Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (964)
  • Open Access

    ARTICLE

    Hybrid AI-IoT Framework with Digital Twin Integration for Predictive Urban Infrastructure Management in Smart Cities

    Abdullah Alourani1, Mehtab Alam2,*, Ashraf Ali3, Ihtiram Raza Khan4, Chandra Kanta Samal2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-32, 2026, DOI:10.32604/cmc.2025.070161 - 10 November 2025

    Abstract The evolution of cities into digitally managed environments requires computational systems that can operate in real time while supporting predictive and adaptive infrastructure management. Earlier approaches have often advanced one dimension—such as Internet of Things (IoT)-based data acquisition, Artificial Intelligence (AI)-driven analytics, or digital twin visualization—without fully integrating these strands into a single operational loop. As a result, many existing solutions encounter bottlenecks in responsiveness, interoperability, and scalability, while also leaving concerns about data privacy unresolved. This research introduces a hybrid AI–IoT–Digital Twin framework that combines continuous sensing, distributed intelligence, and simulation-based decision support. The… More >

  • Open Access

    ARTICLE

    IOTA-Based Authentication for IoT Devices in Satellite Networks

    D. Bernal*, O. Ledesma, P. Lamo, J. Bermejo

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-39, 2026, DOI:10.32604/cmc.2025.069746 - 10 November 2025

    Abstract This work evaluates an architecture for decentralized authentication of Internet of Things (IoT) devices in Low Earth Orbit (LEO) satellite networks using IOTA Identity technology. To the best of our knowledge, it is the first proposal to integrate IOTA’s Directed Acyclic Graph (DAG)-based identity framework into satellite IoT environments, enabling lightweight and distributed authentication under intermittent connectivity. The system leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) over the Tangle, eliminating the need for mining and sequential blocks. An identity management workflow is implemented that supports the creation, validation, deactivation, and reactivation of IoT devices,… More >

  • Open Access

    ARTICLE

    Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments

    Yeasul Kim1, Chaeeun Won1, Hwankuk Kim2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-28, 2026, DOI:10.32604/cmc.2025.069608 - 10 November 2025

    Abstract With the increasing emphasis on personal information protection, encryption through security protocols has emerged as a critical requirement in data transmission and reception processes. Nevertheless, IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices, spanning a range of devices from non-encrypted ones to fully encrypted ones. Given the limited visibility into payloads in this context, this study investigates AI-based attack detection methods that leverage encrypted traffic metadata, eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices. Using the UNSW-NB15 and CICIoT-2023 dataset, encrypted and… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Convolutional Neural Network Inference Framework for AIoT Applications

    Haoran Wang1, Shuhong Yang2, Kuan Shao2, Tao Xiao2, Zhenyong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.069404 - 10 November 2025

    Abstract With the rapid development of the Artificial Intelligence of Things (AIoT), convolutional neural networks (CNNs) have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks. However, the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices. Therefore, this paper proposes an efficient privacy-preserving CNN framework (i.e., EPPA) based on the Fully Homomorphic Encryption (FHE) scheme for AIoT application scenarios. In the plaintext domain, we verify schemes with different activation structures to determine the… More >

  • Open Access

    ARTICLE

    An Improved Forest Fire Detection Model Using Audio Classification and Machine Learning

    Kemahyanto Exaudi1,2, Deris Stiawan3,*, Bhakti Yudho Suprapto1, Hanif Fakhrurroja4, Mohd. Yazid Idris5, Tami A. Alghamdi6, Rahmat Budiarto6

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-24, 2026, DOI:10.32604/cmc.2025.069377 - 10 November 2025

    Abstract Sudden wildfires cause significant global ecological damage. While satellite imagery has advanced early fire detection and mitigation, image-based systems face limitations including high false alarm rates, visual obstructions, and substantial computational demands, especially in complex forest terrains. To address these challenges, this study proposes a novel forest fire detection model utilizing audio classification and machine learning. We developed an audio-based pipeline using real-world environmental sound recordings. Sounds were converted into Mel-spectrograms and classified via a Convolutional Neural Network (CNN), enabling the capture of distinctive fire acoustic signatures (e.g., crackling, roaring) that are minimally impacted by… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction

