Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access


    Towards Blockchain-Based Secure BGP Routing, Challenges and Future Research Directions

    Qiong Yang1, Li Ma1,2,*, Shanshan Tu1, Sami Ullah3, Muhammad Waqas4,5, Hisham Alasmary6

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2035-2062, 2024, DOI:10.32604/cmc.2024.049970

    Abstract Border Gateway Protocol (BGP) is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations. The BGP protocol exhibits security design defects, such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes, easily triggering prefix hijacking, path forgery, route leakage, and other BGP security threats. Meanwhile, the traditional BGP security mechanism, relying on a public key infrastructure, faces issues like a single point of failure and a single point of trust. The decentralization, anti-tampering, and More >

  • Open Access


    Design Pattern and Challenges of Federated Learning with Applications in Industrial Control System

    Hina Batool1, Jiuyun Xu1,*, Ateeq Ur Rehman2, Habib Hamam3,4,5,6

    Journal on Artificial Intelligence, Vol.6, pp. 105-128, 2024, DOI:10.32604/jai.2024.049912

    Abstract Federated Learning (FL) appeared as an encouraging approach for handling decentralized data. Creating a FL system needs both machine learning (ML) knowledge and thinking about how to design system software. Researchers have focused a lot on the ML side of FL, but have not paid enough attention to designing the software architecture. So, in this survey, a set of design patterns is described to tackle the design issues. Design patterns are like reusable solutions for common problems that come up when designing software architecture. This paper focuses on (1) design patterns such as architectures, frameworks,… More >

  • Open Access


    Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

    Shafi Ullah1, Sibghat Ullah Bazai1,*, Mohammad Imran2, Qazi Mudassar Ilyas3,*, Abid Mehmood4, Muhammad Asim Saleem5, Muhmmad Aasim Rafique3, Arsalan Haider6, Ilyas Khan7, Sajid Iqbal3, Yonis Gulzar4, Kauser Hameed3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 93-115, 2024, DOI:10.32604/cmc.2024.048796

    Abstract Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine-type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the… More >

  • Open Access


    Plant Nitrogen Metabolism: Balancing Resilience to Nutritional Stress and Abiotic Challenges

    Muhammad Farhan1,#, Manda Sathish2, Rafia Kiran1, Aroosa Mushtaq3, Alaa Baazeem4, Ammarah Hasnain5, Fahad Hakim1, Syed Atif Hasan Naqvi1,#,*, Mustansar Mubeen6, Yasir Iftikhar6,*, Aqleem Abbas7, Muhammad Zeeshan Hassan1, Mahmoud Moustafa8

    Phyton-International Journal of Experimental Botany, Vol.93, No.3, pp. 581-609, 2024, DOI:10.32604/phyton.2024.046857


    Plant growth and resilience to abiotic stresses, such as soil salinity and drought, depend intricately on nitrogen metabolism. This review explores nitrogen’s regulatory role in plant responses to these challenges, unveiling a dynamic interplay between nitrogen availability and abiotic stress. In the context of soil salinity, a nuanced relationship emerges, featuring both antagonistic and synergistic interactions between salinity and nitrogen levels. Salinity-induced chlorophyll depletion in plants can be alleviated by optimal nitrogen supplementation; however, excessive nitrogen can exacerbate salinity stress. We delve into the complexities of this interaction and its agricultural implications. Nitrogen, a vital element

    More >

  • Open Access


    Novelty of Different Distance Approach for Multi-Criteria Decision-Making Challenges Using q-Rung Vague Sets

    Murugan Palanikumar1, Nasreen Kausar2,*, Dragan Pamucar3,4, Seifedine Kadry5,6,7,*, Chomyong Kim8, Yunyoung Nam9

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3353-3385, 2024, DOI:10.32604/cmes.2024.031439

    Abstract In this article, multiple attribute decision-making problems are solved using the vague normal set (VNS). It is possible to generalize the vague set (VS) and q-rung fuzzy set (FS) into the q-rung vague set (VS). A log q-rung normal vague weighted averaging (log q-rung NVWA), a log q-rung normal vague weighted geometric (log q-rung NVWG), a log generalized q-rung normal vague weighted averaging (log Gq-rung NVWA), and a log generalized q-rung normal vague weighted geometric (log Gq-rung NVWG) operator are discussed in this article. A description is provided of the scoring function, accuracy function and operational laws of the log q-rung… More >

