Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (97)
  • Open Access

    ARTICLE

    Energy-Related Services as a Business: Eco-Transformation Logic to Support the Low-Carbon Transition

    Oleksandr Kovalko1, Tatiana Eutukhova2, Oleksandr Novoseltsev3,*

    Energy Engineering, Vol.119, No.1, pp. 103-121, 2022, DOI:10.32604/EE.2022.017709 - 22 November 2021

    Abstract The transition to low-carbon development has been recognized as one of the most important directions for the transformation of national economies in most countries. Today we can identify two of the most common service-oriented logical models of this transition. These are models of Service-Dominant Logic and Product-Service Systems that are used in this study to create a service-oriented platform for stimulating business development in the field of energy-related (ER) services. The establishment of such a platform is being considered based on the conceptual provisions of the global business ecosystem. Such a platform has been found… More >

  • Open Access

    ARTICLE

    Interactive Middleware Services for Heterogeneous Systems

    Vasanthi Raghupathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, Sudhakar Sengan4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1241-1253, 2022, DOI:10.32604/csse.2022.021997 - 10 November 2021

    Abstract Computing has become more invisible, widespread and ubiquitous since the inception of the Internet of Things (IoT) and Web of Things. Multiple devices that surround us meet user’s requirements everywhere. Multiple Middleware Framework (MF) designs have come into existence because of the rapid development of interactive services in Heterogeneous Systems. This resulted in the delivery of interactive services throughout Heterogeneous Environments (HE). Users are given free navigation between devices in a widespread environment and continuously interact with each other from any chosen device. Numerous interactive devices with recent interactive platforms (for example, Smart Phones, Mobile… More >

  • Open Access

    ARTICLE

    DDoS Detection in SDN using Machine Learning Techniques

    Muhammad Waqas Nadeem, Hock Guan Goh*, Vasaki Ponnusamy, Yichiet Aun

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 771-789, 2022, DOI:10.32604/cmc.2022.021669 - 03 November 2021

    Abstract Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure. The SDN controller is considered as the operating system of the SDN based network infrastructure, and it is responsible for executing the different network applications and maintaining the network services and functionalities. Despite all its tremendous capabilities, the SDN face many security issues due to the complexity of the SDN architecture. Distributed denial of services (DDoS) is a common attack on SDN due to its centralized architecture, especially at the control layer of… More >

  • Open Access

    ARTICLE

    Automatic License Plate Recognition System for Vehicles Using a CNN

    Parneet Kaur1, Yogesh Kumar1, Shakeel Ahmed2,*, Abdulaziz Alhumam2, Ruchi Singla3, Muhammad Fazal Ijaz4

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 35-50, 2022, DOI:10.32604/cmc.2022.017681 - 03 November 2021

    Abstract Automatic License Plate Recognition (ALPR) systems are important in Intelligent Transportation Services (ITS) as they help ensure effective law enforcement and security. These systems play a significant role in border surveillance, ensuring safeguards, and handling vehicle-related crime. The most effective approach for implementing ALPR systems utilizes deep learning via a convolutional neural network (CNN). A CNN works on an input image by assigning significance to various features of the image and differentiating them from each other. CNNs are popular for license plate character recognition. However, little has been reported on the results of these systems with More >

  • Open Access

    ARTICLE

    Fully Authentication Services Scheme for NFC Mobile Payment Systems

    Munefah Alshammari*, Shadi Nashwan

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 401-428, 2022, DOI:10.32604/iasc.2022.022065 - 26 October 2021

    Abstract One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC… More >

  • Open Access

    ARTICLE

    Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective

    Abdullah Alharbi1, Masood Ahmad2, Wael Alosaimi1, Hashem Alyami3, Alka Agrawal2, Rajeev Kumar4,*, Abdul Wahid5, Raees Ahmad Khan2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 557-567, 2022, DOI:10.32604/csse.2022.020843 - 25 October 2021

    Abstract Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuity. High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability. Hence, there is a need to bridge the gap between security and durability of the… More >

  • Open Access

    ARTICLE

    Hybrid Metaheuristics Web Service Composition Model for QoS Aware Services

    P. Rajeswari*, K. Jayashree

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 511-524, 2022, DOI:10.32604/csse.2022.020352 - 25 October 2021

    Abstract Recent advancements in cloud computing (CC) technologies signified that several distinct web services are presently developed and exist at the cloud data centre. Currently, web service composition gains maximum attention among researchers due to its significance in real-time applications. Quality of Service (QoS) aware service composition concerned regarding the election of candidate services with the maximization of the whole QoS. But these models have failed to handle the uncertainties of QoS. The resulting QoS of composite service identified by the clients become unstable and subject to risks of failing composition by end-users. On the other… More >

  • Open Access

    ARTICLE

    Ontology Based Ocean Knowledge Representation for Semantic Information Retrieval

    Anitha Velu*, Menakadevi Thangavelu

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4707-4724, 2022, DOI:10.32604/cmc.2022.020095 - 11 October 2021

    Abstract The drastic growth of coastal observation sensors results in copious data that provide weather information. The intricacies in sensor-generated big data are heterogeneity and interpretation, driving high-end Information Retrieval (IR) systems. The Semantic Web (SW) can solve this issue by integrating data into a single platform for information exchange and knowledge retrieval. This paper focuses on exploiting the SW base system to provide interoperability through ontologies by combining the data concepts with ontology classes. This paper presents a 4-phase weather data model: data processing, ontology creation, SW processing, and query engine. The developed Oceanographic Weather More >

  • Open Access

    ARTICLE

    Blockchain and Machine Learning for Intelligent Multiple Factor-Based Ride-Hailing Services

    Zeinab Shahbazi, Yung-Cheol Byun*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4429-4446, 2022, DOI:10.32604/cmc.2022.019755 - 11 October 2021

    Abstract One of the common transportation systems in Korea is calling taxis through online applications, which is more convenient for passengers and drivers in the modern area. However, the driver's passenger taxi request can be rejected based on the driver's location and distance. Therefore, there is a need to specify driver's acceptance and rejection of the received request. The security of this system is another main core to save the transaction information and safety of passengers and drivers. In this study, the origin and destination of the Jeju island South Korea were captured from T-map and More >

  • Open Access

    REVIEW

    A Review on Privacy Preservation of Location-Based Services in Internet of Things

    Raniyah Wazirali*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 767-779, 2022, DOI:10.32604/iasc.2022.019243 - 22 September 2021

    Abstract Internet of Things (IoT) has become popular with the rapid development of sensing devices, and it offers a large number of services. Location data is one of the most important information required for IoT systems. With the widespread of Location Based Services (LBS) applications, the privacy and security threats are also emerging. Recently, a large number of studies focused on localization and positioning functionalities, however, the risk associated with user privacy has not been sufficiently addressed so far. Therefore, privacy and security of device location in IoT systems is an active area of research. Since… More >

Displaying 41-50 on page 5 of 97. Per Page