Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (102)
  • Open Access

    ARTICLE

    BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks

    Fengting Luo, Ruwei Huang*, Yuyue Chen

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1815-1835, 2023, DOI:10.32604/cmc.2023.041676

    Abstract Smart parks serve as integral components of smart cities, where they play a pivotal role in the process of urban modernization. The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase. To ensure secure communication, device identities must undergo authentication. The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices, making it impractical for resource-constrained devices. This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks, which simplifies the authentication interaction and requires every device to maintain only one certificate. To… More >

  • Open Access

    ARTICLE

    Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption

    Mohanad A. Mohammed*, Hala B. Abdul Wahab

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1731-1748, 2024, DOI:10.32604/cmes.2023.030528

    Abstract Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges. Concurrently, the Internet of Things (IoT) has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services, ultimately enhancing human lives. This paper presents a new approach utilizing lightweight blockchain technology, effectively reducing the computational burden typically associated with conventional blockchain systems. By integrating this lightweight blockchain with IoT systems, substantial reductions in implementation time and computational complexity can be achieved. Moreover, the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm, renowned for… More >

  • Open Access

    ARTICLE

    Dense Spatial-Temporal Graph Convolutional Network Based on Lightweight OpenPose for Detecting Falls

    Xiaorui Zhang1,2,3,*, Qijian Xie1, Wei Sun3,4, Yongjun Ren1,2,3, Mithun Mukherjee5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 47-61, 2023, DOI:10.32604/cmc.2023.042561

    Abstract Fall behavior is closely related to high mortality in the elderly, so fall detection becomes an important and urgent research area. However, the existing fall detection methods are difficult to be applied in daily life due to a large amount of calculation and poor detection accuracy. To solve the above problems, this paper proposes a dense spatial-temporal graph convolutional network based on lightweight OpenPose. Lightweight OpenPose uses MobileNet as a feature extraction network, and the prediction layer uses bottleneck-asymmetric structure, thus reducing the amount of the network. The bottleneck-asymmetrical structure compresses the number of input channels of feature maps by… More >

  • Open Access

    ARTICLE

    PAN-DeSpeck: A Lightweight Pyramid and Attention-Based Network for SAR Image Despeckling

    Saima Yasmeen1, Muhammad Usman Yaseen1,*, Syed Sohaib Ali2, Moustafa M. Nasralla3, Sohaib Bin Altaf Khattak3

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3671-3689, 2023, DOI:10.32604/cmc.2023.041195

    Abstract SAR images commonly suffer from speckle noise, posing a significant challenge in their analysis and interpretation. Existing convolutional neural network (CNN) based despeckling methods have shown great performance in removing speckle noise. However, these CNN-based methods have a few limitations. They do not decouple complex background information in a multi-resolution manner. Moreover, they have deep network structures that may result in many parameters, limiting their applicability to mobile devices. Furthermore, extracting key speckle information in the presence of complex background is also a major problem with SAR. The proposed study addresses these limitations by introducing a lightweight pyramid and attention-based… More >

  • Open Access

    ARTICLE

    Two-Stage Edge-Side Fault Diagnosis Method Based on Double Knowledge Distillation

    Yang Yang1, Yuhan Long1, Yijing Lin2, Zhipeng Gao1, Lanlan Rui1, Peng Yu1,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3623-3651, 2023, DOI:10.32604/cmc.2023.040250

    Abstract With the rapid development of the Internet of Things (IoT), the automation of edge-side equipment has emerged as a significant trend. The existing fault diagnosis methods have the characteristics of heavy computing and storage load, and most of them have computational redundancy, which is not suitable for deployment on edge devices with limited resources and capabilities. This paper proposes a novel two-stage edge-side fault diagnosis method based on double knowledge distillation. First, we offer a clustering-based self-knowledge distillation approach (Cluster KD), which takes the mean value of the sample diagnosis results, clusters them, and takes the clustering results as the… More >

  • Open Access

    ARTICLE

    A Lightweight ABE Security Protection Scheme in Cloud Environment Based on Attribute Weight

