Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks

    Saima Kauser1, Tauqeer Safdar Malik1,*, Mohd Hilmi Hasan2, Emelia Akashah P. Akhir2, Syed Muhammad Husnain Kazmi3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1251-1273, 2022, DOI:10.32604/cmc.2022.022475

    Abstract A web browser is the most basic tool for accessing the internet from any of the machines/equipment. Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors. Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack. These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment. Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and… More >

  • Open Access

    ARTICLE

    Machine Learning-based Stable P2P IPTV Overlay

    Muhammad Javid Iqbal1,2, Ihsan Ullah2,*, Muhammad Ali2, Atiq Ahmed2, Waheed Noor2, Abdul Basit2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5381-5397, 2022, DOI:10.32604/cmc.2022.024116

    Abstract Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service providers. Since Internet was not designed for such services during its inception, such a service poses some serious challenges including cost and scalability. Peer-to-Peer (P2P) Internet Protocol Television (IPTV) is an application-level distributed paradigm to offer live video contents. In terms of ease of deployment, it has emerged as a serious alternative to client server, Content Delivery Network (CDN) and IP multicast solutions. Nevertheless, P2P approach has struggled to provide the desired streaming quality due to a number of… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Predictive Model for P2P Energy Trading in TEM

    Pudi Sekhar1, T. J. Benedict Jose2, Velmurugan Subbiah Parvathy3, E. Laxmi Lydia4, Seifedine Kadry5, Kuntha Pin6, Yunyoung Nam7,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1473-1487, 2022, DOI:10.32604/cmc.2022.022110

    Abstract With the incorporation of distributed energy systems in the electric grid, transactive energy market (TEM) has become popular in balancing the demand as well as supply adaptively over the grid. The classical grid can be updated to the smart grid by the integration of Information and Communication Technology (ICT) over the grids. The TEM allows the Peer-to-Peer (P2P) energy trading in the grid that effectually connects the consumer and prosumer to trade energy among them. At the same time, there is a need to predict the load for effectual P2P energy trading and can be accomplished by the use of… More >

  • Open Access

    ARTICLE

    Optimal Load Forecasting Model for Peer-to-Peer Energy Trading in Smart Grids

    Lijo Jacob Varghese1, K. Dhayalini2, Suma Sira Jacob3, Ihsan Ali4,*, Abdelzahir Abdelmaboud5, Taiseer Abdalla Elfadil Eisa6

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1053-1067, 2022, DOI:10.32604/cmc.2022.019435

    Abstract Peer-to-Peer (P2P) electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer. It also decreases the quantity of line loss incurred in Smart Grid (SG). But, uncertainities in demand and supply of the electricity might lead to instability in P2P market for both prosumer and consumer. In recent times, numerous Machine Learning (ML)-enabled load predictive techniques have been developed, while most of the existing studies did not consider its implicit features, optimal parameter selection, and prediction stability. In order to overcome fulfill this research gap, the current research paper presents a new Multi-Objective Grasshopper… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource. Many… More >

  • Open Access

    ARTICLE

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Jehad Saad Alqurni5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 983-1001, 2021, DOI:10.32604/cmc.2021.015371

    Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates by contacting subsets of each… More >

  • Open Access

    ARTICLE

    Embracing and Growing as a Peer Support Provider: An Analysis of Participants’ Experience in a Peer Support Program Based on the Recovery Model of Mental Illness

    Su Yeon Kim1, Kyung Mi Lim2, Soo Jin Kim3, Go-Un Kim4, Boyoung Kim5,*

    International Journal of Mental Health Promotion, Vol.22, No.4, pp. 261-270, 2020, DOI:10.32604/IJMHP.2020.013279

    Abstract Peer support is an important factor in the recovery of persons with mental illness. Most studies have focused on the effects of peer support programs on participants rather than on the process of mental health recovery. This study was a qualitative analysis of the experience of participants in a peer support provider program based on the recovery model of mental illness in Korean communities. The participants were recruited through flyers, and interested candidates were screened to determine whether they met the eligibility criteria. The total number of participants in individual interviews was 10, comprising 5 males and 5 females. The… More >

  • Open Access

    ARTICLE

    A Sentinel-Based Peer Assessment Mechanism for Collaborative Learning

    Cong Wang1, Mingming Zhao2, Qinyue Wang2, 3, Min Li2, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2309-2319, 2020, DOI:10.32604/cmc.2020.09958

    Abstract This paper introduces a novel mechanism to improve the performance of peer assessment for collaborative learning. Firstly, a small set of assignments which have being pre-scored by the teacher impartially, are introduced as “sentinels”. The reliability of a reviewer can be estimated by the deviation between the sentinels’ scores judged by the reviewers and the impartial scores. Through filtering the inferior reviewers by the reliability, each score can then be subjected into mean value correction and standard deviation correction processes sequentially. Then the optimized mutual score which mitigated the influence of the subjective differences of the reviewers are obtained. We… More >

  • Open Access

    ARTICLE

    Small unrepaired atrial septal defects display impaired exercise capacity compared with healthy peers

    Sebastian Udholm, Christian Rex, Filip Eckerström, Mine Onat, Camilla Nyboe, Vibeke E. Hjortdal

    Congenital Heart Disease, Vol.14, No.3, pp. 372-379, 2019, DOI:10.1111/chd.12740

    Abstract Objective: Adult patients with small, unrepaired atrial septal defects have an in‐ creased risk of pneumonia, atrial fibrillation, and stroke. Furthermore, they have higher late mortality than the background population. The functional capacity is un‐ known in these patients. Therefore, our objective was to determine exercise capacity in adult patients diagnosed with an unrepaired atrial septal defect compared to healthy controls. Design: A cross‐sectional study. Patients: Adult patients with small, unrepaired atrial septal defects, aged 18‐65, di‐ agnosed between 1953 and 2011. Interventions: Cardiopulmonary exercise test was performed using an incremental bicycle test and gas exchange was measured using breath‐by‐breath… More >

  • Open Access

    ARTICLE

    A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

    Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848

    Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of a machine learning algorithm to… More >

Displaying 11-20 on page 2 of 22. Per Page