Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (703)
  • Open Access

    ARTICLE

    Specific Internet-Use Disorders among Indonesian College Students: Psychometric Evaluation of the Assessment of Criteria for Specific Internet-Use Disorders (ACSID-11)

    Siti Rahayu Nadhiroh1,*, Ira Nurmala2, Iqbal Pramukti3, Kamolthip Ruckwongpatr4, Laila Wahyuning Tyas2, Afina Puspita Zari2, Warda Eka Islamiah1, Yan-Li Siaw5, Marc N. Potenza6,7,8,9,10,11, Chung-Ying Lin12,13,14,15,*

    International Journal of Mental Health Promotion, Vol.27, No.12, pp. 1847-1865, 2025, DOI:10.32604/ijmhp.2025.072115 - 31 December 2025

    Abstract Objectives: Problematic use of the internet (PUI) has been increasingly associated with various mental health issues, highlighting the need for accurate assessment tools. The Assessment of Criteria for Specific Internet-use Disorder (ACSID-11) is a validated psychometric instrument designed to measure distinct forms of PUI across multiple online activities. However, its applicability and validity have not yet been established within the Indonesian context. Therefore, this study aimed to translate and validate the ACSID-11 for use among Indonesian populations. Methods: The translation procedure of the ACSID-11 involved forward translation, back translation, and expert panel discussions. This research involved… More >

  • Open Access

    REVIEW

    Problematic internet use and substance use disorder among men: A scoping review

    Liezille Jacobs*, Miché Adolph

    Journal of Psychology in Africa, Vol.35, No.6, pp. 761-769, 2025, DOI:10.32604/jpa.2025.065787 - 30 December 2025

    Abstract This scoping review aimed to synthesise literature on problematic internet use and substance use disorder, including how they affect men, given that prior research has predominantly focused on women. The search included Web of Science, Psych Info, Science Direct, and Scopus spanning over the period 2014–2023. Studies were included for the review if they focused on Problematic Internet Use (PIU) and Substance Use Disorder (SUD) among men, were peer-reviewed, and were written in English. Opinions, discussions, and theoretical papers were excluded. Sixteen studies were included in this review. Data were synthesised through thematic analysis. Emergent More >

  • Open Access

    REVIEW

    Attribute-Based Encryption for IoT Environments—A Critical Survey

    Daskshnamoorthy Manivannan*

    Journal on Internet of Things, Vol.7, pp. 71-97, 2025, DOI:10.32604/jiot.2025.072809 - 24 December 2025

    Abstract Attribute-Based Encryption (ABE) secures data by tying decryption rights to user attributes instead of identities, enabling fine-grained access control. However, many ABE schemes are unsuitable for Internet of Things (IoT) due to limited device resources. This paper critically surveys ABE schemes developed specifically for IoT over the past decade, examining their evolution, strengths, limitations, and access control capabilities. It provides insights into their security, effectiveness, and real-world applicability, highlights the current state of ABE in securing IoT data and access, and discusses remaining challenges and open issues. More >

  • Open Access

    ARTICLE

    Securing IoT Ecosystems: Experimental Evaluation of Modern Lightweight Cryptographic Algorithms and Their Performance

    Mircea Ţălu1,2,*

    Journal of Cyber Security, Vol.7, pp. 565-587, 2025, DOI:10.32604/jcs.2025.073690 - 11 December 2025

    Abstract The rapid proliferation of Internet of Things (IoT) devices has intensified the demand for cryptographic solutions that balance security, performance, and resource efficiency. However, existing studies often focus on isolated algorithmic families, lacking a comprehensive structural and experimental comparison across diverse lightweight cryptographic designs. This study addresses that gap by providing an integrated analysis of modern lightweight cryptographic algorithms spanning six structural classes—Substitution–Permutation Network (SPN), Feistel Network (FN), Generalized Feistel Network (GFN), Addition–Rotation–XOR (ARX), Nonlinear Feedback Shift Register (NLFSR), and Hybrid models—evaluated on resource-constrained IoT platforms. The key contributions include: (i) establishing a unified benchmarking… More >

  • Open Access

    ARTICLE

    Implementation and Evaluation of the Zero-Knowledge Protocol for Identity Card Verification

    Edward Danso Ansong*, Simon Bonsu Osei*, Raphael Adjetey Adjei

    Journal of Cyber Security, Vol.7, pp. 533-564, 2025, DOI:10.32604/jcs.2025.061821 - 11 December 2025

    Abstract The surge in identity fraud, driven by the rapid adoption of mobile money, internet banking, and e-services during the COVID-19 pandemic, underscores the need for robust cybersecurity solutions. Zero-Knowledge Proofs (ZKPs) enable secure identity verification by allowing individuals to prove possession of a National ID card without revealing sensitive information. This study implements a ZKP-based identity verification system using Camenisch-Lysyanskaya (CL) signatures, reducing reliance on complex trusted setup ceremonies. While a trusted issuer is still required, as assumed in this work, our approach eliminates the need for broader system-wide trusted parameters. We evaluate the system’s More >

