Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    REVIEW

    Applications of AI and Blockchain in Origin Traceability and Forensics: A Review of ICs, Pharmaceuticals, EVs, UAVs, and Robotics

    Hsiao-Chun Han1, Der-Chen Huang1,*, Chin-Ling Chen2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 67-126, 2025, DOI:10.32604/cmes.2025.070944 - 30 October 2025

    Abstract This study presents a systematic review of applications of artificial intelligence (abbreviated as AI) and blockchain in supply chain provenance traceability and legal forensics cover five sectors: integrated circuits (abbreviated as ICs), pharmaceuticals, electric vehicles (abbreviated as EVs), drones (abbreviated as UAVs), and robotics—in response to rising trade tensions and geopolitical conflicts, which have heightened concerns over product origin fraud and information security. While previous literature often focuses on single-industry contexts or isolated technologies, this review comprehensively surveys these sectors and categorizes 116 peer-reviewed studies by application domain, technical architecture, and functional objective. Special attention More >

  • Open Access

    REVIEW

    Significant Advancements in UAV Technology for Reliable Oil and Gas Pipeline Monitoring

    Ibrahim Akinjobi Aromoye1, Hai Hiung Lo1, Patrick Sebastian1, Ghulam E Mustafa Abro2,*, Shehu Lukman Ayinla1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.2, pp. 1155-1197, 2025, DOI:10.32604/cmes.2025.058598 - 27 January 2025

    Abstract Unmanned aerial vehicles (UAVs) technology is rapidly advancing, offering innovative solutions for various industries, including the critical task of oil and gas pipeline surveillance. However, the limited flight time of conventional UAVs presents a significant challenge to comprehensive and continuous monitoring, which is crucial for maintaining the integrity of pipeline infrastructure. This review paper evaluates methods for extending UAV flight endurance, focusing on their potential application in pipeline inspection. Through an extensive literature review, this study identifies the latest advancements in UAV technology, evaluates their effectiveness, and highlights the existing gaps in achieving prolonged flight… More > Graphic Abstract

    Significant Advancements in UAV Technology for Reliable Oil and Gas Pipeline Monitoring

  • Open Access

    ARTICLE

    GMLP-IDS: A Novel Deep Learning-Based Intrusion Detection System for Smart Agriculture

    Abdelwahed Berguiga1,2,*, Ahlem Harchay1,2, Ayman Massaoudi1,2, Mossaad Ben Ayed3, Hafedh Belmabrouk4

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 379-402, 2023, DOI:10.32604/cmc.2023.041667 - 31 October 2023

    Abstract Smart Agriculture, also known as Agricultural 5.0, is expected to be an integral part of our human lives to reduce the cost of agricultural inputs, increasing productivity and improving the quality of the final product. Indeed, the safety and ongoing maintenance of Smart Agriculture from cyber-attacks are vitally important. To provide more comprehensive protection against potential cyber-attacks, this paper proposes a new deep learning-based intrusion detection system for securing Smart Agriculture. The proposed Intrusion Detection System IDS, namely GMLP-IDS, combines the feedforward neural network Multilayer Perceptron (MLP) and the Gaussian Mixture Model (GMM) that can… More >

  • Open Access

    ARTICLE

    Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing

    Maryam Alhassan, Abdul Raouf Khan*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2727-2740, 2023, DOI:10.32604/cmc.2023.037129 - 31 March 2023

    Abstract Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture to ensure that sensitive information is protected and kept secure throughout the communication. Simultaneously, efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource constrained. This study proposes a lightweight and efficient authentication scheme for the UAV-assisted MEC environment. The proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting… More >

  • Open Access

    ARTICLE

    A Drone-Based Blood Donation Approach Using an Ant Colony Optimization Algorithm

    Sana Abbas1, Faraha Ashraf1, Fahd Jarad2,3,*, Muhammad Shoaib Sardar1, Imran Siddique4

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1917-1930, 2023, DOI:10.32604/cmes.2023.024700 - 06 February 2023

    Abstract This article presents an optimized approach of mathematical techniques in the medical domain by manoeuvring the phenomenon of ant colony optimization algorithm (also known as ACO). A complete graph of blood banks and a path that covers all the blood banks without repeating any link is required by applying the Travelling Salesman Problem (often TSP). The wide use promises to accelerate and offers the opportunity to cultivate health care, particularly in remote or unmerited environments by shrinking lab testing reversal times, empowering just-in-time lifesaving medical supply. More >

