Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (150)
  • Open Access

    ARTICLE

    A Flexible Architecture for Cryptographic Applications: ECC and PRESENT

    Muhammad Rashid1,*, Omar S. Sonbul1, Muhammad Arif2, Furqan Aziz Qureshi3, Saud. S. Alotaibi4, Mohammad H. Sinky1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1009-1025, 2023, DOI:10.32604/cmc.2023.039901

    Abstract This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography (ECC) and PRESENT for cryptographic applications. The features of the proposed work are (i) computation of only the point multiplication operation of ECC over for a 163-bit key generation, (ii) execution of only the variant of an 80-bit PRESENT block cipher for data encryption & decryption and (iii) execution of point multiplication operation (ECC algorithm) along with the data encryption and decryption (PRESENT algorithm). To establish an area overhead for the flexible design, dedicated hardware architectures of ECC and PRESENT are implemented in the first step, and a sum of… More >

  • Open Access

    ARTICLE

    IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends

    Sharad Saxena1, Shailendra Mishra2,*, Mohammed Baljon2,*, Shamiksha Mishra3, Sunil Kumar Sharma2, Prakhar Goel1, Shubham Gupta1, Vinay Kishore1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1027-1045, 2023, DOI:10.32604/cmc.2023.039677

    Abstract In recent years, the growth of female employees in the commercial market and industries has increased. As a result, some people think travelling to distant and isolated locations during odd hours generates new threats to women’s safety. The exponential increase in assaults and attacks on women, on the other hand, is posing a threat to women’s growth, development, and security. At the time of the attack, it appears the women were immobilized and needed immediate support. Only self-defense isn’t sufficient against abuse; a new technological solution is desired and can be used as quickly as hitting a switch or button.… More >

  • Open Access

    ARTICLE

    A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network

    Muhammad Yasir Khan1, Muhammad Adnan1,2, Jawaid Iqbal3, Noor ul Amin1, Byeong-Hee Roh4, Jehad Ali4,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1185-1208, 2023, DOI:10.32604/csse.2023.039352

    Abstract An Information-Centric Network (ICN) provides a promising paradigm for the upcoming internet architecture, which will struggle with steady growth in data and changes in access models. Various ICN architectures have been designed, including Named Data Networking (NDN), which is designed around content delivery instead of hosts. As data is the central part of the network. Therefore, NDN was developed to get rid of the dependency on IP addresses and provide content effectively. Mobility is one of the major research dimensions for this upcoming internet architecture. Some research has been carried out to solve the mobility issues, but it still has… More >

  • Open Access

    ARTICLE

    Research on a Fog Computing Architecture and BP Algorithm Application for Medical Big Data

    Baoling Qin*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 255-267, 2023, DOI:10.32604/iasc.2023.037556

    Abstract Although the Internet of Things has been widely applied, the problems of cloud computing in the application of digital smart medical Big Data collection, processing, analysis, and storage remain, especially the low efficiency of medical diagnosis. And with the wide application of the Internet of Things and Big Data in the medical field, medical Big Data is increasing in geometric magnitude resulting in cloud service overload, insufficient storage, communication delay, and network congestion. In order to solve these medical and network problems, a medical big-data-oriented fog computing architecture and BP algorithm application are proposed, and its structural advantages and characteristics… More >

  • Open Access

    ARTICLE

    A Novel Detection Method for Pavement Crack with Encoder-Decoder Architecture

    Yalong Yang1,2,3, Wenjing Xu1,2,3, Yinfeng Zhu4, Liangliang Su1,2,3,*, Gongquan Zhang1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 761-773, 2023, DOI:10.32604/cmes.2023.027010

    Abstract As a current popular method, intelligent detection of cracks is of great significance to road safety, so deep learning has gradually attracted attention in the field of crack image detection. The nonlinear structure, low contrast and discontinuity of cracks bring great challenges to existing crack detection methods based on deep learning. Therefore, an end-to-end deep convolutional neural network (AttentionCrack) is proposed for automatic crack detection to overcome the inaccuracy of boundary location between crack and non-crack pixels. The AttentionCrack network is built on U-Net based encoder-decoder architecture, and an attention mechanism is incorporated into the multi-scale convolutional feature to enhance… More >

