Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    A WSN Node Fault Diagnosis Model Based on BRB with Self-Adaptive Quality Factor

    Guo-Wen Sun1, Gang Xiang2,3, Wei He1,4,*, Kai Tang1, Zi-Yi Wang1, Hai-Long Zhu1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1157-1177, 2023, DOI:10.32604/cmc.2023.035667 - 06 February 2023

    Abstract Wireless sensor networks (WSNs) operate in complex and harsh environments; thus, node faults are inevitable. Therefore, fault diagnosis of the WSNs node is essential. Affected by the harsh working environment of WSNs and wireless data transmission, the data collected by WSNs contain noisy data, leading to unreliable data among the data features extracted during fault diagnosis. To reduce the influence of unreliable data features on fault diagnosis accuracy, this paper proposes a belief rule base (BRB) with a self-adaptive quality factor (BRB-SAQF) fault diagnosis model. First, the data features required for WSN node fault diagnosis… More >

  • Open Access

    ARTICLE

    Latency-Aware Dynamic Second Offloading Service in SDN-Based Fog Architecture

    Samah Ibrahim AlShathri, Dina S. M. Hassan*, Samia Allaoua Chelloug

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1501-1526, 2023, DOI:10.32604/cmc.2023.035602 - 06 February 2023

    Abstract Task offloading is a key strategy in Fog Computing (FC). The definition of resource-constrained devices no longer applies to sensors and Internet of Things (IoT) embedded system devices alone. Smart and mobile units can also be viewed as resource-constrained devices if the power, cloud applications, and data cloud are included in the set of required resources. In a cloud-fog-based architecture, a task instance running on an end device may need to be offloaded to a fog node to complete its execution. However, in a busy network, a second offloading decision is required when the fog… More >

  • Open Access

    ARTICLE

    Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility

    Rupali Gangarde1,2,*, Amit Sharma3, Ambika Pawar4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2171-2190, 2023, DOI:10.32604/cmc.2023.035559 - 06 February 2023

    Abstract Online Social Networks (OSN) sites allow end-users to share a great deal of information, which may also contain sensitive information, that may be subject to commercial or non-commercial privacy attacks. As a result, guaranteeing various levels of privacy is critical while publishing data by OSNs. The clustering-based solutions proved an effective mechanism to achieve the privacy notions in OSNs. But fixed clustering limits the performance and scalability. Data utility degrades with increased privacy, so balancing the privacy utility trade-off is an open research issue. The research has proposed a novel privacy preservation model using the… More >

  • Open Access

    ARTICLE

    Edge Computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet

    Yanping Chen1,2,3, Xuyang Bai1,2,3,*, Xiaomin Jin1,2,3, Zhongmin Wang1,2,3, Fengwei Wang4, Li Ling4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2101-2117, 2023, DOI:10.32604/cmc.2023.035530 - 06 February 2023

    Abstract Deploying task caching at edge servers has become an effective way to handle compute-intensive and latency-sensitive tasks on the industrial internet. However, how to select the task scheduling location to reduce task delay and cost while ensuring the data security and reliable communication of edge computing remains a challenge. To solve this problem, this paper establishes a task scheduling model with joint blockchain and task caching in the industrial internet and designs a novel blockchain-assisted caching mechanism to enhance system security. In this paper, the task scheduling problem, which couples the task scheduling decision, task… More >

  • Open Access

    ARTICLE

    A Novel Capability of Object Identification and Recognition Based on Integrated mWMM

    M. Zeeshan Sarwar1, Mohammed Hamad Alatiyyah2, Ahmad Jalal1, Mohammad Shorfuzzaman3, Nawal Alsufyani3, Jeongmin Park4,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 959-976, 2023, DOI:10.32604/cmc.2023.035442 - 06 February 2023

    Abstract In the last decade, there has been remarkable progress in the areas of object detection and recognition due to high-quality color images along with their depth maps provided by RGB-D cameras. They enable artificially intelligent machines to easily detect and recognize objects and make real-time decisions according to the given scenarios. Depth cues can improve the quality of object detection and recognition. The main purpose of this research study to find an optimized way of object detection and identification we propose techniques of object detection using two RGB-D datasets. The proposed methodology extracts image normally… More >

