Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (193)
  • Open Access

    ARTICLE

    Design the IoT Botnet Defense Process for Cybersecurity in Smart City

    Donghyun Kim1, Seungho Jeon2, Jiho Shin3, Jung Taek Seo4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2979-2997, 2023, DOI:10.32604/iasc.2023.040019

    Abstract The smart city comprises various infrastructures, including healthcare, transportation, manufacturing, and energy. A smart city’s Internet of Things (IoT) environment constitutes a massive IoT environment encompassing numerous devices. As many devices are installed, managing security for the entire IoT device ecosystem becomes challenging, and attack vectors accessible to attackers increase. However, these devices often have low power and specifications, lacking the same security features as general Information Technology (IT) systems, making them susceptible to cyberattacks. This vulnerability is particularly concerning in smart cities, where IoT devices are connected to essential support systems such as healthcare and transportation. Disruptions can lead… More >

  • Open Access

    ARTICLE

    A Task-Oriented Hybrid Cloud Architecture with Deep Cognition Mechanism for Intelligent Space

    Yongcheng Cui1, Guohui Tian1,*, Xiaochun Cheng2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1385-1408, 2023, DOI:10.32604/cmc.2023.040246

    Abstract Intelligent Space (IS) is widely regarded as a promising paradigm for improving quality of life through using service task processing. As the field matures, various state-of-the-art IS architectures have been proposed. Most of the IS architectures designed for service robots face the problems of fixed-function modules and low scalability when performing service tasks. To this end, we propose a hybrid cloud service robot architecture based on a Service-Oriented Architecture (SOA). Specifically, we first use the distributed deployment of functional modules to solve the problem of high computing resource occupancy. Then, the Socket communication interface layer is designed to improve the… More >

  • Open Access

    ARTICLE

    MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

    Yi Qing1, Xiangyu Liu2, Yanhui Du2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2095-2119, 2023, DOI:10.32604/cmc.2023.039980

    Abstract Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol–Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT and IoT-23 datasets used IoT… More >

  • Open Access

    PROCEEDINGS

    Efficient Computational Inverse Method for Positioning Accuracy Estimation of Industrial Robot Under Stochastic Uncertainties

    Jinhe Zhang2, Jie Liu1,2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.25, No.4, pp. 1-2, 2023, DOI:10.32604/icces.2023.09279

    Abstract The small uncertainties of geometric parameters of industrial robot, which are caused by links manufacturing and service wear errors, can deteriorate the positioning accuracy of end-effector through multi-level propagation and is difficult to be measured and compensated by high-precision instruments. Hence, an efficient inverse identification method of parameter uncertainty based on global sensitivity analysis and optimal measurement point selection is proposed. In order to ensure the universality of identification results in calibration and control works, the standard Denavit-Hartenberg (D-H) method is employed to establish the kinematic model of series 6 degrees of freedom (DOF) robots. Considering the stochastic error between… More >

  • Open Access

    ARTICLE

    Physicochemical Properties of Combustion Ashes of Some Trees (Urban Pruning) Present in the Neotropical Region

    John Freddy Gelves-Díaz1,*, Ludovic Dorkis2, Richard Monroy-Sepúlveda1, Sandra Rozo-Rincón1, Yebrail Alexis Romero-Arcos1

    Journal of Renewable Materials, Vol.11, No.10, pp. 3769-3787, 2023, DOI:10.32604/jrm.2023.029270

    Abstract Secondary lignocellulosic biomass has proved to be useful as an energy source through its oxidation by means of combustion processes. In accordance with the above, in this paper, we wanted to study the ash from urban pruning residues that are generated in cities in the Neotropics. Species such as Licania tomentosa, Azadirachta indica, Ficus benjamina, Terminalia catappa, Leucaena leucocephala, Prosopis juliflora and Pithecellobium dulce were selected because they have been previously studied and showed potential for thermal energy generation. These materials were calcined in an oxidizing atmosphere and characterized by X-ray diffraction and fluorescence, scanning electron microscopy with microchemistry, BET… More > Graphic Abstract

    Physicochemical Properties of Combustion Ashes of Some Trees (Urban Pruning) Present in the Neotropical Region

  • Open Access

    ARTICLE

    AI Safety Approach for Minimizing Collisions in Autonomous Navigation

    Abdulghani M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal on Artificial Intelligence, Vol.5, pp. 1-14, 2023, DOI:10.32604/jai.2023.039786

