IJWMC.2025.10073993