    Lihong Guo*, Jie Yang, Haitao Wu

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1929-1946, 2023, DOI:10.32604/cmc.2023.039170

    Abstract Attribute-based encryption (ABE) is a technique used to encrypt data, it has the flexibility of access control, high security, and resistance to collusion attacks, and especially it is used in cloud security protection. However, a large number of bilinear mappings are used in ABE, and the calculation of bilinear pairing is time-consuming. So there is the problem of low efficiency. On the other hand, the decryption key is not uniquely associated with personal identification information, if the decryption key is maliciously sold, ABE is unable to achieve accountability for the user. In practical applications, shared message requires hierarchical sharing in… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things

    So-Eun Jeon, Sun-Jin Lee, Il-Gu Lee*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2407-2419, 2023, DOI:10.32604/iasc.2023.039937

    Abstract With the development of the 5th generation of mobile communication (5G) networks and artificial intelligence (AI) technologies, the use of the Internet of Things (IoT) has expanded throughout industry. Although IoT networks have improved industrial productivity and convenience, they are highly dependent on nonstandard protocol stacks and open-source-based, poorly validated software, resulting in several security vulnerabilities. However, conventional AI-based software vulnerability discovery technologies cannot be applied to IoT because they require excessive memory and computing power. This study developed a technique for optimizing training data size to detect software vulnerabilities rapidly while maintaining learning accuracy. Experimental results using a software… More >

  • Open Access

    ARTICLE

    Lightweight Surface Litter Detection Algorithm Based on Improved YOLOv5s

    Zunliang Chen1,2, Chengxu Huang1,2, Lucheng Duan1,2, Baohua Tan1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1085-1102, 2023, DOI:10.32604/cmc.2023.039451

    Abstract In response to the problem of the high cost and low efficiency of traditional water surface litter cleanup through manpower, a lightweight water surface litter detection algorithm based on improved YOLOv5s is proposed to provide core technical support for real-time water surface litter detection by water surface litter cleanup vessels. The method reduces network parameters by introducing the deep separable convolution GhostConv in the lightweight network GhostNet to substitute the ordinary convolution in the original YOLOv5s feature extraction and fusion network; introducing the C3Ghost module to substitute the C3 module in the original backbone and neck networks to further reduce… More >

  • Open Access

    ARTICLE

    Towards Sustainable Agricultural Systems: A Lightweight Deep Learning Model for Plant Disease Detection

    Sana Parez1, Naqqash Dilshad2, Turki M. Alanazi3, Jong Weon Lee1,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 515-536, 2023, DOI:10.32604/csse.2023.037992

    Abstract A country’s economy heavily depends on agricultural development. However, due to several plant diseases, crop growth rate and quality are highly suffered. Accurate identification of these diseases via a manual procedure is very challenging and time-consuming because of the deficiency of domain experts and low-contrast information. Therefore, the agricultural management system is searching for an automatic early disease detection technique. To this end, an efficient and lightweight Deep Learning (DL)-based framework (E-GreenNet) is proposed to overcome these problems and precisely classify the various diseases. In the end-to-end architecture, a MobileNetV3Small model is utilized as a backbone that generates refined, discriminative,… More >

  • Open Access

    ARTICLE

    A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments

    Zakariae Dlimi*, Abdellah Ezzati, Said Ben Alla

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 79-103, 2023, DOI:10.32604/csse.2023.037099

    Abstract The growing advent of the Internet of Things (IoT) users is driving the adoption of cloud computing technologies. The integration of IoT in the cloud enables storage and computational capabilities for IoT users. However, security has been one of the main concerns of cloud-integrated IoT. Existing work attempts to address the security concerns of cloud-integrated IoT through authentication, access control, and blockchain-based methods. However, existing frameworks are somewhat limited by scalability, privacy, and centralized structures. To mitigate the existing problems, we propose a blockchain-based distributed access control method for secure storage in the IoT cloud (BL-DAC). Initially, the BL-DAC performs… More >

Displaying 21-30 on page 3 of 102. Per Page