Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25)
  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu1,2, Xiao Zhang1,2,3,*, Jinjiang Wang1,2, Yuchen Zhang1,2, Yulong Shi1,2, Linxuan Su1,2, Leijie Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2159-2179, 2024, DOI:10.32604/cmc.2024.047340

    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage and access. The on-chain system,… More >

  • Open Access

    ARTICLE

    Multi-Stream Temporally Enhanced Network for Video Salient Object Detection

    Dan Xu*, Jiale Ru, Jinlong Shi

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 85-104, 2024, DOI:10.32604/cmc.2023.045258

    Abstract Video salient object detection (VSOD) aims at locating the most attractive objects in a video by exploring the spatial and temporal features. VSOD poses a challenging task in computer vision, as it involves processing complex spatial data that is also influenced by temporal dynamics. Despite the progress made in existing VSOD models, they still struggle in scenes of great background diversity within and between frames. Additionally, they encounter difficulties related to accumulated noise and high time consumption during the extraction of temporal features over a long-term duration. We propose a multi-stream temporal enhanced network (MSTENet) to address these problems. It… More >

  • Open Access

    ARTICLE

    BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks

    Fengting Luo, Ruwei Huang*, Yuyue Chen

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1815-1835, 2023, DOI:10.32604/cmc.2023.041676

    Abstract Smart parks serve as integral components of smart cities, where they play a pivotal role in the process of urban modernization. The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase. To ensure secure communication, device identities must undergo authentication. The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices, making it impractical for resource-constrained devices. This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks, which simplifies the authentication interaction and requires every device to maintain only one certificate. To… More >

  • Open Access

    ARTICLE

    Satellite-Air-Terrestrial Cloud Edge Collaborative Networks: Architecture, Multi-Node Task Processing and Computation

    Sai Liu1, Zhenjiang Zhang1,*, Guangjie Han2, Bo Shen1

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2651-2668, 2023, DOI:10.32604/iasc.2023.038477

    Abstract Integrated satellite-terrestrial network (ISTN) has been considered a novel network architecture to achieve global three-dimensional coverage and ultra-wide area broadband access anytime and anywhere. Being a promising paradigm, cloud computing and mobile edge computing (MEC) have been identified as key technology enablers for ISTN to further improve quality of service and business continuity. However, most of the existing ISTN studies based on cloud computing and MEC regard satellite networks as relay networks, ignoring the feasibility of directly deploying cloud computing nodes and edge computing nodes on satellites. In addition, most computing tasks are transferred to cloud servers or offloaded to… More >

  • Open Access

    ARTICLE

    Pedestrian and Vehicle Detection Based on Pruning YOLOv4 with Cloud-Edge Collaboration

    Huabin Wang1, Ruichao Mo2, Yuping Chen3, Weiwei Lin2,4,*, Minxian Xu5, Bo Liu3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 2025-2047, 2023, DOI:10.32604/cmes.2023.026910

    Abstract Nowadays, the rapid development of edge computing has driven an increasing number of deep learning applications deployed at the edge of the network, such as pedestrian and vehicle detection, to provide efficient intelligent services to mobile users. However, as the accuracy requirements continue to increase, the components of deep learning models for pedestrian and vehicle detection, such as YOLOv4, become more sophisticated and the computing resources required for model training are increasing dramatically, which in turn leads to significant challenges in achieving effective deployment on resource-constrained edge devices while ensuring the high accuracy performance. For addressing this challenge, a cloud-edge… More >

  • Open Access

    ARTICLE

    Anomaly Detection and Access Control for Cloud-Edge Collaboration Networks

    Bingcheng Jiang, Qian He*, Zhongyi Zhai, Hang Su

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2335-2353, 2023, DOI:10.32604/iasc.2023.039989

    Abstract Software-defined networking (SDN) enables the separation of control and data planes, allowing for centralized control and management of the network. Without adequate access control methods, the risk of unauthorized access to the network and its resources increases significantly. This can result in various security breaches. In addition, if authorized devices are attacked or controlled by hackers, they may turn into malicious devices, which can cause severe damage to the network if their abnormal behaviour goes undetected and their access privileges are not promptly restricted. To solve those problems, an anomaly detection and access control mechanism based on SDN and neural… More >

  • Open Access

    ARTICLE

    Spatial Multi-Presence System to Increase Security Awareness for Remote Collaboration in an Extended Reality Environment

    Jun Lee1, Hyun Kwon2,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 369-384, 2023, DOI:10.32604/iasc.2023.036052

    Abstract Enhancing the sense of presence of participants is an important issue in terms of security awareness for remote collaboration in extended reality. However, conventional methods are insufficient to be aware of remote situations and to search for and control remote workspaces. This study proposes a spatial multi-presence system that simultaneously provides multiple spaces while rapidly exploring these spaces as users perform collaborative work in an extended reality environment. The proposed system provides methods for arranging and manipulating remote and personal spaces by creating an annular screen that is invisible to the user. The user can freely arrange remote participants and… More >

  • Open Access

    ARTICLE

    A Whale Optimization Algorithm with Distributed Collaboration and Reverse Learning Ability

    Zhedong Xu*, Yongbo Su, Fang Yang, Ming Zhang

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5965-5986, 2023, DOI:10.32604/cmc.2023.037611

    Abstract Due to the development of digital transformation, intelligent algorithms are getting more and more attention. The whale optimization algorithm (WOA) is one of swarm intelligence optimization algorithms and is widely used to solve practical engineering optimization problems. However, with the increased dimensions, higher requirements are put forward for algorithm performance. The double population whale optimization algorithm with distributed collaboration and reverse learning ability (DCRWOA) is proposed to solve the slow convergence speed and unstable search accuracy of the WOA algorithm in optimization problems. In the DCRWOA algorithm, the novel double population search strategy is constructed. Meanwhile, the reverse learning strategy… More >

  • Open Access

    ARTICLE

    Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems

    Byeori Kim1, Minseong Choi1, Taek-Young Youn2, Jeong Hyun Yi1, Haehyun Cho1,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3725-3742, 2023, DOI:10.32604/iasc.2023.036574

    Abstract Recently, there has been a sudden shift from using traditional office applications to the collaborative cloud-based office suite such as Microsoft Office 365. Such cloud-based systems allow users to work together on the same document stored in a cloud server at once, by which users can effectively collaborate with each other. However, there are security concerns unsolved in using cloud collaboration. One of the major concerns is the security of data stored in cloud servers, which comes from the fact that data that multiple users are working together cannot be stored in encrypted form because of the dynamic characteristic of… More >

  • Open Access

    ARTICLE

    UOUU: User-Object Distance and User-User Distance Combined Method for Collaboration Task

    Xiangdong Li, Pengfei Wang*, Hanfei Xia, Yuting Niu

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 3213-3238, 2023, DOI:10.32604/cmes.2023.023895

    Abstract Augmented reality superimposes digital information onto objects in the physical world and enables multi-user collaboration. Despite that previous proxemic interaction research has explored many applications of user-object distance and user-user distance in an augmented reality context, respectively, and combining both types of distance can improve the efficiency of users’ perception and interaction with task objects and collaborators by providing users with insight into spatial relations of user-task object and user-user, less is concerned about how the two types of distances can be simultaneously adopted to assist collaboration tasks across multi-users. To fulfill the gap, we present UOUU, the user-object distance… More > Graphic Abstract

    UOUU: User-Object Distance and User-User Distance Combined Method for Collaboration Task

Displaying 1-10 on page 1 of 25. Per Page