Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (697)
  • Open Access

    ARTICLE

    Enhancing IoT-Enabled Electric Vehicle Efficiency: Smart Charging Station and Battery Management Solution

    Supriya Wadekar1,*, Shailendra Mittal1, Ganesh Wakte2, Rajshree Shinde2

    Energy Engineering, Vol.123, No.1, 2026, DOI:10.32604/ee.2025.071761 - 27 December 2025

    Abstract Rapid evolutions of the Internet of Electric Vehicles (IoEVs) are reshaping and modernizing transport systems, yet challenges remain in energy efficiency, better battery aging, and grid stability. Typical charging methods allow for EVs to be charged without thought being given to the condition of the battery or the grid demand, thus increasing energy costs and battery aging. This study proposes a smart charging station with an AI-powered Battery Management System (BMS), developed and simulated in MATLAB/Simulink, to increase optimality in energy flow, battery health, and impractical scheduling within the IoEV environment. The system operates through… More >

  • Open Access

    ARTICLE

    Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things

    Chia-Hui Liu*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-18, 2026, DOI:10.32604/cmc.2025.072887 - 09 December 2025

    Abstract The Industrial Internet of Things (IIoT) has emerged as a cornerstone of Industry 4.0, enabling large-scale automation and data-driven decision-making across factories, supply chains, and critical infrastructures. However, the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping, data tampering, and device impersonation. While digital signatures are indispensable for ensuring authenticity and non-repudiation, conventional schemes such as RSA and ECC are vulnerable to quantum algorithms, jeopardizing long-term trust in IIoT deployments. This study proposes a lightweight, stateless, hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT. The… More >

  • Open Access

    REVIEW

    FSL-TM: Review on the Integration of Federated Split Learning with TinyML in the Internet of Vehicles

    Meenakshi Aggarwal1, Vikas Khullar2,*, Nitin Goyal3

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.072673 - 09 December 2025

    Abstract The Internet of Vehicles, or IoV, is expected to lessen pollution, ease traffic, and increase road safety. IoV entities’ interconnectedness, however, raises the possibility of cyberattacks, which can have detrimental effects. IoV systems typically send massive volumes of raw data to central servers, which may raise privacy issues. Additionally, model training on IoV devices with limited resources normally leads to slower training times and reduced service quality. We discuss a privacy-preserving Federated Split Learning with Tiny Machine Learning (TinyML) approach, which operates on IoV edge devices without sharing sensitive raw data. Specifically, we focus on… More >

  • Open Access

    ARTICLE

    Overcoming Dynamic Connectivity in Internet of Vehicles: A DAG Lattice Blockchain with Reputation-Based Incentive

    Xiaodong Zhang1, Wenhan Hou2,*, Juanjuan Wang3, Leixiao Li1, Pengfei Yue1

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.072384 - 09 December 2025

    Abstract Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles (IoV). However, due to the dynamic connectivity of IoV, blockchain based on a single-chain structure or Directed Acyclic Graph (DAG) structure often suffer from performance limitations. The DAG lattice structure is a novel blockchain model in which each node maintains its own account chain, and only the node itself is allowed to update it. This feature makes the DAG lattice structure particularly suitable for addressing the challenges in dynamically connected IoV environment. In this paper, we propose a blockchain architecture… More >

  • Open Access

    ARTICLE

    Industrial EdgeSign: NAS-Optimized Real-Time Hand Gesture Recognition for Operator Communication in Smart Factories

    Meixi Chu1, Xinyu Jiang1,*, Yushu Tao2

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.071533 - 09 December 2025

    Abstract Industrial operators need reliable communication in high-noise, safety-critical environments where speech or touch input is often impractical. Existing gesture systems either miss real-time deadlines on resource-constrained hardware or lose accuracy under occlusion, vibration, and lighting changes. We introduce Industrial EdgeSign, a dual-path framework that combines hardware-aware neural architecture search (NAS) with large multimodal model (LMM) guided semantics to deliver robust, low-latency gesture recognition on edge devices. The searched model uses a truncated ResNet50 front end, a dimensional-reduction network that preserves spatiotemporal structure for tubelet-based attention, and localized Transformer layers tuned for on-device inference. To reduce… More >

  • Open Access

    ARTICLE

    Smart Assessment of Flight Quality for Trajectory Planning in Internet of Flying Things

