Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (628)
  • Open Access

    ARTICLE

    Latent Profile Analysis: Mattering Concepts, Problematic Internet Use, and Adaptability in Chinese University Students

    Jianlong Wang1,#, Xiumei Chen1,2,#, Muqi Huang3, Rui Liu3, I-Hua Chen4,5,*, Gordon L. Flett6,*

    International Journal of Mental Health Promotion, Vol.27, No.2, pp. 241-256, 2025, DOI:10.32604/ijmhp.2025.058503 - 03 March 2025

    Abstract Background: This study addresses the pressing need to understand the nuanced relationship between ‘mattering’—the perception of being significant to others—and problematic internet use (PIU) among university students. Unlike previous research that has primarily employed variable-centered approaches, this study first adopts a person-centered approach using Latent Profile Analysis (LPA) to identify distinct mattering profiles. Subsequently, through variable-centered analyses, these profiles are examined in relation to different types of PIU—specifically problematic social media use (PSMU) and problematic gaming (PG)—as well as adaptability. Methods: Data were collected from 3587 university students across 19 universities in China. Participants completed… More >

  • Open Access

    ARTICLE

    Software Defined Range-Proof Authentication Mechanism for Untraceable Digital ID

    So-Eun Jeon1, Yeon-Ji Lee2, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3213-3228, 2025, DOI:10.32604/cmes.2025.062082 - 03 March 2025

    Abstract The Internet of Things (IoT) is extensively applied across various industrial domains, such as smart homes, factories, and intelligent transportation, becoming integral to daily life. Establishing robust policies for managing and governing IoT devices is imperative. Secure authentication for IoT devices in resource-constrained environments remains challenging due to the limitations of conventional complex protocols. Prior methodologies enhanced mutual authentication through key exchange protocols or complex operations, which are impractical for lightweight devices. To address this, our study introduces the privacy-preserving software-defined range proof (SDRP) model, which achieves secure authentication with low complexity. SDRP minimizes the More >

  • Open Access

    ARTICLE

    ANNDRA-IoT: A Deep Learning Approach for Optimal Resource Allocation in Internet of Things Environments

    Abdullah M. Alqahtani1,*, Kamran Ahmad Awan2, Abdulaziz Almaleh3, Osama Aletri4

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3155-3179, 2025, DOI:10.32604/cmes.2025.061472 - 03 March 2025

    Abstract Efficient resource management within Internet of Things (IoT) environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities. This study introduces a neural network-based model that uses Long-Short-Term Memory (LSTM) to optimize resource allocation under dynamically changing conditions. Designed to monitor the workload on individual IoT nodes, the model incorporates long-term data dependencies, enabling adaptive resource distribution in real time. The training process utilizes Min-Max normalization and grid search for hyperparameter tuning, ensuring high resource utilization and consistent performance. The simulation results demonstrate the effectiveness of the proposed method, More >

  • Open Access

    ARTICLE

    Quantum Inspired Adaptive Resource Management Algorithm for Scalable and Energy Efficient Fog Computing in Internet of Things (IoT)

    Sonia Khan1, Naqash Younas2, Musaed Alhussein3, Wahib Jamal Khan2, Muhammad Shahid Anwar4,*, Khursheed Aurangzeb3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2641-2660, 2025, DOI:10.32604/cmes.2025.060973 - 03 March 2025

    Abstract Effective resource management in the Internet of Things and fog computing is essential for efficient and scalable networks. However, existing methods often fail in dynamic and high-demand environments, leading to resource bottlenecks and increased energy consumption. This study aims to address these limitations by proposing the Quantum Inspired Adaptive Resource Management (QIARM) model, which introduces novel algorithms inspired by quantum principles for enhanced resource allocation. QIARM employs a quantum superposition-inspired technique for multi-state resource representation and an adaptive learning component to adjust resources in real time dynamically. In addition, an energy-aware scheduling module minimizes power More >

  • Open Access

    ARTICLE

    A Novel Proactive AI-Based Agents Framework for an IoE-Based Smart Things Monitoring System with Applications for Smart Vehicles