  • Open Access

    ARTICLE

    AI-Driven SDN and Blockchain-Based Routing Framework for Scalable and Trustworthy AIoT Networks

    Mekhled Alharbi1,*, Khalid Haseeb2, Mamoona Humayun3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2601-2616, 2025, DOI:10.32604/cmes.2025.073039 - 26 November 2025

    Abstract Emerging technologies and the Internet of Things (IoT) are integrating for the growth and development of heterogeneous networks. These systems are providing real-time devices to end users to deliver dynamic services and improve human lives. Most existing approaches have been proposed to improve energy efficiency and ensure reliable routing; however, trustworthiness and network scalability remain significant research challenges. In this research work, we introduce an AI-enabled Software-Defined Network (SDN)- driven framework to provide secure communication, trusted behavior, and effective route maintenance. By considering multiple parameters in the forwarder selection process, the proposed framework enhances network More >

  • Open Access

    REVIEW

    Deep Learning and Federated Learning in Human Activity Recognition with Sensor Data: A Comprehensive Review

    Farhad Mortezapour Shiri*, Thinagaran Perumal, Norwati Mustapha, Raihani Mohamed

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 1389-1485, 2025, DOI:10.32604/cmes.2025.071858 - 26 November 2025

    Abstract Human Activity Recognition (HAR) represents a rapidly advancing research domain, propelled by continuous developments in sensor technologies and the Internet of Things (IoT). Deep learning has become the dominant paradigm in sensor-based HAR systems, offering significant advantages over traditional machine learning methods by eliminating manual feature extraction, enhancing recognition accuracy for complex activities, and enabling the exploitation of unlabeled data through generative models. This paper provides a comprehensive review of recent advancements and emerging trends in deep learning models developed for sensor-based human activity recognition (HAR) systems. We begin with an overview of fundamental HAR… More > Graphic Abstract

    Deep Learning and Federated Learning in Human Activity Recognition with Sensor Data: A Comprehensive Review

  • Open Access

    ARTICLE

    Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms

    Ehan Sohn1, Sangmyung Lee1, Sunggon Kim1, Kiwook Sohn1, Manish Kumar2, Yongseok Son3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2761-2785, 2025, DOI:10.32604/cmes.2025.070888 - 26 November 2025

    Abstract With the accelerated growth of the Internet of Things (IoT), real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local. Since these devices often handle personal information under limited resources, cryptographic algorithms must be executed efficiently. Their computational characteristics strongly affect system performance, making it necessary to analyze resource impact and predict usage under diverse configurations. In this paper, we analyze the phase-level resource usage of AES variants, ChaCha20, ECC, and RSA on an edge device and develop a prediction model. We apply these algorithms… More >

  • Open Access

    ARTICLE

    Peltier Water Cooling System with Solar Energy and IoT Technology Demonstration Set

    Prasongsuk Songsree*, Chaiyapon Thongchaisuratkrul*

    Energy Engineering, Vol.122, No.11, pp. 4541-4559, 2025, DOI:10.32604/ee.2025.068448 - 27 October 2025

    Abstract The purpose of this research is to design and develop a demonstration Set of a water cooling system using a Peltier with solar energy and technology, and IoT (Internet of Things), and test and measure the performance of the Peltier Plate Water Cooling System Demonstration Set under different environmental conditions. To be used as a model for clean energy systems and experimental learning materials. The prototype system consists of a 100-W solar panel, a 12 V 20 Ah battery, a Peltier plate, a DS18B20 sensor, and a NodeMCU microcontroller. The system performance is determined by… More >

  • Open Access

    REVIEW

    Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework

    Inam Ullah Khan1, Fida Muhammad Khan1,*, Zeeshan Ali Haider1, Fahad Alturise2,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4307-4344, 2025, DOI:10.32604/cmc.2025.070189 - 23 October 2025

    Abstract The rapid expansion of the Internet of Things (IoT) has introduced significant security challenges due to the scale, complexity, and heterogeneity of interconnected devices. The current traditional centralized security models are deemed irrelevant in dealing with these threats, especially in decentralized applications where the IoT devices may at times operate on minimal resources. The emergence of new technologies, including Artificial Intelligence (AI), blockchain, edge computing, and Zero-Trust-Architecture (ZTA), is offering potential solutions as it helps with additional threat detection, data integrity, and system resilience in real-time. AI offers sophisticated anomaly detection and prediction analytics, and… More >

Displaying 21-30 on page 3 of 703. Per Page