Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (493)
  • Open Access

    ARTICLE

    Peltier Water Cooling System with Solar Energy and IoT Technology Demonstration Set

    Prasongsuk Songsree*, Chaiyapon Thongchaisuratkrul*

    Energy Engineering, Vol.122, No.11, pp. 4541-4559, 2025, DOI:10.32604/ee.2025.068448 - 27 October 2025

    Abstract The purpose of this research is to design and develop a demonstration Set of a water cooling system using a Peltier with solar energy and technology, and IoT (Internet of Things), and test and measure the performance of the Peltier Plate Water Cooling System Demonstration Set under different environmental conditions. To be used as a model for clean energy systems and experimental learning materials. The prototype system consists of a 100-W solar panel, a 12 V 20 Ah battery, a Peltier plate, a DS18B20 sensor, and a NodeMCU microcontroller. The system performance is determined by… More >

  • Open Access

    REVIEW

    Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework

    Inam Ullah Khan1, Fida Muhammad Khan1,*, Zeeshan Ali Haider1, Fahad Alturise2,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4307-4344, 2025, DOI:10.32604/cmc.2025.070189 - 23 October 2025

    Abstract The rapid expansion of the Internet of Things (IoT) has introduced significant security challenges due to the scale, complexity, and heterogeneity of interconnected devices. The current traditional centralized security models are deemed irrelevant in dealing with these threats, especially in decentralized applications where the IoT devices may at times operate on minimal resources. The emergence of new technologies, including Artificial Intelligence (AI), blockchain, edge computing, and Zero-Trust-Architecture (ZTA), is offering potential solutions as it helps with additional threat detection, data integrity, and system resilience in real-time. AI offers sophisticated anomaly detection and prediction analytics, and… More >

  • Open Access

    REVIEW

    Federated Learning in Convergence ICT: A Systematic Review on Recent Advancements, Challenges, and Future Directions

    Imran Ahmed1,#, Misbah Ahmad2,3,#, Gwanggil Jeon4,5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4237-4273, 2025, DOI:10.32604/cmc.2025.068319 - 23 October 2025

    Abstract The rapid convergence of Information and Communication Technologies (ICT), driven by advancements in 5G/6G networks, cloud computing, Artificial Intelligence (AI), and the Internet of Things (IoT), is reshaping modern digital ecosystems. As massive, distributed data streams are generated across edge devices and network layers, there is a growing need for intelligent, privacy-preserving AI solutions that can operate efficiently at the network edge. Federated Learning (FL) enables decentralized model training without transferring sensitive data, addressing key challenges around privacy, bandwidth, and latency. Despite its benefits in enhancing efficiency, real-time analytics, and regulatory compliance, FL adoption faces… More >

  • Open Access

    ARTICLE

    Transfer Learning-Based Approach with an Ensemble Classifier for Detecting Keylogging Attack on the Internet of Things

    Yahya Alhaj Maz1, Mohammed Anbar1, Selvakumar Manickam1,*, Mosleh M. Abualhaj2, Sultan Ahmed Almalki3, Basim Ahmad Alabsi4

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5287-5307, 2025, DOI:10.32604/cmc.2025.068257 - 23 October 2025

    Abstract The Internet of Things (IoT) is an innovation that combines imagined space with the actual world on a single platform. Because of the recent rapid rise of IoT devices, there has been a lack of standards, leading to a massive increase in unprotected devices connecting to networks. Consequently, cyberattacks on IoT are becoming more common, particularly keylogging attacks, which are often caused by security vulnerabilities on IoT networks. This research focuses on the role of transfer learning and ensemble classifiers in enhancing the detection of keylogging attacks within small, imbalanced IoT datasets. The authors propose… More >

  • Open Access

    ARTICLE

    Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications

    Reza Nadimi1,*, Maryam Hashemi2, Koji Tokimatsu3

    Journal on Internet of Things, Vol.7, pp. 49-69, 2025, DOI:10.32604/jiot.2025.070822 - 30 September 2025

    Abstract Existing Internet of Things (IoT) systems that rely on Amazon Web Services (AWS) often encounter inefficiencies in data retrieval and high operational costs, especially when using DynamoDB for large-scale sensor data. These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems. This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services. The proposed method employs AWS Lambda functions with Amazon Relational Database Service (RDS) to facilitate the transmission of data collected from temperature and humidity sensors to the… More >

  • Open Access

    ARTICLE

    Towards a Real-Time Indoor Object Detection for Visually Impaired Users Using Raspberry Pi 4 and YOLOv11: A Feasibility Study