  • Open Access


    A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions

    Shahriar Md Arman1, Tao Yang1,*, Shahadat Shahed2, Alanoud Al Mazroa3, Afraa Attiah4, Linda Mohaisen4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2087-2110, 2024, DOI:10.32604/cmc.2024.047870

    Abstract The rapid growth of smart technologies and services has intensified the challenges surrounding identity authentication techniques. Biometric credentials are increasingly being used for verification due to their advantages over traditional methods, making it crucial to safeguard the privacy of people’s biometric data in various scenarios. This paper offers an in-depth exploration for privacy-preserving techniques and potential threats to biometric systems. It proposes a noble and thorough taxonomy survey for privacy-preserving techniques, as well as a systematic framework for categorizing the field’s existing literature. We review the state-of-the-art methods and address their advantages and limitations in More >

  • Open Access


    Fuzzing: Progress, Challenges, and Perspectives

    Zhenhua Yu1, Zhengqi Liu1, Xuya Cong1,*, Xiaobo Li2, Li Yin3

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1-29, 2024, DOI:10.32604/cmc.2023.042361

    Abstract As one of the most effective techniques for finding software vulnerabilities, fuzzing has become a hot topic in software security. It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system. In recent years, considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing, so there are more and more methods and forms, which make it difficult to have a comprehensive understanding of the technique. This paper conducts a thorough survey of fuzzing, focusing on its general process, classification, common application scenarios, and some More >

  • Open Access


    Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques: A Comprehensive Review and Open Challenges

    Samina Amin1, Muhammad Ali Zeb1, Hani Alshahrani2,*, Mohammed Hamdi2, Mohammad Alsulami2, Asadullah Shaikh3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1167-1202, 2024, DOI:10.32604/cmes.2023.043921

    Abstract Social media (SM) based surveillance systems, combined with machine learning (ML) and deep learning (DL) techniques, have shown potential for early detection of epidemic outbreaks. This review discusses the current state of SM-based surveillance methods for early epidemic outbreaks and the role of ML and DL in enhancing their performance. Since, every year, a large amount of data related to epidemic outbreaks, particularly Twitter data is generated by SM. This paper outlines the theme of SM analysis for tracking health-related issues and detecting epidemic outbreaks in SM, along with the ML and DL techniques that… More >

  • Open Access


    Wireless Positioning: Technologies, Applications, Challenges, and Future Development Trends

    Xingwang Li1,2, Hua Pang1, Geng Li1,*, Junjie Jiang1, Hui Zhang3, Changfei Gu4, Dong Yuan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1135-1166, 2024, DOI:10.32604/cmes.2023.031534

    Abstract The development of the fifth-generation (5G) mobile communication systems has entered the commercialization stage. 5G has a high data rate, low latency, and high reliability that can meet the basic demands of most industries and daily life, such as the Internet of Things (IoT), intelligent transportation systems, positioning, and navigation. The continuous progress and development of society have aroused wide concern. Positioning accuracy is the core demand for the applications, especially in complex environments such as airports, warehouses, supermarkets, and basements. However, many factors also affect the accuracy of positioning in those environments, for example, More >

  • Open Access


    Bond-Slip Behavior of Steel Bar and Recycled Steel Fibre-Reinforced Concrete

    Ismail Shah1,2, Jing Li1,3,4,*, Nauman Khan5, Hamad R. Almujibah6, Muhammad Mudassar Rehman2, Ali Raza7, Yun Peng3,4

    Journal of Renewable Materials, Vol.12, No.1, pp. 167-186, 2024, DOI:10.32604/jrm.2023.031503

    Abstract Recycled steel fiber reinforced concrete is an innovative construction material that offers exceptional mechanical properties and durability. It is considered a sustainable material due to its low carbon footprint and environmental friendly characteristics. This study examines the key influencing factors that affect the behavior of this material, such as the steel fiber volume ratio, recycled aggregate replacement rate, concrete strength grade, anchorage length, and stirrup constraint. The study investigates the bond failure morphology, bond-slip, and bond strength constitutive relationship of steel fiber recycled concrete. The results show that the addition of steel fibers at 0.5%,… More >

Displaying 1-10 on page 1 of 71. Per Page