    Weiping Zeng1, Xiangping Bryce Zhai1,2,3,*, Cheng Sun1, Liusha Jiang1,2, Yicong Du3, Xuefeng Yan1,3

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-15, 2026, DOI:10.32604/cmc.2025.070777 - 09 December 2025

    Abstract With the expanding applications of unmanned aerial vehicles (UAVs), precise flight evaluation has emerged as a critical enabler for efficient path planning, directly impacting operational performance and safety. Traditional path planning algorithms typically combine Dubins curves with local optimization to minimize trajectory length under 3D spatial constraints. However, these methods often overlook the correlation between pilot control quality and UAV flight dynamics, limiting their adaptability in complex scenarios. In this paper, we propose an intelligent flight evaluation model specifically designed to enhance multi-waypoint trajectory optimization algorithms. Our model leverages a decision tree to integrate attitude More >

  • Open Access

    ARTICLE

    A Joint Optimization Model for Device Selection and Power Allocation under Dynamic Uncertain Environments

    Bohui Li1, Bin Wang1, Linjie Wu1, Xingjuan Cai1,*, Maoqing Zhang2,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-28, 2026, DOI:10.32604/cmc.2025.070592 - 09 December 2025

    Abstract Federated Learning (FL) provides an effective framework for efficient processing in vehicular edge computing. However, the dynamic and uncertain communication environment, along with the performance variations of vehicular devices, affect the distribution and uploading processes of model parameters. In FL-assisted Internet of Vehicles (IoV) scenarios, challenges such as data heterogeneity, limited device resources, and unstable communication environments become increasingly prominent. These issues necessitate intelligent vehicle selection schemes to enhance training efficiency. Given this context, we propose a new scenario involving FL-assisted IoV systems under dynamic and uncertain communication conditions, and develop a dynamic interval multi-objective More >

  • Open Access

    ARTICLE

    Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT

    He Duan, Shi Zhang*, Dayu Li

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069628 - 09 December 2025

    Abstract Internet of Things (IoT) interconnects devices via network protocols to enable intelligent sensing and control. Resource-constrained IoT devices rely on cloud servers for data storage and processing. However, this cloud-assisted architecture faces two critical challenges: the untrusted cloud services and the separation of data ownership from control. Although Attribute-based Searchable Encryption (ABSE) provides fine-grained access control and keyword search over encrypted data, existing schemes lack of error tolerance in exact multi-keyword matching. In this paper, we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search (FCS-ABMSE) scheme that avoids computationally expensive bilinear pairing… More >

  • Open Access

    ARTICLE

    MWaOA: A Bio-Inspired Metaheuristic Algorithm for Resource Allocation in Internet of Things

    Rekha Phadke1, Abdul Lateef Haroon Phulara Shaik2, Dayanidhi Mohapatra3, Doaa Sami Khafaga4,*, Eman Abdullah Aldakheel4, N. Sathyanarayana5

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-26, 2026, DOI:10.32604/cmc.2025.067564 - 09 December 2025

    Abstract Recently, the Internet of Things (IoT) technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices. Furthermore, the IoT plays a key role in multiple domains, including industrial automation, smart homes, and intelligent transportation systems. However, an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness. To address these issue, this research proposes a Modified Walrus Optimization Algorithm (MWaOA) for effective resource management in smart IoT systems. In the proposed MWaOA, a crowding process… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Distributed Authentication Scheme for IoV with Reputation-Driven Consensus and SM9

    Hui Wei1,2, Zhanfei Ma1,3,*, Jing Jiang1, Bisheng Wang1, Zhong Di1

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069236 - 10 November 2025

    Abstract The Internet of Vehicles (IoV) operates in highly dynamic and open network environments and faces serious challenges in secure and real-time authentication and consensus mechanisms. Existing methods often suffer from complex certificate management, inefficient consensus protocols, and poor resilience in high-frequency communication, resulting in high latency, poor scalability, and unstable network performance. To address these issues, this paper proposes a secure and efficient distributed authentication scheme for IoV with reputation-driven consensus and SM9. First, this paper proposes a decentralized authentication architecture that utilizes the certificate-free feature of SM9, enabling lightweight authentication and key negotiation, thereby… More >

Displaying 1-10 on page 1 of 697. Per Page