Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (158)
  • Open Access

    ARTICLE

    Using Digital Twin to Diagnose Faults in Braiding Machinery Based on IoT

    Youping Lin1, Huangbin Lin2,*, Dezhi Wei1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1363-1379, 2023, DOI:10.32604/iasc.2023.038601

    Abstract The digital twin (DT) includes real-time data analytics based on the actual product or manufacturing processing parameters. Data from digital twins can predict asset maintenance requirements ahead of time. This saves money by decreasing operating expenses and asset downtime, which improves company efficiency. In this paper, a digital twin in braiding machinery based on IoT (DTBM-IoT) used to diagnose faults. When an imbalance fault occurs, the system gathers experimental data. After that, the information is sent into a digital win model of the rotor system to see whether it can quantify and locate imbalance for defect detection. It is possible… More >

  • Open Access

    ARTICLE

    Quantum-Enhanced Blockchain: A Secure and Practical Blockchain Scheme

    Ang Liu1,2, Xiu-Bo Chen1,*, Gang Xu3, Zhuo Wang4, Xuefen Feng5, Huamin Feng6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 259-277, 2023, DOI:10.32604/cmc.2023.039397

    Abstract The rapid advancement of quantum technology poses significant security risks to blockchain systems. However, quantum technology can also provide solutions for enhancing blockchain security. In this paper, we propose a quantum-enhanced blockchain scheme to achieve a high level of security against quantum computing attacks. We first discuss quantum computing attacks on classic blockchains, including attacks on hash functions, digital signatures, and consensus mechanisms. We then introduce quantum technologies, such as a quantum hash function (QHF), a quantum digital signature (QDS), and proof of authority (PoA) consensus mechanism, into our scheme to improve the security of the blockchain system. Our security… More >

  • Open Access

    ARTICLE

    Construction of Intelligent Recommendation Retrieval Model of FuJian Intangible Cultural Heritage Digital Archives Resources

    Xueqing Liao*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 677-690, 2023, DOI:10.32604/iasc.2023.037219

    Abstract In order to improve the consistency between the recommended retrieval results and user needs, improve the recommendation efficiency, and reduce the average absolute deviation of resource retrieval, a design method of intelligent recommendation retrieval model for Fujian intangible cultural heritage digital archive resources based on knowledge atlas is proposed. The TG-LDA (Tag-granularity LDA) model is proposed on the basis of the standard LDA (Linear Discriminant Analysis) model. The model is used to mine archive resource topics. The Pearson correlation coefficient is used to measure the relevance between topics. Based on the measurement results, the FastText deep learning model is used… More >

  • Open Access

    ARTICLE

    Fair-News: Digital Journalism Model to Prevent Information Pollution and Manipulation

    Savaş Takan1,*, Duygu Ergün2,*, Gökmen Katipoğlu3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6059-6082, 2023, DOI:10.32604/cmc.2023.039505

    Abstract As digital data circulation increases, information pollution and manipulation in journalism have become more prevalent. In this study, a new digital journalism model is designed to contribute to the solution of the main current problems, such as information pollution, manipulation, and accountability in digital journalism. The model uses blockchain technology due to its transparency, immutability, and traceability. However, it is tough to provide the mechanisms necessary for journalism, such as updating one piece of information, instantly updating all other information affected by the updated information, establishing logical relationships between news, making quick comparisons, sorting and indexing news, and keeping the… More >

  • Open Access

    ARTICLE

    Research and Implementation of Credit Investigation Sharing Platform Based on Double Blockchain

    Yanyan Han1,2, Wanqi Wei2,*, Kaili Dou3, Peng Li2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5193-5211, 2023, DOI:10.32604/cmc.2023.037756

    Abstract As the development of the modern economy is increasingly inseparable from credit support, the traditional credit investigation mode has yet to meet this demand. Because of the difficulties in conventional credit data sharing among credit investigation agencies, poor data portability, and centralized supervision, this paper proposes a data-sharing scheme for credit investigation agencies based on a double blockchain. Given the problems such as difficult data sharing, difficult recovery of damaged data, and accessible data leakage between institutions and users with non-traditional credit investigation data other than credit, this paper proposes a data-sharing scheme for credit investigation subjects based on the… More >

  • Open Access

    ARTICLE

    A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

    Walid El-Shafai1,2,*, Fatma Khallaf2,3, El-Sayed M. El-Rabaie2, Fathi E. Abd El-Samie2, Iman Almomani1,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3599-3618, 2023, DOI:10.32604/csse.2023.037655

    Abstract This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation. Furthermore, a… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE)

    Lelisa Adeba Jilcha1, Deuk-Hun Kim2, Julian Jang-Jaccard3, Jin Kwak4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3261-3284, 2023, DOI:10.32604/csse.2023.037615

    Abstract Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.… More >

  • Open Access

    ARTICLE

    Blockchain Mobile Wallet with Secure Offline Transactions

    Raed Saeed Rasheed1, Khalil Hamdi Ateyeh Al-Shqeerat2,*, Ahmed Salah Ghorab3, Fuad Salama AbuOwaimer4, Aiman Ahmed AbuSamra1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2905-2919, 2023, DOI:10.32604/cmc.2023.036691

    Abstract There has been an increase in the adoption of mobile payment systems worldwide in the past few years. However, poor Internet connection in rural regions continues to be an obstacle to the widespread use of such technologies. On top of that, there are significant problems with the currently available offline wallets; for instance, the payee cannot verify the number of coins received without access to the Internet. Additionally, it has been demonstrated that some existing systems are susceptible to false token generation, and some do not even permit the user to divide the offline token into smaller portions to be… More >

  • Open Access

    ARTICLE

    Identification of a Printed Anti-Counterfeiting Code Based on Feature Guidance Double Pool Attention Networks

    Changhui You1,2, Hong Zheng1,2,*, Zhongyuan Guo2, Tianyu Wang2, Jianping Ju3, Xi Li3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3431-3452, 2023, DOI:10.32604/cmc.2023.035897

    Abstract The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment, photographing habits, camera resolution and other factors, resulting in poor collection quality of anti-counterfeiting codes and weak differentiation of anti-counterfeiting codes for high-quality counterfeits. Developing an anti-counterfeiting code authentication algorithm based on mobile phones is of great commercial value. Although the existing algorithms developed based on special equipment can effectively identify forged anti-counterfeiting codes, the anti-counterfeiting code identification scheme based on mobile phones is still in its infancy. To address the small differences in texture features, low response speed and excessively large deep learning… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving System Design for Digital Presence Protection

    Eric Yocam1, Ahmad Alomari2, Amjad Gawanmeh3,*, Wathiq Mansoor3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3091-3110, 2023, DOI:10.32604/cmc.2023.032826

    Abstract A person’s privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameter-based access control protection mechanism for digital privacy preservation. The enhanced capability combines multiple access control parameters: facial expression, resource, environment, location, and time. The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.… More >

Displaying 21-30 on page 3 of 158. Per Page