Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (604)
  • Open Access

    ARTICLE

    3D Road Network Modeling and Road Structure Recognition in Internet of Vehicles

    Dun Cao1, Jia Ru1, Jian Qin1, Amr Tolba2, Jin Wang1, Min Zhu3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1365-1384, 2024, DOI:10.32604/cmes.2023.030260 - 17 November 2023

    Abstract Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles, people, transportation infrastructure, and networks, thereby realizing a more intelligent and efficient transportation system. The movement of vehicles and the three-dimensional (3D) nature of the road network cause the topological structure of IoV to have the high space and time complexity. Network modeling and structure recognition for 3D roads can benefit the description of topological changes for IoV. This paper proposes a 3D general road model based on discrete points of roads obtained from GIS. First, the constraints… More >

  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895 - 22 September 2023

    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This More >

  • Open Access

    ARTICLE

    The Relationship between Internet Addiction and Cyberbullying Perpetration: A Moderated Mediation Model of Moral Disengagement and Internet Literacy

    Wan Xiao1,*, Miaoting Cheng2,*

    International Journal of Mental Health Promotion, Vol.25, No.12, pp. 1303-1311, 2023, DOI:10.32604/ijmhp.2023.042976 - 29 December 2023

    Abstract Internet addiction and cyberbullying have emerged as significant global mental health concerns in recent years. Although previous studies have shown a close association between Internet addiction and cyberbullying, the underlying mechanisms connecting these two phenomena remain unclear. Therefore, this study aimed to reveal the mechanisms involved between Internet addiction and cyberbullying perpetration from the perspective of cognition function. This study recruited 976 Chinese youth through online survey, using the short version of Internet Addiction Test (s-IAT), Chinese Cyberbullying Intervention Project Questionnaire (C-CIPQ), Cyberbullying Moral Disengagement Scale (CMDS), and Internet Literacy Questionnaire (ILQ) to investigate the More >

  • Open Access

    ARTICLE

    The Relationship between Students’ Anxiety and Internet Use Disorders: A Meta-Analysis

    Yichi Zhang#, Yuxiang Feng#, Shan Hu*, Huiyong Fan*

    International Journal of Mental Health Promotion, Vol.25, No.12, pp. 1323-1341, 2023, DOI:10.32604/ijmhp.2023.029096 - 29 December 2023

    Abstract Theoretical models have predicted a positive association between anxiety and Internet use disorders. However, the findings of previous studies are conflicting, with some reporting a positive association and others proposing no relationship between the two. To explore the true relationship between the two and analyze the reasons for the differences, 100 primary studies involving 108,539 subjects were entered into a meta-analysis. The results showed that (1) there was a significant positive correlation between students’ anxiety and Internet use disorder (r = 0.330); (2) the moderating effect of anxiety type was significant. (3) The moderating effects of More >

  • Open Access

    ARTICLE

    Hybrid Algorithm-Driven Smart Logistics Optimization in IoT-Based Cyber-Physical Systems

    Abdulwahab Ali Almazroi1,*, Nasir Ayub2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3921-3942, 2023, DOI:10.32604/cmc.2023.046602 - 26 December 2023

    Abstract Effectively managing complex logistics data is essential for development sustainability and growth, especially in optimizing distribution routes. This article addresses the limitations of current logistics path optimization methods, such as inefficiencies and high operational costs. To overcome these drawbacks, we introduce the Hybrid Firefly-Spotted Hyena Optimization (HFSHO) algorithm, a novel approach that combines the rapid exploration and global search abilities of the Firefly Algorithm (FO) with the localized search and region-exploitation skills of the Spotted Hyena Optimization Algorithm (SHO). HFSHO aims to improve logistics path optimization and reduce operational costs. The algorithm’s effectiveness is systematically… More >

  • Open Access

    ARTICLE

    Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform

    Xiangmin Guo1,2, Guangjun Liang1,2,*, Jiayin Liu1,2, Xianyi Chen3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3305-3323, 2023, DOI:10.32604/cmc.2023.044529 - 26 December 2023

    Abstract Cloud storage is widely used by large companies to store vast amounts of data and files, offering flexibility, financial savings, and security. However, information shoplifting poses significant threats, potentially leading to poor performance and privacy breaches. Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms, ensuring businesses can focus on business development. To ensure data security in cloud platforms, this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing (HD2C) model. However, the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of… More >

  • Open Access

    ARTICLE

    Using Metaheuristic OFA Algorithm for Service Placement in Fog Computing

    Riza Altunay1,2,*, Omer Faruk Bay3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2881-2897, 2023, DOI:10.32604/cmc.2023.042340 - 26 December 2023

    Abstract The use of fog computing in the Internet of Things (IoT) has emerged as a crucial solution, bringing cloud services closer to end users to process large amounts of data generated within the system. Despite its advantages, the increasing task demands from IoT objects often overload fog devices with limited resources, resulting in system delays, high network usage, and increased energy consumption. One of the major challenges in fog computing for IoT applications is the efficient deployment of services between fog clouds. To address this challenge, we propose a novel Optimal Foraging Algorithm (OFA) for… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Inference System for Managing Intensive Care Unit Resources Based on Knowledge Graph

    Ahmad F Subahi*, Areej Athama

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3801-3816, 2023, DOI:10.32604/cmc.2023.034522 - 26 December 2023

    Abstract With the rapid growth in the availability of digital health-related data, there is a great demand for the utilization of intelligent information systems within the healthcare sector. These systems can manage and manipulate this massive amount of health-related data and encourage different decision-making tasks. They can also provide various sustainable health services such as medical error reduction, diagnosis acceleration, and clinical services quality improvement. The intensive care unit (ICU) is one of the most important hospital units. However, there are limited rooms and resources in most hospitals. During times of seasonal diseases and pandemics, ICUs… More >

  • Open Access

    ARTICLE

    Internet of Things Based Smart Irrigation System Using ESP WROOM 32

    Krish R. Mehta, K. Jayant Naidu, Madhav Baheti, Dev Parmar, A. Sharmila*

    Journal on Internet of Things, Vol.5, pp. 45-55, 2023, DOI:10.32604/jiot.2023.043102 - 26 December 2023

    Abstract Farming has been the most prominent and fundamental activity for generations. As the population has been multiplying exponentially, the demand for agricultural yield is growing relentlessly. Such high demand in production through traditional farming methodologies often falls short in terms of efficiency due to the limitations of manual labour. In the era of digitization, smart agricultural solutions have been emerging through the windows of Internet of Things and Artificial Intelligence to improve resource management, optimize the process of farming and enhance the yield of crops, hence, ensuring sustainable growth of the increasing production. By implementing… More >

  • Open Access

    ARTICLE

    Flexible Global Aggregation and Dynamic Client Selection for Federated Learning in Internet of Vehicles

    Tariq Qayyum1, Zouheir Trabelsi1,*, Asadullah Tariq1, Muhammad Ali2, Kadhim Hayawi3, Irfan Ud Din4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1739-1757, 2023, DOI:10.32604/cmc.2023.043684 - 29 November 2023

    Abstract Federated Learning (FL) enables collaborative and privacy-preserving training of machine learning models within the Internet of Vehicles (IoV) realm. While FL effectively tackles privacy concerns, it also imposes significant resource requirements. In traditional FL, trained models are transmitted to a central server for global aggregation, typically in the cloud. This approach often leads to network congestion and bandwidth limitations when numerous devices communicate with the same server. The need for Flexible Global Aggregation and Dynamic Client Selection in FL for the IoV arises from the inherent characteristics of IoV environments. These include diverse and distributed… More >

Displaying 101-110 on page 11 of 604. Per Page