Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (298)
  • Open Access

    ARTICLE

    Secured Vehicle Life Cycle Tracking Using Blockchain and Smart Contract

    Srinivasan Ananthanarayanan Bragadeesh, Arumugam Umamakeswari*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 1-18, 2022, DOI:10.32604/csse.2022.019842

    Abstract Life Cycle Tracking (LCT) involves continuous monitoring and analysis of various activities associated with a vehicle. The crucial factor in the LCT is to ensure the validity of gathered data as numerous supply chain phases are involved and the data is assessed by multiple stakeholders. Frauds and swindling activities can be prevented if the history of the vehicles is made available to the interested parties. Blockchain provides a way of enforcing trustworthiness to the supply chain participants and the data associated with the various actions performed. Machine learning techniques when combined decentralized nature of blockchains can be used to develop… More >

  • Open Access

    ARTICLE

    An IoT Based Secure Patient Health Monitoring System

    Kusum Yadav1, Ali Alharbi1, Anurag Jain2,*, Rabie A. Ramadan1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3637-3652, 2022, DOI:10.32604/cmc.2022.020614

    Abstract Internet of things (IoT) field has emerged due to the rapid growth of artificial intelligence and communication technologies. The use of IoT technology in modern healthcare environments is convenient for doctors and patients as it can be used in real-time monitoring of patients, proper administration of patient information, and healthcare management. However, the usage of IoT in the healthcare domain will become a nightmare if patient information is not securely maintained while transferring over an insecure network or storing at the administrator end. In this manuscript, the authors have developed a secure IoT healthcare monitoring system using the Blockchain-based XOR… More >

  • Open Access

    ARTICLE

    Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique

    Asif Irshad Khan1,*, Abdullah Saad Al-Malaise ALGhamdi2, Fawaz Jaber Alsolami1, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Abdullah Marish Ali1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2835-2860, 2022, DOI:10.32604/cmc.2022.020342

    Abstract The blockchain technology plays a significant role in the present era of information technology. In the last few years, this technology has been used effectively in several domains. It has already made significant differences in human life, as well as is intended to have noticeable impact in many other domains in the forthcoming years. The rapid growth in blockchain technology has created numerous new possibilities for use, especially for healthcare applications. The digital healthcare services require highly effective security methodologies that can integrate data security with the available management strategies. To test and understand this goal of security management in… More >

  • Open Access

    ARTICLE

    Blockchain-Based SQKD and IDS in Edge Enabled Smart Grid Network

    Abdullah Musaed Alkhiari1, Shailendra Mishra2,*, Mohammed AlShehri1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2149-2169, 2022, DOI:10.32604/cmc.2022.019562

    Abstract Smart Grid is a power grid that improves flexibility, reliability, and efficiency through smart meters. Due to extensive data exchange over the Internet, the smart grid faces many security challenges that have led to data loss, data compromise, and high power consumption. Moreover, the lack of hardware protection and physical attacks reduce the overall performance of the smart grid network. We proposed the BLIDSE model (Blockchain-based secure quantum key distribution and Intrusion Detection System in Edge Enables Smart Grid Network) to address these issues. The proposed model includes five phases: The first phase is blockchain-based secure user authentication, where all… More >

  • Open Access

    ARTICLE

    VacChain: A Blockchain-Based EMR System to Manage Child Vaccination Records

    Azza Abdullah Alnssayan, Mohammad Mahdi Hassan*, Suliman A. Alsuhibany

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 927-945, 2022, DOI:10.32604/csse.2022.016734

    Abstract The digitalization of healthcare-related information service systems has become a trend across the world. However, several crucial services are still provided manually due to a lack of trust in digital solutions. One such service is keeping records of children’s vaccination, which still relies on a paper-based file system in most parts of the world. This approach causes serious data integrity problems. Recently, healthcare has become a potential application area of the blockchain, as it can preserve and protect highly sensitive private medical records while sharing these records in a decentralized manner without losing personal ownership. Therefore, we propose a new… More >

  • Open Access

    ARTICLE

    Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic

    Mohammed Baz1, Sabita Khatri2, Abdullah Baz3, Hosam Alhakami4, Alka Agrawal2, Raees Ahmad Khan2,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 691-702, 2022, DOI:10.32604/csse.2022.019079

    Abstract The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020, provide critical research criteria to assess the vulnerabilities of our current health system. The paper addresses our preparedness for the management of such acute health emergencies and the need to enhance awareness, about public health and healthcare mechanisms. In view of this unprecedented health crisis, distributed ledger and AI technology can be seen as one of the promising alternatives for fighting against such epidemics at the early stages, and with the higher efficacy. At the implementation level,… More >

  • Open Access

    ARTICLE

    Energy-Aware Scheduling for Tasks with Target-Time in Blockchain based Data Centres

    I. Devi*, G.R. Karpagam

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 405-419, 2022, DOI:10.32604/csse.2022.018573

    Abstract

    Cloud computing infrastructures have intended to provide computing services to end-users through the internet in a pay-per-use model. The extensive deployment of the Cloud and continuous increment in the capacity and utilization of data centers (DC) leads to massive power consumption. This intensifying scale of DCs has made energy consumption a critical concern. This paper emphasizes the task scheduling algorithm by formulating the system model to minimize the makespan and energy consumption incurred in a data center. Also, an energy-aware task scheduling in the Blockchain-based data center was proposed to offer an optimal solution that minimizes makespan and energy consumption.… More >

  • Open Access

    ARTICLE

    A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party

    Ahmed S. Alghamdi1, Surayya Naz2, Ammar Saeed3, Eesa Al Solami1, Muhammad Kamran1,*, Mohammed Saeed Alkatheiri1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1585-1601, 2022, DOI:10.32604/cmc.2022.019936

    Abstract With widespread use of relational database in various real-life applications, maintaining integrity and providing copyright protection is gaining keen interest of the researchers. For this purpose, watermarking has been used for quite a long time. Watermarking requires the role of trusted third party and a mechanism to extract digital signatures (watermark) to prove the ownership of the data under dispute. This is often inefficient as lots of processing is required. Moreover, certain malicious attacks, like additive attacks, can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting… More >

  • Open Access

    ARTICLE

    Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain

    Hani Mohammed Alshahrani*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 739-766, 2022, DOI:10.32604/cmc.2022.019623

    Abstract One of the most rapidly growing areas in the last few years is the Internet of Things (IoT), which has been used in widespread fields such as healthcare, smart homes, and industries. Android is one of the most popular operating systems (OS) used by IoT devices for communication and data exchange. Android OS captured more than 70 percent of the market share in 2021. Because of the popularity of the Android OS, it has been targeted by cybercriminals who have introduced a number of issues, such as stealing private information. As reported by one of the recent studies Android malware… More >

  • Open Access

    ARTICLE

    Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus

    Tehreem Aslam1, Ayesha Maqbool1, Maham Akhtar1, Alina Mirza2,*, Muhammad Anees Khan3, Wazir Zada Khan4, Shadab Alam5

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1089-1109, 2022, DOI:10.32604/cmc.2022.019416

    Abstract Enterprise Resource Planning (ERP) software is extensively used for the management of business processes. ERP offers a system of integrated applications with a shared central database. Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure, which makes the database vulnerable. This paper investigates database and Blockchain integration, where the Blockchain network works in synchronization with the database system, and offers a mechanism to validate the transactions and ensure data integrity. Limited research exists on Blockchain-based solutions for the single point of failure in ERP. We established in… More >

Displaying 221-230 on page 23 of 298. Per Page