Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (519)
  • Open Access

    ARTICLE

    An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing

    Yuanhang Zhang1, Xu An Wang1,2,*, Weiwei Jiang3, Mingyu Zhou1, Xiaoxuan Xu1, Hao Liu1

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1533-1553, 2025, DOI:10.32604/cmc.2025.062910 - 26 March 2025

    Abstract Cloud storage, a core component of cloud computing, plays a vital role in the storage and management of data. Electronic Health Records (EHRs), which document users’ health information, are typically stored on cloud servers. However, users’ sensitive data would then become unregulated. In the event of data loss, cloud storage providers might conceal the fact that data has been compromised to protect their reputation and mitigate losses. Ensuring the integrity of data stored in the cloud remains a pressing issue that urgently needs to be addressed. In this paper, we propose a data auditing scheme… More >

  • Open Access

    ARTICLE

    Fine-Grained Point Cloud Intensity Correction Modeling Method Based on Mobile Laser Scanning

    Xu Liu1, Qiujie Li1,*, Youlin Xu1, Musaed Alhussein2, Khursheed Aurangzeb2,*, Fa Zhu1

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 575-593, 2025, DOI:10.32604/cmc.2025.062445 - 26 March 2025

    Abstract The correction of Light Detection and Ranging (LiDAR) intensity data is of great significance for enhancing its application value. However, traditional intensity correction methods based on Terrestrial Laser Scanning (TLS) technology rely on manual site setup to collect intensity training data at different distances and incidence angles, which is noisy and limited in sample quantity, restricting the improvement of model accuracy. To overcome this limitation, this study proposes a fine-grained intensity correction modeling method based on Mobile Laser Scanning (MLS) technology. The method utilizes the continuous scanning characteristics of MLS technology to obtain dense point… More >

  • Open Access

    ARTICLE

    Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud

    Tajinder Kumar1, Purushottam Sharma2,*, Xiaochun Cheng3,*, Sachin Lalar4, Shubham Kumar5, Sandhya Bansal6

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 719-738, 2025, DOI:10.32604/cmc.2025.060836 - 26 March 2025

    Abstract With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s… More >

  • Open Access

    ARTICLE

    Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud

    Xixi Yan1, Jing Zhang2,*, Pengyu Cheng2

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1399-1414, 2025, DOI:10.32604/cmc.2025.059969 - 26 March 2025

    Abstract Conditional proxy re-encryption (CPRE) is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular, but most of the attribute-based conditional proxy re-encryption (AB-CPRE) schemes proposed so far do not take into account the importance of user attributes. A weighted attribute-based conditional proxy re-encryption (WAB-CPRE) scheme is thus designed to provide more precise decryption rights delegation. By introducing the concept of weight attributes, the quantity of system attributes managed by the server is reduced greatly. At the same time, a weighted tree structure is constructed… More >

  • Open Access

    ARTICLE

    Modified Neural Network Used for Host Utilization Predication in Cloud Computing Environment

    Arif Ullah1, Siti Fatimah Abdul Razak2,*, Sumendra Yogarayan2, Md Shohel Sayeed2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5185-5204, 2025, DOI:10.32604/cmc.2025.059355 - 06 March 2025

    Abstract Networking, storage, and hardware are just a few of the virtual computing resources that the infrastructure service model offers, depending on what the client needs. One essential aspect of cloud computing that improves resource allocation techniques is host load prediction. This difficulty means that hardware resource allocation in cloud computing still results in hosting initialization issues, which add several minutes to response times. To solve this issue and accurately predict cloud capacity, cloud data centers use prediction algorithms. This permits dynamic cloud scalability while maintaining superior service quality. For host prediction, we therefore present a… More >

  • Open Access

    ARTICLE

    Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier

    Yawar Abbas1, Aisha Ahmed Alarfaj2, Ebtisam Abdullah Alabdulqader3, Asaad Algarni4, Ahmad Jalal1,5, Hui Liu6,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4759-4776, 2025, DOI:10.32604/cmc.2025.059224 - 06 March 2025

