Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems

    Jingyu Zhang1,2, Pian Zhou1, Jin Wang1, Osama Alfarraj3, Saurabh Singh4, Min Zhu5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1613-1633, 2024, DOI:10.32604/cmes.2023.044418

    Abstract Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system. This technology has been widely used and has developed rapidly in big data systems across various fields. An increasing number of users are participating in application systems that use blockchain as their underlying architecture. As the number of transactions and the capital involved in blockchain grow, ensuring information security becomes imperative. Addressing the verification of transactional information security and privacy has emerged as a critical challenge. Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations. However,… More >

  • Open Access

    ARTICLE

    CF-BFT: A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication

    Zhiruo Zhang, Feng Wang*, Yang Liu, Yang Lu, Xinlei Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3113-3129, 2023, DOI:10.32604/cmc.2023.040600

    Abstract The consensus protocol is one of the core technologies in blockchain, which plays a crucial role in ensuring the block generation rate, consistency, and safety of the blockchain system. Blockchain systems mainly adopt the Byzantine Fault Tolerance (BFT) protocol, which often suffers from slow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus. In this paper, this paper proposes a new dual-mode consensus protocol based on node identity authentication. It divides the consensus process into two subprotocols: Check_BFT and Fast_BFT. In Check_BFT, the replicas authenticate the primary’s identity by monitoring its behaviors. First, assume that… More >

  • Open Access

    ARTICLE

    Data Utilization-Based Adaptive Data Management Method for Distributed Storage System in WAN Environment

    Sanghyuck Nam1, Jaehwan Lee2, Kyoungchan Kim3, Mingyu Jo1, Sangoh Park1,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3457-3469, 2023, DOI:10.32604/csse.2023.035428

    Abstract Recently, research on a distributed storage system that efficiently manages a large amount of data has been actively conducted following data production and demand increase. Physical expansion limits exist for traditional standalone storage systems, such as I/O and file system capacity. However, the existing distributed storage system does not consider where data is consumed and is more focused on data dissemination and optimizing the lookup cost of data location. And this leads to system performance degradation due to low locality occurring in a Wide Area Network (WAN) environment with high network latency. This problem hinders deploying distributed storage systems to… More >

  • Open Access

    ARTICLE

    Ether-IoT: A Realtime Lightweight and Scalable Blockchain-Enabled Cache Algorithm for IoT Access Control

    Hafiz Adnan Hussain*, Zulkefli Mansor, Zarina Shukur, Uzma Jafar

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3797-3815, 2023, DOI:10.32604/cmc.2023.034671

    Abstract Several unique characteristics of Internet of Things (IoT) devices, such as distributed deployment and limited storage, make it challenging for standard centralized access control systems to enable access control in today’s large-scale IoT ecosystem. To solve these challenges, this study presents an IoT access control system called Ether-IoT based on the Ethereum Blockchain (BC) infrastructure with Attribute-Based Access Control (ABAC). Access Contract (AC), Cache Contract (CC), Device Contract (DC), and Policy Contract (PC) are the four central smart contracts (SCs) that are included in the proposed system. CC offers a way to save user characteristics in a local cache system… More >

  • Open Access

    ARTICLE

    Fault Tolerance in the Joint EDF-RMS Algorithm: A Comparative Simulation Study

    Rashmi Sharma1, Nitin Nitin2, Deepak Dahiya3,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5197-5213, 2022, DOI:10.32604/cmc.2022.025059

    Abstract Failure is a systemic error that affects overall system performance and may eventually crash across the entire configuration. In Real-Time Systems (RTS), deadline is the key to successful completion of the program. If tasks effectively meet the deadline, it means the system is working in pristine order. However, missing the deadline means a systemic fault due to which the system can crash (hard RTS) or degrade inclusive performance (soft RTS). To fine-tune the RTS, tolerance is the critical issue and must be handled with extreme care. This article explains the context of fault tolerance with improvised Joint EDF-RMS algorithm in… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Predictive Model for P2P Energy Trading in TEM