    Meng-Hua Yen1,*, Nilamadhab Mishra2,*, Win-Jet Luo3, Chu-En Lin1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1839-1855, 2025, DOI:10.32604/cmc.2025.060903 - 17 February 2025

    Abstract The Internet of Everything (IoE) coupled with Proactive Artificial Intelligence (AI)-Based Learning Agents (PLAs) through a cloud processing system is an idea that connects all computing resources to the Internet, making it possible for these devices to communicate with one another. Technologies featured in the IoE include embedding, networking, and sensing devices. To achieve the intended results of the IoE and ease life for everyone involved, sensing devices and monitoring systems are linked together. The IoE is used in several contexts, including intelligent cars’ protection, navigation, security, and fuel efficiency. The Smart Things Monitoring System… More >

  • Open Access

    ARTICLE

    HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things

    Amjad Khan1, Rahim Khan1,*, Fahad Alturise2,*, Tamim Alkhalifah3

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3161-3178, 2025, DOI:10.32604/cmc.2025.060372 - 17 February 2025

    Abstract The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the… More >

  • Open Access

    ARTICLE

    LSBSP: A Lightweight Sharding Method of Blockchain Based on State Pruning for Efficient Data Sharing in IoMT

    Guoqiong Liao1,3, Yinxiang Lei1,2,*, Yufang Xie1, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3309-3335, 2025, DOI:10.32604/cmc.2024.060077 - 17 February 2025

    Abstract As the Internet of Medical Things (IoMT) continues to expand, smart health-monitoring devices generate vast amounts of valuable data while simultaneously raising critical security and privacy challenges. Blockchain technology presents a promising avenue to address these concerns due to its inherent decentralization and security features. However, scalability remains a persistent hurdle, particularly for IoMT applications that involve large-scale networks and resource-constrained devices. This paper introduces a novel lightweight sharding method tailored to the unique demands of IoMT data sharing. Our approach enhances state bootstrapping efficiency and reduces operational overhead by utilizing a dual-chain structure comprising… More >

  • Open Access

    REVIEW

    Zero Trust Networks: Evolution and Application from Concept to Practice

    Yongjun Ren1, Zhiming Wang1, Pradip Kumar Sharma2, Fayez Alqahtani3, Amr Tolba4, Jin Wang5,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1593-1613, 2025, DOI:10.32604/cmc.2025.059170 - 17 February 2025

    Abstract In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defensive techniques, Zero Trust Networks (ZTN) have emerged as a widely recognized technology. Zero Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of “never trust, always verify.” Initially proposed by John Cortez in 2010 and subsequently promoted by Google, the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network environments. This paper systematically compares the current mainstream cybersecurity models, thoroughly explores More >

  • Open Access

    ARTICLE

    MG-SLAM: RGB-D SLAM Based on Semantic Segmentation for Dynamic Environment in the Internet of Vehicles

    Fengju Zhang1, Kai Zhu2,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2353-2372, 2025, DOI:10.32604/cmc.2024.058944 - 17 February 2025

    Abstract The Internet of Vehicles (IoV) has become an important direction in the field of intelligent transportation, in which vehicle positioning is a crucial part. SLAM (Simultaneous Localization and Mapping) technology plays a crucial role in vehicle localization and navigation. Traditional Simultaneous Localization and Mapping (SLAM) systems are designed for use in static environments, and they can result in poor performance in terms of accuracy and robustness when used in dynamic environments where objects are in constant movement. To address this issue, a new real-time visual SLAM system called MG-SLAM has been developed. Based on ORB-SLAM2,… More >

  • Open Access

    ARTICLE

    An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things

    Gang Xu1,2,6, Xinyu Fan1, Xiu-Bo Chen2, Xin Liu4, Zongpeng Li5, Yanhui Mao6,7, Kejia Zhang3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2293-2309, 2025, DOI:10.32604/cmc.2024.057882 - 17 February 2025

    Abstract Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure,… More >

Displaying 11-20 on page 2 of 628. Per Page