    Abstract Human Activity Recognition (HAR) in drone-captured videos has become popular because of the interest in various fields such as video surveillance, sports analysis, and human-robot interaction. However, recognizing actions from such videos poses the following challenges: variations of human motion, the complexity of backdrops, motion blurs, occlusions, and restricted camera angles. This research presents a human activity recognition system to address these challenges by working with drones’ red-green-blue (RGB) videos. The first step in the proposed system involves partitioning videos into frames and then using bilateral filtering to improve the quality of object foregrounds while… More >

  • Open Access

    ARTICLE

    A Bioinspired Method for Optimal Task Scheduling in Fog-Cloud Environment

    Ferzat Anka1, Ghanshyam G. Tejani2,3,*, Sunil Kumar Sharma4, Mohammed Baljon5

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2691-2724, 2025, DOI:10.32604/cmes.2025.061522 - 03 March 2025

    Abstract Due to the intense data flow in expanding Internet of Things (IoT) applications, a heavy processing cost and workload on the fog-cloud side become inevitable. One of the most critical challenges is optimal task scheduling. Since this is an NP-hard problem type, a metaheuristic approach can be a good option. This study introduces a novel enhancement to the Artificial Rabbits Optimization (ARO) algorithm by integrating Chaotic maps and Levy flight strategies (CLARO). This dual approach addresses the limitations of standard ARO in terms of population diversity and convergence speed. It is designed for task scheduling… More >

  • Open Access

    ARTICLE

    Cloud-Based Deep Learning for Real-Time URL Anomaly Detection: LSTM/GRU and CNN/LSTM Models

    Ayman Noor*

    Computer Systems Science and Engineering, Vol.49, pp. 259-286, 2025, DOI:10.32604/csse.2025.060387 - 21 February 2025

    Abstract Precisely forecasting the performance of Deep Learning (DL) models, particularly in critical areas such as Uniform Resource Locator (URL)-based threat detection, aids in improving systems developed for difficult tasks. In cybersecurity, recognizing harmful URLs is vital to lowering risks associated with phishing, malware, and other online-based attacks. Since it directly affects the model’s capacity to differentiate between benign and harmful URLs, finding the optimum mix of hyperparameters in DL models is a significant difficulty. Two commonly used architectures for sequential and spatial data processing, Long Short-Term Memory (LSTM)/Gated Recurrent Unit (GRU) and Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    GPU Usage Time-Based Ordering Management Technique for Tasks Execution to Prevent Running Failures of GPU Tasks in Container Environments

    Joon-Min Gil1, Hyunsu Jeong1, Jihun Kang2,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2199-2213, 2025, DOI:10.32604/cmc.2025.061182 - 17 February 2025

    Abstract In a cloud environment, graphics processing units (GPUs) are the primary devices used for high-performance computation. They exploit flexible resource utilization, a key advantage of cloud environments. Multiple users share GPUs, which serve as coprocessors of central processing units (CPUs) and are activated only if tasks demand GPU computation. In a container environment, where resources can be shared among multiple users, GPU utilization can be increased by minimizing idle time because the tasks of many users run on a single GPU. However, unlike CPUs and memory, GPUs cannot logically multiplex their resources. Additionally, GPU memory… More >

  • Open Access

    ARTICLE

    A Novel Proactive AI-Based Agents Framework for an IoE-Based Smart Things Monitoring System with Applications for Smart Vehicles

    Meng-Hua Yen1,*, Nilamadhab Mishra2,*, Win-Jet Luo3, Chu-En Lin1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1839-1855, 2025, DOI:10.32604/cmc.2025.060903 - 17 February 2025

    Abstract The Internet of Everything (IoE) coupled with Proactive Artificial Intelligence (AI)-Based Learning Agents (PLAs) through a cloud processing system is an idea that connects all computing resources to the Internet, making it possible for these devices to communicate with one another. Technologies featured in the IoE include embedding, networking, and sensing devices. To achieve the intended results of the IoE and ease life for everyone involved, sensing devices and monitoring systems are linked together. The IoE is used in several contexts, including intelligent cars’ protection, navigation, security, and fuel efficiency. The Smart Things Monitoring System… More >

Displaying 41-50 on page 5 of 519. Per Page