    Ayman Noor1,2, Hanan Almukhalfi1,2, Arthur Souza2,3, Talal H. Noor1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3085-3111, 2025, DOI:10.32604/cmes.2025.068393 - 30 September 2025

    Abstract People with visual impairments face substantial navigation difficulties in residential and unfamiliar indoor spaces. Neither canes nor verbal navigation systems possess adequate features to deliver real-time spatial awareness to users. This research work represents a feasibility study for the wearable IoT-based indoor object detection assistant system architecture that employs a real-time indoor object detection approach to help visually impaired users recognize indoor objects. The system architecture includes four main layers: Wearable Internet of Things (IoT), Network, Cloud, and Indoor Object Detection Layers. The wearable hardware prototype is assembled using a Raspberry Pi 4, while the… More >

  • Open Access

    ARTICLE

    Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol (iSTSP) for Security-Critical Time-Sensitive WSNs

    Ramadan Abdul-Rashid1, Mohd Amiruddin Abd Rahman1,*, Abdulaziz Yagoub Barnawi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3213-3250, 2025, DOI:10.32604/cmes.2025.066589 - 30 September 2025

    Abstract Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks (WSNs), especially in security-critical, time-sensitive applications. However, most existing protocols degrade substantially under malicious interference. We introduce iSTSP, an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust, precise synchronization even in hostile environments: (1) trust preprocessing that filters node participation using behavioral trust scoring; (2) anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time; (3) reliability-weighted consensus that prioritizes high-trust nodes during time aggregation; and (4) convergence-optimized synchronization… More >

  • Open Access

    ARTICLE

    A Dynamic Deceptive Defense Framework for Zero-Day Attacks in IIoT: Integrating Stackelberg Game and Multi-Agent Distributed Deep Deterministic Policy Gradient

    Shigen Shen1,2, Xiaojun Ji1,*, Yimeng Liu1

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3997-4021, 2025, DOI:10.32604/cmc.2025.069332 - 23 September 2025

    Abstract The Industrial Internet of Things (IIoT) is increasingly vulnerable to sophisticated cyber threats, particularly zero-day attacks that exploit unknown vulnerabilities and evade traditional security measures. To address this critical challenge, this paper proposes a dynamic defense framework named Zero-day-aware Stackelberg Game-based Multi-Agent Distributed Deep Deterministic Policy Gradient (ZSG-MAD3PG). The framework integrates Stackelberg game modeling with the Multi-Agent Distributed Deep Deterministic Policy Gradient (MAD3PG) algorithm and incorporates defensive deception (DD) strategies to achieve adaptive and efficient protection. While conventional methods typically incur considerable resource overhead and exhibit higher latency due to static or rigid defensive mechanisms,… More >

  • Open Access

    ARTICLE

    Real-Time Communication Driver for MPU Accelerometer Using Predictable Non-Blocking I2C Communication

    Valentin Stangaciu*, Mihai-Vladimir Ghimpau, Adrian-Gabriel Sztanarec

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3213-3229, 2025, DOI:10.32604/cmc.2025.068844 - 23 September 2025

    Abstract Along with process control, perception represents the main function performed by the Edge Layer of an Internet of Things (IoT) network. Many of these networks implement various applications where the response time does not represent an important parameter. However, in critical applications, this parameter represents a crucial aspect. One important sensing device used in IoT designs is the accelerometer. In most applications, the response time of the embedded driver software handling this device is generally not analysed and not taken into account. In this paper, we present the design and implementation of a predictable real-time More >

  • Open Access

    ARTICLE

    Blockchain and Smart Contracts: An Effective Approach for the Transaction Security & Privacy in Electronic Medical Records

    Amal Al-Rasheed1, Hashim Ali2,*, Rahim Khan2,*, Aamir Saeed3

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3419-3436, 2025, DOI:10.32604/cmc.2025.065156 - 23 September 2025

    Abstract In the domain of Electronic Medical Records (EMRs), emerging technologies are crucial to addressing longstanding concerns surrounding transaction security and patient privacy. This paper explores the integration of smart contracts and blockchain technology as a robust framework for securing sensitive healthcare data. By leveraging the decentralized and immutable nature of blockchain, the proposed approach ensures transparency, integrity, and traceability of EMR transactions, effectively mitigating risks of unauthorized access and data tampering. Smart contracts further enhance this framework by enabling the automation and enforcement of secure transactions, eliminating reliance on intermediaries and reducing the potential for… More >

Displaying 1-10 on page 1 of 493. Per Page