    Abeer Alnuaim*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.069110 - 10 November 2025

    Abstract The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats. In the evolving landscape of cybersecurity, the efficacy of Intrusion Detection Systems (IDS) is increasingly measured by technical performance, operational usability, and adaptability. This study introduces and rigorously evaluates a Human-Computer Interaction (HCI)-Integrated IDS with the utilization of Convolutional Neural Network (CNN), CNN-Long Short Term Memory (LSTM), and Random Forest (RF) against both a Baseline Machine Learning (ML) and a Traditional IDS model, through an extensive experimental framework encompassing many performance metrics, including detection latency, accuracy, alert prioritization, classification… More >

  • Open Access

    ARTICLE

    Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning

    Misbah Anwer1,*, Ghufran Ahmed1, Maha Abdelhaq2, Raed Alsaqour3, Shahid Hussain4, Adnan Akhunzada5,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068673 - 10 November 2025

    Abstract The exponential growth of the Internet of Things (IoT) has introduced significant security challenges, with zero-day attacks emerging as one of the most critical and challenging threats. Traditional Machine Learning (ML) and Deep Learning (DL) techniques have demonstrated promising early detection capabilities. However, their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints, high computational costs, and the costly time-intensive process of data labeling. To address these challenges, this study proposes a Federated Learning (FL) framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in… More >

  • Open Access

    ARTICLE

    GSLDWOA: A Feature Selection Algorithm for Intrusion Detection Systems in IIoT

    Wanwei Huang1,*, Huicong Yu1, Jiawei Ren2, Kun Wang3, Yanbu Guo1, Lifeng Jin4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-24, 2026, DOI:10.32604/cmc.2025.068493 - 10 November 2025

    Abstract Existing feature selection methods for intrusion detection systems in the Industrial Internet of Things often suffer from local optimality and high computational complexity. These challenges hinder traditional IDS from effectively extracting features while maintaining detection accuracy. This paper proposes an industrial Internet of Things intrusion detection feature selection algorithm based on an improved whale optimization algorithm (GSLDWOA). The aim is to address the problems that feature selection algorithms under high-dimensional data are prone to, such as local optimality, long detection time, and reduced accuracy. First, the initial population’s diversity is increased using the Gaussian Mutation More >

  • Open Access

    ARTICLE

    A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix

    Hongyu Zhao1,2, Shengsheng Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.068426 - 10 November 2025

    Abstract Driven by advancements in mobile internet technology, images have become a crucial data medium. Ensuring the security of image information during transmission has thus emerged as an urgent challenge. This study proposes a novel image encryption algorithm specifically designed for grayscale image security. This research introduces a new Cantor diagonal matrix permutation method. The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix, where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice (CML). The high initial value sensitivity of the… More >

  • Open Access

    ARTICLE

    Melatonin Enhances Antioxidant Defense and Physiological Stability in Grapevine (Vitis vinifera L.) Cultivars ‘Merlot’ and ‘Erciş’ under UV-B Stress

    Sena Yıldız1, Nurhan Keskin2,*, Birhan Kunter3, Harlene Hatterman-Valenti4, Ozkan Kaya4,5,*

    Phyton-International Journal of Experimental Botany, Vol.94, No.11, pp. 3471-3492, 2025, DOI:10.32604/phyton.2025.073180 - 01 December 2025

    Abstract Climate change-driven environmental stresses, particularly ultraviolet-B (UV-B) radiation, pose severe threats to grapevine (Vitis vinifera L.) productivity and physiological stability. This study investigated the protective role of melatonin in in vitro plantlets of two grapevine cultivars, ‘Merlot’ and ‘Erciş’, subjected to low (≈8.25 μW cm−2, 16 h) and high (≈33 μW cm−2, 4 h) UV-B exposure. Significant cultivar-specific responses were observed (p < 0.001). The ‘Erciş’ cultivar exhibited higher oxidative stress, with malondialdehyde (MDA) levels reaching 24.30 mmol g−1 FW in control plants compared with 14.91 ± 0.25 mmol g−1 FW in ‘Merlot’. Melatonin provided dose-dependent mitigation, reducing MDA to… More >

Displaying 1-10 on page 1 of 964. Per Page