Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    CRBFT: A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains

    Xiangyu Wu1, Xuehui Du1,*, Qiantao Yang1,2, Aodi Liu1, Na Wang1, Wenjuan Wang1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1491-1519, 2024, DOI:10.32604/cmc.2024.052708 - 18 July 2024

    Abstract Blockchain has been widely used in finance, the Internet of Things (IoT), supply chains, and other scenarios as a revolutionary technology. Consensus protocol plays a vital role in blockchain, which helps all participants to maintain the storage state consistently. However, with the improvement of network environment complexity and system scale, blockchain development is limited by the performance, security, and scalability of the consensus protocol. To address this problem, this paper introduces the collaborative filtering mechanism commonly used in the recommendation system into the Practical Byzantine Fault Tolerance (PBFT) and proposes a Byzantine fault-tolerant (BFT) consensus… More >

  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759 - 16 April 2024

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions… More >

  • Open Access

    ARTICLE

    Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs

    Lianghao Hua1,2, Jianfeng Zhang1,*, Dejie Li3, Xiaobo Xi1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2129-2157, 2024, DOI:10.32604/cmes.2023.030535 - 15 December 2023

    Abstract With the increasing prevalence of high-order systems in engineering applications, these systems often exhibit significant disturbances and can be challenging to model accurately. As a result, the active disturbance rejection controller (ADRC) has been widely applied in various fields. However, in controlling plant protection unmanned aerial vehicles (UAVs), which are typically large and subject to significant disturbances, load disturbances and the possibility of multiple actuator faults during pesticide spraying pose significant challenges. To address these issues, this paper proposes a novel fault-tolerant control method that combines a radial basis function neural network (RBFNN) with a More > Graphic Abstract

    Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs

  • Open Access

    ARTICLE

    CF-BFT: A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication

    Zhiruo Zhang, Feng Wang*, Yang Liu, Yang Lu, Xinlei Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3113-3129, 2023, DOI:10.32604/cmc.2023.040600 - 08 October 2023

    Abstract The consensus protocol is one of the core technologies in blockchain, which plays a crucial role in ensuring the block generation rate, consistency, and safety of the blockchain system. Blockchain systems mainly adopt the Byzantine Fault Tolerance (BFT) protocol, which often suffers from slow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus. In this paper, this paper proposes a new dual-mode consensus protocol based on node identity authentication. It divides the consensus process into two subprotocols: Check_BFT and Fast_BFT. In Check_BFT, the replicas authenticate the primary’s identity by monitoring… More >

  • Open Access

    ARTICLE

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

    Yang Zhao1, Jingmin An1, Hao Li1, Saru Kumari2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 555-575, 2023, DOI:10.32604/cmes.2023.026808 - 23 April 2023

    Abstract The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-time detection and operation control of vehicles and real-time transmission of data and information. In the environment of VSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users, so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, in this paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTAS-ET). The scheme combines fault-tolerant and aggregate signcryption, which… More > Graphic Abstract

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

  • Open Access

    ARTICLE

    Detection of Phishing in Internet-of-Things Using Hybrid Deep Belief Network

    S. Ashwini*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3043-3056, 2023, DOI:10.32604/iasc.2023.034551 - 15 March 2023

    Abstract Increase in the use of internet of things owned devices is one of the reasons for increased network traffic. While connecting the smart devices with publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing system. The Phishing is the slow and resilient attack stacking techniques probe the users. The proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm (NWAT). Though Predictive mapping, Predictive Validation and Predictive analysis mechanism is… More >

  • Open Access

    ARTICLE

    Novel Double Modular Redundancy Based Fault-Tolerant FIR Filter for Image Denoising

    V. S. Vaisakhi1,*, D. Surendran2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 181-193, 2023, DOI:10.32604/csse.2023.032514 - 20 January 2023

    Abstract In signal processing and communication systems, digital filters are widely employed. In some circumstances, the reliability of those systems is crucial, necessitating the use of fault tolerant filter implementations. Many strategies have been presented throughout the years to achieve fault tolerance by utilising the structure and properties of the filters. As technology advances, more complicated systems with several filters become possible. Some of the filters in those complicated systems frequently function in parallel, for example, by applying the same filter to various input signals. Recently, a simple strategy for achieving fault tolerance that takes advantage… More >

  • Open Access

    REVIEW

    Intelligent Identification over Power Big Data: Opportunities, Solutions, and Challenges

    Liang Luo1, Xingmei Li1, Kaijiang Yang1, Mengyang Wei1, Jiong Chen1, Junqian Yang1, Liang Yao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1565-1595, 2023, DOI:10.32604/cmes.2022.021198 - 20 September 2022

    Abstract The emergence of power dispatching automation systems has greatly improved the efficiency of power industry operations and promoted the rapid development of the power industry. However, with the convergence and increase in power data flow, the data dispatching network and the main station dispatching automation system have encountered substantial pressure. Therefore, the method of online data resolution and rapid problem identification of dispatching automation systems has been widely investigated. In this paper, we perform a comprehensive review of automated dispatching of massive dispatching data from the perspective of intelligent identification, discuss unresolved research issues and More >

  • Open Access

    ARTICLE

    Fault Tolerance Techniques for Multi-Hop Clustering in Wireless Sensor Networks

    Adel Rajab*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1743-1761, 2022, DOI:10.32604/iasc.2022.021922 - 09 December 2021

    Abstract Wireless sensor networks (WSN) deploy many nodes over an extended area for traffic surveillance, environmental monitoring, healthcare, tracking wildlife, and military sensing. Nodes of the WSN have a limited amount of energy. Each sensor node collects information from the surrounding area and forwards it onto the cluster head, which then sends it on to the base station (BS). WSNs extend the lifetime of the network through clustering techniques. Choosing nodes with the greatest residual energy as cluster heads is based on the idea that energy consumption is periodically distributed between nodes. The sink node gathers… More >

  • Open Access

    ARTICLE

    Fault-Tolerant Communication Induced Checkpointing and Recovery Protocol Using IoT

    Neha Malhotra1,2,*, Manju Bala3

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 945-960, 2021, DOI:10.32604/iasc.2021.019082 - 20 August 2021

    Abstract In mobile computing systems, nodes in the network take checkpoints to survive failures. Certain characteristics of mobile computing systems such as mobility, low bandwidth, disconnection, low power consumption, and limited memory make these systems more prone to failures. In this paper, a novel minimum process communication-induced checkpointing algorithm that makes full use of the computation ability and implementation of effective stable storage in a mobile computing system is proposed. The said approach initiates by taking spontaneous checkpoints by each node in phase 1 using a logistic function that is specifically used to estimate the time… More >

Displaying 1-10 on page 1 of 12. Per Page