Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (55)
  • Open Access

    ARTICLE

    ChainApparel: A Trustworthy Blockchain and IoT-Based Traceability Framework for Apparel Industry 4.0

    Muhammad Shakeel Faridi1, Saqib Ali1,2,*, Guojun Wang2,*, Salman Afsar Awan1, Muhammad Zafar Iqbal3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1837-1854, 2023, DOI:10.32604/cmc.2023.041929

    Abstract Trustworthiness and product traceability are essential factors in the apparel industry 4.0 for establishing successful business relationships among stakeholders such as customers, manufacturers, suppliers, and consumers. Each stakeholder has implemented different technology-based systems to record and track product transactions. However, these systems work in silos, and there is no intra-system communication, leading to a lack of complete supply chain traceability for all apparel stakeholders. Moreover, apparel stakeholders are reluctant to share their business information with business competitors; thus, they involve third-party auditors to ensure the quality of the final product. Furthermore, the apparel manufacturing industry faces challenges with counterfeit products,… More >

  • Open Access

    ARTICLE

    Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts

    Abdulatif Alabdulatif1,*, Mada Alharbi1, Abir Mchergui2, Tarek Moulahi3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 2005-2022, 2024, DOI:10.32604/cmes.2023.029769

    Abstract The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency. Revolutionary advanced technology, such as Intelligent Transportation Systems (ITS), enables improved traffic management, helps eliminate congestion, and supports a safer environment. ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users. However, ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks (VANETs). This is because each vehicle plays the role of a router in this network, which leads to a… More >

  • Open Access

    ARTICLE

    MBE: A Music Copyright Depository Framework Incorporating Blockchain and Edge Computing

    Jianmao Xiao1, Ridong Huang1, Jiangyu Wang1, Zhean Zhong1, Chenyu Liu1, Yuanlong Cao1,*, Chuying Ouyang2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2815-2834, 2023, DOI:10.32604/csse.2023.039716

    Abstract Audio copyright is a crucial issue in the music industry, as it protects the rights and interests of creators and distributors. This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on “blockchain + edge computing mode,” abbreviated as MBE, by integrating edge computing into the Hyperledger Fabric system. MBE framework compresses and splits the audio into small chunks, performs Fast Fourier Transform (FFT) to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information. After being confirmed by various nodes on the Fabric alliance… More >

  • Open Access

    ARTICLE

    A Data Consistency Insurance Method for Smart Contract

    Jing Deng1, Xiaofei Xing1, Guoqiang Deng2,*, Ning Hu3, Shen Su3, Le Wang3, Md Zakirul Alam Bhuiyan4

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3783-3795, 2023, DOI:10.32604/cmc.2023.034116

    Abstract As one of the major threats to the current DeFi (Decentralized Finance) ecosystem, reentrant attack induces data inconsistency of the victim smart contract, enabling attackers to steal on-chain assets from DeFi projects, which could terribly do harm to the confidence of the blockchain investors. However, protecting DeFi projects from the reentrant attack is very difficult, since generating a call loop within the highly automatic DeFi ecosystem could be very practicable. Existing researchers mainly focus on the detection of the reentrant vulnerabilities in the code testing, and no method could promise the non-existent of reentrant vulnerabilities. In this paper, we introduce… More >

  • Open Access

    ARTICLE

    Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology

    Sur Singh Rawat1,*, Youseef Alotaibi2, Nitima Malsa1, Vimal Gupta1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381

    Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone data. The suggested platform stores… More >

  • Open Access

    ARTICLE

    GRATDet: Smart Contract Vulnerability Detector Based on Graph Representation and Transformer

    Peng Gong1,2,3, Wenzhong Yang2,3,*, Liejun Wang2,3, Fuyuan Wei2,3, KeZiErBieKe HaiLaTi2,3, Yuanyuan Liao2,3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1439-1462, 2023, DOI:10.32604/cmc.2023.038878

    Abstract Smart contracts have led to more efficient development in finance and healthcare, but vulnerabilities in contracts pose high risks to their future applications. The current vulnerability detection methods for contracts are either based on fixed expert rules, which are inefficient, or rely on simplistic deep learning techniques that do not fully leverage contract semantic information. Therefore, there is ample room for improvement in terms of detection precision. To solve these problems, this paper proposes a vulnerability detector based on deep learning techniques, graph representation, and Transformer, called GRATDet. The method first performs swapping, insertion, and symbolization operations for contract functions,… More >

  • Open Access

    ARTICLE

    An Incentive Mechanism Model for Crowdsensing with Distributed Storage in Smart Cities

    Jiaxing Wang, Lanlan Rui, Yang Yang*, Zhipeng Gao, Xuesong Qiu

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2355-2384, 2023, DOI:10.32604/cmc.2023.034993

    Abstract Crowdsensing, as a data collection method that uses the mobile sensing ability of many users to help the public collect and extract useful information, has received extensive attention in data collection. Since crowdsensing relies on user equipment to consume resources to obtain information, and the quality and distribution of user equipment are uneven, crowdsensing has problems such as low participation enthusiasm of participants and low quality of collected data, which affects the widespread use of crowdsensing. This paper proposes to apply the blockchain to crowdsensing and solve the above challenges by utilizing the characteristics of the blockchain, such as immutability… More >

  • Open Access

    ARTICLE

    Recapitulation Web 3.0: Architecture, Features and Technologies, Opportunities and Challenges

    Amtul Waheed, Bhawna Dhupia*, Sultan Mesfer Aldossary

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1609-1620, 2023, DOI:10.32604/iasc.2023.037539

    Abstract Tim Berners-Lee developed the internet at CERN in early 1990 with fundamental technologies such as HTML, URL, and HTTP which became the foundation of the web. The contemporary web we use today has been much advanced over a period of time ever since the innovation of the World Wide Web was introduced. The static web was the first version of the web, which was the read-only web. Succeeding development in web technology is web 3.0 which is a distributed and decentralized web with emerging technologies. This article emphasizes the comparison of important details with the evolution of the web. The… More >

  • Open Access

    ARTICLE

    Customer Churn Prediction Framework of Inclusive Finance Based on Blockchain Smart Contract

    Fang Yu1, Wenbin Bi2, Ning Cao3,4,*, Hongjun Li1, Russell Higgs5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1-17, 2023, DOI:10.32604/csse.2023.018349

    Abstract In view of the fact that the prediction effect of influential financial customer churn in the Internet of Things environment is difficult to achieve the expectation, at the smart contract level of the blockchain, a customer churn prediction framework based on situational awareness and integrating customer attributes, the impact of project hotspots on customer interests, and customer satisfaction with the project has been built. This framework introduces the background factors in the financial customer environment, and further discusses the relationship between customers, the background of customers and the characteristics of pre-lost customers. The improved Singular Value Decomposition (SVD) algorithm and… More >

  • Open Access

    ARTICLE

    Vulnerability Detection of Ethereum Smart Contract Based on SolBERT-BiGRU-Attention Hybrid Neural Model

    Guangxia Xu1,*, Lei Liu2, Jingnan Dong3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 903-922, 2023, DOI:10.32604/cmes.2023.026627

    Abstract In recent years, with the great success of pre-trained language models, the pre-trained BERT model has been gradually applied to the field of source code understanding. However, the time cost of training a language model from zero is very high, and how to transfer the pre-trained language model to the field of smart contract vulnerability detection is a hot research direction at present. In this paper, we propose a hybrid model to detect common vulnerabilities in smart contracts based on a lightweight pre-trained language model BERT and connected to a bidirectional gate recurrent unit model. The downstream neural network adopts… More >

Displaying 11-20 on page 2 of 55. Per Page