  • Open Access

    ARTICLE

    3D Human Pose Estimation Using Two-Stream Architecture with Joint Training

    Jian Kang1, Wanshu Fan1, Yijing Li2, Rui Liu1, Dongsheng Zhou1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 607-629, 2023, DOI:10.32604/cmes.2023.024420

    Abstract With the advancement of image sensing technology, estimating 3D human pose from monocular video has become a hot research topic in computer vision. 3D human pose estimation is an essential prerequisite for subsequent action analysis and understanding. It empowers a wide spectrum of potential applications in various areas, such as intelligent transportation, human-computer interaction, and medical rehabilitation. Currently, some methods for 3D human pose estimation in monocular video employ temporal convolutional network (TCN) to extract inter-frame feature relationships, but the majority of them suffer from insufficient inter-frame feature relationship extractions. In this paper, we decompose the 3D joint location regression… More >

  • Open Access

    ARTICLE

    High Efficient Reconfigurable and Self Testable Architecture for Sensor Node

    G. Venkatesan1,*, N. Ramadass2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3979-3991, 2023, DOI:10.32604/csse.2023.031627

    Abstract Sensor networks are regularly sent to monitor certain physical properties that run in length from divisions of a second to many months or indeed several years. Nodes must advance their energy use for expanding network lifetime. The fault detection of the network node is very significant for guaranteeing the correctness of monitoring results. Due to different network resource constraints and malicious attacks, security assurance in wireless sensor networks has been a difficult task. The implementation of these features requires larger space due to distributed module. This research work proposes new sensor node architecture integrated with a self-testing core and cryptoprocessor… More >

  • Open Access

    ARTICLE

    BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things

    Sahar Badri1, Sana Ullah Jan2,*, Daniyal Alghazzawi1, Sahar Aldhaheri1, Nikolaos Pitropakis2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3667-3684, 2023, DOI:10.32604/csse.2023.037531

    Abstract Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things (IoMT). The existing cloud-based, centralized IoMT architectures are vulnerable to multiple security and privacy problems. The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks. This article presents a private and easily expandable blockchain-based framework for the IoMT. The proposed framework contains several participants, including private blockchain, hospital management systems, cloud service providers, doctors, and patients. Data security is ensured by incorporating an attribute-based encryption scheme. Furthermore,… More >

  • Open Access

    ARTICLE

    Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing

    Jihyeon Yu1, Juhwan Kim1, Youngwoo Lee1, Fayozbek Rustamov2, Joobeom Yun1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3291-3315, 2023, DOI:10.32604/cmc.2023.035835

    Abstract Internet of things (IoT) devices are being increasingly used in numerous areas. However, the low priority on security and various IoT types have made these devices vulnerable to attacks. To prevent this, recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments. However, these studies focused only on major firmware architectures and rarely considered exotic firmware. In addition, because of the diversity of firmware, the emulation success rate is not high in terms of large-scale analyses. In this study, we propose the adaptive emulation framework for multi-architecture (AEMA). In… More >

  • Open Access

    ARTICLE

    A Proposed Architecture for Local-Host and AWS with Multiagent System

    Jaspreet Chawla1,*, Anil Kr Ahlawat2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2787-2802, 2023, DOI:10.32604/iasc.2023.034775

    Abstract Cloud computing has become one of the leading technologies in the world today. The benefits of cloud computing affect end users directly. There are several cloud computing frameworks, and each has ways of monitoring and providing resources. Cloud computing eliminates customer requirements such as expensive system configuration and massive infrastructure while improving dependability and scalability. From the user’s perspective, cloud computing makes it easy to upload multiagents and operate on different web services. In this paper, the authors used a restful web service and an agent system to discuss, deployments, and analysis of load performance parameters like memory use, central… More >

Displaying 21-30 on page 3 of 150. Per Page