    Abstract Autonomous agents can explore the environment around them when equipped with advanced hardware and software systems that help intelligent agents minimize collisions. These systems are developed under the term Artificial Intelligence (AI) safety. AI safety is essential to provide reliable service to consumers in various fields such as military, education, healthcare, and automotive. This paper presents the design of an AI safety algorithm for safe autonomous navigation using Reinforcement Learning (RL). Machine Learning Agents Toolkit (ML-Agents) was used to train the agent with a proximal policy optimizer algorithm with an intrinsic curiosity module (PPO + ICM). This training aims to improve AI… More >

  • Open Access

    ARTICLE

    Improved RRT Algorithm for Automatic Charging Robot Obstacle Avoidance Path Planning in Complex Environments

    Chong Xu1, Hao Zhu1, Haotian Zhu2, Jirong Wang1, Qinghai Zhao1,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2567-2591, 2023, DOI:10.32604/cmes.2023.029152

    Abstract A new and improved RRT algorithm has been developed to address the low efficiency of obstacle avoidance planning and long path distances in the electric vehicle automatic charging robot arm. This algorithm enables the robot to avoid obstacles, find the optimal path, and complete automatic charging docking. It maintains the global completeness and path optimality of the RRT algorithm while also improving the iteration speed and quality of generated paths in both 2D and 3D path planning. After finding the optimal path, the B-sample curve is used to optimize the rough path to create a smoother and more optimal path.… More > Graphic Abstract

    Improved RRT<sup>∗</sup> Algorithm for Automatic Charging Robot Obstacle Avoidance Path Planning in Complex Environments

  • Open Access

    ARTICLE

    An Improved High Precision 3D Semantic Mapping of Indoor Scenes from RGB-D Images

    Jing Xin1,*, Kenan Du1, Jiale Feng1, Mao Shan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2621-2640, 2023, DOI:10.32604/cmes.2023.027467

    Abstract This paper proposes an improved high-precision 3D semantic mapping method for indoor scenes using RGB-D images. The current semantic mapping algorithms suffer from low semantic annotation accuracy and insufficient real-time performance. To address these issues, we first adopt the Elastic Fusion algorithm to select key frames from indoor environment image sequences captured by the Kinect sensor and construct the indoor environment space model. Then, an indoor RGB-D image semantic segmentation network is proposed, which uses multi-scale feature fusion to quickly and accurately obtain object labeling information at the pixel level of the spatial point cloud model. Finally, Bayesian updating is… More >

  • Open Access

    ARTICLE

    Toward Secure Software-Defined Networks Using Machine Learning: A Review, Research Challenges, and Future Directions

    Muhammad Waqas Nadeem1,*, Hock Guan Goh1, Yichiet Aun1, Vasaki Ponnusamy2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2201-2217, 2023, DOI:10.32604/csse.2023.039893

    Abstract Over the past few years, rapid advancements in the internet and communication technologies have led to increasingly intricate and diverse networking systems. As a result, greater intelligence is necessary to effectively manage, optimize, and maintain these systems. Due to their distributed nature, machine learning models are challenging to deploy in traditional networks. However, Software-Defined Networking (SDN) presents an opportunity to integrate intelligence into networks by offering a programmable architecture that separates data and control planes. SDN provides a centralized network view and allows for dynamic updates of flow rules and software-based traffic analysis. While the programmable nature of SDN makes… More >

  • Open Access

    ARTICLE

    Systematic Survey on Big Data Analytics and Artificial Intelligence for COVID-19 Containment

    Saeed M. Alshahrani1, Jameel Almalki2, Waleed Alshehri2, Rashid Mehmood3, Marwan Albahar2, Najlaa Jannah2, Nayyar Ahmed Khan1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1793-1817, 2023, DOI:10.32604/csse.2023.039648

    Abstract Artificial Intelligence (AI) has gained popularity for the containment of COVID-19 pandemic applications. Several AI techniques provide efficient mechanisms for handling pandemic situations. AI methods, protocols, data sets, and various validation mechanisms empower the users towards proper decision-making and procedures to handle the situation. Despite so many tools, there still exist conditions in which AI must go a long way. To increase the adaptability and potential of these techniques, a combination of AI and Bigdata is currently gaining popularity. This paper surveys and analyzes the methods within the various computational paradigms used by different researchers and national governments, such as… More >

Displaying 21-30 on page 3 of 193. Per Page