  • Open Access

    ARTICLE

    Efficient Power Control for UAV Based on Trajectory and Game Theory

    Fadhil Mukhlif1,*, Ashraf Osman Ibrahim2, Norafida Ithnin1, Roobaea Alroobaea3, Majed Alsafyani3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5589-5606, 2023, DOI:10.32604/cmc.2023.034323 - 28 December 2022

    Abstract Due to the fact that network space is becoming more limited, the implementation of ultra-dense networks (UDNs) has the potential to enhance not only network coverage but also network throughput. Unmanned Aerial Vehicle (UAV) communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes. A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this article. In the IoT system, the UAV is utilised not only to determine… More >

  • Open Access

    ARTICLE

    Intelligent Optimization-Based Clustering with Encryption Technique for Internet of Drones Environment

    Dalia H. Elkamchouchi1, Jaber S. Alzahrani2, Hany Mahgoub3,4, Amal S. Mehanna5, Anwer Mustafa Hilal6,*, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6617-6634, 2022, DOI:10.32604/cmc.2022.031909 - 28 July 2022

    Abstract The recent technological developments have revolutionized the functioning of Wireless Sensor Network (WSN)-based industries with the development of Internet of Things (IoT). Internet of Drones (IoD) is a division under IoT and is utilized for communication amongst drones. While drones are naturally mobile, it undergoes frequent topological changes. Such alterations in the topology cause route election, stability, and scalability problems in IoD. Encryption is considered as an effective method to transmit the images in IoD environment. The current study introduces an Atom Search Optimization based Clustering with Encryption Technique for Secure Internet of Drones (ASOCE-SIoD)… More >

  • Open Access

    ARTICLE

    Feature Selection with Stacked Autoencoder Based Intrusion Detection in Drones Environment

    Heba G. Mohamed1, Saud S. Alotaibi2, Majdy M. Eltahir3, Heba Mohsen4, Manar Ahmed Hamza5,*, Abu Sarwar Zamani5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5441-5458, 2022, DOI:10.32604/cmc.2022.031887 - 28 July 2022

    Abstract The Internet of Drones (IoD) offers synchronized access to organized airspace for Unmanned Aerial Vehicles (known as drones). The availability of inexpensive sensors, processors, and wireless communication makes it possible in real time applications. As several applications comprise IoD in real time environment, significant interest has been received by research communications. Since IoD operates in wireless environment, it is needed to design effective intrusion detection system (IDS) to resolve security issues in the IoD environment. This article introduces a metaheuristics feature selection with optimal stacked autoencoder based intrusion detection (MFSOSAE-ID) in the IoD environment. The… More >

  • Open Access

    ARTICLE

    A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD)

    Saeed Ullah Jan1, Irshad Ahmed Abbasi2,*, Fahad Algarni3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5845-5869, 2022, DOI:10.32604/cmc.2022.026179 - 21 April 2022

    Abstract With the rapid miniaturization in sensor technology, Internet-of-Drones (IoD) has delighted researchers towards information transmission security among drones with the control station server (CSS). In IoD, the drone is different in shapes, sizes, characteristics, and configurations. It can be classified on the purpose of its deployment, either in the civilian or military domain. Drone’s manufacturing, equipment installation, power supply, multi-rotor system, and embedded sensors are not issues for researchers. The main thing is to utilize a drone for a complex and sensitive task using an infrastructure-less/self-organization/resource-less network type called Flying Ad Hoc Network (FANET). Monitoring… More >

  • Open Access

    ARTICLE

    Game Theory-Based IoT Efficient Power Control in Cognitive UAV

    Fadhil Mukhlif1,*, Norafida Ithnin1, Omar B. Abdulghafoor2, Faiz Alotaibi3, Nourah Saad Alotaibi4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1561-1578, 2022, DOI:10.32604/cmc.2022.026074 - 24 February 2022

    Abstract With the help of network densification, network coverage as well as the throughput can be improved via ultra-dense networks (UDNs). In tandem, Unmanned Aerial Vehicle (UAV) communications have recently garnered much attention because of their high agility as well as widespread applications. In this paper, a cognitive UAV is proposed for wireless nodes power pertaining to the IoT ground terminal. Further, the UAV is included in the IoT system as the source of power for the wireless nodes as well as for resource allocation. The quality of service (QoS) related to the cognitive node was… More >

Displaying 1-10 on page 1 of 14. Per Page