    Pudi Sekhar1, T. J. Benedict Jose2, Velmurugan Subbiah Parvathy3, E. Laxmi Lydia4, Seifedine Kadry5, Kuntha Pin6, Yunyoung Nam7,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1473-1487, 2022, DOI:10.32604/cmc.2022.022110

    Abstract With the incorporation of distributed energy systems in the electric grid, transactive energy market (TEM) has become popular in balancing the demand as well as supply adaptively over the grid. The classical grid can be updated to the smart grid by the integration of Information and Communication Technology (ICT) over the grids. The TEM allows the Peer-to-Peer (P2P) energy trading in the grid that effectually connects the consumer and prosumer to trade energy among them. At the same time, there is a need to predict the load for effectual P2P energy trading and can be accomplished by the use of… More >

  • Open Access

    ARTICLE

    An Optimal Distribution of RSU for Improving Self-Driving Vehicle Connectivity

    Khattab Alheeti1, Abdulkareem Alaloosy1, Haitham Khalaf2, Abdulkareem Alzahrani3,*, Duaa Al_Dosary4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3311-3319, 2022, DOI:10.32604/cmc.2022.019773

    Abstract Self-driving and semi-self-driving cars play an important role in our daily lives. The effectiveness of these cars is based heavily on the use of their surrounding areas to collect sensitive and vital information. However, external infrastructures also play significant roles in the transmission and reception of control data, cooperative awareness messages, and caution notifications. In this case, roadside units are considered one of the most important communication peripherals. Random distribution of these infrastructures will overburden the spread of self-driving vehicles in terms of cost, bandwidth, connectivity, and radio coverage area. In this paper, a new distributed roadside unit is proposed… More >

  • Open Access

    ARTICLE

    Fault-Tolerant Communication Induced Checkpointing and Recovery Protocol Using IoT

    Neha Malhotra1,2,*, Manju Bala3

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 945-960, 2021, DOI:10.32604/iasc.2021.019082

    Abstract In mobile computing systems, nodes in the network take checkpoints to survive failures. Certain characteristics of mobile computing systems such as mobility, low bandwidth, disconnection, low power consumption, and limited memory make these systems more prone to failures. In this paper, a novel minimum process communication-induced checkpointing algorithm that makes full use of the computation ability and implementation of effective stable storage in a mobile computing system is proposed. The said approach initiates by taking spontaneous checkpoints by each node in phase 1 using a logistic function that is specifically used to estimate the time interval between two checkpoints and… More >

  • Open Access

    ARTICLE

    Average Convergence for Directed & Undirected Graphs in Distributed Systems

    Ali Mustafa1,2, M Najam ul Islam1, Salman Ahmed1,3,*

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 399-413, 2021, DOI:10.32604/csse.2021.015575

    Abstract Consensus control of multi-agent systems is an innovative paradigm for the development of intelligent distributed systems. This has fascinated numerous scientific groups for their promising applications as they have the freedom to achieve their local and global goals and make their own decisions. Network communication topologies based on graph and matrix theory are widely used in a various real-time applications ranging from software agents to robotics. Therefore, while sustaining the significance of both directed and undirected graphs, this research emphases on the demonstration of a distributed average consensus algorithm. It uses the harmonic mean in the domain of multi-agent systems… More >

  • Open Access

    ARTICLE

    A Storage Optimization Scheme for Blockchain Transaction Databases

    Jingyu Zhang1,2, Siqi Zhong1, Jin Wang1,3, Xiaofeng Yu4,*, Osama Alfarraj5

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 521-535, 2021, DOI:10.32604/csse.2021.014530

    Abstract As the typical peer-to-peer distributed networks, blockchain systems require each node to copy a complete transaction database, so as to ensure new transactions can by verified independently. In a blockchain system (e.g., bitcoin system), the node does not rely on any central organization, and every node keeps an entire copy of the transaction database. However, this feature determines that the size of blockchain transaction database is growing rapidly. Therefore, with the continuous system operations, the node memory also needs to be expanded to support the system running. Especially in the big data era, the increasing network traffic will lead to… More >

Displaying 1-10 on page 1 of 15. Per Page