Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (373)
  • Open Access

    ARTICLE

    Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol (iSTSP) for Security-Critical Time-Sensitive WSNs

    Ramadan Abdul-Rashid1, Mohd Amiruddin Abd Rahman1,*, Abdulaziz Yagoub Barnawi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3213-3250, 2025, DOI:10.32604/cmes.2025.066589 - 30 September 2025

    Abstract Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks (WSNs), especially in security-critical, time-sensitive applications. However, most existing protocols degrade substantially under malicious interference. We introduce iSTSP, an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust, precise synchronization even in hostile environments: (1) trust preprocessing that filters node participation using behavioral trust scoring; (2) anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time; (3) reliability-weighted consensus that prioritizes high-trust nodes during time aggregation; and (4) convergence-optimized synchronization… More >

  • Open Access

    ARTICLE

    Real-Time Communication Driver for MPU Accelerometer Using Predictable Non-Blocking I2C Communication

    Valentin Stangaciu*, Mihai-Vladimir Ghimpau, Adrian-Gabriel Sztanarec

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3213-3229, 2025, DOI:10.32604/cmc.2025.068844 - 23 September 2025

    Abstract Along with process control, perception represents the main function performed by the Edge Layer of an Internet of Things (IoT) network. Many of these networks implement various applications where the response time does not represent an important parameter. However, in critical applications, this parameter represents a crucial aspect. One important sensing device used in IoT designs is the accelerometer. In most applications, the response time of the embedded driver software handling this device is generally not analysed and not taken into account. In this paper, we present the design and implementation of a predictable real-time More >

  • Open Access

    ARTICLE

    MNTSCC: A VMamba-Based Nonlinear Joint Source-Channel Coding for Semantic Communications

    Chao Li1,3,#, Chen Wang1,3,#, Caichang Ding2,*, Yonghao Liao1,3, Zhiwei Ye1,3

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3129-3149, 2025, DOI:10.32604/cmc.2025.067440 - 23 September 2025

    Abstract Deep learning-based semantic communication has achieved remarkable progress with CNNs and Transformers. However, CNNs exhibit constrained performance in high-resolution image transmission, while Transformers incur high computational cost due to quadratic complexity. Recently, VMamba, a novel state space model with linear complexity and exceptional long-range dependency modeling capabilities, has shown great potential in computer vision tasks. Inspired by this, we propose MNTSCC, an efficient VMamba-based nonlinear joint source-channel coding (JSCC) model for wireless image transmission. Specifically, MNTSCC comprises a VMamba-based nonlinear transform module, an MCAM entropy model, and a JSCC module. In the encoding stage, the… More >

  • Open Access

    REVIEW

    Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission

    Michael Juma Ayuma1,*, Shem Mbandu Angolo1, Philemon Nthenge Kasyoka2, Simon Maina Karume3

    Journal of Cyber Security, Vol.7, pp. 307-341, 2025, DOI:10.32604/jcs.2025.067360 - 02 September 2025

    Abstract Token transmission is a fundamental component in diverse domains, including computer networks, blockchain systems, distributed architectures, financial transactions, secure communications, and identity verification. Ensuring optimal performance during transmission is essential for maintaining the efficiency of data in transit. However, persistent threats from adversarial actors continue to pose significant risks to the integrity, authenticity, and confidentiality of transmitted data. This study presents a comprehensive review of existing research on token transmission techniques, examining the roles of transmission channels, emerging trends, and the associated security and performance implications. A critical analysis is conducted to assess the strengths, More >

  • Open Access

    ARTICLE

    Design of a Wireless Measurement Instrument for Tunnel Anchor Rod Length

    Mengqiang Yu1, Xingcheng Wang1, Chen Quan1, Mingxin Sun1, Yujun Yang2, Xiaodong He1, Wu Sun2,*, Pengfei Cao1,*

    Structural Durability & Health Monitoring, Vol.19, No.5, pp. 1127-1143, 2025, DOI:10.32604/sdhm.2025.067069 - 05 September 2025

    Abstract Accurate measurement of anchor rod length is crucial for ensuring structural safety in tunnel engineering, yet conventional destructive techniques face limitations in efficiency and adaptability to complex underground environments. This study presents a novel wireless instrument based on the standing wave principle to enable remote, non-destructive length assessment. The system employs a master-slave architecture, where a handheld transmitter unit initiates measurements through robust 433 MHz wireless communication, optimized for signal penetration in obstructed spaces. The embedded measurement unit, integrated with anchor rods during installation, utilizes frequency-scanning technology to excite structural resonances. By analyzing standing wave… More >

  • Open Access

    ARTICLE

    Dynamic Session Key Allocation with Time-Indexed Ascon for Low-Latency Cloud-Edge-End Communication