  • Open Access

    ARTICLE

    Multi-Layer Fog-Cloud Architecture for Optimizing the Placement of IoT Applications in Smart Cities

    Mohammad Aldossary*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 633-649, 2023, DOI:10.32604/cmc.2023.035414 - 06 February 2023

    Abstract In the smart city paradigm, the deployment of Internet of Things (IoT) services and solutions requires extensive communication and computing resources to place and process IoT applications in real time, which consumes a lot of energy and increases operational costs. Usually, IoT applications are placed in the cloud to provide high-quality services and scalable resources. However, the existing cloud-based approach should consider the above constraints to efficiently place and process IoT applications. In this paper, an efficient optimization approach for placing IoT applications in a multi-layer fog-cloud environment is proposed using a mathematical model (Mixed-Integer… More >

  • Open Access

    ARTICLE

    Construction and Application of Cloud Computing Model for Reciprocal and Collaborative Knowledge Management

    Jingqi Li1,*, Yijie Bian1, Jun Guan2, Lu Yang2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1119-1137, 2023, DOI:10.32604/cmc.2023.035369 - 06 February 2023

    Abstract Promoting the co-constructing and sharing of organizational knowledge and improving organizational performance have always been the core research subject of knowledge management. Existing research focuses on the construction of knowledge management systems and knowledge sharing and transfer mechanisms. With the rapid development and application of cloud computing and big data technology, knowledge management is faced with many problems, such as how to combine with the new generation of information technology, how to achieve integration with organizational business processes, and so on. To solve such problems, this paper proposes a reciprocal collaborative knowledge management model (RCKM… More >

  • Open Access

    ARTICLE

    Relative-Position Estimation Based on Loosely Coupled UWB–IMU Fusion for Wearable IoT Devices

    A. S. M. Sharifuzzaman Sagar1, Taein Kim1, Soyoung Park1, Hee Seh Lee2, Hyung Seok Kim1,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1941-1961, 2023, DOI:10.32604/cmc.2023.035360 - 06 February 2023

    Abstract Relative positioning is one of the important techniques in collaborative robotics, autonomous vehicles, and virtual/augmented reality (VR/AR) applications. Recently, ultra-wideband (UWB) has been utilized to calculate relative position as it does not require a line of sight compared to a camera to calculate the range between two objects with centimeter-level accuracy. However, the single UWB range measurement cannot provide the relative position and attitude of any device in three dimensions (3D) because of lacking bearing information. In this paper, we have proposed a UWB-IMU fusion-based relative position system to provide accurate relative position and attitude… More >

  • Open Access

    ARTICLE

    Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key

    Wangke Yu, Shuhua Wang*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 67-80, 2023, DOI:10.32604/cmc.2023.035337 - 06 February 2023

    Abstract Wireless network is the basis of the Internet of things and the intelligent vehicle Internet. Due to the complexity of the Internet of things and intelligent vehicle Internet environment, the nodes of the Internet of things and the intelligent vehicle Internet are more vulnerable to malicious destruction and attacks. Most of the proposed authentication and key agreement protocols for wireless networks are based on traditional cryptosystems such as large integer decomposition and elliptic curves. With the rapid development of quantum computing, these authentication protocols based on traditional cryptography will be more and more threatened, so… More >

  • Open Access

    ARTICLE

    Fruit Leaf Diseases Classification: A Hierarchical Deep Learning Framework

    Samra Rehman1, Muhammad Attique Khan1, Majed Alhaisoni2, Ammar Armghan3, Fayadh Alenezi3, Abdullah Alqahtani4, Khean Vesal5, Yunyoung Nam5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1179-1194, 2023, DOI:10.32604/cmc.2023.035324 - 06 February 2023

    Abstract Manual inspection of fruit diseases is a time-consuming and costly because it is based on naked-eye observation. The authors present computer vision techniques for detecting and classifying fruit leaf diseases. Examples of computer vision techniques are preprocessing original images for visualization of infected regions, feature extraction from raw or segmented images, feature fusion, feature selection, and classification. The following are the major challenges identified by researchers in the literature: (i) low-contrast infected regions extract irrelevant and redundant information, which misleads classification accuracy; (ii) irrelevant and redundant information may increase computational time and reduce the designed… More >

Displaying 2831-2840 on page 284 of 7234. Per Page