Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (576)
  • Open Access

    ARTICLE

    Internet Use and Mental Health among Older Adults in China: Beneficial for Those Who Lack of Intergenerational Emotional Support or Suffering from Chronic Diseases?

    Yuxin Wang1,2,*, Jia Shi1,2

    International Journal of Mental Health Promotion, Vol.26, No.1, pp. 69-80, 2024, DOI:10.32604/ijmhp.2023.044641 - 05 February 2024

    Abstract In the 21st century, the rapid growth of the Internet has presented a significant avenue for China to respond actively to the aging population and promote the “Healthy China” strategy in an orderly manner. This study uses panel data from the China Health and Retirement Longitudinal Study (CHARLS) to empirically investigate the influence of Internet use on the mental health of older adults, particularly those who lack intergenerational emotional support and suffer from chronic diseases. This study employs a multi-period difference-in-differences (DID) method and a two-stage instrumental variable approach to address the endogenous problem. Results… More >

  • Open Access

    ARTICLE

    Lightweight Intrusion Detection Using Reservoir Computing

    Jiarui Deng1,2, Wuqiang Shen1,3, Yihua Feng4, Guosheng Lu5, Guiquan Shen1,3, Lei Cui1,3, Shanxiang Lyu1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1345-1361, 2024, DOI:10.32604/cmc.2023.047079 - 30 January 2024

    Abstract The blockchain-empowered Internet of Vehicles (IoV) enables various services and achieves data security and privacy, significantly advancing modern vehicle systems. However, the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks. As a result, an efficient intrusion detection system (IDS) becomes crucial for securing the IoV environment. Existing IDSs based on convolutional neural networks (CNN) often suffer from high training time and storage requirements. In this paper, we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats. Our approach achieves More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058 - 30 January 2024

    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system More >

  • Open Access

    ARTICLE

    An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN

    Zhihua Liu, Shengquan Liu*, Jian Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 411-433, 2024, DOI:10.32604/cmc.2023.046237 - 30 January 2024

    Abstract Network intrusion detection systems (NIDS) based on deep learning have continued to make significant advances. However, the following challenges remain: on the one hand, simply applying only Temporal Convolutional Networks (TCNs) can lead to models that ignore the impact of network traffic features at different scales on the detection performance. On the other hand, some intrusion detection methods consider multi-scale information of traffic data, but considering only forward network traffic information can lead to deficiencies in capturing multi-scale temporal features. To address both of these issues, we propose a hybrid Convolutional Neural Network that supports… More >

  • Open Access

    ARTICLE

    Enhancing IoT Security: Quantum-Level Resilience against Threats

    Hosam Alhakami*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 329-356, 2024, DOI:10.32604/cmc.2023.043439 - 30 January 2024

    Abstract The rapid growth of the Internet of Things (IoT) operations has necessitated the incorporation of quantum computing technologies to meet its expanding needs. This integration is motivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario. The combination of IoT and quantum computing creates new privacy and security problems. This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications. We investigate the incorporation of quantum computing approaches within IoT security frameworks,… More >

  • Open Access

    ARTICLE

    Smart Healthcare Activity Recognition Using Statistical Regression and Intelligent Learning

    K. Akilandeswari1, Nithya Rekha Sivakumar2,*, Hend Khalid Alkahtani3, Shakila Basheer3, Sara Abdelwahab Ghorashi2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1189-1205, 2024, DOI:10.32604/cmc.2023.034815 - 30 January 2024

    Abstract In this present time, Human Activity Recognition (HAR) has been of considerable aid in the case of health monitoring and recovery. The exploitation of machine learning with an intelligent agent in the area of health informatics gathered using HAR augments the decision-making quality and significance. Although many research works conducted on Smart Healthcare Monitoring, there remain a certain number of pitfalls such as time, overhead, and falsification involved during analysis. Therefore, this paper proposes a Statistical Partial Regression and Support Vector Intelligent Agent Learning (SPR-SVIAL) for Smart Healthcare Monitoring. At first, the Statistical Partial Regression… More >

  • Open Access

    ARTICLE

    Physics Based Digital Twin Modelling from Theory to Concept Implementation Using Coiled Springs Used in Suspension Systems

    Mohamed Ammar1,*, Alireza Mousavi1, Hamed Al-Raweshidy2,*

    Digital Engineering and Digital Twin, Vol.2, pp. 1-31, 2024, DOI:10.32604/dedt.2023.044930 - 31 January 2024

    Abstract The advent of technology around the globe based on the Internet of Things, Cloud Computing, Big Data, Cyber-Physical Systems, and digitalisation. This advancement introduced industry 4.0. It is challenging to measure how enterprises adopt the new technologies. Industry 4.0 introduced Digital Twins, given that no specific terms or definitions are given to Digital Twins still challenging to define or conceptualise the Digital Twins. Many academics and industries still use old technologies, naming it Digital Twins. This young technology is in danger of reaching the plateau despite the immense benefit to sectors. This paper proposes a… More >

  • Open Access

    ARTICLE

    IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems

    Dinesh Mavaluru1,*, Chettupally Anil Carie2, Ahmed I. Alutaibi3, Satish Anamalamudi2, Bayapa Reddy Narapureddy4, Murali Krishna Enduri2, Md Ezaz Ahmed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1487-1503, 2024, DOI:10.32604/cmes.2023.045277 - 29 January 2024

    Abstract In this paper, we present a comprehensive system model for Industrial Internet of Things (IIoT) networks empowered by Non-Orthogonal Multiple Access (NOMA) and Mobile Edge Computing (MEC) technologies. The network comprises essential components such as base stations, edge servers, and numerous IIoT devices characterized by limited energy and computing capacities. The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption. The system operates in discrete time slots and employs a quasi-static approach, with a specific focus on the complexities of… More >

  • Open Access

    REVIEW

    Wireless Positioning: Technologies, Applications, Challenges, and Future Development Trends

    Xingwang Li1,2, Hua Pang1, Geng Li1,*, Junjie Jiang1, Hui Zhang3, Changfei Gu4, Dong Yuan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1135-1166, 2024, DOI:10.32604/cmes.2023.031534 - 29 January 2024

    Abstract The development of the fifth-generation (5G) mobile communication systems has entered the commercialization stage. 5G has a high data rate, low latency, and high reliability that can meet the basic demands of most industries and daily life, such as the Internet of Things (IoT), intelligent transportation systems, positioning, and navigation. The continuous progress and development of society have aroused wide concern. Positioning accuracy is the core demand for the applications, especially in complex environments such as airports, warehouses, supermarkets, and basements. However, many factors also affect the accuracy of positioning in those environments, for example, More >

  • Open Access

    ARTICLE

    Secure and Reliable Routing in the Internet of Vehicles Network: AODV-RL with BHA Attack Defense

    Nadeem Ahmed1,*, Khalid Mohammadani2, Ali Kashif Bashir3,4,5, Marwan Omar6, Angel Jones7, Fayaz Hassan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 633-659, 2024, DOI:10.32604/cmes.2023.031342 - 30 December 2023

    Abstract Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles (IoV). However, intricate security challenges are intertwined with technological progress: Vehicular ad hoc Networks (VANETs), a core component of IoV, face security issues, particularly the Black Hole Attack (BHA). This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability; also, BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether. Recognizing the importance of this challenge, we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier… More >

Displaying 61-70 on page 7 of 576. Per Page