    Fang-Yie Leu1, Kun-Lin Tsai2,*, Li-Woei Chen3, Deng-Yao Yao2, Jian-Fu Tsai2, Ju-Wei Zhu2, Guo-Wei Wang2

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1937-1957, 2025, DOI:10.32604/cmc.2025.068486 - 29 August 2025

    Abstract With the rapid development of Cloud-Edge-End (CEE) computing, the demand for secure and lightweight communication protocols is increasingly critical, particularly for latency-sensitive applications such as smart manufacturing, healthcare, and real-time monitoring. While traditional cryptographic schemes offer robust protection, they often impose excessive computational and energy overhead, rendering them unsuitable for use in resource-constrained edge and end devices. To address these challenges, in this paper, we propose a novel lightweight encryption framework, namely Dynamic Session Key Allocation with Time-Indexed Ascon (DSKA-TIA). Built upon the NIST-endorsed Ascon algorithm, the DSKA-TIA introduces a time-indexed session key generation mechanism… More >

  • Open Access

    ARTICLE

    EdgeGuard-IoT: 6G-Enabled Edge Intelligence for Secure Federated Learning and Adaptive Anomaly Detection in Industry 5.0

    Mohammed Naif Alatawi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 695-727, 2025, DOI:10.32604/cmc.2025.066606 - 29 August 2025

    Abstract Adaptive robust secure framework plays a vital role in implementing intelligent automation and decentralized decision making of Industry 5.0. Latency, privacy risks and the complexity of industrial networks have been preventing attempts at traditional cloud-based learning systems. We demonstrate that, to overcome these challenges, for instance, the EdgeGuard-IoT framework, a 6G edge intelligence framework enhancing cybersecurity and operational resilience of the smart grid, is needed on the edge to integrate Secure Federated Learning (SFL) and Adaptive Anomaly Detection (AAD). With ultra-reliable low latency communication (URLLC) of 6G, artificial intelligence-based network orchestration, and massive machine type… More >

  • Open Access

    REVIEW

    A Comprehensive Survey of Deep Learning for Authentication in Vehicular Communication

    Tarak Nandy1,*, Sananda Bhattacharyya2

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 181-219, 2025, DOI:10.32604/cmc.2025.066306 - 29 August 2025

    Abstract In the rapidly evolving landscape of intelligent transportation systems, the security and authenticity of vehicular communication have emerged as critical challenges. As vehicles become increasingly interconnected, the need for robust authentication mechanisms to safeguard against cyber threats and ensure trust in an autonomous ecosystem becomes essential. On the other hand, using intelligence in the authentication system is a significant attraction. While existing surveys broadly address vehicular security, a critical gap remains in the systematic exploration of Deep Learning (DL)-based authentication methods tailored to these communication paradigms. This survey fills that gap by offering a comprehensive… More >

  • Open Access

    BRIEF COMMUNICATION

    Addressing the Physician Mental Health Crisis with Psychoeducation: A Brief Communication

    Traci N. Adams1,*, Carol S. North2

    International Journal of Mental Health Promotion, Vol.27, No.7, pp. 1045-1050, 2025, DOI:10.32604/ijmhp.2025.065144 - 31 July 2025

    Abstract Physician mental health (MH) is in crisis, particularly in high-stress areas of medicine such as the emergency room and the intensive care unit. The high prevalence of burnout and psychiatric illness among critical care physicians, along with delays in seeking psychiatric care, can lead to suicide, ruined careers, damaged relationships, and medical errors. Psychoeducation programs can reduce MH sick leave days, increase empathy, and enhance help-seeking attitudes. The purpose of this brief communication is to demonstrate that physician psychoeducation programs can improve patient care, improve outcomes in physicians with psychiatric illness, and improve burnout rates, More >

  • Open Access

    ARTICLE

    Hyper-Chaos and CNN-Based Image Encryption Scheme for Wireless Communication Transmission

    Gang Liu1, Guosheng Xu1,*, Chenyu Wang1, Guoai Xu2

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4851-4868, 2025, DOI:10.32604/cmc.2025.066331 - 30 July 2025

    Abstract In wireless communication transmission, image encryption plays a key role in protecting data privacy against unauthorized access. However, conventional encryption methods often face challenges in key space security, particularly when relying on chaotic sequences, which may exhibit vulnerabilities to brute-force and predictability-based attacks. To address the limitations, this paper presents a robust and efficient encryption scheme that combines iterative hyper-chaotic systems and Convolutional Neural Networks (CNNs). Firstly, a novel two-dimensional iterative hyper-chaotic system is proposed because of its complex dynamic behavior and expanded parameter space, which can enhance the key space complexity and randomness, ensuring… More >

Displaying 21-30 on page 3 of 373. Per Page