Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (678)
  • Open Access

    ARTICLE

    Design Pattern and Challenges of Federated Learning with Applications in Industrial Control System

    Hina Batool1, Jiuyun Xu1,*, Ateeq Ur Rehman2, Habib Hamam3,4,5,6

    Journal on Artificial Intelligence, Vol.6, pp. 105-128, 2024, DOI:10.32604/jai.2024.049912

    Abstract Federated Learning (FL) appeared as an encouraging approach for handling decentralized data. Creating a FL system needs both machine learning (ML) knowledge and thinking about how to design system software. Researchers have focused a lot on the ML side of FL, but have not paid enough attention to designing the software architecture. So, in this survey, a set of design patterns is described to tackle the design issues. Design patterns are like reusable solutions for common problems that come up when designing software architecture. This paper focuses on (1) design patterns such as architectures, frameworks, client selection protocols, personalization techniques,… More >

  • Open Access

    REVIEW

    Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

    Shafi Ullah1, Sibghat Ullah Bazai1,*, Mohammad Imran2, Qazi Mudassar Ilyas3,*, Abid Mehmood4, Muhammad Asim Saleem5, Muhmmad Aasim Rafique3, Arsalan Haider6, Ilyas Khan7, Sajid Iqbal3, Yonis Gulzar4, Kauser Hameed3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 93-115, 2024, DOI:10.32604/cmc.2024.048796

    Abstract Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine-type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the data and devices becomes challenging… More >

  • Open Access

    REVIEW

    Internet of Things Authentication Protocols: Comparative Study

    Souhayla Dargaoui1, Mourade Azrour1,*, Ahmad El Allaoui1, Azidine Guezzaz2, Abdulatif Alabdulatif3, Abdullah Alnajim4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 65-91, 2024, DOI:10.32604/cmc.2024.047625

    Abstract Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according… More >

  • Open Access

    ARTICLE

    An Ingenious IoT Based Crop Prediction System Using ML and EL

    Shabana Ramzan1, Yazeed Yasin Ghadi2, Hanan Aljuaid3, Aqsa Mahmood1,*, Basharat Ali4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 183-199, 2024, DOI:10.32604/cmc.2024.047603

    Abstract Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers have no proper knowledge to select which crop is suitable to grow according to the environmental factors and soil characteristics. This is the main reason for the low yield of crops and the economic crisis in the agricultural sector of the different countries. The use of modern technologies such as the Internet of Things (IoT), machine learning, and ensemble learning can facilitate farmers to observe different factors such as soil electrical conductivity (EC), and environmental factors like temperature to improve crop yield. These parameters play a vital… More >

  • Open Access

    ARTICLE

    ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things

    Yan Xiang1,2, Daofeng Li1,2,*, Xinyi Meng1,2, Chengfeng Dong1,2, Guanglin Qin1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1005-1023, 2024, DOI:10.32604/cmc.2024.047143

    Abstract The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasing demands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has caught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. This has resulted in a myriad of security challenges, including information leakage, malware propagation, and financial loss, among others. Consequently, developing an intrusion detection system to identify both active and potential intrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practical intrusion detection… More >

  • Open Access

    ARTICLE

    Chitosan/PVA Films and Silver Nanoparticle Impregnated Nanofibrous Dressings for Evaluation of their Wound Healing Efficacy in Wistar Albino Rat Model

    SOBHA KOTA*, RATNAKUMARI ANANTHA, VAYUNANDANA RAO GOVADA, PRADEEP DUMPALA

    Journal of Polymer Materials, Vol.40, No.3-4, pp. 285-303, 2023, DOI:10.32381/JPM.2023.40.3-4.10

    Abstract The exoskeleton of marine shrimp contains a natural, biocompatible polymer chitin, which is dumped as a waste. The study proposes the sustainable single-pot-extraction of chitosan from the waste and its use in the fabrication of wound-dressings, and thus leverage its piezoelectric, antioxidant, hypoglycaemic and medicinal properties in wound-healing. The Fourier transform infrared spectrum revealed that marine chitosan contains functional groups with N-O, O-H, and CO stretching. Scanning electron micrographs demonstrated the spherical and mesoporous structures of the extracted chitosan. X-ray diffraction analysis showed a semi-crystalline phase of chitosan particles with a mean size of 28.9 nm. The film prepared with… More >

  • Open Access

    ARTICLE

    Study on Organic Fluorine Modified Cationic Acrylic Resin and its Application in Cathodic Electrodeposition Coatings

    LIJUN CHEN*, ZHEQING GONG, ZHENGRONG FU

    Journal of Polymer Materials, Vol.40, No.3-4, pp. 157-164, 2023, DOI:10.32381/JPM.2023.40.3-4.3

    Abstract The organic fluorine modified/containing cationic acrylic resin is prepared via solution polymerization technique using hexafluorobutyl methacrylate (HFMA) along with butyl acrylate (BA), methyl methacrylate (MMA), styrene (St), dimethylaminoethyl methacrylate (DMAEMA) and hydroxy propyl methacrylate (HPMA) as the comonomers, proprylene glycol monomethyl ether (PGME) as the solvent, and 2, 2-Azo-bis-iso-butyronitrile (AIBN) as the initiator. The synthesized resin in which fluorine atom is introduced into the polymer chains. The cathodic electrodeposition (CED) coatings were prepared by mixing the synthesized resin and blocked isocyanate. The influence of the amount of organic fluorine on the resin and the resultant CED coatings is investigated in… More >

  • Open Access

    ARTICLE

    Phenolic Profile and Volatiles of in vitro Propagated Lavandula angustifolia Mill. Seedlings

    Mir Abdullatif Yahya1, Fatma Tunali1, Dilek Killi2,*, Atalay Sökmen2

    Phyton-International Journal of Experimental Botany, Vol.93, No.3, pp. 427-444, 2024, DOI:10.32604/phyton.2024.046271

    Abstract An effective in vitro propagation protocol was designed for Lavandula angustifolia Miller, a medicinal aromatic plant that is a prominent source of volatile organic compounds (VOCs). Murashige and Skoog media were supplemented with various concentrations of Plant Growth Regulators (PGRs), and the growth parameters of the nodal segments were examined. Nodal explants formed callus when they were supplemented with 2 mg/L of 6-Benzylaminopurine (BAP). The superior hormonal concentration of Murashige and Skoog (MS) media for the proliferation of shoots from callus cultures (39.33%) was 5 mg/L of 2-Isopentenyl adenine (2iP), and the favorable media for the growth of L. angustifoliaMore >

  • Open Access

    ARTICLE

    A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

    Shaha Al-Otaibi1, Rahim Khan2,*, Hashim Ali2, Aftab Ahmed Khan2, Amir Saeed3, Jehad Ali4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3805-3823, 2024, DOI:10.32604/cmc.2024.049017

    Abstract The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device’s authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field-proven methodologies were presented to streamline the verification process of the communicating devices; however, location-aware authentication has not been reported as per our knowledge, which is a crucial metric, especially in scenarios where… More >

  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu1, Zhe Zhang1, Shengrong Hu2, Song Sun3,*, Dapeng Liu4, Zhenyu Qiu5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099

    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on… More >

Displaying 1-10 on page 1 of 678. Per Page