Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (680)
  • Open Access

    ARTICLE

    Data Secure Storage Mechanism for IIoT Based on Blockchain

    Jin Wang1,2, Guoshu Huang1, R. Simon Sherratt3, Ding Huang4, Jia Ni4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4029-4048, 2024, DOI:10.32604/cmc.2024.047468

    Abstract With the development of Industry 4.0 and big data technology, the Industrial Internet of Things (IIoT) is hampered by inherent issues such as privacy, security, and fault tolerance, which pose certain challenges to the rapid development of IIoT. Blockchain technology has immutability, decentralization, and autonomy, which can greatly improve the inherent defects of the IIoT. In the traditional blockchain, data is stored in a Merkle tree. As data continues to grow, the scale of proofs used to validate it grows, threatening the efficiency, security, and reliability of blockchain-based IIoT. Accordingly, this paper first analyzes the inefficiency of the traditional blockchain… More >

  • Open Access

    ARTICLE

    A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices

    Muhammad Saad1, Muhammad Raheel Bhutta2, Jongik Kim3,*, Tae-Sun Chung1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4263-4282, 2024, DOI:10.32604/cmc.2024.047132

    Abstract With the increase in IoT (Internet of Things) devices comes an inherent challenge of security. In the world today, privacy is the prime concern of every individual. Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage. The challenge is keeping confidentiality and continuing to make the person innominate throughout the system. To address this, we present our proposed architecture where we manage IoT devices using blockchain technology. Our proposed architecture works on and off blockchain integrated with… More >

  • Open Access

    ARTICLE

    CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems

    Talal Albalawi, P. Ganeshkumar*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3511-3528, 2024, DOI:10.32604/cmc.2024.046396

    Abstract The Internet of Things (IoT) is a growing technology that allows the sharing of data with other devices across wireless networks. Specifically, IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks. In this framework, a Covariance Linear Learning Embedding Selection (CL2ES) methodology is used at first to extract the features highly associated with the IoT intrusions. Then, the Kernel Distributed Bayes Classifier (KDBC) is created to forecast attacks based on the probability distribution value precisely. In addition, a… More >

  • Open Access

    ARTICLE

    Classification and clustering of buildings for understanding urban dynamics

    A framework for processing spatiotemporal data

    Perez Joan1, Fusco Giovanni1, Sadahiro Yukio2

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 303-327, 2022, DOI:10.3166/RIG.31.303-327© 2022

    Abstract This paper presents different methods implemented with the aim of studying urban dynamics at the building level. Building types are identified within a comprehensive vector-based building inventory, spanning over at least two time points. First, basic morphometric indicators are computed for each building: area, floor-area, number of neighbors, elongation, and convexity. Based on the availability of expert knowledge, different types of classification and clustering are performed: supervised tree-like classificatory model, expert-constrained k-means and combined SOM-HCA. A grid is superimposed on the test region of Osaka (Japan) and the number of building types per cell and for each period is computed,… More >

  • Open Access

    ARTICLE

    The role of polymorphic cytochrome P450 gene (CYP2B6) in B-chronic lymphocytic leukemia (B-CLL) incidence and outcome among Egyptian patients

    MENNA AL-ADL1,*, MAGDY M. YOUSSEF1, AHMED EL-SEBAIE2, SHERIF REFAAT3, AFAF EL-SAID4

    Oncology Research, Vol.32, No.4, pp. 785-797, 2024, DOI:10.32604/or.2024.047021

    Abstract Cytochromes P450 (CYPs) play a prominent role in catalyzing phase I xenobiotic biotransformation and account for about 75% of the total metabolism of commercially available drugs, including chemotherapeutics. The gene expression and enzyme activity of CYPs are variable between individuals, which subsequently leads to different patterns of susceptibility to carcinogenesis by genotoxic xenobiotics, as well as differences in the efficacy and toxicity of clinically used drugs. This research aimed to examine the presence of the CYP2B6*9 polymorphism and its possible association with the incidence of B-CLL in Egyptian patients, as well as the clinical outcome after receiving cyclophosphamide chemotherapy. DNA… More > Graphic Abstract

    The role of polymorphic cytochrome P450 gene (CYP2B6) in B-chronic lymphocytic leukemia (B-CLL) incidence and outcome among Egyptian patients

  • Open Access

    REVIEW

    How aging affects bone health via the intestinal micro-environment

    HUAN HU1,2,*, YUE HUANG1, FANGZHOU LIU1, QIAN WANG1,2, YANZI YAO3,*

    BIOCELL, Vol.48, No.3, pp. 353-362, 2024, DOI:10.32604/biocell.2024.048311

    Abstract Increasing life expectancy and an aging population lead to age-related bone diseases like osteoporosis and low bone mass more prevalent. These conditions represent a common, costly and chronic burden, not only for elderly but also to society at large. Consequently, elucidating the pathophysiology and developing effective therapies for these diseases is of paramount importance. Recent advances in research have identified the gut as a novel and promising target for addressing bone disorders, giving rise to the concept of the “gut-bone axis”. An in-depth review of the latest insights into the effects of age-related physiological changes in the gastrointestinal tract on… More >

  • Open Access

    ARTICLE

    Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology

    Nazik Alturki1, Raed Alharthi2, Muhammad Umer3,*, Oumaima Saidani1, Amal Alshardan1, Reemah M. Alhebshi4, Shtwai Alsubai5, Ali Kashif Bashir6,7,8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3387-3415, 2024, DOI:10.32604/cmes.2023.044700

    Abstract The concept of smart houses has grown in prominence in recent years. Major challenges linked to smart homes are identification theft, data safety, automated decision-making for IoT-based devices, and the security of the device itself. Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features. This paper proposes a smart home system based on ensemble learning of random forest (RF) and convolutional neural networks (CNN) for programmed decision-making tasks, such as categorizing gadgets as “OFF” or “ON” based… More >

  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2245-2267, 2024, DOI:10.32604/cmc.2023.047323

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership functions. This study presents a… More >

  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1881-1895, 2024, DOI:10.32604/cmc.2023.047243

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust clustering algorithm. We perform feature… More >

  • Open Access

    ARTICLE

    Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing

    Huixiang Xu*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2309-2335, 2024, DOI:10.32604/cmc.2024.046253

    Abstract The Internet of Things (IoT) has revolutionized how we interact with and gather data from our surrounding environment. IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights. The rapid proliferation of Internet of Things (IoT) devices has ushered in an era of unprecedented data generation and connectivity. These IoT devices, equipped with many sensors and actuators, continuously produce vast volumes of data. However, the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges. However, transmitting all this data to a… More >

Displaying 11-20 on page 2 of 680. Per Page